Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Cambridge Five Spy Ring — Part 36
Page 96
96 / 130
~ 7 7 TOTO a
. - . e . .
Tan - = re - owe o %
- { . 7~ - s Toe oy > at + a
* _ - ~ . me _ nd - ; aa
+. f ‘ woo * . =
: 1. On 23rd November, 1955, the Prime Minister informed the House
of Commons that a Conference of Privy Councillors had been set up with the
following terms of reference:—- . “ . Soy
“To examine the security procedures now applied In‘ the public
_'. , services and to consider whether any ef precautions are called for
+ ‘The Conference consisted of the following Privy Councillors:— |”
"2 7 ‘The Lord President of the Council: 7 he ee
; The Secretary of State for the Home Department; os
_. The Lord Jowitt, _ a OO
“ort ~ | ‘The right hon, Member for Lewisham, South (Mr. H. Morrison);
‘tes + The right hon. Member for Vauxhall (Mr. G. R. Strauss); ons
- The Permancat ‘Secretary to Her Majesty's ‘Treasury. | rag
2 The Conference have presented their Report and their recommenda- ©
tions have been considered by Her Majesty's Government. .- > - oY
3. The Prime Minister stated on 29th November last that if there were |
steps which could be made public as a result of the Conference, there would, |. -
of course, be a report to Parliament. The Report of the Conference includes ~ —
a close examination of the security procedures in the public services, and
it would not be in the public interest to publish the full text of the Report ;
of to make known all its recommendations. But in compliance with the.
undertaking given by the Prime Minister, this White Paper gives the substance ~ -
of the Report in so far as it can properly be made public, including a number «
. Of specific recommendations, : . : :
hat ahi
‘ -
ep
_
we feel tet eek
4. The report starts by an analysis of the general nature of the security. -
cisks with which this country is faced to-day. The Conference point out”.
that, whereas once the main risk to be guarded against was espionage by -
foreign Powers carried out by professional agents, to-day the chief risks -
are presented by Communists and by other persons who for one reason
or another are subject to Communist influence. The Communist faith’ ..~
overrides a man's normal loyalties to his country and induces the belief ©. |
that it is justifiable to hand over secret information to the Communist
Party or to the Communist foreign Power. This risk from Communists
is not. however. confined to party members. either open or underground, but
- extends to sympathisers with Communism.- - + Ce
__5. At one time the Fascist ideology also presented considerable security ~
risks. Although to-day the chief cisk is that presented by Communism,
_ the security arrangements instituted in 8 were directed, and will continue _,
’ to be directed. against Communism Fascism slike. In this paper for == +
- ~ onvenience and brevity the term “Communism” ‘is to cover
Communism and Fascism alike. Se
6. One of the chief problems of security to-day is thus to identify
the members of the British Communist Party. to be informed of its activities . . |
and to identify that wider body of those who are both sympathetic to _
Communism, or susceptible to munist pressure and present a danger
r ”
7
. toe . en - ~~ a
. aes -
= 4 r 4
‘ *
lowe. | | s 3
‘ . . . a .
i tcltany LMLm oye eee A « < “ =
at esha Set _. —_ _ nnn ew
a Te ernie maiemmnlael
- - * ~ = 7 } _ al *
~ i a . 7
. OA ile -
o : add - ea ”
- i” mn -
_- = . : _
* pe egg wn apie’ mp RE TT pT ~ EE ET TE A
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic