◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Cambridge Five Spy Ring — Part 36

130 pages · May 09, 2026 · Document date: Apr 16, 1922 · Broad topic: Terrorism · Topic: Cambridge Five Spy Ring · 130 pages OCR'd
← Back to feed
~ 7 7 TOTO a . - . e . . Tan - = re - owe o % - { . 7~ - s Toe oy > at + a * _ - ~ . me _ nd - ; aa +. f ‘ woo * . = : 1. On 23rd November, 1955, the Prime Minister informed the House of Commons that a Conference of Privy Councillors had been set up with the following terms of reference:—- . “ . Soy “To examine the security procedures now applied In‘ the public _'. , services and to consider whether any ef precautions are called for + ‘The Conference consisted of the following Privy Councillors:— |” "2 7 ‘The Lord President of the Council: 7 he ee ; The Secretary of State for the Home Department; os _. The Lord Jowitt, _ a OO “ort ~ | ‘The right hon, Member for Lewisham, South (Mr. H. Morrison); ‘tes + The right hon. Member for Vauxhall (Mr. G. R. Strauss); ons - The Permancat ‘Secretary to Her Majesty's ‘Treasury. | rag 2 The Conference have presented their Report and their recommenda- © tions have been considered by Her Majesty's Government. .- > - oY 3. The Prime Minister stated on 29th November last that if there were | steps which could be made public as a result of the Conference, there would, |. - of course, be a report to Parliament. The Report of the Conference includes ~ — a close examination of the security procedures in the public services, and it would not be in the public interest to publish the full text of the Report ; of to make known all its recommendations. But in compliance with the. undertaking given by the Prime Minister, this White Paper gives the substance ~ - of the Report in so far as it can properly be made public, including a number « . Of specific recommendations, : . : : hat ahi ‘ - ep _ we feel tet eek 4. The report starts by an analysis of the general nature of the security. - cisks with which this country is faced to-day. The Conference point out”. that, whereas once the main risk to be guarded against was espionage by - foreign Powers carried out by professional agents, to-day the chief risks - are presented by Communists and by other persons who for one reason or another are subject to Communist influence. The Communist faith’ ..~ overrides a man's normal loyalties to his country and induces the belief ©. | that it is justifiable to hand over secret information to the Communist Party or to the Communist foreign Power. This risk from Communists is not. however. confined to party members. either open or underground, but - extends to sympathisers with Communism.- - + Ce __5. At one time the Fascist ideology also presented considerable security ~ risks. Although to-day the chief cisk is that presented by Communism, _ the security arrangements instituted in 8 were directed, and will continue _, ’ to be directed. against Communism Fascism slike. In this paper for == + - ~ onvenience and brevity the term “Communism” ‘is to cover Communism and Fascism alike. Se 6. One of the chief problems of security to-day is thus to identify the members of the British Communist Party. to be informed of its activities . . | and to identify that wider body of those who are both sympathetic to _ Communism, or susceptible to munist pressure and present a danger r ” 7 . toe . en - ~~ a . aes - = 4 r 4 ‘ * lowe. | | s 3 ‘ . . . a . i tcltany LMLm oye eee A « < “ = at esha Set _. —_ _ nnn ew a Te ernie maiemmnlael - - * ~ = 7 } _ al * ~ i a . 7 . OA ile - o : add - ea ” - i” mn - _- = . : _ * pe egg wn apie’ mp RE TT pT ~ EE ET TE A
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 97
Jump straight to page 97 of 130.
Reader
Cambridge Five Spy Ring — Part 35
Stay inside Cambridge Five Spy Ring with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
Cambridge Five Spy Ring Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the Terrorism archive hub and the more specific Cambridge Five Spy Ring topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
investigation
Related subtopics
9-11 Commission Report
74 documents · 1592 known pages
Subtopic
Amerithrax
56 documents · 3567 known pages
Subtopic
16th Street Church Bombing
33 documents · 4210 known pages
Subtopic
Irgun Zvai Leumi
8 documents · 264 known pages
Subtopic
American Nazi Party
2 documents · 120 known pages
Subtopic
Aryan Circle
2 documents · 36 known pages
Subtopic