Jon E. Lewis

The Mammoth Book of

CONSPIRACIES

INTRODUCTION

These are, of course, theories. If they were proven beyond all doubt they would be conspiracy facts.

This book, a companion to The Mammoth Book of Cover-Ups, is a guide to the weirdest, wackiest and the most dangerous conspiracy theories around. I have, hopefully, steered a path between the Scylla of outright scepticism and the Charybdis of wide-open gullibility, the latter constantly boosted by the Internet, a self-referring universe where one blogger’s claim becomes one researcher’s proof. As a measuring stick of a theory’s veracity, I have included an “ALERT” guide, with a 1 to 10 rating, with 1 being “No way, Jose” and 10 being “It’s a cert”. A small number of cases have appeared in Cover-Ups, but reappear here in the light of more and new information.

There are conspiracy theories that cross the edge of madness—David Icke’s “reptilian-humanoid takeover” and Vril-powered UFOs driven by Nazis come hurtling to mind—but there are plenty out there that raise real issues about the abuse of power by secretive groups of politicos, CEOs, medicos and military honchos. Everyone should sleep a little less easy and be a little more vigilant after reading about the US Army’s “Operation Northwoods” (which proposed false-flag terrorist outrages on the American people and the sticking of the blame on Cuba) and you may want to give the bio-research facility at Plum Island a wide, wide detour.

As they say: just because you are paranoid, it doesn’t mean that they aren’t out to get you…

Jon E. Lewis

APPLE

Ever wonder how two tech geeks like Steve Jobs and Steve Wozniak made their billions?

Conspiracists know the answer. Jobs and Wozniak built the first Macintosh computer in a California garage and when it failed to raise interest they did a deal with the devil, selling their souls in exchange for success on earth. The proof was on the price tag of the first Mac: $666.66. The mark of the Beast. Rounding off the evidence is the Apple logo. There’s a bite taken out of the apple, the forbidden fruit.

Alternatively, Apple did a deal with Big Brother. Take a look at an iPhone. It plays, unknown to its owner, iSpy on you. A secret file stores latitude and longitude, complete with a dater. The file is unencrypted and is transferred to any device the iPhone syncs with. Thus anyone with access to the owner’s computer can track his or her movements. Invasion of privacy anyone? Apple’s snooping habit doesn’t end with the locator file. The “Hackintosh hacker” alleged that Apple has stuck a code into the iPhone that tracks keyboard use, so every time the user taps in information this is relayed to Apple HQ. The claim has never been verified but Apple’s appetite for gathering personal information is infamous; in 2010 the company applied for a patent (“Systems and Methods for Identifying Unauthorized Users of an Electronic Device”) that could record the heartbeat of iPhone users, as well as covertly photograph them and their surroundings. If Apple collects information, as sure as God made little green apples, law enforcement agencies will one day come calling to use it. All of which has made dark rooms full of pale conspiracy theorists wonder if Apple is not doing the CIA/FBI’s job for them.

Apple justified the patent application as a security measure to prevent thieves using stolen phones, but as the Electronic Frontier Foundation (EEF) watchdog pointed out the technology also enabled Apple to cut off customers who pimped (quite lawfully) their devices. Improper use would also be reported to the Orwellian sounding “proper authorities”. The EEF christened the patent “traitorware”. Apple’s inclination to control is almost as great as its inclination to spy. On prudishly deciding that cartoonist Mark Fiore’s NewsToons app was too satirical for its taste Apple rejected it. When Fiore won a Pulitzer though they installed the app. Never one to miss a commercial opportunity, Apple.

Of course, Apple likes to keep its own secrets very close to its chips: the company is heavily controlling of image and market share. When Consumer Reports had the brazen gall to say it couldn’t recommend the iPhone 4 until the antenna was improved, threads discussing the issue on Mac.com forums mysteriously disappeared overnight. And only an absolute cynic would claim that Apple’s 2010 litigious spat with internet mag Gizmodo about its review of an iPhone 4 prototype left in a bar and passed on to the website was a staged publicity stunt, what with the new phone getting oodles of free publicity, and security at Apple HQ being Fort Knox tight.

Byte into an Apple. Indeed.

Further Reading

www.eff.org/deeplinks/2010/08/steve-jobs-watching-you-apple-seeking-patent-0

AREA 51

“Warning. Restricted Area. Photography of This Area is Prohibited”.

So read the signs staked around Area 51, a high-security military base in the Nevada desert, 90 miles (145 km) north of Las Vegas. Also known as Groom Lake, the facility, which comprises thousands of acres, is surrounded by security fencing and intruder detection systems, and is regularly patrolled. A no-fly zone operates above it. The US Government, you get the feeling, wants to keep peeping eyes away from what happens in Area 51.

Why? There is a long-standing belief by conspiracists that Area 51 houses the UFO disc found at Roswell, as well as other crashed alien spaceships. At Area 51, the theory goes, the recovered UFOs are back-engineered so that their technology can be utilized by the US military. The latter are helped—either willingly or unwillingly—by captured alien pilots.

Few of the human government employees who work at Groom have ever talked about their work, but two who did were Leo Williams and Bob Lazar. Williams claimed to have worked in alien technology evaluation, the results of which informed the design of the B-2 stealth bomber. In 1989 Lazar announced on local TV that he too had been involved in “back-engineering” at Groom’s S-4 hangars complex, including assessment of the Roswell craft’s propulsion system. He had even uncovered “Gravity B”, a force arising from the manipulation of a new nuclear element, “ununpentium”.

Neither Williams nor Lazar proved very convincing witnesses. Lazar had invented his purported MIT physics qualification and before working in back-engineering had been engaged in the rather less than cutting edge employment of managing a photo shop. A steady stream of sightings of strange lights and craft at Groom, however, kept alive the notion of Area 51 as a top-secret UFO lab, perhaps the manufacturing plant of Black Helicopters.

Certainly, Area 51 has been the testing ground for weird and wonderful aircraft. The U-2 spy plane was flown there; so was the SR-71 Blackbird, the B-2 stealth bomber, the F-117 stealth fighter, and the unmanned aerial vehicle known as the “Beast of Kandahar” (and officially as RQ-170 Sentinel) that spied on the Abbottabad compound of Osama bin Laden. And these are only the craft the public has been informed about. It’s reasonable to suppose that other prototype and avant-garde aircraft have taken to the air at Groom, less reasonable to suppose that they have been developed from alien technology.

There was, though, one conspiracy taking place at Area 51. Bill Sweetman, editor-in-chief of defence technology for Aviation Week, maintains that the government absolutely encouraged “deliberate disinformation campaigns to generate a lot of noise about UFOs back in the 1950s and 1960s to cover

Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату