The Mammoth Book of Conspiracies
Brought to you by KeVkRaY
Jon E. Lewis is a historian and writer, whose books on history and military history are sold worldwide. He is also the editor of many The Mammoth Book of anthologies, including the best-selling Cover-Ups.
Other titles by Jon E. Lewis
The Mammoth Book of Antarctic Journeys
The Mammoth Book of Cover-Ups
The Mammoth Book of Native Americans
The Mammoth Book of How It Happened
The Mammoth Book of On the Edge
The Mammoth Book of Pirates
The Mammoth Book of True War Stories
The Mammoth Book of Wild Journeys
London: The Autobiography
Rome: The Autobiography
World War II: The Autobiography
Survivor: The Autobiography
SAS: The Autobiography
Spitfire: The Autobiography
Constable & Robinson Ltd
55–56 Russell Square
London WC1B 4HP
www.constablerobinson.com
First published in the UK by Robinson,
an imprint of Constable & Robinson Ltd, 2012
Copyright © J. Lewis-Stempel, 2012
The right of Jon E. Lewis to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs & Patents Act 1988.
All rights reserved. This book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, re-sold, hired out or otherwise circulated in any form of binding or cover other than that in which it is published and without a similar condition including this condition being imposed on the subsequent purchaser.
A copy of the British Library Cataloguing in Publication
Data is available from the British Library
UK ISBN: 978-1-84901-363-5 (paperback)
UK eISBN: 978-1-84901-730-5 (ebook)
1 3 5 7 9 10 8 6 4 2
First published in the United States in 2012 by Running Press Book Publishers,
A Member of the Perseus Books Group
All rights reserved under the Pan-American and International Copyright Conventions
This book may not be reproduced in whole or in part, in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system now known or hereafter invented, without written permission from the publisher.
Books published by Running Press are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 2300 Chestnut Street, Suite 200, Philadelphia, PA 19103, or call (800) 810-4145, ext. 5000, or e-mail special.markets@perseusbooks.com.
US ISBN: 978-0-7624-4271-3
US Library of Congress Control Number: 2011930502
9 8 7 6 5 4 3 2 1
Digit on the right indicates the number of this printing
Running Press Book Publishers
2300 Chestnut Street
Philadelphia, PA 19103-4371
Visit us on the web!
www.runningpress.com
Printed and bound in the UK
CONTENTS
Introduction
Apple
Area 51
Julian Assange
Aum Shinrikyo
Bavarian Illuminati
Bible Code
Big Brother: InfraGard and ECHELON
Osama bin Laden
Black Death
Cagoule
Fidel Castro
Cattle Mutilations
Le Cercle
CERN (European Organization for Nuclear Research)
Chupacabra
Cloudbuster
Club of the Isles
Kurt Cobain
Codex Alimentarius
Committee of 300
CAN
Denver International Airport
The Dreyfus Affair
Dulce Base
Ebola
FEMA
Foo Fighters
Ford Pinto
Free Electricity
General Motors
Global Warming
Gulf War Syndrome
HAARP
Dag Hammarskjold
Heinrich Himmler
Holloman Air Force Base
Hurricane Katrina
Indian Ocean Tsunami
IRS
Israeli Bubblegum
Jack the Ripper
Michael Jackson
Dr David Kelly
John F. Kennedy
Kissinger Associates
KKK
Knights of Columbus
Knights of the Golden Circle
Abraham Lincoln
Lusitania
Paul McCartney
Mary Magdalene
Manchurian Candidate
Mantell Incident
Mayan Calendar
Nazca Lines
Nazi Gold
New Coke
New World Order
9/11
North American Union
Nostradamus
Barack Obama
October Surprise
The Octopus
Odessa/The Org
Operation Black Dog
Operation Northwoods
The Paladin Group
Peak Oil
Plum Island
Pope John Paul II
Princess Diana
Project Coast
Project Montauk
Project Paperclip
Propaganda Due (P2)
Reptilian Humanoids
SARS
William Shakespeare
The Shriners
Society of Jesus
Society of the Elect
Space Monolith
Space Shuttle Columbia
Stolen Elections
Dominique Strauss-Kahn
Subliminal Advertising
Synarchy
The Third Secret of Fátima
The Thule Society
The Tonkin Gulf Incident
Turin Shroud
Tuskegee Syphilis Study
Unit 731
USS Cole
Vril Society
Water Control
Paul Wellstone
The White House Putsch
Harold Wilson
INTRODUCTION
These are, of course, theories. If they were proven beyond all doubt they would be conspiracy facts.
This book, a companion to The Mammoth Book of Cover-Ups, is a guide to the weirdest, wackiest and the most dangerous conspiracy theories around. I have, hopefully, steered a path between the Scylla of outright scepticism and the Charybdis of wide-open gullibility, the latter constantly boosted by the Internet, a self-referring universe where one blogger’s claim becomes one researcher’s proof. As a measuring stick of a theory’s veracity, I have included an “ALERT” guide, with a 1 to 10 rating, with 1 being “No way, Jose” and 10 being “It’s a cert”. A small number of cases have appeared in Cover-Ups, but reappear here in the light of more and new information.
There are conspiracy theories that cross the edge of madness – David Icke’s “reptilian-humanoid takeover” and Vril-powered UFOs driven by Nazis come hurtling to mind – but there are plenty out there that raise real issues about the abuse of power by secretive groups of politicos, CEOs, medicos and military honchos. Everyone should sleep a little less easy and be a little more vigilant after reading about the US Army’s “Operation Northwoods” (which proposed false-flag terrorist outrages on the American people and the sticking of the blame on Cuba) and you may wan
t to give the bio-research facility at Plum Island a wide, wide detour.
As they say: just because you are paranoid, it doesn’t mean that they aren’t out to get you …
Jon E. Lewis
APPLE
Ever wonder how two tech geeks like Steve Jobs and Steve Wozniak made their billions?
Conspiracists know the answer. Jobs and Wozniak built the first Macintosh computer in a California garage and when it failed to raise interest they did a deal with the devil, selling their souls in exchange for success on earth. The proof was on the price tag of the first Mac: $666.66. The mark of the Beast. Rounding off the evidence is the Apple logo. There’s a bite taken out of the apple, the forbidden fruit.
Alternatively, Apple did a deal with Big Brother. Take a look at an iPhone. It plays, unknown to its owner, iSpy on you. A secret file stores latitude and longitude, complete with a dater. The file is unencrypted and is transferred to any device the iPhone syncs with. Thus anyone with access to the owner’s computer can track his or her movements. Invasion of privacy anyone? Apple’s snooping habit doesn’t end with the locator file. The “Hackintosh hacker” alleged that Apple has stuck a code into the iPhone that tracks keyboard use, so every time the user taps in information this is relayed to Apple HQ. The claim has never been verified but Apple’s appetite for gathering personal information is infamous; in 2010 the company applied for a patent (“Systems and Methods for Identifying Unauthorized Users of an Electronic Device”) that could record the heartbeat of iPhone users, as well as covertly photograph them and their surroundings. If Apple collects information, as sure as God made little green apples, law enforcement agencies will one day come calling to use it. All of which has made dark rooms full of pale conspiracy theorists wonder if Apple is not doing the CIA/FBI’s job for them.
Apple justified the patent application as a security measure to prevent thieves using stolen phones, but as the Electronic Frontier Foundation (EEF) watchdog pointed out the technology also enabled Apple to cut off customers who pimped (quite lawfully) their devices. Improper use would also be reported to the Orwellian sounding “proper authorities”. The EEF christened the patent “traitorware”. Apple’s inclination to control is almost as great as its inclination to spy. On prudishly deciding that cartoonist Mark Fiore’s NewsToons app was too satirical for its taste Apple rejected it. When Fiore won a Pulitzer though they installed the app. Never one to miss a commercial opportunity, Apple.
Of course, Apple likes to keep its own secrets very close to its chips: the company is heavily controlling of image and market share. When Consumer Reports had the brazen gall to say it couldn’t recommend the iPhone 4 until the antenna was improved, threads discussing the issue on Mac.com forums mysteriously disappeared overnight. And only an absolute cynic would claim that Apple’s 2010 litigious spat with internet mag Gizmodo about its review of an iPhone 4 prototype left in a bar and passed on to the website was a staged publicity stunt, what with the new phone getting oodles of free publicity, and security at Apple HQ being Fort Knox tight.
Byte into an Apple. Indeed.
Further Reading
www.eff.org/deeplinks/2010/08/
steve-jobs-watching-you-apple-seeking-patent-0
AREA 51
“Warning. Restricted Area. Photography of This Area is Prohibited”.
So read the signs staked around Area 51, a high-security military base in the Nevada desert, 90 miles (145 km) north of Las Vegas. Also known as Groom Lake, the facility, which comprises thousands of acres, is surrounded by security fencing and intruder detection systems, and is regularly patrolled. A no-fly zone operates above it. The US Government, you get the feeling, wants to keep peeping eyes away from what happens in Area 51.
Why? There is a long-standing belief by conspiracists that Area 51 houses the UFO disc found at Roswell, as well as other crashed alien spaceships. At Area 51, the theory goes, the recovered UFOs are back-engineered so that their technology can be utilized by the US military. The latter are helped – either willingly or unwillingly – by captured alien pilots.
Few of the human government employees who work at Groom have ever talked about their work, but two who did were Leo Williams and Bob Lazar. Williams claimed to have worked in alien technology evaluation, the results of which informed the design of the B-2 stealth bomber. In 1989 Lazar announced on local TV that he too had been involved in “back-engineering” at Groom’s S-4 hangars complex, including assessment of the Roswell craft’s propulsion system. He had even uncovered “Gravity B”, a force arising from the manipulation of a new nuclear element, “ununpentium”.
Neither Williams nor Lazar proved very convincing witnesses. Lazar had invented his purported MIT physics qualification and before working in back-engineering had been engaged in the rather less than cutting edge employment of managing a photo shop. A steady stream of sightings of strange lights and craft at Groom, however, kept alive the notion of Area 51 as a top-secret UFO lab, perhaps the manufacturing plant of Black Helicopters.
Certainly, Area 51 has been the testing ground for weird and wonderful aircraft. The U-2 spy plane was flown there; so was the SR-71 Blackbird, the B-2 stealth bomber, the F-117 stealth fighter, and the unmanned aerial vehicle known as the “Beast of Kandahar” (and officially as RQ-170 Sentinel) that spied on the Abbottabad compound of Osama bin Laden. And these are only the craft the public has been informed about. It’s reasonable to suppose that other prototype and avant-garde aircraft have taken to the air at Groom, less reasonable to suppose that they have been developed from alien technology.
There was, though, one conspiracy taking place at Area 51. Bill Sweetman, editor-in-chief of defence technology for Aviation Week, maintains that the government absolutely encouraged “deliberate disinformation campaigns to generate a lot of noise about UFOs back in the 1950s and 1960s to cover secret flights of planes like the U-2, and then again in the late 1970s and early 1980s to link area 51 to UFOs through ‘fake’ documents and eye-witness accounts of alien technology and even alien bodies”.
The object of the disinformation was to mask the real reasons for the building of the base, namely the R&D of air-machines to best the Ruskies.
The Government, in other words, conspired to create a conspiracy theory.
Further Reading
David Darlington, Area 51: The Dreamland Chronicles, 1998
Eric Elfman, Almanac of Alien Encounters, 2001
Annie Jacobsen, Area 51: An Uncensored History of America’s Top Secret Military Base, 2011
Phil Patton, Dreamland: Travels Inside the Secret World of Roswell and Area 51, 1998
JULIAN ASSANGE
During 2010, the whistle-blowing website WikiLeaks released troves of classified US cables. They made fascinating reading, and Joe and Josephine Public learned a thing or a hundred it never knew its government and allies were up to, from the US CIA’s 3,000-strong secret army in Afghanistan to Saudi Arabia’s plea for a missile strike on Iran. WikiLeaks justified the release of the information as being in the “public interest”, while embarrassed establishments in the West complained about the endangering of national security. Julian Assange, the Australian founder of WikiLeaks, became, depending on your point of view, a hero or an Osama bin-Laden-style bogeyman. In the latter camp, Sarah Palin called for the “anti-American” Assange to be pursued “with the same urgency we pursue al-Qaeda and Taliban leaders”. But Palin had a particular hard spot for WikiLeaks; the site had published her emails from her unsuccessful run for VeePee of the USA, one of its highest profile coups since its foundation in 2007.
Not long after Palin blew her hunting horn, the US Government announced its intention to try Assange under the Espionage Act of 1917. Then there were cyberspace sabotage attacks on WikiLeaks, the US Air Force started blocked access on its computers to any website which posted the cables (including the New York Times), and PayPal, Mastercard, Visa, Amazon and Bank of America all refused to handle donations to WikiLeaks.
To put the cherry on the conspiracy cake, Julian Assange was then arrested in Britain, at the request of Swedish prosecutors, on a completely unrelated matter. The Swedes maintained that Assange was guilty of rape, unlawful coercion and molestation in their bailiwick. Assange directly accused the US of smearing him on trumped-up charges; meanwhile, the two Stockholm women allegedly assaulted by Assange – who were left-wing fans of his – explicitly denied being “set up by the Pentagon or anyone else”. In a prime case of wheels within wheels, WikiLeaks staff apparently blocked Assange from using the site to claim he was a victim of a conspiracy in the Swedish case. Citing Assange’s autocratic style and courting of publicity, other staff left, others called for his replacement. Some defectors allied with a new site that published leaks about – WikiLeaks.
All, clearly, was not well down in WikiWorld. As WikiObservers sagely noted, the US might not need to conspire to destroy Assange and his operation. He might do that himself.
For his part Assange uploaded an “Insurance File” onto the internet, which is reputed to be bursting with more top secret government information. Only Assange knows the password, and this is to be released posthumously – should he suffer an “accident”.
Further Reading
Daniel Domscheit-Berg, Inside WikiLeaks: My Time with Julian Assange at the World’s Most Dangerous Website, 2011
David Leigh and Luke Harding, WikiLeaks: Inside Julian Assange’s War on Secrecy, 2011
AUM SHINRIKYO
Nipponese yoga teacher Shoko Asahara founded the Aum Shinrikyo (“Supreme Truth”) sect in 1984 on a religious programme that combined Buddhism with Nostradamus and End-is-Nigh Christianity. A standard issue cult leader, Asahara boasted a beard, plus messianic powers (the ability to make the sick rise from their beds) and supernatural abilities. He couldn’t quite walk on water, but he could walk through walls, a feat made difficult for his followers because he made them scald their feet. Despite – or maybe because of – Asahara’s certifiable lunacy, Aum Shinrikyo attracted over 50,000 members. In the material world of Japan, it did at least offer something more than the pursuit of the yen. That said, like many a cult leader, Asahara was an accomplished businessman, raising sect funds through software enterprises and outright extortion at gunpoint.