100% found this document useful (10 votes)
218 views

Complete Download (Ebook) SSCP Systems Security Certified Practitioner: all-in-one exam guide by Gibson, Darril; Rogers, Bobby E ISBN 9780071771559, 9780071771566, 9781283405829, 0071771557, 0071771565, 1283405822 PDF All Chapters

The document provides information about various ebooks available for download, including exam guides for SSCP and CRISC certifications, as well as other educational materials. Each entry includes the title, authors, ISBN numbers, and a link to download the ebook. It also outlines the contents of the SSCP exam guide, covering topics such as security fundamentals, access controls, networking, and risk management.

Uploaded by

mugabkucina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (10 votes)
218 views

Complete Download (Ebook) SSCP Systems Security Certified Practitioner: all-in-one exam guide by Gibson, Darril; Rogers, Bobby E ISBN 9780071771559, 9780071771566, 9781283405829, 0071771557, 0071771565, 1283405822 PDF All Chapters

The document provides information about various ebooks available for download, including exam guides for SSCP and CRISC certifications, as well as other educational materials. Each entry includes the title, authors, ISBN numbers, and a link to download the ebook. It also outlines the contents of the SSCP exam guide, covering topics such as security fundamentals, access controls, networking, and risk management.

Uploaded by

mugabkucina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Download Full Version ebook - Visit ebooknice.

com

(Ebook) SSCP Systems Security Certified


Practitioner: all-in-one exam guide by Gibson,
Darril; Rogers, Bobby E ISBN 9780071771559,
9780071771566, 9781283405829, 0071771557,
0071771565, 1283405822
https://ebooknice.com/product/sscp-systems-security-
certified-practitioner-all-in-one-exam-guide-22002894

Click the button below to download

DOWLOAD EBOOK

Discover More Ebook - Explore Now at ebooknice.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Start reading on any device today!

(Ebook) SSCP Systems Security Certified Practitioner All-


in-One Exam Guide, Third Edition by Gibson, Darril ISBN
9780071771559, 9780071771566, 9781283405829,
9781260128710, 0071771557, 0071771565, 1283405822,
https://ebooknice.com/product/sscp-systems-security-certified-
1260128717
practitioner-all-in-one-exam-guide-third-edition-35059294

ebooknice.com

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason;


Viles, James ISBN 9781459699816, 9781743365571,
9781925268492, 1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

ebooknice.com

(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena


Alfredsson, Hans Heikne, Sanna Bodemyr ISBN 9789127456600,
9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312

ebooknice.com

(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT


II Success) by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018

ebooknice.com
(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master
the SAT Subject Test: Math Levels 1 & 2) by Arco ISBN
9780768923049, 0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-
arco-master-the-sat-subject-test-math-levels-1-2-2326094

ebooknice.com

(Ebook) Cambridge IGCSE and O Level History Workbook 2C -


Depth Study: the United States, 1919-41 2nd Edition by
Benjamin Harrison ISBN 9781398375147, 9781398375048,
1398375144, 1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044

ebooknice.com

(Ebook) CRISC Certified in Risk and Information Systems


Control All-in-One Exam Guide, Second Edition by Peter
Gregory, Bobby Rogers, Dawn Dunkerley ISBN 9781260473339,
1260473333
https://ebooknice.com/product/crisc-certified-in-risk-and-information-
systems-control-all-in-one-exam-guide-second-edition-42734044

ebooknice.com

(Ebook) CRISC Certified in Risk and Information Systems


Control All-in-One Exam Guide, Second Edition, 2nd Edition
by Peter H. Gregory & Bobby E. Rogers & Dawn Dunkerley
ISBN 9781260473346, 1260473341
https://ebooknice.com/product/crisc-certified-in-risk-and-information-
systems-control-all-in-one-exam-guide-second-edition-2nd-
edition-42693752
ebooknice.com

(Ebook) SSCP (ISC)2 Systems Security Certified


Practitioner Official Study Guide by George Murphy ISBN
9781119059653, 1119059658
https://ebooknice.com/product/sscp-isc-2-systems-security-certified-
practitioner-official-study-guide-5488256

ebooknice.com
Contents
1. Cover
2. Title Page
3. Copyright Page
4. Dedication
5. Contents at a Glance
6. Contents
7. Acknowledgments
8. Introduction
9. Exam Objective Map
10. Chapter 1 Security Fundamentals

1. Reviewing the Requirements for SSCP

1. Have One Year of Experience


2. Registering for the Exam
3. Passing the Exam
2
4. Subscribing to the (ISC) Code of Ethics and
Getting Endorsed
5. Maintaining Your SSCP Certification

2. Understanding Basic Security Concepts

1. Confidentiality
2. Integrity
3. Availability

3. Exploring Fundamentals of Security

1. Least Privilege
2. Separation of Duties
3. Privacy and Data Sensitivity
4. Defense in Depth
5. Nonrepudiation
6. AAAs of Security
7. Accountability
8. Due Diligence
9. Due Care
4. Chapter Review

1. Questions
2. Answers
11. Chapter 2 Access Controls

1. Comparing Identification, Authentication, and


Authorization
2. Exploring Authentication

1. Three Factors of Authentication


2. Multifactor Authentication
3. Two-Step Verification
4. Reviewing Identification
5. Single Sign-on Authentication
6. Centralized vs. Decentralized Authentication
7. Offline Authentication
8. Device Authentication

3. Implementing Access Controls

1. Comparing Subjects and Objects


2. Logical Access Controls

4. Comparing Access Control Models

1. Discretionary Access Control


2. Non-Discretionary Access Control
3. Access Control Matrix vs. Capability Table

5. Participating in the Identity and Access Management


Lifecycle

1. Identity Proofing
2. Provisioning and Authorization
3. Maintenance and Entitlement
4. De-provisioning
6. Participating in Physical Security Operations

1. Badging
2. Data Center Assessment

7. Chapter Review

1. Questions
2. Answers
12. Chapter 3 Basic Networking and Communications

1. Understanding Use Cases


2. Reviewing the OSI Model

1. The Physical Layer (Layer 1)


2. The Data Link Layer (Layer 2)
3. The Network Layer (Layer 3)
4. The Transport Layer (Layer 4)
5. The Session Layer (Layer 5)
6. The Presentation Layer (Layer 6)
7. The Application Layer (Layer 7)

3. Comparing the OSI and TCP/IP Models


4. Understanding Network Topologies and Relationships

1. Ethernet
2. Bus Topology
3. Star Topology
4. Tree Topology
5. Token Ring Topology
6. Mesh Topology
7. Network Relationships

5. Reviewing Basic Protocols and Ports

1. Comparing IPv4 and IPv6


2. Dynamic Host Configuration Protocol
3. Address Resolution Protocol
4. Network Discovery Protocol
5. Domain Name System
6. Internet Control Message Protocol
7. Internet Group Message Protocol
8. Simple Network Management Protocol
9. File Transfer Protocol
10. Telnet
11. Secure Shell
12. Hypertext Transfer Protocol and Hypertext
Transfer Protocol Secure
13. Transport Layer Security and Secure Sockets Layer
14. Network File System
15. Routing Protocols
16. E-mail Protocols
17. Internet Protocol Security
18. Tunneling Protocols
19. Mapping Well-Known Ports to Protocols
20. Comparing Ports and Protocol Numbers
6. Comparing Internetwork Trust Architectures

1. Comparing Public and Private IP Addresses


2. Using NAT
3. Comparing Trust Relationships

7. Exploring Wireless Technologies

1. Securing Data Transmissions


2. Wireless Device Administrator Password
3. Wireless Service Set Identifier
4. MAC Address Filtering
5. Bluetooth
6. NFC
7. GSM
8. 3G, LTE, and 4G
9. WiMAX
10. Radio Frequency Identification
11. Protecting Mobile Devices

8. Chapter Review

1. Questions
2. Answers
13. Chapter 4 Advanced Networking and Communications

1. Managing LAN-based Security

1. Comparing Switches and Routers


2. Physical and Logical Segmentation
3. Secure Device Management
4. VoIP

2. Using Proxy Servers


3. Understanding Firewalls

1. Packet-Filtering Firewall
2. Stateful Inspection Firewall
3. Application Firewall
4. Next-Generation Firewall
5. Defense Diversity
6. Comparing Network-based and Host-based
Firewalls

4. Exploring Remote Access Solutions

1. Risks and Vulnerabilities


2. Tunneling Protocols
3. Authentication
4. Traffic Shaping and WAN Optimization

5. Managing Network Access Control


6. Exploring Virtual Environments

1. Virtualization Terminology
2. Shared Storage
3. Virtual Appliances
4. Virtual Desktop Infrastructure
5. Continuity and Resilience
6. Separation of Data Plane and Control Plane
7. Software-defined Networking
8. Protecting Virtualization Systems

7. Understanding Cloud Computing


1. Shared Responsibility Models
2. Cloud Operation Models
3. Storage
4. Privacy
5. Data Control and Third-party Outsourcing
6. Compliance
8. Chapter Review

1. Questions
2. Answers
14. Chapter 5 Attacks

1. Comparing Attackers

1. Hackers and Crackers


2. White Hats, Black Hats, and Gray Hats
3. Advanced Persistent Threats
4. Insider Threats
5. Script Kiddies

2. Exploring Attack Types and Countermeasures

1. Basic Countermeasures
2. Spoofing
3. Data Theft
4. DoS
5. DDoS
6. Botnets and Zombies
7. Sniffing Attack
8. Reconnaissance and Fingerprinting Attacks
9. Salami Attack
10. Man-in-the-Middle
11. Replay
12. Session Hijacking
13. DNS Cache Poisoning
14. Smurf and Fraggle Attacks
15. Software Security as a Countermeasure
16. Buffer Overflow Attacks
17. Injection Attacks
18. Cross-Site Scripting
19. Cross-Site Request Forgery
20. Password Attacks
21. Spam
22. Phishing Attacks
23. Phishing and Drive-by Downloads
24. Spear Phishing and Whaling
25. Vishing
26. Smishing
27. Zero Day Exploits
28. Covert Channel
29. Wireless Attacks and Countermeasures
3. Understanding Social Engineering

1. Tailgating
2. Impersonation
3. Skimming
4. Dumpster Diving
5. Shoulder Surfing
6. Social Networking Attacks
7. User Awareness as a Countermeasure

4. Chapter Review

1. Questions
2. Answers
15. Chapter 6 Malicious Code and Activity

1. Identifying Malicious Code

1. Virus
2. Worm
3. Trojan Horse
4. RATs
5. Scareware
6. Ransomware
7. Keylogger
8. Logic Bomb
9. Rootkits
10. Mobile Code
11. Backdoors and Trapdoors
12. Spyware
13. Malware Hoaxes
14. Analyzing the Stages of an Attack
2. Understanding Malware Delivery Methods

1. Delivering Malware via Drive-by Downloads


2. Delivering Malware via Malvertising
3. Delivering Malware via E-mail
4. Delivering Malware via USB Drives

3. Implementing Malicious Code Countermeasures

1. Antivirus Software
2. Keeping AV Signatures Up to Date
3. Spam Filters
4. Content-filtering Appliances
5. Keeping Operating Systems Up to Date
6. Scanners
7. Beware of Shortened Links
8. Sandboxing
9. Least Privilege
10. Software Security
11. Application Whitelisting and Blacklisting
12. Participating in Security Awareness and Training

4. Common Vulnerabilities and Exposures


5. Chapter Review

1. Questions
2. Answers
16. Chapter 7 Risk, Response, and Recovery

1. Defining Risk

1. Identifying Threat Sources


2. Identifying Threat Events
3. Understanding Vulnerabilities
4. Understanding Impact Assessments
5. Sharing Threat Intelligence

2. Managing Risk
1. Risk Treatment
2. Residual Risk
3. Identifying Assets
4. Risk Visibility and Reporting
5. Risk Register
6. Common Vulnerability Scoring System
7. Risk Management Frameworks
3. Performing Risk Assessments

1. Threat Modeling
2. Quantitative Analysis
3. Qualitative Analysis
4. Risk Assessment Steps
5. Address Findings

4. Supporting the Incident Lifecycle

1. Preparation
2. Detection, Analysis, and Escalation
3. Containment
4. Eradication
5. Recovery
6. Lessons Learned/Implementation of New
Countermeasure

5. Chapter Review

1. Questions
2. Answers
17. Chapter 8 Monitoring and Analysis

1. Operating and Maintaining Monitoring Systems

1. Events of Interest
2. Intrusion Detection Systems
3. IDS Alerts
4. Network-based Intrusion Detection Systems
5. Host-based Intrusion Detection Systems
6. Intrusion Prevention Systems
7. Detection Methods
8. Wireless Intrusion Detection and Prevention
Systems
9. Analyze Monitoring Results
10. Detection Systems and Logs
11. Detecting Unauthorized Changes
12. Using Security Information and Event
Management Tools
13. Continuous Monitoring
14. Document and Communicate Findings
2. Performing Security Tests and Assessments

1. Vulnerability Assessments
2. Penetration Tests

3. Chapter Review

1. Questions
2. Answers
18. Chapter 9 Controls and Countermeasures

1. Using Security Controls, Safeguards, and Countermeasures

1. Performing a Cost-Benefit Analysis


2. Security Controls Lifecycle

2. Understanding Control Goals

1. Preventive
2. Detective
3. Corrective
4. Other Controls

3. Comparing Security Control Implementation Methods

1. Administrative Security Controls


2. Technical Security Controls
3. Physical Security Controls

4. Combining Control Goals and Classes


5. Exploring Some Basic Controls
1. Hardening Systems
2. Policies, Standards, Procedures, and Guidelines
3. Response Plans
4. Change Control and Configuration Management
5. Testing and Implementing Patches, Fixes, and
Updates
6. Endpoint Device Security
7. User Awareness and Training Programs
6. Understanding Fault Tolerance

1. Fault Tolerance for Disks


2. Failover Clusters
3. Load Balancing
4. Redundant Connections

7. Understanding Backups

1. Full Backups
2. Full/Incremental Backup Strategy
3. Full/Differential Backup Strategy
4. Image-based Backups

8. Chapter Review

1. Questions
2. Answers
19. Chapter 10 Auditing and Management Processes

1. Understanding Auditing and Accountability

1. Holding Users Accountable with Audit Logs


2. Auditing with Logs
3. Clipping Levels
4. Understanding Audit Trails

2. Exploring Audit Logs

1. Operating System Logs


2. Storing Logs on Remote Systems
3. *Nix Logs
4. Proxy Server Logs
5. Firewall Logs
6. Reviewing Logs
7. Managing Audit Logs
3. Performing Security Audits

1. Periodic Audit and Review


2. Auditing Passwords
3. Auditing Security Policies
4. ISACA
5. Exploring PCI DSS Requirements
6. Auditing Physical Access Controls

4. Understanding Configuration Management

1. Using Imaging for Configuration Management


2. Using Group Policy for Configuration Management
3. Using Other Tools for Configuration Management

5. Understanding Change Management

1. Change Management Process


2. Identifying Security Impact

6. Chapter Review

1. Questions
2. Answers
20. Chapter 11 Security Operations

1. Handling Data

1. Classifying Data
2. Marking and Labeling Data
3. Roles and Responsibilities
4. Protecting Data from Cradle to Grave
5. Data at Rest and Data in Motion
6. Data Management Policies
7. Understanding Databases
8. Data Inference
9. Data Diddling
10. Regulatory Requirements
11. Training
2. Managing Assets Through the Lifecycle

1. Hardware Inventory
2. Software Inventory and Licenses
3. Data Storage

3. Certification and Accreditation

1. Certification, Accreditation, and Security


Assessments
2. Common Criteria
3. Using a Risk Management Framework
4. Understanding Security Within the System
Development Lifecycle

4. Chapter Review

1. Questions
2. Answers
21. Chapter 12 Security Administration and Planning

1. Understanding Security Policies

1. Security Policy Characteristics


2. Enforcing Security Policies
3. Value of a Security Policy
4. Security Policies Becoming More Common
5. Complying with Codes of Ethics
6. Policy Awareness
7. Updating Security Policies

2. Understanding BCP and DRP Activities

1. Business Impact Analysis


2. Disaster Recovery Plan
3. Emergency Response Plans and Procedures
4. Comparing a BCP and a DRP
5. Restoration Planning
6. Testing and Drills
7. Alternative Locations
3. Identifying Security Organizations

1. NIST
2. US-CERT
3. SANS Institute
4. CERT Division

4. Chapter Review

1. Questions
2. Answers
22. Chapter 13 Legal Issues

1. Exploring Computer Forensics

1. Supporting the Incident Lifecycle


2. Handling Evidence
3. Three Phases of a Computer Forensics
Investigation
4. Legal and Ethical Principles

2. Comparing Computer Abuse and Computer Crime


3. Understanding Fraud and Embezzlement Crime

1. Mandatory Vacations
2. Job Rotation

4. Understanding Privacy Issues

1. General Data Protection Regulation


2. California Supreme Court Rules That ZIP Codes
Are PII
3. Connecticut’s Public Act No. 08-167
4. Children’s Online Privacy Protection Act
5. California Online Privacy Protection Act of 2003

5. Legal and Regulatory Concerns


6. Chapter Review

1. Questions
2. Answers
23. Chapter 14 Cryptography

1. Understanding Basic Cryptography Concepts

1. Cryptography Terminology
2. Data Sensitivity
3. Regulatory Requirements
4. Participating in Security Awareness and Training

2. Enforcing Integrity with Hashing

1. Hashing Algorithms Provide One-Way Encryption


2. Hashing Algorithms
3. Verifying Integrity with a Hash
4. Salting Passwords

3. Exploring Symmetric Encryption

1. ROT13
2. Creating Strong Keys
3. Comparing Block and Stream Ciphers
4. Advanced Encryption Standard
5. Other Symmetric Encryption Algorithms

4. Exploring Asymmetric Encryption

1. RSA
2. Secure Sockets Layer
3. Transport Layer Security
4. SSL Decryptors
5. Diffie-Hellman
6. Elliptic Curve Cryptography
7. Secure Shell
8. Protecting E-mail with S/MIME
9. Protecting E-mail with DKIM
10. PGP and GPG
5. Other Encryption Schemes

1. Steganography
2. IPsec

6. Understanding Public Key Infrastructure Systems

1. Certificates
2. Certificate Authority
3. Key Escrow
4. Alternative Certificate Trusts

7. Comparing Cryptanalysis Attacks

1. Fundamental Key Management Concepts


2. Known-Plaintext Attack
3. Ciphertext-Only Attack
4. Hashing and Collisions
5. Countermeasures Against Cryptanalysis Attacks

8. Chapter Review

1. Questions
2. Answers
24. Appendix About the Online Content

1. System Requirements
2. Your Total Seminars Training Hub Account

1. Privacy Notice

3. Single User License Terms and Conditions


4. TotalTester Online
5. Technical Support

25. Glossary
26. Index
Guide
1. Cover
2. Title Page
3. SSCP Systems Security Certified Practitioner All-in-One Exam
Guide

Page List
1. i
2. ii
3. iii
4. iv
5. v
6. vi
7. vii
8. viii
9. ix
10. x
11. xi
12. xii
13. xiii
14. xiv
15. xv
16. xvi
17. xvii
18. xviii
19. xix
20. xx
21. xxi
22. xxii
23. xxiii
24. xxiv
25. xxv
26. xxvi
27. 1
28. 2
29. 3
30. 4
31. 5
32. 6
33. 7
34. 8
35. 9
36. 10
37. 11
38. 12
39. 13
40. 14
41. 15
42. 16
43. 17
44. 18
45. 19
46. 20
47. 21
48. 22
49. 23
50. 24
51. 25
52. 26
53. 27
54. 28
55. 29
56. 30
57. 31
58. 32
59. 33
60. 34
61. 35
62. 36
63. 37
64. 38
65. 39
66. 40
67. 41
68. 42
69. 43
70. 44
71. 45
72. 46
73. 47
74. 48
75. 49
76. 50
77. 51
78. 52
79. 53
80. 54
81. 55
82. 56
83. 57
84. 58
85. 59
86. 60
87. 61
88. 62
89. 63
90. 64
91. 65
92. 66
93. 67
94. 68
95. 69
96. 70
97. 71
98. 72
99. 73
100. 74
101. 75
102. 76
103. 77
104. 78
105. 79
106. 80
107. 81
108. 82
109. 83
110. 84
111. 85
112. 86
113. 87
114. 88
115. 89
116. 90
117. 91
118. 92
119. 93
120. 94
121. 95
122. 96
123. 97
124. 98
125. 99
126. 100
127. 101
128. 102
129. 103
130. 104
131. 105
132. 106
133. 107
134. 108
135. 109
136. 110
137. 111
138. 112
139. 113
140. 114
141. 115
142. 116
143. 117
144. 118
145. 119
146. 120
147. 121
148. 122
149. 123
150. 124
151. 125
152. 126
153. 127
154. 128
155. 129
156. 130
157. 131
158. 132
159. 133
160. 134
161. 135
162. 136
163. 137
164. 138
165. 139
166. 140
167. 141
168. 142
169. 143
170. 144
171. 145
172. 146
173. 147
174. 148
175. 149
176. 150
177. 151
178. 152
179. 153
180. 154
181. 155
182. 156
183. 157
184. 158
185. 159
186. 160
187. 161
188. 162
189. 163
190. 164
191. 165
192. 166
193. 167
194. 168
195. 169
196. 170
197. 171
198. 172
199. 173
200. 174
201. 175
202. 176
203. 177
204. 178
205. 179
206. 180
207. 181
208. 182
209. 183
210. 184
211. 185
212. 186
213. 187
214. 188
215. 189
216. 190
217. 191
218. 192
219. 193
220. 194
221. 195
222. 196
223. 197
224. 198
225. 199
226. 200
227. 201
228. 202
229. 203
230. 204
231. 205
232. 206
233. 207
234. 208
235. 209
236. 210
237. 211
238. 212
239. 213
240. 214
241. 215
242. 216
243. 217
244. 218
245. 219
246. 220
247. 221
248. 222
249. 223
250. 224
251. 225
252. 226
253. 227
254. 228
255. 229
256. 230
257. 231
258. 232
259. 233
260. 234
261. 235
262. 236
263. 237
264. 238
265. 239
266. 240
267. 241
268. 242
269. 243
270. 244
271. 245
272. 246
273. 247
274. 248
275. 249
276. 250
277. 251
278. 252
279. 253
280. 254
281. 255
282. 256
283. 257
284. 258
285. 259
286. 260
287. 261
288. 262
289. 263
290. 264
291. 265
292. 266
293. 267
294. 268
295. 269
296. 270
297. 271
298. 272
299. 273
300. 274
301. 275
302. 276
303. 277
304. 278
305. 279
306. 280
307. 281
308. 282
309. 283
310. 284
311. 285
312. 286
313. 287
314. 288
315. 289
316. 290
317. 291
318. 292
319. 293
320. 294
321. 295
322. 296
323. 297
324. 298
325. 299
326. 300
327. 301
328. 302
329. 303
330. 304
331. 305
332. 306
333. 307
334. 308
335. 309
336. 310
337. 311
338. 312
339. 313
340. 314
341. 315
342. 316
343. 317
344. 318
345. 319
346. 320
347. 321
348. 322
349. 323
350. 324
351. 325
352. 326
353. 327
354. 328
355. 329
356. 330
357. 331
358. 332
359. 333
360. 334
361. 335
362. 336
363. 337
364. 338
365. 339
366. 340
367. 341
368. 342
369. 343
370. 344
371. 345
372. 346
373. 347
374. 348
375. 349
376. 350
377. 351
378. 352
379. 353
380. 354
381. 355
382. 356
383. 357
384. 358
385. 359
386. 360
387. 361
388. 362
389. 363
390. 364
391. 365
392. 366
393. 367
394. 368
395. 369
396. 370
397. 371
398. 372
399. 373
400. 374
401. 375
402. 376
403. 377
404. 378
405. 379
406. 380
407. 381
408. 382
409. 383
410. 384
411. 385
412. 386
413. 387
414. 388
415. 389
416. 390
417. 391
418. 392
419. 393
420. 394
421. 395
422. 396
423. 397
424. 398
425. 399
426. 400
427. 401
428. 402
429. 403
430. 404
431. 405
432. 406
433. 407
434. 408
435. 409
436. 410
437. 411
438. 412
439. 413
440. 414
441. 415
442. 416
443. 417
444. 418
445. 419
446. 420
447. 421
448. 422
449. 423
450. 424
451. 425
452. 426
453. 427
454. 428
455. 429
456. 430
457. 431
458. 432
459. 433
460. 434
461. 435
462. 436
463. 437
464. 438
465. 439
466. 440
467. 441
468. 442
469. 443
470. 444
471. 445
472. 446
473. 447
474. 448
475. 449
476. 450
477. 451
478. 452
479. 453
480. 454
Exploring the Variety of Random
Documents with Different Content
once a seat of a family of that name, has been so mutilated in
alteration that it presents little of interest. The same may be said of
Basil.
Botathen, once the seat of the Bligh family, has not in it anything
of interest, but is associated with one of the best ghost stories on
record, written by the Rev. John Ruddle, vicar of Launceston, who
laid a ghost in a field that appeared to and tormented a boy of the
name of Bligh.
Ruddle was parson of Launceston between 1663 and 1698. Defoe
got hold of Ruddle’s MS. account of the transaction, and published it
in 1720. It has been often surmised that Defoe had touched up the
original, or had invented the whole story; but Mr. A. Robins has
carefully entered into an examination of the circumstances, and has
proved that the account was by Ruddle, and all those persons
mentioned in it actually lived at the period.
In 1665 John Ruddle was schoolmaster in Launceston as well as
vicar, and one of his pupils died. He preached a sermon at the
funeral on June 20th, and after leaving church he was addressed by
an old gentleman, who informed him that his own son was sadly
troubled by having several times met a ghost, or, at all events, the
boy pretended that he had. The gentleman, Mr. Bligh, of Botathen,
invited Ruddle to his house to see the lad.
After conferences with the boy Ruddle gained his confidence, and,
says he, “he told me with all naked freedom and a flood of tears that
his friends were unjust and unkind to him, neither to believe nor pity
him, and that if any man would go with him to the place he might be
convinced that the thing was real.” The rest of the story shall be told
from a MS. now in the possession of a lady in Launceston, copied by
William Ruddle, the son, from his father’s original MS.:—​
“By ys time he found me able to comisrate his condition
and to be attentive to his relation of it, therefore he went on
in ys manner. This woman wch appears to me (saith he) Lived
a nighbour here to my father, and dyed about 8 years since.
Her name Dorothy Dingle, of such a stature, such an age and
complexion. She never speaks to me, but passeth by hastyly
and always Leaves ye footpath to me, and she comonly
meets me twice or thrice in ye breadth of ye field. It was abt
2 months before I took any notice of it, and tho’ ye shape of
ye face was in my memory yet I could not recal ye name of
ye person, but wthout more thoughtfullnes I did suppose it
was some woman who Lived thereabout and had frequent
occasion that way, nor did I imagine anything to ye contrary
before she began to meet me constantly morning and
evening, and always in ye same field, and sometimes twice or
thrice in ye breadth of it. The first time I took notice of her
was abt a year since and when I first began to suspect and
beleive it to be a Ghost I had courage enough not to be
affraid, but kept it to myself a good while and only pondered
very much at it. I did often speak to it, but never had a word
in answer. Then I changed my way and went to school ye
Under Horse Road, and then she always met me in ye narrow
Lane between ye Quarry Park and ye Nursery, which was
worse. At Length I began to be terrifyd at it, and prayed
continually that God would either free me from it, or Let me
know ye meaning of it. Night and day, sleeping and wakeing
ye shape was ever runing in my mind.
“Thus (said he) by degrees I grew very pensive, in so
much that it was taken notice of by all our family, whereupon,
being urg’d to it, I told my brother William of it, and he
privately acquainted my father and mother wth it, and they
kept it to themselves for sometime. Ye successe of this
discovery was only that they sometimes Laugh at me,
sometimes elude me, but still comanded me to keep my
school and put such fageries out of my head. I did
accordingly go often to school, but always met ye woman in
ye way.
“This and much more to ye same purpose (yea as much as
held a Dialogue of near 2 hours) was our conference in ye
orchard, which ended wth my profer to him that (without
makeing any privy to our intent) I would next day walk wth
him to ye place abt 6 o’clock. He was even transported wth
joy at ye mention of it, and replyed, ‘but will ye sure Sr, will
ye sure Sr? Thank God! now I hope I shall be believed!’ Upon
this conclusion we retired to ye hous. The gent, his wife, and
Mr. S. were impatient to know ye event, insomuch that they
came out of ye parlour into ye hall to meet us, and seeing ye
Lad Look chearfully ye first complement from ye old man was
‘Come, Mr. Ruddle! ye have talked with S. I hope now he will
have more wit, an idle boy, an idle boy.’ At these words ye
Lad ran up ye stairs to his chamber without replying, and I
soon stopt ye curiosity of ye 3 expectants by telling them that
I had promised silence, and was resolved to be as good as
my word; but when things were riper they might know all, at
prsent I desired them to rest in my faithfull pmise that I
would do my utmost in their service and for ye good of their
son. With this they were silenced, I cannot say satisfyed.
“The next morning before 5 o’clock ye Lad was in my
chamber and very brisk. I arose and went with him. Ye field
he Led me to I guested to be abt 20 acres in an open country
and abt 3 furlongs from any hous. We went into ye field, and
had not gone above a third parte before the Spectrum in ye
shape of a woman wth all ye circumstances he had described
her to me in ye orchard ye day before (as much as ye
suddennesse of itts appearance and evanition would prmit me
to discover) met us and passed by. I was a Little surprised at
it, yet I had not ye power, nor indeed durst I Look back, yet
took care not to show any fear to my pupil and guide, and
therefore, only telling him that I was satysfyed in ye truth of
his complaint we walked to ye end of ye field and returned,
nor did ye Ghost meet us at yt time above once. I perceved in
ye young man a kind of boldnes mixt wth astonismt, ye first
caused by my prsence, and ye proof he had given of his own
relation, ye other by ye sight of his prsecutor.
“In short he went home; I somewhat puzled, he much
animated. At our return ye gentlewoman (whose
inquisitiveness had mist us) watched to speak with me, I gave
her a convenience, and told her that my opinion was her
son’s complaint was not to be slighted, nor altogether
discredited, yet that my judgment in his case was not setled.
I gave her caution moreover that ye thing might not take
wind Lest ye whole country should ring wth what we yet had
no assurance of. In this juncture of time I had busines wch
would admit no delay, wherefore I went for Launceston that
evening, but prmised to see him again next week,—​yet I was
prevented by an occasion which pleaded a sufficient excuse,
for my wife was that week brought home from a nighbours
house very ill. However my mind was upon ye adventure. I
studyed ye case, and abt 3 weeks after went again resolving
by ye help of God to see ye utmost.
“The next Monday, being ye 27th day of July 1665, I went
to ye haunted field by myself and walked ye bredth of it
without any encounter. I returned and took ye other walk,
and then ye Spectrum appeared to me, much about ye same
place I saw it before when ye young gent was wth me. In my
thoughts it moved swifter than ye time before, and abt 30
feet distant from me on my right hand in so much that I had
not time to speak, as I determined with myself beforehand.
“The evening of that day ye parents, ye son, and myself
being in ye chamber where I Lay, I propounded to them our
going altogether to ye place next morning, and after some
asseverration that there was no danger in it we all resolved
upon it.
“The morning being come Lest we shd alarm ye family of
servts, they went under pretence of seeing a field of wheat,
and I took my horse and fetched a compas another way, and
so met at ye stile we had appointed; thence we al four
walked Leisurely into ye Quartils, and had not passed above
half ye field before ye Ghost made appearance. It then came
over ye stile just before us, and moved with such swiftness
that by ye time we had gone 6 or 7 steps it passed by; I
’mediately turned head and ran after it wth ye young man by
my side. We saw it passe over ye stile at wch we entred, but
no further. I stept upon ye hedg at one place, he at another,
but could discern nothing, whereas I dare averr that ye
swiftest horse in England could not have conveyed himself
out of sight in yt short space of time.
“Two things I observed in this day’s appearance, viz.: 1.
that a spaniel dog which followed ye company unregarded,
did bark and run away as ye Spectrum passed by, whence ’tis
easy to conclude yt it was not our fear or fancy wch made ye
apparition. 2. that ye motion of ye Spectrum was not
gradatim, or by steps and moveing ye feet, but a kind of
glideing as children upon ye ice, or a boat down a swift river,
which punctually answers ye descriptions ye antients gave of
ye motion of their Lemures.
“But to prceed: this ocular evidence clearly convinced, but
withall sharply affrighted ye old gent and his wife who knew
ys D. D. in her Lifetime,—​were at her buryal, and now plainly
saw her features in this prsent apparition. I encouraged them
as wel as I could, but after this they went no more. However
I was resolved to prceed and use such Lawfull means as God
hath discovered and Learned men have successfully practiced
in these unvulgar cases.
“The next morning being Thursday I went out very early
by myself and walked for abt an hour’s space in meditation
and prayer in ye field next adjoyning to ye Quartils. Soon
after five I stept over ye stile into ye disturbed field, and had
not gone above 30 or 40 paces before ye Ghost appeared at
ye further stile. I spake to it with a Loud voice in some such
sentences as ye way of these dealings directed me,
whereupon it approached, but slowly. When I came near it, it
mov’d not. I spake again and it answered in a voice neither
very audible nor intelligable. I was not in ye Least terrifyed,
and therefore persisted untill it spake again, and gave me
satisfaction.
“But ye work could not be finished at this time; wherefore
ye same evening, an hour after sun-set, it met me again near
ye same place, and after a few words of each side it quietly
vanished, and neither doth appear since, nor ever will more
to any man’s disturbance.
“N.B. The discourse in ye morning Lasted abt a quarter of
an hour.
“These things are true. I know them to be so with as much
certainty as eyes and ears can give me; and until I can be
perswaded that my senses do deceve me abt their proper
objects (and by that perswasion deprive myself of ye
strongest inducement to beleive ye Christian Religion) I must
and will assert that these things in this paper are true.”
I omit the reflections made on this by the writer, who signs:
“September 4th, 1665, John Ruddle.”
Every person and every place can be and has been identified by
Mr. Robins, to whose article I refer the reader, should he care to go
over the ground.[7]
Note.—​Books on Launceston:—​
Robins (A. F.), Launceston, Past and Present. Launceston, 1884.
Peter (R.), The Histories of Launceston and Dunheved. Plymouth,
1885.
CHAPTER VII.

CALLINGTON
A town with a past—​The principality of Gallewick—​A royal residence
—​The Boy and the Mantle—​Caradock and Tegau—​Arthur and
Guenever—​Southill—​S. Samson—​Callington Church—​The Borough
—​Dupath Well—​Hingesdon Hill—​S. Ive—​Linkinhorne—​Story of S.
Melor—​The Cheesewring—​Camp—​The Hurlers—​Trethevy stone—​S.
Cleer—​The Tamar—​Arsenic manufacture—​Poisoning—​Production—​
Pentillie.
Callington is a town with a past; whether it has a future is
problematical. Its past is remote; and if it has a future, that will be
equally distant. Issachar was a strong ass couching between two
burdens; and Callington lies low between the great bunches of
Caradon and Hingesdon, two great masses of moor said to be rich in
minerals. In the times of Callington’s prosperity it throve on these
lodes of tin and copper. But now the mines are abandoned and the
population has leaked away. Should the two mountains be again
worked, then the profits will go to Liskeard, seated on a railway, on
one side, and to Gunnislake, planted on the Tamar, on the other.
CALLINGTON

Callington occupies the site of the royal residence of the kings of


Cornwall as princes of Gallewick. Here Selyf and his wife S. Wenn
had their residence, and here S. Cuby was born. Here it is asserted
that Arthur once had his court. And here also at one time was
Caradoc Freichfras with his wife Tegau, the most honest woman in
Arthur’s court.
Who can say that it was not here that the boy appeared with the
mantle, the ballad concerning which is in Percy’s Reliques, though
indeed in that it is said to have occurred in Carlisle?
“‘Now have thou here, King Arthur,
Have this here of mee,
And give unto thy comely queen
All-shapen as you see.

“‘No wife it shall become


That once hath been to blame.’
Then every knight in Arthur’s court
Slye glaunced at his dame.

“And first came Lady Guenever,


The mantle she must trye.
This dame, she was new-fangled,
And of a roving eye.

“When she had tane the mantle,


And all was with it cladde,
From top to toe it shiver’d down,
As tho’ with sheers beshradde.

“Down she threw the mantle,


She longer would not stay;
But, storming like a fury,
To her chamber flung away.”

So one lady after another attempted to wear the mantle, and it


curled and became contracted on each, and all were shamed in the
sight of Arthur and the whole court.
“Sir Cradock call’d his lady,
And bade her to come neare:
‘Come win this mantle, lady,
And do me credit here.’

“The lady gently blushing


With modest grace came on,
And now to trye the wondrous charm
Courageously is gone.

“When she had tane the mantle,


And put it on her backe,
About the hem it seemed
To wrinkle and to cracke.
“‘Lye still,’ she cryed, ‘O mantle!
And shame me not for naught,
I’ll freely own whate’er amiss
Or blameful I have wrought.

“‘Once I kist Sir Cradocke


Beneathe the greenwood tree:
Once I kist Sir Cradocke’s mouth
Before he married me.’

“When thus she had her shriven,


And her worst fault had told,
The mantle soon became her
Right comely as it shold.

“Most rich and fair of colour


Like gold it glittering shone;
And much the knights in Arthur’s court
Admir’d her every one.”

I do not hold that this story belongs to Carlisle, but to Caerleon or


to Callington.
This last place was one of the three royal cities of Britain, of
which Caerleon was the second, says a Welsh triad, and the third I
cannot identify. At one of these three Arthur was wont to celebrate
the high festivals of Christmas, Easter, and Whitsuntide. Caradoc
Freichfras, the Sir Cradock of the ballad, was chieftain in Gelliwig, or
the region of which Callington was capital, and Bedwin was the
bishop there. I suspect this is a mistake for Berwin Bishop, who was
commemorated in Cornwall on the 4th September. It was here that
Gwenever held court when insulted by Modred, Arthur’s nephew,
during the king’s absence in Brittany, when he dragged her with
contumely from her throne and drove her from the palace. The fatal
battle of Camalon was fought to avenge this insult. The region of
Gelli, which gives its name to or derives its name from Brown Willy
and Brown Gelli, two tors in the upland metalliferous district, was
valuable because of the abundance of stream-tin and of gold that
was found there. Callington is a corruption of Gellewick-ton.
Caradoc Freichfras, that is to say Strong-i’-th’-Arm was son of Llyr
Merini, a Cornish prince, and his wife Gwen, who was a
granddaughter of Brychan of Brecknock. According to a saying
attributed to Arthur himself, he was styled “the pillar of the Cymry.”
His prowess in the great battle of Cattraeth against the Saxons is
commemorated by the contemporary poet Aneurin, who is the same
as the sour Gildas, historian of the Britons:—​
“When Caradoc rushed into the battle
It was like the tearing onset of the woodland boar,
The bull of combat in the field of slaughter,
He attracted the wild dogs by the motion of his hand.
My witnesses are Owen ap Eulat
And Gwrien, and Gwynn and Gwriat.
From Cattraeth and its carnage,
From the battle encounter,
After the clear bright mead was served,
He saw no more the dwelling of his father.”
Aneurin represents Caradoc as having fallen in this battle.
It is possible that Caradon may take its name from him, and that
it may have been Dun Caradock.
Caradoc and his true wife Tegau were laid hold of by the Anglo-
Norman romancers. They could not understand his nickname, and
rendered it “Brise-Bras,” and supposed that his arm was wasted
away, whereas the Celtic title implies that it was brawny. To explain
the wasted arm they invented a story. They told of an enchanter
who made a serpent attach itself to the arm of Caradoc, from whose
wasting tooth he could never be relieved until she whom he loved
best should consent to undergo the torture in his stead. The faithful
Tegau, on hearing this, was not to be deterred from giving him this
proof of her devotion. As, however, the serpent was in the act of
springing from the wasted arm of the knight to the lily-white neck of
the lady, her brother Cado, Earl of Cornwall, struck off its head with
his sword, and thus dispelled the enchantment.[8]
If Tegau was actually the sister of Cado, then we may flatter
ourselves that Cornwall presented the two noblest and purest types
of womanhood at the Arthurian period—​Tegau and Enid, the wife of
Geraint.
Two miles out of Callington is the parish church—​Southill—​one of
the many instances of an ecclesiastical settlement at a respectable
distance from the secular caer or tribal centre, that each might live
its own life and have its own independent organisation.
Southill was founded by S. Samson. As we have already seen, he
had landed on the north Cornish coast and made his way to
Petherwin, where he had visited his first cousin Padarn. On his way,
he passed through the district of Trecor, now Trigg, deriving its name
from three notable caers or camps,—​Helborough, Warbstow, and
Launceston. As Samson was in this district, he found the people
performing idolatrous rites about a tall upright stone, and this with
the sanction of their chief, who was called Gwythian. Samson did not
throw down the menhîr; he contented himself with cutting a cross
upon it.
I wonder whether this is the stone that still stands at Southill, on
which is cut the cross of Constantine. It is an inscribed stone to one
Connetoc, and is of the period of S. Samson.
Whilst tarrying in Cornwall, Samson heard that his old master,
Dubricius, was very infirm and failing, and he hastened to South
Wales to revisit him. The old man, who was dying, committed to his
charge a favourite disciple named Morinus. Samson did not
particularly relish the charge, for he did not believe the young man
was sincere. However, he took Morinus back with him, but soon
after, the disciple became insane and died. The monks, regarding
this as possession, removed his body and buried it outside their
cemetery. Samson was, however, very uneasy, because the deacon
had been entrusted to him with such solemnity by Dubricius, whom
he loved and reverenced with all his heart, and he prayed
incessantly for the poor fellow who had died mad, till one night he
dreamed that Dubricius appeared to him and assured him that
Morinus was admitted to the company of the blessed. With a glad
heart Samson ordered the body to be at once exhumed and laid in
consecrated ground.
One night in midwinter a thief got into the church, and stole
thence a cross adorned with gems and gold and all the money he
could lay his hands on, and ran away with the spoil wrapped in a
bundle. He made for the moors and ventured over a bog, trusting
that the frozen surface would bear him. But his weight broke
through the thin ice, and he sank to his waist. Afraid of going under
altogether, he threw away his burden, and did that which everyone
who has wits will do in a bog—​spread out his arms on the crust.
There the man remained till morning, when a hue and cry was set
up after the stolen goods. He was found and the plunder recovered.
What was done with the man we are not informed. At Southill is S.
Samson’s Well, and it was in clearing it out, having become choked,
that the stone with the inscription on it was found.
The old tribeland or principality of Gallewick was reduced in the
Middle Ages to a manor of Kelliland, which, however, remained of
considerable importance, and is now held by Countess Compton.
The church is Perpendicular, of no particular interest, but it
possesses an Easter sepulchre, and an early font on which are
carved grotesque animals and a representation of the Tree of Life.
Callington has in it a fine church that is chapel-of-ease to Southill. It
is good Perpendicular, and suffered a “restoration” under the hands
of an incompetent architect. Happily, since then, genius has been
invoked to supplement the defects of mediocrity, and the north aisle
that was added by Mr. Edmund Sedding is one of the ablest works of
that clever architect. Viewed internally or externally it is delightful.
CALLINGTON CROSS

There are a few quaint old cottages in Callington, and there is a


late mediæval cross that is picturesque. In the church, moreover, is
a very fine monument to Sir Robert Willoughby de Broke, who died
in 1503; he was steward of the Duchy of Cornwall, and took part in
the battle of Bosworth.
Callington was made a borough in 1584, and its earliest patrons
were the Pauletts. From them the patronage passed to the Rolles,
who divided it with the Corytons. Then it went to the Walpoles, next
to Lord Clinton, and finally to the first Lord Ashburton. It never bore
arms, nor had a corporation, but there is an early and interesting
silver mace, now in the custody of the portreeve, who is elected with
other officers annually at the manor court of Kelliland.
Perhaps the most quaint and beautiful of the chapel wells in
Cornwall is Dupath, near Callington, though not in the parish, but in
that of S. Dominick. Unhappily dirty farmyard surroundings disfigure
the scene, and make one fear pollution of the sparkling water.
Hingesdon, on the N.E., rises to the height of 1091 feet, its
highest point being called Kit Hill, where are remains of a camp; the
moor, moreover, is strewn with barrows. It was on Hingesdon that
the Britons, uniting their forces with some Danes who had come up
the Tamar, met and fought Egbert in 833, and were defeated. The
surface of Hingesdon and Kit Hill has been much interfered with by
mines, and the summit is crowned with a ruined windmill erected to
work the machinery in a mine hard by. The road to Tavistock passes
over Hingesdon at a height of 900 feet, and thence after nightfall
can be seen the Eddystone light.
On the Liskeard road, beside the Lynher, is a well-preserved oval
camp called Cadsonbury. Other camps are at Tokenbury and
Roundbury.
S. Ive (pronounced Eve) is probably a foundation of one of the
Brychan family, and certainly not dedicated to S. Ive of
Huntingdonshire, who is an impostor, nor to S. Ive of the Land’s End
district. The church is interesting, but has been unfeelingly
“restored.” The east window, with its niches, deserves special notice.
By far the finest church in the neighbourhood is Linkinhorne (Llan
Tighern), the church of the king, that is, of S. Melor. It was erected
by Sir Henry Trecarrel, who built Launceston Church, but Linkinhorne
is in far superior style. The story of S. Melor is this. He was the son
of Melyan, prince of Devon and Cornwall and of Brittany. Melyan’s
brother was Riwhal, or Hoel the Great, cousin of King Arthur. Hoel,
being an ambitious man, murdered his brother Melyan, and cut off
the hand and foot of his nephew Melor, so as to incapacitate him
from reigning; as a cripple, according to Celtic law, might not
succeed to the headship of a clan or of a principality. In the place of
the hand and foot of flesh and blood the boy was supplied with
metal substitutes, and the hand was formed of silver.
For precaution the child was sent to Quimper, and placed there in
a monastery.
Now it fell out that Melor and other boys were nutting in a wood,
and his comrades made their little pile of hazel nuts and brought
them to Melor. To their great surprise they found that,
notwithstanding that his hand was of metal, he was able therewith
to twitch off the nuts from the trees.
As the misfortunes of the unhappy prince attracted much
sympathy, Howel sent for a man named Cerialtan, Melor’s foster-
father, and promised him an extensive grant of lands if he would
make away quietly with the young prince. Cerialtan consented, and
confided his purpose to his wife. She was horrified, and resolved on
saving the boy. During her husband’s temporary absence, she fled
with her nephew to the wife of Count Conmor at Carhaix in Brittany,
who was Melor’s aunt. When Howel heard of this he was incensed,
and urged Cerialtan to get the boy back into his power. Accordingly
this worthless fellow took his son Justan with him, a lad who had
been Melor’s playmate, and to whom the young prince was much
attached. The treacherous foster-father persuaded Melor that no
harm was intended, and he and Justan were given the same bed as
Melor in which to sleep.
During the night Cerialtan rose and cut the young prince’s throat,
then roused his son, and they escaped together over the walls of
Carhaix. But in so doing Justan missed his hold and fell, and was
killed.
On reaching the residence of Howel, Cerialtan produced the head
of Melor, which he had cut off, in token that he had accomplished his
undertaking. Howel grimly promised to show the man the lands he
had promised him, but first put out his eyes.
In Brittany it is held that Melor was buried at Lan Meur, near
Morlaix, but no tomb exists there, nor does there seem to have ever
been one.
The whole story is legendary, yet certainly is framed about some
threads of historic truth. But whether the murder was committed in
Brittany or in Cornwall is uncertain. That Melor’s father was
assassinated in Cornwall I shall show later on to be probable. Mylor
Church as well as Linkinhorne are dedicated to this boy martyr;
Thornecombe Church in Dorset is also named after him, and it was
held that his body had been transferred to Amesbury, where, during
the Middle Ages, his relics attracted pilgrims.
From Callington a pleasing excursion may be made to the
Cheesewring; and there is a very comfortable little inn there, where
one can tarry and be well fed and cared for.
The height is a thousand feet, and the view thence over the
fertile rolling land of Devon and East Cornwall is magnificent,
contrasting strikingly with the desolation of the moors to the north.
Here is Craddock Moor, taking its name in all probability from that
Caradoc who ruled for Arthur in Gallewick, or Gelliwig.
THE CHEESEWRING

The whole of the neighbourhood has been searched for metal,


and the Phœnix Mines employed many hundreds of hands till the
blight fell on Cornish tin mining, and they were shut down.
The head of the Cheesewring hill has been enclosed in a stone
caer. The common opinion is that every stone composing it was
brought up from the bed of the Lynher, but this is almost certainly a
fiction. The circles of the Hurlers are near, with a couple of
outstanding stones. The legend is that some men were hurling the
ball on Sunday, whilst a couple of pipers played to them. As a
judgment for desecration of the Lord’s-day they were all turned into
stone. There are three circles, eleven stones in one, of which all but
three have fallen; fourteen in the second, of which nine are
standing; twelve in the third, but only five have not fallen. A curious
instance of the persistency of tradition may be mentioned in
connection with the cairn near the Hurlers and the Cheesewring, in
which a gold cup was found a few years ago.
The story long told is that a party were hunting the wild boar in
Trewartha Marsh. Whenever a hunter came near the Cheesewring a
prophet—​by whom an Archdruid is meant—​who lived there received
him, seated in the stone chair, and offered him to drink out of his
golden goblet, and if there were as many as fifty hunters approach,
each drank, and the goblet was not emptied. Now on this day of the
boar hunt one of those hunting vowed that he would drink the cup
dry. So he rode up to the rocks, and there saw the grey Druid
holding out his cup. The hunter took the goblet and drank till he
could drink no more, and he was so incensed at his failure that he
dashed what remained of the wine in the Druid’s face, and spurred
his horse to ride away with the cup. But the steed plunged over the
rocks and fell with his rider, who broke his neck, and as he still
clutched the cup he was buried with it.
Immediately outside the rampart of the stone fort above the
Cheesewring is a large natural block of granite, hollowed out by the
weather into a seat called the Druid’s Chair.
Just below the Cheesewring is a rude hut cell or cromlech, formed
of large slabs of granite, which is called “Daniel Gumb’s House.” It
was inhabited in the last century by an eccentric individual, who
lived there, and brought up a family in a state of primæval savagery.
On one of the jambs is inscribed, “D. Gumb, 1735,” and on the top
of the roofing slab is an incised figure of the diagram of Euclid’s 47th
proposition in the First Book.
At some little distance is the very fine cromlech called the
Trethevy Stone. It is well worth a digression to see, as being, if not
the finest, at least the most picturesque in Cornwall.
S. Cleer has a holy well in very good condition, carefully restored.
Near it is a cross.
In the parish is the inscribed stone of Doniert, the British king,
who was drowned in 872.
From Callington, Calstock—​the stock or stockade in the Gelli
district on the Tamar—​may be visited. The river scenery is of the
finest description, rolling coppice and jutting crags, the most
beautiful portion being at Morwell.

ARSENIC MANUFACTURE
There are several arsenic works in this district. The mundic
(mispickel-arsenic), which was formerly cast aside from the copper
mines as worthless, is calcined.
The works consist in the crushing of the rock, it being chewed up
by machinery; then the broken stone is gone over by girls, who in an
inclined position select that which is profitable, and cast aside the
stone without mundic in it. This is then ground and washed, and
finally the ground mundic is burnt in large revolving cylinders.
The fumes given off in calcining are condensed in chambers for
the purpose, and deposited in a snow-white powder. The arsenic is a
heavy substance with a sweetish taste, and is soluble in water. In
the process of calcining a large amount of sulphurous acid is given
off—​a pungent, suffocating gas—​and this, escaping through the
stack, is so destructive to trees and grass, that it blights the region
immediately surrounding. When, however, a stack is of sufficient
height the amount of damage done to herbage is greatly reduced, as
at Greenhill, where there is a healthy plantation within two hundred
yards of the stack.
When the workmen have to scrape out the receivers or
condensers, the utmost precaution has to be taken against inhaling
the dust of arsenic. The men engaged wear a protection over the
mouth and nostrils, which consists in first covering the nostrils with
lint, and then tying a folded handkerchief outside this with a corner
hanging over the chin. When the arsenic soot has been scraped out
of the flues and chambers in which it has condensed, it is packed in
barrels.
Every precaution possible is adopted to reduce danger, but with
certain winds gases escape in puffs from the furnace doors, which
the men designate “smeeches,” and these contain arsenic in a
vaporised form, which has an extremely irritating effect on the
bronchial tubes.
One great protection against arsenical sores is soap and water.
Arsenic dust has a tendency to produce sore places about the
mouth, the ankles, and the wrists. Moreover, if it be allowed to settle
in any of the folds of the flesh it produces a nasty raw. On leaving
their work the men are required to bathe and completely cleanse
themselves from every particle of the poison that may adhere to
them.
As touching inadvertent arsenical poisoning, I will mention a
circumstance that may be of use to some of my readers.
When living in the East of England I found my children troubled
with obstinate sores, chiefly about the joints. They would not heal. I
sent for the local doctor, and he tinkered at them, but instead of
mending, the wounds got worse. This went on for many weeks.
Suddenly an idea struck me. I had papered some of my rooms with
highly æsthetic wall coverings by a certain well-known artist-poet
who had a business in wall-papers. I passed my hand over the wall,
and found that the colouring matter came off on my hand. At once I
drove into the nearest town and submitted the paper to an analyst.
He told me that it was charged with sulphuret of arsenic, common
orpiment, and that as the glue employed for holding the paint had
lost all power, this arsenical dust floated freely in the air. I at once
sent my children away, and they had not been from home a week
before they began to recover. Of course, all the wall-papers were
removed.
ARSENIC WORKS

About a month later I was in Freiburg, in Baden, and immediately


on my arrival called on an old friend, and asked how he and all his
were.
“Only fairly well,” he replied. “We are all—​the young people
especially—​suffering from sores. Whether it is the food—​—​”
“Or,” said I, interrupting him, “the paper.”
Then I told him my experience.
“Why,” said he, “a neighbour, a German baron, has his children ill
in the same way.”
At once he ran into the baron’s house and told him what I had
said. Both proceeded immediately to the public analyst with
specimens of the papers from the rooms in which the children slept.
The papers were found to be heavily laden with arsenic.
Unhappily, in spite of all precautions, the work at the arsenic mine
and manufactory is prejudicial to health. The workers are disabled
permanently at an average age of forty. Of deaths in the district,
eighty-three per cent. are due to respiratory diseases, while sixty-six
per cent. are due to bronchitis alone. For the last three years, out of
every hundred deaths among persons of all ages in the parish of
Calstock twenty-six have been due to diseases of the respiratory
organs, but out of every hundred employés at the arsenic works who
have died or become disabled eighty-three deaths have been due to
respiratory diseases. It is evident that with such an unusual
proportion of one particular disease in the most able-bodied portion
of the community there must be a definite existing cause.
No doubt that a very minute amount of arsenic may pass through
the nostrils and down the throat, but what is far more prejudicial
than that is the sulphurous acid which cannot be excluded by the
handkerchief and lint, but passes freely through both. This is
extremely irritating to the mucous membrane. But the fact of
working for hours with the breathing impeded by the wraps about
mouth and nose is probably the leading cause of the mischief.
Suggestions of remedies have been made, but none practical. A
mask has been proposed, but this does not answer, as it causes
sores, and is difficult to keep clean.
Devon Consols produces about 150 tons of arsenic per month;
Gawlor, 100 tons; Greenhill, 50; Coombe, 25; and Devon Friendship
about the same. In all about 350 tons per month. This to the
workers is worth £10 per ton, or a revenue to the neighbourhood of
£42,000 per annum.
In S. Mellion parish, on the Tamar, finely situated, is Pentillie
Castle.
The original name of the place was Pillaton, but it was bought by
a man of the name of Tillie in the reign of James II., who called it
after his own name. He was a self-made man, who was knighted,
and not having any right to arms of his own, assumed those of
Count Tilly, of the Holy Roman empire. But this came to the ears of
the Herald’s College, and an inquisition into the matter was made,
and Sir James was fined, and his assumed arms were defaced and
torn down.
He died in 1712, and by will required his adopted heir, one
Woolley, his sister’s son, not only to assume his name, but also not
to inter his body in the earth, but to set it up in the chair in which he
died, in hat, wig, rings, gloves, and his best apparel, shoes and
stockings, and surround him with his books and papers, with pen
and ink ready; and for the reception of his body to erect a walled
chamber on a height, with a room above it in which his portrait was
to be hung; and the whole was to be surmounted by a tower and
spire.
About two hours before he died Sir James said, “In a couple of
years I shall be back again, and unless Woolley has done what I
have required, I will resume all again.”
Mr. Woolley accordingly erected the tower that still stands above
Sir James’ vault. But the knight did not return. He crumbled away;
moth and worm attacked his feathers and velvets; and after some
years nothing was left of him but a mass of bone and dust that had
fallen out of the chair.
CHAPTER VIII.

CAMELFORD
A rotten borough—​Without a church or chapel-of-ease—​History of
the borough—​Contest between the Earl of Darlington and Lord
Yarmouth—​Brown Willy and Rough Tor—​Helborough—​S. Itha—​
Slaughter Bridge—​King Arthur—​The reason for the creation of the
Arthur myth—​Geoffrey of Monmouth—​The truth about King Arthur
—​The story of his birth—​Damelioc and Tintagel—​How it is that he
appears in so many places—​King Arthur’s Hall—​The remains of
Tintagel—​The Cornish chough—​Crowdy Marsh—​Brown Willy and
the beehive cottages on it—​Fernworthy—​Lord Camelford—​His
story—​Penvose—​S. Tudy—​Slate monuments—​Basil—​S. Kew—​The
Carminows—​Helland—​A telegram.
That this little town of a single street should have been a borough
and have returned two members to Parliament is a surprise. It is a
further surprise to find that it is a town without a church, and that
no rector of Lanteglos, two miles distant, should have deemed it a
scandal to leave it without even a chapel-of-ease is the greatest
surprise of all.
Camelford was invested with the dignity of a borough in 1547,
when it was under the control of the Roscarrock family. From them it
passed to the Manatons living at Kilworthy, near Tavistock. Then it
fell into the hands of an attorney named Phillipps. He parted with his
interest to the Duke of Bedford, and he in turn to the Earl of
Darlington, afterwards Duke of Cleveland.
The electors were the free burgesses paying scot and lot. “Scot”
signifies taxes or rates. But the mayor was the returning officer, and
he controlled the election.
In George IV.’s reign there was a warm contest between the Earl
of Darlington and Lord Yarmouth. The latter ran up a great building,
into which he crowded a number of faggot voters. But the Earl of
Darlington possessed rights of search for minerals; so he drove a
mine under this structure, and blew it up with gunpowder. The
voters hearing what was purposed, ran away in time, and
consequently Lord Yarmouth lost the election.
In the election of 1812 each voter received a hundred pounds for
his vote. In the election of 1818 the mayor, Matthew Pope,
announced his intention of giving the majority to Lord Darlington’s
nominee, and of turning out of their freeholds all who opposed. The
other party had a club called “The Bundle of Sticks,” and engaged a
chemist named William Hallett, of S. Mary Axe, to manage the
election for them, and put £6000 into his hand to distribute among
the electors, £400 apiece.
Hanmer and Stewart got ten votes apiece, Milbrook and Maitland
thirteen. But there was an appeal, and a new election; but this again
led to a petition, and a scandalous story was told of bribery and
corruption of the most barefaced description. The election was
declared void, and many persons, including Hallett, the chemist,
were reported. It was proposed to disfranchise the borough, but
George III. died in 1820, and new writs had to be at once issued.
Camelford has no public buildings of interest. It is situate on very
high ground, on a wind-blown waste 700 feet above the sea,
exposed to furious gales from the Atlantic; but it has this advantage,
that it forms headquarters for an excursion to the Bodmin moors, to
Brown Willy (1375 feet), and Rough Tor (1250 feet). These tors,
though by no means so high as those on Dartmoor, are yet
deserving of a visit, on account of their bold outlines, the desolation
of the wilderness out of which they rise, and the numerous relics of
antiquity strewn over the moors about them.
Of these presently.
The parish church of Camelford, two miles off, is Lanteglos. The
dedication is to S. Julitta, but this would seem to have been a
rededication, and the true patroness to have been either Jutwara or
Jutwell, sister of St. Sidwell, or of Ilut, one of King Brythan’s
daughters.
There was a royal deer-park there, as the old castle of
Helborough, though not occupied, was in the possession of the Duke
of Cornwall.
This is really a prehistoric camp of Irish construction, and in the
midst of it are the ruins of a chapel to S. Sith or Itha, the Bridget of
Munster. Itha had a number of churches ranging from the Padstow
estuary to Exeter, showing that this portion of Dumnonia received
colonists from the south-west of Ireland. Her name is disguised as
Issey and as Teath. She was a remarkable person, as it was she who
sent her foster-son Brendan with three ships, manned by thirty in
each, on an exploring excursion across the Atlantic to the west,
which, possibly, led to the discovery of Madeira in the sixth century.
But the truth is so disguised by fable that little certainty can be
obtained as to the results of the voyage. Brendan made, in fact, two
expeditions; in the first his ships were of wicker, with three coats of
leather over the basket frame; the second time, by Itha’s advice, he
made his boats of timber.
Itha never was herself in Cornwall, her great foundation was Kill-
eedy in Limerick, and she was taken as the tutelary saint or
patroness of Hy-Conaill, but there were establishments, daughters of
the parent house, what the Irish called daltha (i.e. pupil) churches,
enjoying much the same rights as the mother house.
Camelford has by some been supposed to be the Gavulford where
the last battle was fought between the West Welsh and Athelstan;
but there was no reason for his advancing into Cornwall this way,
where all was bleak, and by no old road.
There is, however, a Slaughter Bridge on the Camel, but this is
taken to have acquired its name from having been the scene of the
fight between King Arthur and his rebellious nephew Mordred, circ.
537.
King Arthur is a personage who has had hard measure dealt out
to him. That there was such an individual one can hardly doubt.
There is a good deal of evidence towards establishing his existence.
He was chief king over all the Britons from Cornwall to Strathclyde
(i.e. the region from the Firth of Clyde to Cumberland). He was
constantly engaged, first in one part, then in another, against the
Saxons; but his principal battles were fought in Scotland. He occurs
in the Welsh accounts of the saints, but never as a hero, always as a
despot and tyrant. His immediate predecessor, Geraint, in like
manner is met with, mainly in Cornwall, but also in Wales, where he
had a church, and in Herefordshire. He had to keep the frontier
against the Saxons.
What played the mischief with Arthur was that Geoffrey of
Monmouth, who became bishop of S. Asaph in 1152, published,
about 1140, his fabulous History of the Britons, which elevated
Arthur into a hero. Geoffrey had an object in view when he wrote
this wonderful romance. The period was one in which the Welsh had
been horribly maltreated, dispossessed of their lands, their churches
taken from them and given to Normans, who neither understood
their language nor regarded their traditions. The foreigners had
castles planted over the country filled with Norman soldiery,
tormenting, plundering, insulting the natives. Poor Wales wept tears
of blood. Now Henry I. had received the beautiful Nest, daughter of
Rhys, king of South Wales, as a hostage when her father had fallen
in battle, and, instead of respecting his trust, he had wronged her in
her defenceless condition in a cruel manner, and had by her a son,
Robert, who was raised by him to be Duke of Gloucester. To this
Robert, half Welsh, Geoffrey dedicated his book, a glorification of the
British kings, a book that surrounded the past history of the Welsh
with a halo of glory. The book at once seized on the imagination of
English and Normans, and a change took place in the way in which
the Welsh were regarded. The triumph of the Saxon over the Briton
came to be viewed in an entirely new light, as that of brutality over
heroic virtue.

KING ARTHUR
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like