A Michigan AIMCat wrote us:
Your research work, and the work of the miners, has inspired me to try to research and create an expose on the leader of the Michigan Republican party, Ron Weiser. He is on the board of WEF and has been leading Michigan politician in support of failed RINOs. He recently tried to take Macomb County from the grassroots leaders.
I was wondering if the miners might have some tips as to how they are able to uncover so much otherwise hidden information. Do they employ a defined methodology (as V I suppose an engineer like you would)? Do they just query and do deep dives on what the find? I will bet they rely extensively on resources I haven’t even considered.
Thank you for the work you do, and thanks in advance for any tips.
Our reply and we ask that you share these tips widely and USE THEM!
The shortest answer is see what is there, first, then, follow those links to see other links, start noting the interlocked relationships, follow each of those until you find the devils and their dirty deeds and data. Keep a file of notes, links, screen captures on your journey in a WORD file. That way, when you start preparing your write up, you won’t have to wonder where you got the earlier stuff.
Whenever you discover items being censored, that is a clue to focus on that item as it is usually a smoking gun for information the demons think they should hide.
The demons usually hide a few layers deep, sometimes many layers.
We only use open source information from internet, libraries, archives, media, newspapers, genealogy, some of it is free, some of it is subscription. Then, persist, persist, persist. Sometimes weeks can go by rummaging through information before a break occurs. You have to be patient and dogged. This process is not for souls that give up easily because it is “too hard.”
Befriend good state library researchers. They can be very helpful in tracking down stuff for you.
Don’t be satisfied with evidence until it is “judicially recognizable”… that is, it is already so notoriously known, or comes from a notoriously accepted source that it can be used in court without further validation.
When you save files, start with the date, ie. YYYY-MM-DD-CITATIONS-MO-DY–YYYY. This way people can get a context date for the material. For example, here is a recent document we will be posting.
2020-12-04-Blackstone-Completes-Acquisition-of-Ancestry-Leading-Online-Family-History-Business-for-$4.7-Billion-Press-Release-Blackstone-Dec-04-2020
The more of the subject you can get in the filename, the better. File names should be shortened when they get too long. iPads sometimes have trouble with too long file names. Windows PCs, less so.
Note: all writings, speeches and information posted by public officials and institutions is judicially recognizable. Make sure you present a proper bibliography for the citation, including the original sources and links where possible. Without the links, it is hard for others to do their own verifications.
On anything you post, be sure to write “Reproduced for educational purposes only. Fair Use relied upon.” This will keep you from trouble and accusations of copyright violation vis a vis the Fair Use doctrine.
Hope this helps.
Find a reliable place to post your research documents, and remember you can always send your research to us where we can post on one of our several blogs. You can also open up a substack account and publish your work – then post your findings to Gab or other platform where we can help you circulate it.