For those who are lurking, but don’t know how to help, your time has come.
**Your mission is to preserve potential online evidence. **
This will be done with archive.is. (There are other archiving sites as well, but this is the one I use.) See comments of others for more suggestions.
Why is archiving important? Because TPTB are changing/removing online evidence. As soon as someone publicly points it out, complicit media makes it disappear. We have all seen posts referencing Archive.is. But a lot of us diggers are limited to only mobile devices (I am one of those), or we just don’t understand how it works in general or what the purpose is.
FOR EVERY RESEARCHER:
It is important to Archive.is your link before publicly posting it. Otherwise it is like the fish that got away; no proof except your words. Best Practice is to practically archive.is every source you come across.
Technical Quick Start Guide to using Archive.is
Open a browser tab.
Navigate to the www.archive.is website on a browser tab. (You will keep coming back and forth to this tab. It is the machine that feeds your page into the archive.is library. Make it a favorite in your browser.)
Open a second browser tab (to search with). Search your keyword and go to webpage. Copy the web addresses.
Flip over to the archive.is tab. Paste the web address here. Save/Search. It may require a few clicks, depending on whether it has been archived before.
{If someone could do a short tutorial on Archive.is for Dummies, that would be great!)
Now flip back to your search tab, and go back down your rabbit hole!
**
Maintaining a Running Record**
It would be helpful to the investigation to maintain a bread crumb trail for the rabbit hole you are digging in. That way, once you come upon a big connection that hasn’t been mentioned, you can copy and paste your trail of preserved evidence!
If you want to maintain a running record, copy the key info (such as headlines or paragraph containing info) and paste into Word, and then also obtain the Archive.is web address. NOTE: Short and long archive.is web addresses can be found under the Share option
Once you understand how to use Archive.is, you can let your interest guide you from here. There are two ways that I have approached the process, using Wikis and MSM/News Media sites.
Wiki:
Select a wiki entry.
Look for interesting connections and key information.
Follow the links down the Wiki rabbit hole.
Stop at each destination and Archive.is it.
Copy/Paste bread crumb path (archive.is link) into Word or other local software.
.
News Media:
Find any interesting new media story, video or photo.
Follow the webpage’s algorithm on suggested stories.
Archive each story as you go (sometimes I don’t even read them).
Copy/Paste bread crumb path (archive.is link) into Word or other local software.
We can use these type of comparisons to prove MSM is covering up and spewing pr0paganda. The general masses of sheeple need woken up to the sleazy media tactics that can be objectively seen.
Iyd10 ago
Really dumb question sorry. If I archive something and it tells me it's already been saved, if I click save again does it save over the current one or does it save a new copy? I'm assuming the second one, just want to verify. Thanks
sheer-con ago
@mods Can we get this tagged with a "tools" tag?
KrabbyDog ago
In addition, I like many others, have copies of evidence accumulating in encrypted folders on our desktop machines. And, some tools previously available only to the intelligence community have become available to the public. I am using Gephi to map social networks. I have also used Microsoft FileMaker Pro to create a target database, database of evidence files, and the links between targets and evidence. The beauty of FileMaker Pro is that the files are encrypted at all times, including copies of any evidence attached. So, for example, if I see a long article in Focus Deutschland, I can copy and paste it into a document file, save that file, and then attach it to the FileMaker Pro database, where it will then be encrypted and ingested into the file structure (afterwards I can then wipe the temporary document file). Good OPSEC and good INFOSEC may be overkill for we amateur investigators, but it is good practice.
Peackng74 ago
Thank you. I will try to do this. I'm an amateur on this compared to most of you. I've been screen shooting most of the thins I find.