posted on May, 11 2007 @ 06:47 PM
Everybody has to start somewhere.
The information contained in this thread is for educational purposes only. I've been asked many times to explain basic research methods. I've
compiled all of my answers for this introductory essay because doing your own homework matters.
Each new generation of conspiracy enthusiasts likes to re-examine the many plots that have already been written about. Some investigators hope to put
a new spin on old ideas. Others try to seek out new information, using new technologies (like the internet). Many authors will use what's already
known about a conspiracy theory they are familiar with to create a work of fiction that appeals to their own unique interests.
Trained researchers and experienced conspiracy buffs already know how to use libraries and other research tools. Finding information about your
favorite topic can be as easy as using a computer to access the internet, and your favorite search engine. Even so, successful conspiracy hunting
relies on more than just knowing where to look. What you look for is just as important as how you try to find it.
Specialized information sources contain specialized information. Large-scale (bulk) information sources contain a little bit of knowledge relating to
many subjects. This is the first lesson that most conspiracy researchers learn the hard way. When you look at books in a store, or at your local
library, keep this in mind before you buy them or check them out. For best results, look for titles that convey specific information about a single
subject.
The same thing holds true for internet web sites. When looking at personal, commercial, or government-run web sites, be aware that "a little bit of
everything" usually means a whole lot of nothing. This is an important consideration, since many authors don't have a lot of spare time to waste on
useless research.
Libraries and book stores catalog their titles by author, subject, and ISBN number. When dealing with libraries, you may be able to use a computer to
search for the subjects you want. Don't be afraid to ask for help if you can't operate the search terminal, or read what's on the screen. Many
modern libraries have assistive technologies or trained specialists to help you find what you need. This may include books on tape or audio CD.
Search terms and subject categories are exactly what you think they are. Making the most of your research time means thinking analytically. Making a
list of single words that relate to your subject of interest will be very helpful. The internet is very convenient, but you will always find
information (in books) on the shelf at most libraries that you won't find anywhere else. Don't be surprised if some of the search terms you come up
with sound odd or silly.
The internet is constantly evolving, and computer security is becoming more of an issue with the passing of each decade. Many modern laws now allow
law enforcement officials to track library records. This means they have the potential to find out who checked out what book. Some localities
require users to have a registered user account to operate the library's electronic records inventory. This means that law enforcement officials may
be able to find out who was interested in certain categories of information.
Some conspiracy theorists find themselves looking for information on subjects that may be regarded as "suspicious" by local, State, or Federal law
enforcement officers. Those who don't like being tracked or monitored may choose to look for books and other periodicals without using the
library's search tools. This can be done by simply looking around the library that you're in at a slow leisurely pace.
Many of the books you may want to read will be grouped by subject. Look for printed signs on the ends of book shelves that will tell you what
subjects are covered in that area. Don't be afraid to ask for help if you can't read the signs. Learning the layout of your local library may take
some time.
If you're afraid of being tracked, don't check out the books you want to read. Find a comfortable place to sit, and look at them. Remember that
libraries are supposed to be used for research and study. Don't be afraid to take notes on what you're reading. If writing is a problem, consider
making photocopies of the most important pages.
Bear in mind that some libraries have adapted their copiers to store digital images of whatever gets reproduced. Stored images are time indexed, with
a date stamp. In some cases, a library may be kept secure by means of closed-circuit video cameras. This could mean that your activities are closely
monitored. These technologies are expensive to operate and maintain. They are not used by all libraries.
Many of the challenges associated with libraries can also be encountered in commercial book stores. Many of the larger stores are equipped with video
surveillance systems. Some use hidden cameras. Books and magazines are sorted by topic, and many big stores allow you to sit and read without
buying.
Most of the contemporary book shops you're likely to visit will have electronic database inventories. If you can't find what you want, it may be
wise to ask the salesperson behind the counter for help. Many of the programs they are likely to use will log the type of request you make, but they
won't be able to track your identity unless you use a credit card to make a purchase. Paying with cash does not allow them to track your identity,
even if they give you change from large bills.
There is one additional thing to consider when shopping at book stores. Larger chain stores offer their customers discount club cards. When you make
a purchase, the card is scanned and you get an extra discount on what you bought. The catch is that your club card contains information about your
identity that is read in to the cash register's customer database. It's voluntary on your part, so you have no room to complain if you give your
card to the clerk when they ask for it.
The end result can be that store owners know who you are and what you bought. Under the terms of modern law, this information can be made available
to local, State, and Federal police agencies by request or warrant. It's worth noting that many small used book stores don't have these security
measures in place because they can't afford them. Most of these little shops don't even take credit cards.
ii. Search Engines and Web Sites
The internet is an electronic gateway to an infinite number of destinations. Conspiracy buffs looking to read up on established conspiracies can find
any number of web pages that will contain an unlimited amount of theories, observations, speculations, and facts of all sorts. Using your favorite
search engine, you can request subject descriptions in much the same way as you might in a library. The search parameters are a little broader, and
the selection is much greater.
When the search results come up, they are displayed by website title, followed by a short description of what you might expect to find on that page.
Because the sites on the internet are being updated by their owners at different intervals, your results may vary each time you use a search
engine.
Conspiracy theories which have been around for a long time will have a lot of material online. Your challenge, as a researcher, is to sift through it
all and get to the details that matter most to your investigation. Making a list of search terms that relate specifically to the elements that relate
to your 'plot' will help. Because the known theories have been written about by so many people, you will find yourself skipping over a lot of
duplicated material.
Be creative with your search terms. Don't be afraid to type in a complete one sentence question. Modern search engines can process a written
question just like any other information request. They can do this with a high degree of success. Conspiracy theorists spend a lot of time on the
internet. With practice, and a little deductive reasoning, you'll be able to make your preferred search engine lead you to lots of information about
well established conspiracy theories.
You should know that modern law authorizes government agencies and law enforcement officials to monitor internet traffic. It's possible that every
action you take on the internet may be recorded by any of the many computers which process your electronic requests. The Federal government is known
to monitor any web site that it considers suspicious, or threatening to national security.
Removing hostile programs (spyware) from your own computer is no guarantee of privacy. This form of monitoring offends many conspiracy theorists who
see it as a threat to their privacy. Some are even known to write about it. Privacy issues are very common topic for today's reform-minded
authors.
What you find is just as important as how you find it. Expertise comes through experience. The more time you spend on a subject, the more you will
learn about it. As time passes, you'll get comfortable with it. What you think doesn't hinge on your ability to win an argument, but it does rely
on what you know. Fact shapes opinion. Conspiracies are only mysterious when you don't know anything about them.