Money Supply and Consumer Price Index

MoneySupply_CPI   <– PDF

Dear readers:

The enclosed PDF shows the total money supply, per-capita money supply, and consumer price index (CPI) for the United States from 1791 to 2020.  These charts were extracted from my new book “The Control and Manipulation of Money”, available for free download at


Ed Duvall

Tags: , , , ,
Posted in consumer price index, Economics, U. S. money supply | No Comments »

History of Money During the French Revolution

French_Revolution   <– PDF

Dear Readers:

The enclosed PDF is section 3.2 from my new book, The Control and Manipulation of Money, available for free download at  This section describes the depreciation of the paper money issued during the French Revolution (known as assignats and mandats), and the tyrannical means employed to force it into circulation.



Posted in Uncategorized | No Comments »

New book announcement

4 Dec 2021

Dear Readers:

I am pleased to announce that I have (finally) completed my new book, “The Control and Manipulation of Money”.  It is available for free download at:

The book consists of two parts.  Part 1 (chapters 1 to 6) discusses basic economics: wealth, capital, labor, rent, credit, taxation, the causes of expansions and recessions, inflation, and national debt. It also includes examples of  monetary depreciation (inflation), the effects of inflation, and the operation of the various banking systems (including central banks under a fractional reserve system).  It is primarily a refutation of the common false claims made by “progressive” socialists.

Part 2 (chapters 7 to 24) is a complete financial and economic history of the U. S. from 1775 to 2020; starting with the Continentals during the Revolution, the first and second Banks of the United States, the National Banking system, and the Federal Reserve system.  It includes all the relevant legislation that changed the banking system and describes the causes of recessions.  Each chapter contains a full set of data: U. S. government revenues and expenditures, national debt, condition statements of the banking system, money supply, coinage, consumer price index (the metric for depreciation of money), and income index.  Part 2 will provide you with all the necessary facts about the monetary situation in the U. S. throughout our history.



Posted in Uncategorized | No Comments »

Privacy in the Modern Age, Part 5

Privacy In The Modern Age, Part 5   <– PDF

It sure is convenient in these modern times to have the internet available; there is so much more information than there was back in the days of the Encyclopedia at the local library.  But, take the bad with the good: there is also a lot of false and misleading garbage out there, too.  At least the cigar-chomping old guys who wrote the Encyclopedia had their work reviewed by competent experts, and if it was in the Encyclopedia, you can be sure that the authors and reviewers believed that their articles were true and correct at the time it was written.  The internet, on the other hand, is full of people who lie for a living.

There are a great many other issues to contend with regarding computers, the internet, and privacy.  If you use a Microsoft or Apple operating system, you cannot actually delete a file.  When you tell those operating systems to delete a file, all it does is delete the pointer to the first byte in the file, not the data itself.  That means that all your files are still there, and anyone who understands how the file system and pointer system can recover anything that you thought you had deleted, including all your financial and personal data.  The only remedy is to install special commercial software programs (Sdelete, ccleaner, or Eraser) that overwrite all disk space not actively being used (including the “deleted” files).  However, if you use a UNIX-based operating system, it will in fact entirely delete a file, and overwriting is not necessary.

There are other risks that can compromise your privacy entirely.  First, you do have control over what you download from the internet.  But you do not have any way to control, or even to know, what is being uploaded from your computer whether you are on the internet or not.  You, the PC user, are not provided with any tools that will allow you to see what is being sent from your PC without your express consent.

Second, we are all aware of the numerous “viruses” on the internet designed to shut your system down or encrypt your data until you pay a ransom to have it unlocked.

Third, the large tech companies are trying to convince you to store all your data on the “cloud”, which is (of course) advertised “for your convenience”.  They even tell you that all your data is encrypted.

Fourth, most internet search engines (especially google and bing) track all your internet searches and maintain a list of all the websites you have visited.

Here are some suggestions to mitigate these direct risks.  This is not foolproof, and it is only a first-order method; there are far stronger methods.

  1. Never store anything on the “cloud”. It may well be that your data is encrypted, but so what? What matters is who has the encryption key; and of course, no one is going to tell you what corporations or what government agencies have the keys.  You should not assume anything you place on the cloud is actually kept private.  Instead, use a separate external hard drive (a drive holding one terabyte now costs about $50), connected to your PC through one of the USB ports.
  2. Never store anything of value on your PC’s main hard drive. Store everything of any importance on the external drive only. Never store any financial records, personal data, pictures of yourself or your family, your driver’s license copy, or anything of relevance on the PC hard drive, only on the external drive.  The exception is that you can store individual documents on your PC hard drive only if they are encrypted. In addition, use thumb drives as backups to the external drive (since the external drive will fail at some point).
  3. Disconnect the external hard drive from your PC whenever you get on the internet. That way, if anything is being uploaded, only the things of no value can be uploaded without your knowledge.
  4. Use strong passwords of important documents; this utility is found on nearly all commercial software products (although you may have to access the non-helpful “help” to gain access to how it works. Your password should consist of at least 10 characters, and be a combination of letters, numbers, and symbols. Do not store the password anywhere on the PC; instead, write them down in a small notebook and put them in a secure place elsewhere in your home or office.
  5. Only use internet search engines that do not preserve a search history (such as DuckDuckGo, IXQuick, or StartPage). Do not use google or bing or any other ones that retain a search history.


Tags: ,
Posted in fourth amendment, Privacy | No Comments »