USA. Information Society

The rapid development of information technology has had a significant impact on all aspects of life in globalised society: in the population, government and business.
The book illustrates the multifaceted role of the U.S. in creating conditions for information dominance and pays special attention to information security of ordinary people, as well as to  problems of electronic payment instruments. We discuss the U.S. approach to issues of dominance in the information space and international security. The book is designed for readers interested in the problems of the information society, as well as professionals, researchers and students engaged in studying the impact of information technologies for economic and political conditions for international security.

There is a total surveillance system for human beings in place  that "covers" people , living and dead. It is one thing, when sources of information existed separately, in different bodies and organizations, and another when they can be gathered together, analyzed and
compiled into  an information portrait of a particular person. This unique opportunity came with the creation of advanced information technologies based on electronic devices that have revolutionized the collection of observations of people’s affairs secretly from them. This information can be distributed or sold. while the sources of this information - the individuals - are

"USA. Information society" by Professor E. Rogovsky
not even aware of this process and then every citizen of the world, whether it is a potential terrorist or a bona fide  citizen, will be on the screen of  information intelligence. Moreover, modern technologies are already in place to make this work. Modern computers and telecommunications lines may easily cope with this task  . Few, except some number of experts  are aware of this fact. But they hardly suspect  about the unpredictable economic, moral and psychological consequences of this process. An era of total electronic surveillance may radically change the way of life of most of the population and the economic logic of behavior of all market participants (government, business, population) and society as a whole. The current fast rate of proliferation of special observing technologies leaves little time to organize opposition to numerous violations of privacy rights. As a result, modern society could face a new social nightmare. Experts believe if today's children from  the early childhood  get accustomed to a shortage of confidentiality, they would consider it normal. When they grow  up and become voters, such young people, accustomed from childhood to a shortage of  own privacy and confidentiality will  habitually violates other people's and human rights .
In spring 2005 the U.S. Congress considered a report from the General Accounting Office titled  "The fight against cyber terrorisism", in which they called the computer system of the IRS "inadequate" .Hackers  broke down  the system and gained access to information about millions of taxpayers. In addition to information about  taxation IRS office collects the financial intelligence information on money laundering and other financial crimes.
They want to know everything about you. A global leadership in the modern world requires additional advantages, among which are the most important : information dominance (global knowledge) and new tools for usage of  someone else's property and funds  in the interests of a global leader (raising capital). Those who control  international finance - can control everything else. Surveillance systems of a near future  would integrate digital information about people in corporate, medical, commercial, educational, travel, telephone and other sources, as well as biometrics such as fingerprints, images of the iris and retina, DNA, and photo parameters of a person to create a unprecedented depository of information. Authorized users, wherever they are, can access the necessary data.
The intelligence community will be able to access data such as the cash flow associated with specific people. To prevent the collateral use of such information is very difficult. It raises the question of excessive awareness of the security services. The threat of theft and misuse of personal data may not be less significant than the threat of terrorism.
As it follows from the experience of the USSR most of the data collected on ordinary citizens by KGB finally ended up in the hands of corrupted bureaucrats and criminals themselves after perestroika. This unprecedented power that dropped into unscrupulous hands had  led to an unfair and unequal fight where most of the population of the former USSR lost unconditionally.