ITC technology offers many surveillance possibilities. Camera surveilled area activities can be digitally recorded/stored for future use. Network traffic analyzers can surveil network communication. Search engine providers can surveil Web usage. Location surveillance is possible through preinstalled sensor networks, GPS services, and devices’ location information. Mobile phones’ calls/SMS can be governmentally surveilled through access to subscribers’ authentication keys in operators’ Authentication Centers. Implanted malware can surveil network and network-connected device usage. Surveillance benefits are in health/elderly care, protection of people/property, air/car/ship traffic security, logistics, etc. Threats are violations of computer/network users’ privacy, theft of digital identities/credentials, cyber criminality/terrorism, etc. Avoidance of, mitigation of, and protection against surveillance threats is outlined.