Cast secure algorithms into immutable hardware, use strong crypto with partos of the secret distributed to several parties.
Masks/capes might cloak you against the more primitive video surveillance, but neuronal DSP will identify you on your mannerism (as we learned today, it works with speech, it is only a matter of time until it works with video. Or body odor (MHC fragments) fingerprint).
A solution would seam to use identical hardware remotes/proxies with crypting/diffusing the traffic to make it untraceable.
Brian D Williams writes:
> *U.S. Army special agents from the Army Criminal Investigation
> Command have 'proved' that NetBus and Back Orifice can be used to
> hijack desktop camera and microphone applications for the purposes
> of industrial espionage, spying or to gather evidence for a
> criminal investigation. The commandeered cameras and microphones
> can then secretly send data to a monitoring station unbeknownst to
> the end user.
> http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html