Cast secure algorithms into immutable hardware, use strong crypto with partos of the secret distributed to several parties.
Masks/capes might cloak you against the more primitive video surveillance, but neuronal DSP will identify you on your mannerism (as we learned today, it works with speech, it is only a matter of time until it works with video. Or body odor (MHC fragments) fingerprint).
A solution would seam to use identical hardware remotes/proxies with crypting/diffusing the traffic to make it untraceable.
Brian D Williams writes:
 > *U.S. Army special agents from the Army Criminal Investigation
 > Command have 'proved' that NetBus and Back Orifice can be used to
 > hijack desktop camera and microphone applications for the purposes
 > of industrial espionage, spying or to gather evidence for a
 > criminal investigation. The commandeered cameras and microphones
 > can then secretly send data to a monitoring station unbeknownst to
 > the end user.
 > http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html