Cast secure algorithms into immutable hardware, use strong crypto with partos of the secret distributed to several parties.
Masks/capes might cloak you against the more primitive video surveillance, but neuronal DSP will identify you on your mannerism (as we learned today, it works with speech, it is only a matter of time until it works with video. Or body odor (MHC fragments) fingerprint).
A solution would seam to use identical hardware remotes/proxies with crypting/diffusing the traffic to make it untraceable.
It would seem a very good idea to not let this happen too easily. Pilot projects on face recognition for criminal deterrance are on the way, and ubiquitous cameras are certainly proliferating. A carnival, anybody?
Brian D Williams writes:
> *U.S. Army special agents from the Army Criminal Investigation
> Command have 'proved' that NetBus and Back Orifice can be used to
> hijack desktop camera and microphone applications for the purposes
> of industrial espionage, spying or to gather evidence for a
> criminal investigation. The commandeered cameras and microphones
> can then secretly send data to a monitoring station unbeknownst to
> the end user.