Robert Graham has a quite interesting article that touches on tools, techniques, and operational security that is worth your time. There's quite a lot of technology that can betray people who don't know how it works:
Photographs suffer the same problem: your camera and phone tag the photographs with GPS coordinates and time the photograph was taken, as well as information about the camera. This accidentally exposed John McAfee's hiding location when Vice took pictures of him a few years ago. Some people leak by taking pictures of the screen -- use a camera without GPS for this (meaning, a really old camera you bought from a pawnshop).But the discussion on burner phones, tails, and open WiFi is interesting and useful. It's still hard to hide your transmissions from prying eyes, but it may be a bit easier than it used to be.