Puppeteer lets you bypass getting hacked access levels but you still need to connect to it first.
It would appear, being on the outside of a host does not per-se disrupt connectivity to icons on the inside. Otherwise, it would be impossible to detect them.
Puppeteer would work as you described on a device that is broadcasting a public wireless signal
This appears to be exactly the case. Clearly, we
do have the ability to pick up the device on the outside of a host as granted by Hack & Slash. Its signal is merely obscured by the hosts firewall and sleaze.
I am assuming the security camera is not in this case, otherwise it would be pointless to have it nested in a security host.
Except it would still be protected through resistance to matrix perception, through the hosts firewall and against anyone not capable of using the puppeteer complex form.
The question that remains is, whether connectivity between icons on the inside of a host and the outside is or can be made bidirectional and exploitable. And yes, while that would be the spirit of editor and puppeteer in my view, it appears RAI discourages it.