A good pseudorandom generator will pass any such test with flying colours, in fact it's a basic requirement. Bu that is no guarantee that, given a certain length of output, an external attacker couldn't sync up and predict all future outputs.
And I don't believe there is a general way to distinguish such a device from an actual random source without looking inside. For example, they could use AES256 output in counter mode on a low entopy chip ID + high entropy backdoor key. Trivial to bruteforce given a few words of output, but you would essentially need to break AES to detect it.
"The moving average is the most common filter in DSP, mainly because it is the easiest digital
filter to understand and use. In spite of its simplicity, the moving average filter is optimal for
a common task: reducing random noise while retaining a sharp step response. This makes it the
premier filter for time domain encoded signals. However, the moving average is the worst filter
for frequency domain encoded signals, with little ability to separate one band of frequencies from
another."
It definitely depends on your domain, but moving average/median can be extremely effective. (Or terrible, if mis-applied).
That is the basics of how people in astronomy clean their signal.
http://beauty-of-imagination.blogspot.fr/2012/09/fun-with-si...