Business
The “Tic-Tac-Toe” and Analog Messaging Methods
How sophisticated fugitives bypass digital intercepts by using manual encryption, public payphones, and courier-based communication.
WASHINGTON, DC, February 10, 2026
When people talk about modern evasion, they usually start with apps, burner devices, and disappearing messages. The quieter reality is that many serious cases still hinge on something older, simpler, and harder to “hack” from a keyboard: analog communication.
Handwritten codes passed through trusted hands. Messages routed through intermediaries. Short calls made from public phones. Prearranged signals that never touch an internet server. Sometimes it is a crude grid cipher nicknamed “tic-tac-toe.” Sometimes it is a courier who delivers words the way previous generations delivered cash.
It is also the kind of topic that can be misunderstood quickly, and weaponized even faster. I cannot help with instructions for bypassing lawful interception, building ciphers, or setting up covert communications intended to evade law enforcement. What can be examined is the public safety and compliance picture: why analog methods still appear in real investigations, why they are not the escape hatch people imagine, and why the psychological and operational costs often end up creating the mistakes that bring cases to a close.
The core insight is simple. Analog methods can reduce digital exposure, but they do not eliminate detection. They shift the battlefield from data to people. And people are the most fragile link in any long-term concealment plan.
Early in the story, that shift looks smart. Over time, it often becomes the reason the scheme collapses.
Digital intercepts got better, so the lore got older
The appeal of analog communication is rooted in a modern fear: that every digital move creates metadata, and metadata creates a map. That fear is not irrational. Even lawful users have learned that “content” and “context” are different things, and that context can be revealing.
Governments have also made no secret that court-authorized interception is a persistent tool in serious investigations. The annual reporting around wire and electronic interceptions is public record, and the Administrative Office of the U.S. Courts collects those statistics and summaries on its official page for Wiretap Reports. That reporting does not tell you how to evade anything, but it does underscore why criminals look for alternatives. They assume that if a court can authorize an intercept, and if providers can comply, then the safest conversation is the one that never becomes data.
This is where the analog revival begins. If a person believes the network is the trap, they try to step outside the network.
The “tic-tac-toe” label is a clue to what this really is
The phrase “tic tac toe” sounds playful, but it points to a grim reality: much of what gets called “manual encryption” in criminal contexts is not sophisticated. It is often simple substitution, shorthand, or prearranged references that only make sense to insiders.
That simplicity can be the point. A complex system is harder to manage under stress. A simple code can be remembered, written quickly, and destroyed quickly. It can also be taught to someone with no technical skill.
But simplicity has a downside that gets lost in the mystique. Simple manual codes are vulnerable to human error. People reuse phrases. They repeat patterns. They forget what they agreed to. They panic and deviate. They write too much. They explain the code inside the message without realizing they are doing it. They leave paper behind, in a trash bag, a glove compartment, a pocket, a notebook, a storage unit, a home.
In other words, the weakness is not the math. It is the lifestyle required to keep the math from being exposed.
In serious investigations, the most common failure mode is not that a clever cipher is “cracked” in isolation. It is that the surrounding context solves it. A seized notebook. A cooperating witness. A recovered draft. A message that references a place, a time, or a name in a way that anchors meaning. A pattern that becomes obvious once investigators know who is talking to whom.
Analog can reduce digital visibility, but it increases the value of any physical mistake.
Payphones are not a magic shield; they are a shrinking niche
Public payphones carry a powerful cultural image. They suggest anonymity, the caller with no subscriber account, no device ID, no contract. In practice, the payphone idea is a mixed bag.
First, payphones are far less common than they used to be, which changes their utility. Scarcity creates predictability. If there are only a few working phones in an area, the person who uses them repeatedly becomes a pattern.
Second, payphones exist in physical space. Physical space has cameras, witnesses, and routines. A person who believes they have avoided digital tracking may still be visible to ordinary surveillance systems, and more importantly to human memory.
Third, payphone calls are still communications. Even without diving into operational detail, the obvious reality is that phone networks create records because networks must function. The belief that a call is “off the books” simply because it is made from a public handset is often wishful thinking.
That is why payphone use, in modern cases, tends to show up as part of a broader risk posture, not as a standalone solution. It is one choice among many, and its benefits are often overstated.
Couriers and “human routing” reduce data, and raise betrayal risk
If payphones are about short bursts of distance, couriers are about controlled human routing. The goal is not to be untraceable in some absolute sense. The goal is to reduce the number of electronic touchpoints that can be captured, stored, and analyzed.
The hidden cost is obvious. Couriers are people. People get tired. People get scared. People get arrested on unrelated issues. People get questioned. People brag. People steal. People flip.
A courier system also introduces a time delay that can be operationally inconvenient, which is precisely why it can be attractive in certain criminal contexts. Urgency is dangerous. Urgency forces calls, texts, and impulsive moves. If communication becomes slower, behavior may become slower. That can feel safer.
But slow systems create their own pressure. The sender does not know if the message arrived. The receiver does not know if the sender changed plans. The lack of feedback can create improvisation. Improvisation is where mistakes multiply.
There is also a structural problem. Couriers have to move through the world. Movement intersects with policing, traffic enforcement, routine stops, building access logs, and all the “ordinary” friction points that generate attention. Even when the content is not captured electronically, the act of moving creates a footprint.
Analog methods trade one form of exposure for another.
The real “bypass” is often psychological, and it rarely stays stable
The most interesting part of analog communication is not the technique. It is the mindset.
People who fear digital capture often become hyper-controlled about routine. They reduce contact. They avoid anything that feels trackable. They narrow their lives.
That narrowing can provide short-term stability, but it also increases long-term strain. The person becomes isolated. They must rely on a smaller circle. The circle becomes more valuable and more dangerous. Each additional person is both an asset and a liability.
Over time, that pressure can produce the same pattern seen in many prolonged cases: exhaustion, paranoia, and then a mistake made for emotional reasons. The desire to hear a familiar voice. The desire to reassure family. The desire to coordinate quickly because slow routing feels unbearable in a crisis.
When the nervous system is running on fear, the person becomes more likely to break their own rules.
This is why “sleeping with one eye open” is not a superpower. It is a tax. And taxes come due.
Why law enforcement still closes in without “reading every message”
There is a common misunderstanding that analog methods force authorities to “start over.” In reality, many investigations are not solved by a single intercepted conversation. They are solved by convergence.
Tips from the public. Financial chokepoints. Housing records. Vehicle patterns. Human observation. Cooperation from insiders. Routine mistakes that bring a person into contact with institutions that verify identity and document behavior.
Analog communication can complicate one lane of collection, but it does not dissolve the broader ecosystem of detection. It can even intensify attention in other lanes, because unusual caution can itself be a signal. When someone is excessively rigid, avoids ordinary transactions, avoids routine communications, and relies on intermediaries, the behavior can become conspicuous.
In practice, the analog choice often increases the role of human intelligence, and human intelligence is not defeated by paper. It is defeated by the absence of people, and the absence of mistakes. Both are hard to sustain.
The compliance mirror: the same techniques that “reduce trace” also raise suspicion
One reason this topic matters beyond crime headlines is that the world has moved toward continuity checks. Institutions increasingly evaluate whether a person’s story is coherent over time. When a life has gaps, odd workarounds, or unusual reliance on intermediaries, institutions treat that as risk.
That can affect legitimate people, too. People who are privacy-focused, newly relocated, or rebuilding after hardship can face friction if they appear “thin” in ordinary records. The difference is intent and documentation. A lawful person can usually explain gaps and provide coherent proof when required. A fabricated life cannot.
Analysts at AMICUS INTERNATIONAL CONSULTING frame this as the stability problem at the heart of modern mobility: privacy is achievable through lawful structure and consistent documentation, while disappearance myths often create the very inconsistencies that trigger scrutiny from banks, border systems, and counterparties.
That perspective matters because it highlights a point the analog lore often hides. Avoiding a digital trail is not the same as creating a sustainable life. A life that cannot interact with modern institutions without improvisation is not free. It is fragile.
The “tic tac toe” myth persists because it feels empowering
The reason people keep returning to analog myths is emotional. They promise agency in a world that feels surveilled. They suggest that cleverness can beat scale.
But the modern environment is not a single machine that you either defeat or obey. It is a web of systems that often do not need to see everything to act decisively. They need enough to narrow the search, enough to validate a lead, enough to apply pressure at the moment a person must touch reality.
That is why the most enduring lesson from analog messaging is not that it works. It is that it increases dependence on people, and dependence is where most schemes crack.
You can watch how this theme keeps resurfacing in case coverage, often in the context of organized crime networks, fugitives, and counter-surveillance tactics, through ongoing reporting collected in a live stream like this Google News briefing.
The bottom line
Analog communication methods, from handwritten codes to couriers to the occasional public payphone call, still appear in modern investigations because they reduce certain kinds of digital exposure. They also come with brutal trade-offs that the folklore rarely admits.
Paper can be seized. People can be flipped. Couriers can be intercepted. Scarce public infrastructure creates predictable patterns. And the psychological load of living in constant threat detection tends to erode discipline over time.
The “tic-tac-toe” story is not really about clever codes. It is about a nervous system trying to outrun a modern web of records, relationships, and routine touchpoints. In the long run, the web rarely needs to catch every message. It only needs one weak link, and analog methods tend to multiply weak links instead of reducing them.


