top of page

Ghost Vault

In the past I was making a small article about the Ebutog and Go-Tube but now I want to dive more in this topic and help you to build an emergency on the run vault.

ree

The Ghost Vault : An Escape & Evasion Emergency Financial Capsule


This study article is based on The EBUTOG designed by Oscar Delta https://oscardelta.co.uk/discreet-carry/ . Developed and designed by KARL OSCARDELTA the EBUTOG is an advanced storage device for small items that you would like to protect from damage, loss, or unauthorised access.Its primary function as a security device is delivered through relocating sensitive and valuable assets from the usual locations; to a safer, hidden location. is a discreet, cylindrical storage capsule built with one clear purpose: to provide you with a backup escape plan in non-permissive or emergency environments.

I underline that you can replace this item or storage device with other options.

Unlike lock-picks or brute-force breaching tools, the Ghost Vault is meant to secure essential items that give you the ability to move, communicate, and sustain yourself when circumstances turn against you.

In an emergency situation sometimes your escape and evasion tools, weapon skills and training cannot replace what you can obtain with money. From the Need to pay transportation to pass the border in a third world country or purchasing different items money is the key. For this the Ghost Vault is a good emergency plan.

Three Forms of Emergency Finance

A proper escape plan must anticipate the collapse of conventional access to funds. If your wallet, cards, or accounts are compromised, you need redundancy in financial support. The Ghost Vault is ideal for holding small but high-value assets in three different formats:

  1. Cash (e.g., €500-1000 in mixed bills)

    • Universally accepted, no infrastructure required.

    • Use smaller denominations for flexibility.

    • Folded and sealed against moisture, it fits neatly into the EBUTOG.

  2. Precious Metals (e.g., small gold bar/bars worth ~€1000)

    • Compact, universally valuable, inflation-proof.

    • Even if electronic networks fail, gold is trusted as a store of value.

    • A 10-gram investment-grade gold bar slips easily inside the tube.

  3. Cryptocurrency Wallet (~€500/1000 or more in value)

    • Portable, borderless, and resistant to confiscation if properly secured.

    • Store your seed phrase or wallet password on a USB flash drive.

    • Recommendation: an encrypted SanDisk Mini USB drive—tiny, discreet, and durable.

    • On this same drive, keep scanned copies of ID, passport, and essential documents. This makes digital proof of identity available without carrying bulky originals.

    The most private and secure option is a non-custodial wallet (like Ledger, Trezor, or Trust Wallet).

    You do not need to give real data to create one — you simply install it, get your seed phrase, and you’re done.

    Exchanges (like Binance/Coinbase) require your identity, but wallets don’t.

By combining these three methods, you ensure that no matter the environment—cash economy, barter, or digital—you retain the ability to pay for transport, shelter, or critical services in an emergency.

Communication & Information Tools

Finance is only half the escape equation. Without communication, coordination is nearly impossible. The Ghost Vault can also discreetly house compact items that expand your options:

  • Black Dot NFC Disk

    • Enables short-range, discreet data transfer.

    • Perfect for passing information or leaving a message without relying on conventional channels that may be monitored.

  • Mini Mobile Phone + Prepaid SIM

    • Keep a basic GSM phone—small, cheap, long battery life.

    • Use it with a prepaid SIM card purchased with cash (long before deployment).

    • Such a phone becomes your “burner”—an emergency lifeline separate from your daily digital footprint.


Concealment & Placement Strategy

The EBUTOG was designed with a form factor suitable for ground concealment. Its strength lies in redundancy and distributed placement:

  • Multiple caches: hide 2–3 tubes across different routes in your local area, not just at your home.

  • Route planning: place one in a location near your residence, one along an escape route, and one in a distant fallback point.

  • Access flexibility: by diversifying cache spots, you increase your chance of retrieving at least one if forced to flee under pressure.

The shape of the EBUTOG allows for below ground level dead-drop applications. Simply place the EBUTOG upright and push into soil by placing your foot onto the flat end cap. To ease extraction you can attach a tether to the lanyard hole and leave a small piece above ground. GEOTAG the location for recovery.

How to GEOTAC?

Use a device to get accurate GPS coordinates of your cache location:

  • Use a dedicated GPS device or a smartphone with a mapping app (e.g., Gaia GPS, Maps.me, Locus Map, etc.).

  • Mark the exact lat/long of the spot where the Ghost Vault is buried or concealed.

  • Take note of the accuracy shown in the app/device (you want <10 meters if possible).

Tip: Don’t rely only on phone screenshots. Store coordinates in multiple formats (written, encoded, digital).

Save It Digitally (But Encrypted!)

  1. Use an encrypted USB drive (e.g., SanDisk Secure, IronKey, or a hardware-encrypted model) to store:

    • The coordinates.

    • A description of landmarks nearby (optional).

    • A photo of the general area (with no identifying info in the file name or EXIF data).

  2. Encrypt the file using tools like:

    • VeraCrypt (create a hidden volume).

    • BitLocker (Windows Pro).

    • Cryptomator or Standard Notes for mobile-friendly access.

⚠️ Never store cache locations unencrypted on cloud services, notes apps, or unprotected flash drives.

3. Use Physical Redundancy (Paper Copy)

Also include a physically concealed paper copy, such as:

  • Written lat/long and description stored inside your Go-Tube.

  • Use waterproof paper and a laminated card or Tyvek tag.

  • Write in code or use obscure reference points (e.g., “Location Alpha: 400m NE from Lone Pine Rock, turn left at stream bed.”)

You can also encode the coordinates in a cipher or number puzzle only you understand.

4. Stealth Map or Personal Landmark System

If you want more security:

  • Draw a hand-sketched map of the area with personal reference points:

    • Landmarks, rock formations, logs, animal trails.

    • No names, no indication of value—just enough to trigger your memory.

  • Use a "dead-drop triangle" system:

    • 3 known reference points.

    • Cache is X meters at Y° from each point.

    • Only you know the formula or triangulation method.

5. Use an NFC Tag as a Digital Clue

For ultra-stealthy digital retrieval:

  • Hide a Black Dot NFC Tag near the cache (not with it).

  • Program it with a password-protected link or text that gives directions or coordinates.

  • Place it behind a sign, under a rock, or in a nearby object.

  • Only you know to scan it.

    Another more simple way that I use is the Garmin watch. I have an Tactical Instinct Solar from Garmin and I use the "Track me" function.

Important: What to Avoid

  • Don’t geotag using public services like Google Maps with your login—it ties your identity to the location.

  • Don’t leave an obvious physical marker (e.g., “X” on a tree).

  • Don’t take pictures with embedded EXIF GPS data unless the photo is stored securely and stripped of metadata.

Optional: Redundant Cache Clues

  • Store a clue in a password-protected online note (Standard Notes, Turtl, Proton Drive) with a code only you know.

  • Have a trusted contact hold a “key” to decode your map—but not the map itself.

Example (Multi-Redundant GEOTAC Setup)

  • Primary: Encrypted GPS coordinates on a SanDisk USB drive inside your Go-Tube.

  • Secondary: Laminated waterproof map stored in a survival manual hidden in a second location.

  • Tertiary: NFC Tag 15m away from cache, programmed with hints only you can interpret.

  • Quaternary: Memorized triangulation formula using 3 landscape features.

Mental Note: The “Rule of 3”

  • Have 3 ways to locate your vault: GPS, physical clues, and memory.

  • Use 3 levels of obfuscation (digital encryption, location concealment, and reference coding).

  • Cache 3 different vaults in different zones.

In a non-permissive environment, this gives you a B-Plan: if you are robbed, lose your equipment, or must abandon belongings, you still have access to essential funds and communications.

Remember that EBUTOG from Oscar Delta is only an example of storage item, you can find something similar or other methods important is to keep the same principles.

Minimize Human & Animal Attention

  • Avoid fresh digging smells: Dogs are more interested in recently disturbed soil than in sealed objects. Let soil dry and blend before finishing.

  • Work naturally: disguise your digging with natural ground patterns (leaves, roots, small stones). Don’t leave a “perfect circle of bare dirt.”

    Mask Scent from Dogs

  • Neutralizing agents:

    • Before burying, wipe the outside with isopropyl alcohol to remove skin oils/odors.

    • Dust soil with a handful of local material (forest floor leaves, pine needles, dirt).

  • Scent camouflage:

    • Place natural “dog distractors” like pine resin, cedar mulch, or coffee grounds around the area.

    • Some survivalists use sulfur garden pellets (dogs dislike them).

Placement Strategy

  • Avoid “dog zones”: don’t hide it near obvious dog-walking paths, tree bases, or spots dogs mark with urine. Instead, choose dense undergrowth, rocks, or logs as cover.

  • Multiple sites: better to have several caches with smaller value each, than one big risk.

What NOT to Do

  • Don’t bury in freshly turned, bare earth. Dogs (and people) notice right away.


The Ghost Vault is not about carrying tools for forceful entry or high-risk activity. Its value lies in quiet resilience: the ability to move, communicate, and pay under duress.

  • Cash buys immediate compliance.

  • Gold secures barter in uncertain economies.

  • Crypto ensures borderless access to digital value.

  • NFC and burner phones keep communication open without drawing attention.

  • Redundant, hidden caches give you a fallback even if everything else is lost.

By preparing in this way, you transform the Ghost Vault from a simple container into a lifeline of last resort—your discreet escape plan in hostile conditions.

Stay safe all!


Comments


© 2023 by Tribe13.

bottom of page