Detecting the Invisible: Searcher-Facing BLE Broadcast and Owner-Facing Remote Alert as a Unified Cache Detection System

 

A Proposed Low-Power Bilateral Detection Architecture in the Beyond the Map's Edge Treasure Hunt:

Searcher-Facing BLE Broadcast and Owner-Facing Remote Alert as a Unified Cache Detection System

  

Low Rents, May 2026

 

ABSTRACT

 

This paper proposes and provides substantiated technical and biographical evidence for the hypothesis that Justin M. Posey, creator of the Beyond the Map's Edge (BTME) wilderness treasure hunt, deployed a low-power, trigger-activated electronic detection system at or near the location of his hidden cache. The proposed system is hypothesized to perform two simultaneous functions upon detecting the approach of a person within a defined perimeter: (1) initiating a Bluetooth Low Energy (BLE) advertisement broadcast detectable by any consumer-grade mobile device or BLE scanner, thereby providing the discovering searcher with an unambiguous electronic signal confirming their proximity to the cache (the function Posey describes as a "checkpoint") and (2) transmitting a remote alert via a long-range radio protocol to notify Posey that a searcher has crossed the detection threshold, explaining his documented awareness of specific proximity events despite having no physical presence at the site. The architecture proposed is consistent with commodity, battery-operated hardware (ESP32-class Wi-Fi/BLE SoCs, Semtech SX1262 LoRa radio, µA-class passive trigger sensors), and is substantiated by (a) the engineering literature on device-free localization, radio tomographic imaging, and low-power duty-cycled Wi-Fi CSI sensing; (b) multiple structural analogs embedded in Posey's memoir; and (c) multiple statements in the publicly compiled JIBLE 6.0 interview record. The system's dormant-until-triggered design philosophy aligns with Posey's documented background in large-scale systems architecture, his narcolepsy diagnosis as a biographical metaphor for the sleep-wake duty cycle, and the precedents he establishes in the memoir for layered perimeter detection and multi-modal biological sensing. The paper argues that recognizing the BLE broadcast function of the checkpoint fundamentally reframes how a searcher should approach the final leg of the BTME hunt: the checkpoint is not a physical landmark to be identified by sight but an electronic signal event to be detected by instrument.

 

Keywords: Beyond the Map's Edge, BTME, Wi-Fi CSI, BLE beacon, device-free localization, radio tomographic imaging, LoRa, wilderness cache detection, treasure hunt technology, Justin Posey, checkpoint hypothesis

 

1. INTRODUCTION

Justin M. Posey, software engineer, former Microsoft product developer, and self-described lifelong treasure hunter, published Beyond the Map's Edge in 2025 [1]. The memoir describes his decade-long pursuit of Forrest Fenn's famous bronze chest, his subsequent acquisition of that treasure, and his creation of a new hunt, the BTME hunt, in which he hid approximately sixty pounds of gold, gems, coins, and artifacts in the western United States during 2023. The hunt is accompanied by a poem, a legally documented notarized record of the hiding event, and a cryptographic hash posted publicly in November 2023, all of which establish the treasure's existence and provenance beyond reasonable dispute [2].

One of the most distinctive features of the BTME hunt is Posey's documented claim of a built-in "checkpoint": an event or location in the hunt's progression that, in his words, will give the finder "zero doubt" that they are in the right place [3]. Unlike Forrest Fenn's hunt, where the blaze and other physical landmarks were interpretive and subjective, Posey explicitly frames the BTME checkpoint as providing unambiguous confirmation. He has also made a series of public statements that are difficult to explain under conventional interpretations: that if the checkpoint is found, he will become aware of it and announce it [4]; that specific searchers have been "within 200 feet" of the checkpoint [5]; and that he is "at least aware of people that have been close" [6]. These statements, taken together, imply that Posey receives real-time or near-real-time information about searcher proximity to the checkpoint from a source other than searcher self-reporting.

This paper proposes that the source of this awareness is an electronic detection and notification system Posey deployed at the cache site; specifically, a low-power, trigger-activated architecture capable of: (1) detecting human approach within a defined perimeter radius using passive sensors and Wi-Fi Channel State Information (CSI) burst sampling; (2) broadcasting a Bluetooth Low Energy (BLE) advertisement packet to any nearby device upon detection, providing the searcher with the electronic "checkpoint" signal; and (3) transmitting a remote owner alert via a long-range LoRa radio or cellular uplink, notifying Posey of the intrusion event with geographic specificity. The system is hypothesized to remain in ultra-low-power deep sleep between events, consuming microamp-level current from a long-life battery, and to wake only when a passive trigger sensor detects disturbance in its monitored perimeter.

The case for this hypothesis rests on three independent bodies of evidence. The first is the published engineering literature on device-free localization, radio tomographic imaging (RTI), and Wi-Fi CSI sensing [7,8,9,10,11,12], which demonstrates that the proposed architecture is technically feasible using commercially available commodity hardware. The second is Posey's memoir, which contains multiple narratively embedded structural analogs to the proposed system's key functional layers: the passive perimeter trigger, the sleep-wake duty cycle, the multi-node detection topology, the false alarm rejection mechanism, and the remote event-log retention architecture, many of which are discussed in the context of his formative experiences and professional background. The third is the JIBLE 6.0 compilation of Posey's public interview statements [13], which contains specific claims about the checkpoint's nature, Posey's remote awareness of proximity events, and the hunt's design philosophy that are most parsimoniously explained by the proposed bilateral detection system.

It is important to note the epistemological status of this paper. The hypothesis presented here is analytical and inferential; it is not based on physical access to the cache location or confirmation from Posey. It is offered as a research framework for serious BTME searchers, consistent with prior Low Rents Research methodology of applying technical and psychological analysis to the structure of treasure hunt design. The hypothesis, if correct, has direct operational implications: a searcher within the detection radius should be able to identify the checkpoint event through a BLE scan on any modern smartphone rather than through visual identification of a physical landmark, and Posey's remote awareness of such events can be treated as independent validation that a searcher has reached the correct zone.

2. BACKGROUND AND TECHNICAL FOUNDATION

2.1 Device-Free Localization and Radio Tomographic Imaging

Device-free localization (DFL) refers to the class of wireless sensing systems in which the network itself acts as the sensor, detecting the presence and position of a person or object without requiring any instrumented tag on that person's body. Patwari and Wilson's foundational work on RF sensor networks for device-free localization [7] and their radio tomographic imaging (RTI) formalization [8] demonstrated that changes in received signal strength (RSS) across wireless links correlate measurably with the position of an obscuring body in the link's Fresnel zone. In RTI, multiple spatially distributed link pairs are combined to reconstruct a spatial loss field, enabling coarse localization of a person within the monitored volume.

The device-free paradigm is particularly valuable for cache protection applications because it requires no cooperation from the detected party. An approaching searcher need not carry a radio tag, activate an app, or announce their presence; their physical body's interruption of the RF propagation environment is sufficient to trigger detection. Early RTI implementations used only RSS measurements. Youssef and colleagues' Nuzzer system [14] demonstrated that standard Wi-Fi infrastructure (access points and monitoring laptops) could be reused for passive sensing without custom hardware, establishing the conceptual basis for repurposing commodity Wi-Fi as a sensing medium.

2.2 Wi-Fi Channel State Information as a Richer Sensing Signal

A significant advance over RSS-based systems came with the exploitation of Wi-Fi Channel State Information (CSI). Where RSS is a single scalar aggregate of received power, CSI provides per-subcarrier amplitude and phase information across all OFDM subcarriers, preserving the frequency-selective multipath structure of the channel. Espressif Systems' CSI documentation [15] states explicitly that CSI contains amplitude, phase, propagation delay, SNR, and channel matrix information unavailable in RSS. Wang and colleagues' CARM system [16] demonstrated that CSI-based activity recognition, using PCA-based denoising and DWT-based feature extraction, achieves accuracy above 96% for human motion classification. SpotFi [17] showed that per-subcarrier phase information can be exploited for sub-decimeter indoor localization by estimating time-of-flight and angle-of-arrival from the phase gradient across subcarriers.

More recent work has focused on generalization and environmental robustness. Widar3.0 [18] proposed body-coordinate velocity profiles derived from Doppler information as a domain-independent representation, achieving strong cross-domain accuracy. SenseFi [19] benchmarked multiple deep learning architectures for Wi-Fi sensing, while a 2025 survey on Wi-Fi sensing generalizability [20] organized domain adaptation approaches into domain-independent features, transfer learning, and few-shot methods. Hernandez and Bulut's edge sensing survey [21] identified the practical limitations of laboratory-validated systems deployed in real-world environments, including the critical observation that outdoor deployments face wind-driven vegetation, humidity and temperature fluctuations, and non-stationary environmental noise that necessitate adaptive recalibration and careful link selection.

2.3 Low-Power Architecture: The Trigger-Activated Sleep-Wake Paradigm

The central engineering challenge for a wilderness deployment of any RF sensing system is power. Commodity Wi-Fi radios are far too energy-hungry to operate continuously on battery power for multi-year deployments. Espressif's ESP32-S3 datasheet [22] lists approximately 7–8 µA deep-sleep current versus approximately 88 mA in Wi-Fi receive mode and roughly 283 mA peak for 802.11n HT20 transmit. A system running continuously in Wi-Fi receive mode would drain even a large primary cell within days. The solution established in the literature and validated through the outdoor RTI work [23] is a two-tier wake hierarchy: ultra-low-power passive trigger sensors (reed switches at zero quiescent current; ST LIS2DW12 accelerometers at 50 nA to 5 µA in low-power mode [24]; Panasonic EKMB PIR sensors at 1.0–1.9 µA [25]) maintain an always-on perimeter watch, and the Wi-Fi CSI subsystem wakes only when the trigger fires, collecting a brief burst of channel measurements before returning to deep sleep.

Under this architecture, with a sleep current of approximately 11 µA (ESP32-S3 plus trigger sensors plus retained LoRa state) and 10-second CSI bursts triggered at rates of one to ten per day, a 3.2 V, 3 Ah LiFePO4-class battery [22] can sustain multi-year operation. The dominant energy cost is event-driven, not idle; event rate determines lifetime, not quiescent current. This architecture is the only credible path to long-lived wilderness battery operation with commodity hardware.

2.4 BLE Advertising as a Searcher-Facing Signal Medium

Bluetooth Low Energy (BLE) advertisement packets are the mechanism by which BLE-capable devices announce their presence to any scanning listener within radio range (typically 10–100 meters depending on TX power and environment) without requiring a prior pairing relationship. BLE advertising is the foundation of beacon systems (iBeacon, Eddystone), proximity marketing, and indoor positioning systems. Critically, BLE advertisement scanning is a native function of every modern smartphone operating system without the installation of any specialized application; iOS and Android both expose BLE scanning APIs accessible to standard apps. The Nordic nRF52840 system-on-chip, referenced in the proposed hardware stack, supports BLE advertisement at 0 to +8 dBm TX power with 0.4 µA system OFF current [26], making it suitable for both the trigger-event advertisement broadcast and the low-power maintenance mode between events.

The ESP32-S3, Espressif's primary CSI-capable SoC, also natively supports Bluetooth 5.0 and BLE advertisement [22], enabling a unified single-chip solution for both Wi-Fi CSI sensing and BLE broadcast without requiring a separate BLE SoC. When a trigger event wakes the ESP32-S3 and the CSI burst confirms human approach, the same chip can immediately begin broadcasting a custom BLE advertisement packet encoding a predetermined UUID or payload that a searching party's device can detect as the checkpoint signal. This broadcast can persist for a defined window (e.g., 30–300 seconds) before the system returns to deep sleep, ensuring that a nearby searcher has sufficient time to identify the signal on their device.

2.5 LoRa as an Owner-Facing Remote Alert Channel

The Semtech SX1262 LoRa radio [27] provides the long-range alert path. LoRa (Long Range) spread-spectrum modulation achieves link budgets of 150–170 dB, enabling communication ranges of tens of kilometers in open terrain from a device consuming 45 mA at +14 dBm transmit power and 4.6 mA in receive mode, with sub-µA sleep current (160 nA cold sleep, 600 nA retained sleep [27]). A single LoRa alert packet transmitted from a wilderness cache location to a gateway within range or to a direct point-to-point receiver, and can deliver a timestamped intrusion notification to Posey's monitoring infrastructure with the burst energy cost of approximately 0.038 mAh per event at the SX1262's optimal efficiency point.

Under standard LoRaWAN Class A architecture [28], each uplink is followed by two short downlink windows, making it suitable for outbound alert telemetry from a fixed cache node. Where a LoRaWAN gateway is unavailable within range of the cache site, a direct point-to-point custom LoRa uplink protocol or a cellular fallback (u-blox ALEX-R5 LTE-M/NB-IoT [29], 0.5 µA PSM idle) can deliver the alert to any Internet-connected monitoring service. Either path enables Posey to receive near-real-time notification that a searcher's device has crossed the detection perimeter, without requiring any searcher action or self-report.

3. THE BILATERAL NOTIFICATION HYPOTHESIS

3.1 System Overview and State Machine

The proposed system is conceptually a state machine with three primary states. In the default Dormant State, all major subsystems (Wi-Fi radio, BLE radio, LoRa TX) are powered down. The ESP32-S3 and nRF52840 MCUs are in deep sleep. Only the passive trigger sensor tier (reed switches, LIS2DW12 accelerometers, and/or a Panasonic EKMB PIR) remains active, consuming a combined quiescent current of approximately 2–3 µA. In this state the system is electronically invisible: no RF emissions, no detectable Wi-Fi beacon, no BLE advertisement. It may remain in this state indefinitely, consuming approximately 0.052 mAh per day.

A trigger event, defined as physical vibration at the cache body, lid disturbance, or thermal motion of a human-sized body within the PIR's field of view, elevates the system to the Detection State. The ESP32-S3 wakes from deep sleep (wake latency approximately 300 µs [22]), enables Wi-Fi in promiscuous mode, and coordinates a 10–20 second time-division multiplexed CSI burst across its link geometry. Per-subcarrier amplitude and phase data from each burst packet are processed through a compact feature extraction pipeline (temporal variance, short-time spectral energy, principal component envelopes) and compared against a stored site-specific baseline. If the disturbance signature is consistent with human approach rather than wind, animal, or other environmental noise, the confidence score crosses the alert threshold and the system transitions to the Broadcast and Alert State.

In the Broadcast and Alert State, two actions occur in parallel. The ESP32-S3's integrated BLE radio (or an optionally co-located nRF52840) begins transmitting BLE advertisement packets on the standard 37/38/39 advertising channels at a user-configured TX power and interval, encoding a predetermined service UUID and optional RSSI payload that functions as the checkpoint signal detectable by any scanning device. Simultaneously, the SX1262 LoRa radio wakes from retained sleep and transmits an encrypted alert packet upstream, either to a LoRaWAN gateway or a point-to-point receiver, delivering a timestamped intrusion notification to Posey's monitoring infrastructure. Both broadcasts continue for a configurable window before the system returns to the Dormant State and updates its environmental baseline.

3.2 The Checkpoint as a BLE Signal Event

Under this hypothesis, the "checkpoint" Posey describes in multiple interviews [3,30,31,32] is not a physical object to be found by visual search but an electronic signal event to be detected by instrument. Posey states the checkpoint will provide "zero doubt" [3], a threshold of certainty that is difficult to achieve with any visually identified physical landmark, which is always subject to interpretive uncertainty, but is trivially achievable with a BLE UUID match. A searcher scanning for BLE advertisements on a modern smartphone who detects a predefined service UUID at increasing RSSI as they approach the cache site has, by the ordinary standards of electronic instrument reading, zero doubt about the direction and approximate distance to the signal source.

The 200-foot proximity statement [5] is particularly significant under this interpretation. BLE at standard advertising TX power (+0 to +4 dBm) achieves reliable detection ranges of 50–80 meters (approximately 165–260 feet) in open outdoor environments with a clear line of sight. A searcher who has triggered the detection perimeter and entered the BLE broadcast range will receive a progressively strengthening RSSI reading as they approach. At 200 feet from a +4 dBm BLE transmitter in open terrain, RSSI values in the range of -80 to -90 dBm are typical, detectable on a standard smartphone but not yet at maximum strength. The fact that Posey specifically cites "200 feet" as a meaningful proximity benchmark is consistent with the BLE broadcast radius of the proposed system. A searcher at 200 feet has entered the BLE detection envelope; they are receiving the checkpoint signal. Posey knows this because his LoRa uplink has told him.

3.3 Posey's Remote Awareness: A Necessary Consequence of the Architecture

Posey's repeated public acknowledgments of awareness about searcher proximity: "If the checkpoint is actually found and I become aware of it, I will announce it" [4]; "I'm at least aware of people that have been close" [6]; these statements create an explanatory problem for any hypothesis that does not posit an active notification mechanism. The BTME hunt has attracted thousands of searchers. The probability that any given searcher who reaches the detection zone would self-report to Posey before announcing publicly or privately to their search community is low. The more parsimonious explanation is that Posey's awareness is instrument-mediated: the LoRa uplink from the deployed system delivers him a timestamped notification when a searcher crosses the detection threshold, independently of any searcher action.

This interpretation also resolves the otherwise puzzling phrasing of Posey's checkpoint announcement commitment: "If the checkpoint is actually found and I become aware of it" [4]. The conditional "if I become aware of it" suggests a mechanism by which Posey becomes aware that is not guaranteed, consistent with a radio link that may fail (gateway outage, terrain shadowing, battery depletion) but is otherwise reliable. A searcher self-reporting, by contrast, would always make Posey aware if they contacted him; there would be no conditional. The LoRa alert model predicts exactly this conditional phrasing: the system notifies Posey when it functions correctly, but the notification may not arrive if the radio link fails.

4. MEMOIR EVIDENCE: STRUCTURAL ANALOGS IN JUSTIN POSEY'S NARRATIVE

Posey's memoir is not a technical manual. It does not describe, reference, or explain any electronic detection system. Nevertheless, close reading of the memoir reveals a consistent pattern of embedded structural analogs to the proposed system's functional layers; analogies so specific that they suggest not only a familiarity with the underlying principles but an authorial intent to encode them into the memoir's narrative texture. What follows is a systematic analysis of the most significant of these analogs, organized by functional layer.

4.1 The Trigger Layer: Dad's Tin Can Perimeter System

In the chapter entitled "The Bandit Banquet," Posey describes his father's response to the family's recurring raccoon problem. After repeated overnight raids on the vegetable garden, the elder Posey installed what the memoir calls a "sophisticated early warning system": tin cans "strewn like metallic confetti" throughout the garden perimeter [1]. The cans served as a passive, zero-power, mechanical intrusion detection network: inert objects physically distributed around a protected asset that produce an auditory alert signal only when physically disturbed by an intruder crossing the boundary.

This is the mechanical precursor of the proposed system's trigger layer. The paper's recommended trigger hardware includes reed switches drawing zero quiescent current at the switch element, LIS2DW12 accelerometers drawing 50 nA in power-down mode and 0.38–5 µA in low-power mode [24], and Panasonic EKMB PIR sensors drawing 1.0 µA in sleep mode [25]; these are the electronic equivalents of the tin cans: passive, always-present, consuming negligible energy, and producing an alert only when physically activated by intrusion. The philosophy is identical: do not waste energy monitoring when nothing is present; let the environment itself signal the detection event.

The memoir also records the logical conclusion of a single-tier perimeter defense: the raccoons eventually defeat the tin cans by learning to circumvent the boundary. Professor Pudge, the largest raccoon in the family's recognized hierarchy, "demonstrated the art of sliding open our patio door" [1], bypassing the perimeter entirely to access the interior of the house. This defeat of the single-mode perimeter maps directly to the paper's argument for multi-layer detection: the trigger tier provides the first alert, but the CSI burst layer runs the secondary discriminating analysis that can distinguish between a raccoon (low mass, low thermal signature, non-human motion pattern) and a person, just as the paper recommends fusing PIR, accelerometer, and CSI signatures to reduce false alarms and circumvention risk.

4.2 The Sleep-Wake Duty Cycle: Narcolepsy as a Living Power Budget

The chapter "The Sleep Study" documents Posey's diagnosis with narcolepsy following his wife's insistence on a clinical evaluation [1]. The chapter is the memoir's most technically precise metaphor for the proposed system's power management architecture, and it merits detailed analysis.

The Multiple Sleep Latency Test (MSLT), the diagnostic instrument used in Posey's evaluation, measures sleep latency, defined as the time interval from active wakefulness to confirmed sleep onset, and the presence of REM sleep at or near the beginning of each sleep episode. In the clinically normal population, sleep latency is 10–20 minutes with REM sleep delayed or absent in daytime nap episodes. Posey achieves sleep onset in two minutes flat with immediate REM at every measurement opportunity. He describes the technician's reaction: "You don't even realize you're falling asleep, do you?" [1]

The ESP32-S3 in deep sleep achieves approximately 7–8 µA total system current [22], with the wake-from-deep-sleep latency on the order of 300 µs. The system goes dormant almost instantaneously when released from active processing, consuming negligible power in the interim, and requires an external interrupt (the trigger sensor's GPIO wake signal) to return to active state, exactly the behavior the MSLT documents in Posey's biology. His narcoleptic episodes are not failures of regulation; they are optimal energy management. The system allocates zero resources to maintaining wakefulness when no task demands attention, and returns to full processing capability within milliseconds of an external demand.

The clinical structure of the MSLT itself maps to the proposed system's operational cycle. The test consists of five scheduled nap opportunities of 20 minutes each, during which the technician monitors the subject and wakes them at the first confirmed REM onset. The technician is functionally the trigger event; the nap window is the burst window; the waking interruption is the controller pod ending the burst and returning the node to deep sleep. Posey enters dormancy within 2 minutes at each opportunity, the technician detects the state transition and interrupts, and the cycle repeats. This is the proposed system's sleep-wake-burst-sleep loop operating at biological timescales.

The chapter's conclusion amplifies the technical parallel. In the same clinical appointment where Posey receives his narcolepsy diagnosis, he learns of his father's death from brain cancer. He reflects: "Life, with its merciless tick and tock, waits for no one, not even those lost in the depths of an unbidden dream" [1]. The paper's power budget calculation makes the same statement in engineering terms: every percentage point of active Wi-Fi time is energy that cannot be recovered; the system's longevity depends on the discipline of its dormancy. Posey's narcolepsy is not incidental to the memoir's structure; it is the memoir's most intimate expression of a systems design principle that governs the proposed hardware at every operational level.

4.3 Tucker as a Living CSI Pipeline: The Snout Scout

"The Snout Scout" describes Posey's multi-year project to train his vizsla, Tucker, to detect buried bronze by scent [1]. The chapter's narrative arc maps the full signal processing pipeline of the proposed detection system in biological terms, and the methodological rigor Posey describes is strikingly parallel to the paper's evaluation protocol.

Tucker's olfactory system is a high-dimensional sensor array: 300 million olfactory receptors (compared to six million in humans) producing continuous, parallel signal streams across multiple chemical detection channels simultaneously. The proposed CSI system captures per-subcarrier amplitude and phase across 52–256 OFDM subcarriers per packet [15], producing a similarly high-dimensional parallel signal stream. Tucker does not detect bronze through a single molecular receptor; he detects a characteristic chemical profile: a multi-dimensional covariance signature distinguishable from the ambient environmental baseline. The CSI system does not detect intrusion through a single RSSI reading; it detects a characteristic disturbance pattern across subcarriers and time [16].

Posey's training methodology is notable for its technical rigor. He wore latex gloves during every training session "to eliminate my own scent from the test" [1], thereby removing a confounding signal from the training environment so Tucker's classifier would not learn to associate the operator's presence with bronze detection. This is the biological equivalent of the paper's gain compensation step [15], in which automatic gain control artifacts are removed from the CSI pipeline before feature extraction so that the classifier responds to environmental disturbance rather than operator-induced channel changes. Posey also left bronze samples outdoors to weather and oxidize for a full year before beginning field validation tests [1], establishing a training sample set that matched the spectral profile of an aged, environmentally exposed bronze cache, directly equivalent to the paper's recommendation to collect site-specific negative data under real environmental conditions before calibrating detection thresholds [21].

The field validation protocol, comprising twelve bronze samples buried at varying depths and GPS-logged coordinates with Tucker performing a blind search, is the paper's controlled-field evaluation methodology applied to a biological sensor [19]. Tucker achieved detection of all twelve samples, including the deepest, with a brief hesitation period on the deepest sample before sitting and locking eye contact to signal a confirmed find. The paper identifies exactly this uncertainty-proportional latency in its discussion of confidence-threshold crossing: a deeper, more attenuated target produces a lower initial confidence score that requires additional burst cycles to clear the alert threshold, resulting in longer time-to-alert but ultimately the same detection outcome [23].

4.4 The Home Depot Hound: Device-Free Localization in a Complex Environment

"The Home Depot Hound" describes Tucker's unauthorized departure from Posey's vehicle in a shopping center parking lot, his navigation through two unsecured parking areas and an automatic entry system, and his successful location of Posey in the hardware department of a large-format retail store [1]. Tucker performed this navigation without a map, without explicit instruction, and without any electronic aid; Tucker used scent gradient following to track the propagation of a chemical signal through a complex multipath environment crowded with ambient human traffic, air handling systems, and shelf-obstructed sightlines.

This is a behavioral demonstration of device-free passive localization. The paper cites Wilson and Patwari's foundational formulation [8]: "The sensing system does not literally 'see' the target; it infers the target from how the radio field changes across links and time." Tucker does not see Posey; he infers Posey's position from how the scent field changes as he moves through the store's spatial domain. His search behavior, characterized by broad initial sweeps narrowing to directed convergence, mirrors the paper's description of the RTI reconstruction process: a coarse spatial loss field is estimated from multiple link pairs, and the region of maximum disturbance is progressively localized through additional measurement iterations [8].

The practical implication of this parallel is significant. Posey trained Tucker to locate buried bronze by scent using the same biological mechanism he demonstrates in the Home Depot. He then extended that capability to the wilderness, where Tucker located twelve buried samples in open forest terrain. A Wi-Fi CSI detection system around a buried or surface-concealed bronze cache operates on the same physical principle: detecting the disturbance to the electromagnetic propagation environment caused by a human body approaching the cache, rather than detecting the cache itself. Tucker and the proposed CSI system are solving the same inverse problem through different sensing modalities.

4.5 Multi-Node Topology: The Aft Assault and the Grizzly Gathering

Two chapters in the memoir address the vulnerability of single-node detection through direct narrative demonstration. In "The Aft Assault," Posey is fly fishing on Grasshopper Creek, completely absorbed in observation of a large trout in front of him [1]. His sensor, attention, is directed forward. A badger attacks from the rear. The assault is total and effective because no sensor covered the approach vector. Posey sustains a bite wound and loses his rod before he can respond.

This paper's recommended multi-node topology creates multiple pairwise CSI links that collectively cover the protected zone from multiple angles [8,23], specifically to eliminate the directional gap that cost Posey in this chapter. No single approach vector goes unmonitored across all six link pairs simultaneously. The engineering lesson of the badger attack is expressed in the paper's link count formula: for N nodes, pairwise link count scales as N(N-1)/2, so the transition from one node (zero links, no coverage) to three nodes (three links, minimum practical coverage) to four nodes (six links, recommended coverage) represents a qualitative improvement in angular coverage that directly addresses the single-direction monitoring failure.

In "The Grizzly Gathering," Posey, his stepfather Gary, and Tucker encounter three separate grizzly bears in a single afternoon along the North Fork of the Blackfoot River [1]. Each encounter occurs at a different spatial location and is detected by a different member of the party: Gary spots the first bear upstream before Posey sees it; Tucker detects the third bear near the truck before any human can see or hear it; Gary again provides the alert for the second bear. The distributed detection team functions as a multi-node sensor network, with overlapping fields of awareness and complementary detection modalities (visual for Gary, olfactory for Tucker) providing coverage that no single node could maintain alone.

Gary's warning, shouted across the water when Posey cannot see the approaching bear, is the LoRa alert packet: a short, high-priority message delivered over distance to a receiver who would otherwise have no awareness of the event. Tucker's low growl and hackled stare toward the treeline is the PIR sensor firing before the visual link registers the intrusion; this represents the ultra-low-power first-tier sensor detecting the thermal signature of a large body before the secondary confirmation system can run. The structure of the afternoon's events demonstrates, through lived experience, the value of the layered multi-node detection architecture the paper formalizes.

4.6 False Alarm Architecture: The Stormy Stakeout and the Postal Pilgrimage

The memoir's most detailed treatment of the false alarm problem appears in "The Stormy Stakeout," which describes a two-night covert surveillance operation Posey conducted at a housesitting assignment [1]. The operation's structure is a direct, if accidental, analog of the paper's outdoor detection evaluation protocol: a two-node detection team (Posey and his wife Jennie), a wired communications link (the telephone), a camera sensor, adverse weather conditions (a monsoon), and real-time intelligence exchange about a suspected intruder.

The resolution is that the "intruder" is a patio umbrella with a crank handle, oscillating in the monsoon wind and illuminated obliquely by porch light at a specific distance and approach angle that produces a humanoid signature. Advance toward it and it disappears; retreat and it reappears. This precisely models the outdoor CSI false alarm phenomenon described in Hernandez and Bulut [21] and the microchanges paper by Turetta et al. [12]: wind-animated objects (foliage, patio furniture, loose signage) create motion signatures in the RF propagation environment that are locally indistinguishable from human motion when observed from a single viewpoint at a specific angle. The multi-link fusion approach the paper recommends, which requires a persistent signature across multiple link pairs rather than a single-link detection, would have rejected the umbrella false positive, because the umbrella's oscillating signature would appear at different intensities and phases across different link pairs and would not cohere into the spatially consistent intrusion signature of a human body.

"The Postal Pilgrimage" addresses the complementary problem of false negative suppression through overly aggressive alarm dismissal. Posey hears a rattlesnake rattle twice on his grandfather's driveway, retreats twice, and is twice told by his grandfather that his mind is playing tricks on him [1]. On the third approach, two snakes in courtship are confirmed at close range, validating the original detection entirely. The grandfather's dismissal policy of treating all unconfirmed alerts as false positives produces a systematic false negative bias that would have been costly had Posey been less cautious. The paper addresses this calibration challenge explicitly, recommending that the full operating ROC curve be presented rather than a single threshold point, and that the final threshold be justified by the operator's tolerance for missed intrusions versus nuisance dispatches [23].

4.7 Event Logging and the Black Box: The Midnight Menace

"The Midnight Menace" describes the shooting of Posey's mother's locomotive near Maricopa, Arizona, by a person whose license plate happened to fall from his vehicle at the crime scene [1]. The subsequent legal case collapses not for lack of a suspect but because Union Pacific Railroad failed to download data from the locomotive's event recorder (the "black box" that logs precise GPS coordinates, speed, and timestamped events) before the retention window closed. Without the event recorder data, the railroad cannot contradict the shooter's claim that the crime occurred at a different location. The case moves to federal jurisdiction and dissolves.

This chapter is a direct biographical encoding of the paper's firmware design requirement that "the firmware must copy the data immediately [from the CSI callback buffer] if it is needed later" [15]. The CSI callback buffer is deallocated after the callback returns, the Wi-Fi equivalent of the event recorder's rolling overwrite window. The engineer who does not implement bounded event retention and immediate buffer copy makes the same error Union Pacific made: the data existed, the retention window was finite, and the retrieval opportunity was missed. Posey learned from his mother's professional life what it costs when the black box data is not captured in time. The legal architecture he built for the BTME hunt, comprising notarized documents, cryptographic hashes posted publicly, and a designated steward holding split key material [2], reflects exactly this lesson, applied to treasure hunt documentation rather than railroad incident investigation.

4.8 The Systems Architect: The Obsession's Oath

"The Obsession's Oath" is the memoir's most direct statement of Posey's professional identity as a large-scale systems architect. He describes building "high-throughput, low-latency ingestion systems that process petabytes of data" [1] at Microsoft and subsequent employers, monitoring distributed systems for latency and anomalies, and building streaming architectures that serve millions of concurrent users. He describes the South Korean banking collapse caused by an ActiveX vulnerability as a professional milestone: "a single flaw in ActiveX controls had brought a nation to its knees." [1]

The packet storm incident at Microsoft, in which Posey inadvertently created a network denial-of-service condition by plugging both ends of a network cable into the same switched network, is a specific technical experience that maps to the paper's failure mode analysis for multi-node CSI systems [23]. A network cable loop creates a broadcast storm in which every packet is reflected and amplified until bandwidth is saturated. Insufficiently synchronized CSI nodes broadcasting simultaneously on the same channel create an equivalent condition in the RF domain, degrading detection performance through self-interference. Posey experienced this failure mode at scale before designing any wilderness detection system, and would have applied its lesson to node timing architecture.

His transition from software engineering to treasure hunting, described at the chapter's conclusion, is framed as the recognition that the same systems-thinking skills apply to physical puzzle design as to software architecture: finding vulnerabilities others have missed, extracting covert information from observable signals, and engineering solutions for environments where the adversary is not a software bug but a physical system that actively resists measurement [1]. This self-description is the most direct evidence in the memoir that Posey brings professional-grade systems design capability to the BTME hunt's technical infrastructure, including any detection system he may have deployed.

5. JIBLE EVIDENCE: INTERVIEW STATEMENTS SUPPORTING THE HYPOTHESIS

The JIBLE 6.0, compiled by community researcher @jessinthewest with support from @hi-imerica and @k, represents a comprehensive indexed record of Posey's public statements across 22 identified interview sources from 2023 through May 2026 [13]. The following statements are directly germane to the proposed bilateral detection hypothesis.

5.1 The Checkpoint as an Unambiguous Confirmation Event

Posey introduced the checkpoint concept in the April 2025 Mysterious Writings interview, stating: "My treasure hunt has a built-in checkpoint that will give you zero doubt that you are in the right place" [30]. The language "built-in" is architecturally significant, suggesting a designed feature of the hunt's infrastructure rather than an incidental physical feature of the landscape. A GPS coordinate, a rock formation, or a tree blaze would not typically be described as "built-in" to a hunt; electronic hardware physically installed at the site would be. The phrase "zero doubt" sets a certainty threshold that matches an electronic signal confirmation (UUID detection) rather than the interpretive certainty achievable from visual landmark identification, which is always subject to ambiguity about whether the searcher has correctly identified the intended object.

In the Dillon, Montana book-signing Q&A (June 21, 2025) [31], Posey confirmed that the poem mentions the checkpoint in the sense that the checkpoint is "a stage of your journey," a waypoint in the path encoded by the poem's clues. In the Cowlazars and Kpro interview (March 31, 2025), he confirmed that "there are physical objects that you can find along the way" [32]. Under the proposed hypothesis, the physical objects are the deployed sensor nodes, hardware components physically present in the environment that a careful searcher might observe, and the checkpoint is the BLE broadcast event that those nodes initiate upon detecting approach.

5.2 Posey's Remote Awareness of Proximity Events

The most operationally specific statement in the JIBLE record appears in Posey's Facebook and Twitter post of August 1, 2025: "Some people have been within 200 feet of the checkpoint" [5]. This statement implies precise spatial knowledge of searcher positions at a specific time, knowledge that Posey possesses despite being physically absent from the search area. As discussed in Section 3.3, this precision is most parsimoniously explained by the LoRa uplink notification architecture, which would deliver a timestamped alert with the knowledge that the detection perimeter (approximately 5–10 meters) has been crossed, implying the searcher is within the system's protective radius and hence within BLE broadcast range (approximately 50–80 meters, or 165–260 feet), of the cache.

Posey's July 11, 2025 Facebook post reinforces this interpretation: "Many people have claimed to have found the checkpoint... If the checkpoint is actually found and I become aware of it, I will announce it" [4]. The passive construction "I become aware of it" is telling. If awareness depended on searcher self-report, Posey would naturally phrase this as "If someone contacts me" or "If someone tells me they've found it." The passive construction is consistent with automated notification: a system that makes Posey aware without requiring any action from the searcher or from Posey himself. The conditional "if I become aware of it" accommodates the possibility of alert delivery failure (gateway outage, radio link shadowing, battery depletion) while maintaining the general reliability of the notification architecture.

In the March 2026 X Marks the Spot interview [6], Posey was asked directly whether he is aware of anyone who has been to the checkpoint. He replied: "I'm at least aware of people that have been close." The phrasing "at least aware" and "close" suggests a graduated spatial awareness consistent with the detection system's perimeter geometry. People who crossed the outer trigger perimeter activated the system and generated a LoRa uplink; Posey knows they were "close" but cannot confirm from the alert alone whether they identified the BLE broadcast signal, because that would require the searcher to act on the signal by approaching the cache.

5.3 Redundant Solve Architecture and Engineering Safeguards

In the Sandal Sanders TikTok interview (September 27, 2025) [33], Posey was asked whether there are multiple solves in the hunt. He replied: "I felt like it's kind of like safeguards, you know, in case certain aspects of the treasure hunt mechanics don't work for whatever reason, then there are other ways to approach it so that you end up finding it either way." [33] The phrase "treasure hunt mechanics" is an engineering descriptor: it refers to the functional components of the hunt's design rather than its narrative or poetic content. Mechanical safeguards are designed for systems that might fail; Posey's language implies that the hunt contains components whose failure he anticipated and compensated for with redundant paths.

This is precisely the paper's architectural argument for the four-node square topology over the two-node single-link configuration [8,23]. Multiple pairwise links provide redundancy against individual node failure (battery depletion, water ingress, physical damage) so that the detection function persists even if one node in the network becomes inoperative. Multiple solve paths provide redundancy against individual clue interpretation failure, so that the search succeeds even if one stage of the puzzle resists resolution. In both cases, the designer's stated rationale is identical: "in case certain aspects of the mechanics don't work for whatever reason."


6. SYSTEM DESIGN IMPLICATIONS FOR SEARCHERS

6.1 BLE Scanning Protocol

If the proposed hypothesis is correct, any searcher who has reached the correct general area of the cache should equip themselves with a BLE scanning application on their primary mobile device. Several no-cost applications provide full BLE advertisement scanning with RSSI display and UUID identification across both iOS and Android platforms, including nRF Connect (Nordic Semiconductor), LightBlue (PunchThrough), and BLE Scanner (Bluepixel Technologies). The searcher should enter the application's scanning mode while moving through the final approach zone and monitor for any advertisement packet that: (a) does not correspond to a known commercial device in the vicinity; (b) presents a consistent UUID across multiple scans; and (c) increases in RSSI as the searcher advances toward the suspected cache location.

Because the system is hypothesized to be dormant until triggered, a searcher who passes through the detection perimeter without being detected (for example, by moving too quickly, or approaching at a time when the PIR trigger has not fully armed) may not receive the BLE broadcast. A systematic approach that includes pausing within the estimated detection radius for 30–60 seconds before scanning is recommended, as this gives the trigger sensor time to confirm the thermal or motion event and the CSI burst time to evaluate the disturbance signature before the broadcast state is initiated.

6.2 Directionality of the RSSI Signal

BLE RSSI values decrease logarithmically with distance in free space, following approximately a -20 dB per decade relationship with modifications for local environmental multipath. A searcher who scans and detects a non-commercial BLE advertisement can use the RSSI value as a directional guide by moving in each of four cardinal directions for 10–15 meters and noting which direction produces increasing RSSI. The direction of maximum RSSI increase is the bearing toward the transmitting node. Multiple directional samples taken from different positions can triangulate the node's approximate location using manual bearing intersection, a technique that requires no specialized equipment beyond the BLE scanning application and a compass.

The magnetic anomaly hypothesis discussed in Section 5.4 suggests that a compass may behave erratically near the final cache location, consistent with the Netflix hint. If compass behavior is anomalous in the final approach zone, a searcher should be aware that traditional magnetic bearing techniques will be unreliable and should rely on the BLE RSSI gradient rather than compass-based triangulation.

6.3 Environmental and Seasonal Considerations

The proposed system's dormant state will appear identical to an absent system under all external observation: no RF emissions, no BLE advertisement, no detectable Wi-Fi beacon. A searcher scanning for BLE in the detection zone during periods when the system is dormant (between trigger events) will detect nothing. This creates an important operational implication: a null scan result does not disprove the hypothesis. It may simply indicate that the searcher has not yet activated the system's trigger. Only a positive detection, specifically a stable, non-commercial BLE advertisement with increasing RSSI as the searcher approaches, constitutes evidence relevant to the hypothesis.

Posey has stated in multiple interview contexts [35] that the cache should not be searched in snowy conditions, and that seasonal access varies. The detection system's battery, if a LiFePO4-class chemistry as proposed, is rated for operation down to -20°C but will exhibit capacity derating in cold temperatures [22]. If the system has been deployed since 2023 without servicing, battery state is a genuine operational variable. The system may have entered a low-battery protection state that prevents normal triggering while preserving the stored baseline in non-volatile memory. This eventuality would be consistent with Posey's ability to know that people have been "close" in prior seasons while being unable to confirm checkpoint detection in more recent search attempts.

6. THE TWO-TRIP DEPLOYMENT TIMELINE AS CORROBORATING EVIDENCE

Posey discloses in "The Treasure" chapter of his memoir that hiding the cache required two separate journeys, each exceeding 4,500 miles, for a combined travel distance of over 9,000 miles [1]. He describes the first trip as "essentially a dry run, a rehearsal for madness" undertaken to verify that his plan was feasible before committing to the irreversible act of placement. He states that the first trip allowed him to "get the kinks worked out," and that only after completing it did he set out a second time to "hide my treasure somewhere along my journey." [1] The second trip, conducted with heightened security consciousness including the use of a disguise when observed, was the trip during which the cache was actually placed.

The memoir's description of the first trip is notably sparse on specifics. Posey does not describe finding a hiding location on that trip, does not describe arriving at a final destination, and does not describe returning home with any confirmed outcome beyond the decision to proceed. He went, he assessed, and he returned. Under a conventional interpretation, this is simply a scouting trip: Posey visited the candidate location, evaluated it, and departed without placing the cache. This interpretation is adequate but incomplete. It does not explain why a journey of 4,500-plus miles was necessary for reconnaissance that could, in principle, have been accomplished through satellite imagery, topographic maps, and land status databases that Posey demonstrably had access to through his research capabilities.

The bilateral detection hypothesis provides a more complete explanation of the first trip's purpose. Under this framework, the first trip served three functions that could not be performed remotely: physical site assessment for sensor node placement geometry; deployment and physical installation of the detection hardware; and initiation of a calibration and baseline-building period before the cache was placed. Each of these functions required physical presence at the site, and none of them required placing the cache on the same trip. The second trip was therefore not the first time Posey visited the site but the second: the trip during which, with the detection system already installed, operational, and calibrated, he placed the cache within the system's protective perimeter and verified that the bilateral notification architecture was functioning correctly before departing.

6.1 Hardware Deployment Logistics

Physical deployment of a multi-node wireless sensor network in a wilderness environment requires on-site activities that cannot be abbreviated without compromising system integrity. Node placement geometry must be walked to confirm that the desired link pairs cross the protected zone with sufficient clearance, and that foliage, terrain features, and soil composition do not create dead zones in the detection field [9]. Physical enclosures must be mounted or buried to protect against water ingress, condensation, and UV degradation, as the paper's reference design recommends IP-rated enclosures with conformal coating and desiccant for all outdoor nodes [22]. Antenna orientation must be verified in situ for each node, since ground reflection, nearby conductive surfaces, and vegetation proximity all affect radiation pattern in ways that cannot be predicted from maps alone.

Beyond placement, the initial calibration protocol requires time on-site. The paper recommends collecting at least several days of negative data in ordinary weather before enabling real alerts [10], specifically to build a site-specific environmental baseline that reflects the location's actual multipath geometry, diurnal temperature cycle, prevailing wind conditions, and typical vegetation movement. A detection system calibrated on the day of cache placement would have no environmental baseline against which to compare incoming CSI measurements; every wind gust, passing animal, or temperature-driven foliage movement would register as a potential anomaly until the baseline stabilizes. The paper addresses this directly: threshold revisiting is required after temperature swings, rain, and major vegetation change, and a post-rain recalibration window is recommended before restoring normal thresholds [9,10].

These requirements are consistent with a first trip of multi-day duration that ends without cache placement: Posey arrives, installs the hardware, runs initial calibration passes, verifies the LoRa uplink alert path to his monitoring infrastructure, and departs with the system running but no cache in place. The 4,500-mile travel distance suggests the site is not near any of Posey's known residential or professional locations, consistent with his stated intent to minimize the number of people who saw him traveling toward the site [42]. A site requiring such deliberate, circuitous travel, chosen in part for its remoteness from traceable travel patterns, would also be a site where driving out once for deployment and again for cache placement is a practical operational necessity rather than an inefficiency.

6.2 The Calibration Period Between Trips

If the first trip deployed the detection hardware and initiated the baseline calibration period, the interval between the two trips served as the system's environmental seasoning window. The outdoor RTI literature documents that site-specific environmental baselines require exposure to the full range of local conditions, including seasonal temperature variation, precipitation events, wind patterns at different times of day, and animal traffic, before detection thresholds are stable enough to reliably discriminate human approach from environmental noise [9,11]. A system deployed in early-season conditions and left to run for weeks or months before cache placement would, by the time of the second trip, have accumulated a statistically robust environmental baseline covering the expected range of ambient conditions at that location.

Posey's memoir description of the interval between the two trips is consistent with this interpretation. He does not describe the period as idle; he describes it as a time during which his appetite for the project intensified rather than diminished, suggesting ongoing engagement with the project's progress. Under the deployment hypothesis, this engagement would have included monitoring the LoRa uplink telemetry from the deployed system, reviewing the environmental baseline data accumulating in the node logs, and adjusting detection thresholds remotely based on the observed false-alarm rate during the seasoning period. This remote monitoring function is a native capability of the proposed architecture: the LoRa uplink can transmit periodic health pings, battery voltage readings, and aggregated baseline statistics to Posey's monitoring infrastructure on a scheduled basis without requiring any trigger event.

The calibration period hypothesis also explains a detail of the memoir that is otherwise puzzling: Posey's characterization of the first trip as having "gotten the kinks worked out." [1] In the context of a simple scouting trip, there are no kinks to work out beyond evaluating whether the candidate location meets his criteria, a determination that would be made within hours of arrival. In the context of a hardware deployment, kinks is a natural engineering descriptor for the unexpected complications that arise during field installation: a node placement that produces insufficient link geometry, a PIR sensor whose field of view is blocked by a terrain feature, a LoRa gateway range test that requires antenna repositioning, or a baseline calibration that reveals unexpectedly high environmental noise requiring threshold adjustment. Working out these complications over the course of the first trip, then verifying the corrected system performs as designed during the inter-trip monitoring period, is exactly the bench-to-field evaluation progression the paper recommends [9].

6.3 Cache Placement Within the Operational System Perimeter

The second trip's primary purpose, under the bilateral detection hypothesis, was to place the cache within the detection perimeter of the already-operational system and to verify the end-to-end alert chain from detection event through LoRa uplink to Posey's monitoring infrastructure. This verification would have required Posey to approach the cache site from the expected search vectors, confirm that his own approach triggered the detection system by receiving his own LoRa alert notification, verify that the BLE advertisement broadcast initiated correctly and was detectable at the expected range on a scanning device, and confirm that the system returned to the dormant state after the burst window expired. Only after this end-to-end verification would placing the cache within the perimeter be operationally sensible; a cache placed before the detection system is confirmed functional provides no protection during the critical early period after placement.

The memoir's description of the second trip is again sparse on operational detail, consistent with Posey's intent to maintain the secrecy of his route and methods. He notes that he traveled farther than strictly necessary and used a circuitous route [1]. He also discloses that by the time of the second trip he was operating with a broken tibia, sustained in a jack failure while helping a neighbor with a moving truck. The physical impairment would have affected the approach path he used to reach the cache site and, notably, would have produced an asymmetric gait that differs from the normal bipedal approach signature the detection system's classifier was calibrated against. This is a meaningful operational detail: if the system was calibrated on normal-gait approach patterns during the inter-trip seasoning period, Posey's injured approach on the placement trip would have generated an atypical motion signature. A competent systems engineer in Posey's position would have accounted for this by temporarily disabling or adjusting the classifier during the placement visit, adding a concrete procedural step to the second trip's operational timeline that is consistent with the deployment hypothesis and has no equivalent under the conventional scouting interpretation.

6.4 Consistency With Posey's Stated Security Protocol

Posey's description of his travel security measures on both trips is consistent with the operational security requirements of a hardware deployment mission rather than a simple cache placement mission. He describes going completely off-grid on both trips, leaving no digital breadcrumbs, using a disguise when observed, and deliberately routing through unnecessary distance to obscure his destination [1]. In the Seekers Summit Q&A (March 2026) [42], he elaborated that anonymous travel in the United States is difficult because license plates are captured by numerous commercial and governmental camera systems, creating a travel record even for drivers who take no active steps to be observed. His stated solution was a very convoluted and very deliberate route undertaken twice.

The operational security concern about travel record creation is more acute for a hardware deployment trip than for a cache placement trip. A cache placement trip produces a historical record that points to the cache's general region but does not require any future revisit; once the cache is placed, it is placed. A hardware deployment trip, if it produces a discoverable travel record, points to a site that will be revisited in the future, doubling the eventual exposure and allowing route correlation across multiple visits. Posey's evident awareness of traffic camera systems and his willingness to add 4,500-plus miles of deliberate circuitous routing suggests a security calculus proportional to ongoing rather than one-time exposure. The two-trip architecture, under the deployment hypothesis, represents the minimum visit count necessary to deploy a functional bilateral detection system: one trip to install and calibrate, one trip to verify end-to-end function and place the cache. Any additional trips increase the probability of route correlation across multiple discoverable travel records, which is precisely the risk Posey's memoir indicates he was most focused on managing.

7. DISCUSSION

7.1 Alternative Hypotheses

The most obvious alternative hypothesis is that Posey's awareness of searcher proximity derives entirely from searcher self-report, social media monitoring, and inference from the pattern of public search activity. Under this interpretation, "within 200 feet" is an estimate based on publicly reported search locations rather than instrument measurement, and the checkpoint is a physical landmark that a searcher finds by sight. This hypothesis is consistent with some of the evidence but struggles with the specificity and precision of the 200-foot claim, the passive "become aware" construction in Posey's checkpoint announcement commitment, and the "built-in" language applied to the checkpoint feature; three separate phrasings that, individually, might be explained away but collectively suggest an active notification mechanism rather than passive social media monitoring.

A second alternative is that the checkpoint is a physical object Posey placed (a sealed container, a marker stone, or a specific arrangement of natural materials) whose discovery is confirmed to Posey when a searcher who has found it contacts him with a photograph or description. Under this interpretation, the "zero doubt" threshold is achieved by the unambiguous distinctiveness of the object (e.g., a manufactured item in a wilderness context). This hypothesis cannot be fully ruled out, but it does not explain the "built-in" language or the passive awareness construction, and it requires a level of searcher discipline (immediate and private contact with Posey before any public announcement) that is inconsistent with the behavior patterns observed in other treasure hunt communities.

The electronic bilateral detection hypothesis advanced in this paper remains the most parsimonious unified explanation of the totality of the evidence, including Posey's professional background, the memoir's structural analogs, the JIBLE's specific proximity claims, the "built-in" checkpoint language, and the passive awareness construction. It is not, however, the only plausible interpretation, and its empirical confirmation requires either physical access to the cache site or a direct admission from Posey.

7.2 Ethical and Legal Considerations

The proposed detection system, if deployed on publicly accessible wilderness land, raises questions under FCC Part 15 unlicensed device regulations. Under 47 CFR §15.247 [36], digital-modulation systems operating in the 2400–2483.5 MHz band (Wi-Fi and BLE) may not cause harmful interference and must accept any interference received, with a maximum peak conducted output power of 1 W for qualifying systems. BLE advertisement at standard power levels (0 to +8 dBm) and Wi-Fi CSI at standard 802.11 power levels are well within Part 15 limits. LoRa sub-GHz operation in the 902–928 MHz band is similarly compliant under §15.247 at the power levels proposed. The proposed system's brief duty-cycled transmissions (BLE advertising for short windows and LoRa uplinks of milliseconds duration) represent minimal interference contribution to the shared spectrum environment.

The physical placement of unattended electronic equipment on public land is subject to the jurisdiction of the relevant land management agency. Posey's legal disclosures confirm that the cache was placed on land that was "legally accessible at the time of abandonment" and that land status "may change over time" [2]. The BTME rules prohibit the use of metal detectors in areas where they are prohibited by law [2], but do not address BLE scanning, which requires no physical disturbance of the environment and is not regulated by any current land management rule applicable to wilderness recreation. A BLE scanning application is a passive receiver function; it does not transmit in the standard scanning mode and creates no interference with the environment.

7.3 Contribution to BTME Search Methodology

If the bilateral detection hypothesis is correct, it reframes the final stage of the BTME search in a way that has immediate methodological consequences. The conventional approach to treasure hunt endgame searches is visual: the searcher examines the environment for physical markers, distinctive geological features, or placed objects that match the clues' description. The proposed hypothesis suggests that the correct endgame approach is instrumental: the searcher carries a BLE scanning device, enters the estimated final zone, and waits for a signal event rather than searching for a visual indicator.

This distinction may explain why some searchers who have reached the correct general area have not found the cache despite apparently exhaustive visual searches: they were looking for the wrong category of evidence. Under the proposed hypothesis, the cache itself may be minimally visually distinctive, deliberately concealed to resist visual detection, while the electronic checkpoint is unambiguous to any searcher carrying an active BLE scanner. The hunt's design would thus implement a form of technological gatekeeping: the searcher who arrives at the correct location with a BLE scanner receives a definitive confirmation signal; the searcher who arrives without one receives nothing, regardless of how thoroughly they search the immediate area by sight.

8. CONCLUSION

This paper has proposed and substantiated the hypothesis that Justin Posey deployed a low-power, trigger-activated bilateral detection system at or near the BTME cache location, with two simultaneous functions: broadcasting a BLE advertisement checkpoint signal detectable by any nearby mobile device, and transmitting a remote LoRa uplink alert notifying Posey of the proximity event. The hypothesis is supported by three independent bodies of evidence: the established engineering literature on device-free localization, low-power Wi-Fi CSI sensing, and BLE proximity detection; multiple structurally precise metaphorical analogs embedded in Posey's memoir, spanning the trigger layer, the sleep-wake duty cycle, the multi-node detection topology, the false alarm architecture, and the event-log retention requirement; and specific JIBLE interview statements regarding the checkpoint's built-in nature, Posey's passive awareness of proximity events, and the precision of the 200-foot distance claim.

The hypothesis, if correct, has direct operational consequences for BTME searchers. The checkpoint is an electronic signal event rather than a physical visual landmark. It is detectable with a standard BLE scanning application on any modern smartphone. The RSSI gradient of the detected advertisement provides directional guidance to the transmitting node. And Posey's remote awareness of checkpoint events, the mechanism by which he will announce the checkpoint's discovery, is an automated notification function of the deployed hardware, not a process dependent on searcher self-report.

The design principles underlying the proposed system are not external to Posey's character or experience. They emerge directly from his professional history as a large-scale systems architect, his biographical encounter with narcolepsy as a living model of the sleep-wake duty cycle, his decade of training a vizsla to detect buried bronze using a biological analog of the CSI pipeline, and his family's ingrained practice of layered perimeter detection from his father's raccoon-deterrence experiments. The proposed system is, in the fullest sense, the technical infrastructure that Justin Posey was uniquely qualified and personally motivated to build.

REFERENCES

 

[1]  Posey, J. M. (2025). Beyond the Map's Edge. Beyond the Map's Edge LLC. ISBN 978-1-966862-01-7.

[2]  Posey, J. M. (2023). Beyond the Map's Edge Legal Documentation, Notarized Records, and Digital Fingerprint. Posted publicly November 17, 2023 via X (formerly Twitter). Retrieved from https://treasure.quest/en/legal/

[3]  @jessinthewest. (2026). JIBLE 6.0: A Compilation of Statements by Justin Posey for Beyond the Map's Edge Treasure Hunters. Entry [Checkpoint]. Mysterious Writings 2025 Interview, April 3, 2025. Version 6.0, updated May 19, 2026.

[4]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint]. Justin Posey Facebook page, July 11, 2025.

[5]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint]. Justin Posey Twitter/Facebook page, August 1, 2025.

[6]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint]. X Marks the Spot YouTube Interview, March 17, 2026.

[7]  Patwari, N., and Wilson, J. (2010). RF Sensor Networks for Device-Free Localization: Measurements, Models, and Algorithms. Proceedings of the IEEE. https://oamonitor.ireland.openaire.eu/rpo/rcsi/search/publication?pid=10.1109%2Fjproc.2010.2052010

[8]  Wilson, J., and Patwari, N. (2010). Radio Tomographic Imaging with Wireless Networks. IEEE Transactions on Mobile Computing. https://span.ece.utah.edu/uploads/RTI.pdf

[9]  Alippi, C., Bocca, M., et al. (2014/2016). Radio Tomographic Imaging for Outdoor People Detection and Localization in Wireless Sensor Networks. https://arxiv.org/pdf/1407.8509

[10]  Turetta, C., et al. (2024). Environmental Microchanges in WiFi Sensing. DATE Conference Proceedings. https://past.date-conference.com/proceedings-archive/2024/DATA/10005_pdf_upload.pdf

[11]  Hernandez, S. M., and Bulut, E. (2022). WiFi Sensing on the Edge: Signal Processing Techniques and Challenges for Real-World Systems. IEEE Communications Surveys & Tutorials. https://ebulutvcu.github.io/COMST22_WiFi_Sensing_Survey.pdf

[12]  Turetta, C., et al. (2024). Environmental Microchanges in WiFi Sensing. DATE 2024. [Cited separately for microchanges characterization.] https://past.date-conference.com/proceedings-archive/2024/DATA/10005_pdf_upload.pdf

[13]  @jessinthewest. (2026). JIBLE 6.0: A Compilation of Statements by Justin Posey for Beyond the Map's Edge Treasure Hunters. Version 6.0, updated May 19, 2026. Prepared with support from @hi-imerica and @k. Contact: jessinthewest5@gmail.com

[14]  Youssef, M., Mah, M., and Agrawala, A. Device-Free Passive Localization for Wireless Environments. (Nuzzer system.) IEEE Transactions on Mobile Computing and related publications. https://saeed.github.io/files/nuzzer-tmc.pdf

[15]  Espressif Systems. Introduction to ESP-CSI Solution. ESP-Techpedia. https://docs.espressif.com/projects/esp-techpedia/en/latest/esp-friends/solution-introduction/esp-csi/esp-csi-solution.html

[16]  Wang, W., Liu, A. X., and Shahzad, M. (2015). Understanding and Modeling of WiFi Signal Based Human Activity Recognition. ACM MobiCom. https://www.sigmobile.org/mobicom/2015/papers/p65-wangA.pdf

[17]  Kotaru, M., Joshi, K., Bharadia, D., and Katti, S. (2015). SpotFi: Decimeter Level Localization Using WiFi. ACM SIGCOMM. https://web.stanford.edu/~skatti/pubs/sigcomm15-spotfi.pdf

[18]  Zhang, Y., Zheng, Y., Qian, K., et al. Widar3.0: Zero-Effort Cross-Domain Gesture Recognition with Wi-Fi. IEEE TPAMI. https://tns.thss.tsinghua.edu.cn/widar3.0/data/TPAMI_Widar3.0_paper.pdf

[19]  Yang, J., Chen, X., et al. (2023). SenseFi: A Library and Benchmark on Deep-Learning-Empowered WiFi Human Sensing. Patterns. https://arxiv.org/abs/2207.07859

[20]  Wang, F., et al. (2025). A Survey on Wi-Fi Sensing Generalizability: Taxonomy, Techniques, Datasets, and Future Research Prospects. https://arxiv.org/abs/2503.08008

[21]  Hernandez, S. M., and Bulut, E. (2022). WiFi Sensing on the Edge. [Full citation at Ref. 11 above.]

[22]  Espressif Systems. ESP32-S3 Series Datasheet. https://documentation.espressif.com/esp32-s3_datasheet_en.pdf

[23]  Alippi, C., Bocca, M., et al. (2014/2016). Radio Tomographic Imaging for Outdoor People Detection. [Full citation at Ref. 9 above.] https://arxiv.org/pdf/1407.8509

[24]  STMicroelectronics. LIS2DW12 Datasheet. https://www.st.com/resource/en/datasheet/lis2dw12.pdf

[25]  Panasonic. EKMB110111 WL Series PIR Motion Sensor Reference Specification. https://industrial.panasonic.com/cdbs/www-data/pdf/EWA0000/bltn_eng_ekmb110611_ast-ind-247372.pdf

[26]  Nordic Semiconductor. nRF52840 Product Brief. https://www.mouser.com/datasheet/2/297/nrf52840_soc_v3_0-2942478.pdf

[27]  Semtech. SX1261/2 Datasheet. https://cdn.sparkfun.com/assets/6/b/5/1/4/SX1262_datasheet.pdf

[28]  LoRa Alliance. LoRaWAN Link Layer Specification v1.0.4. https://lora-alliance.org/wp-content/uploads/2021/11/LoRaWAN-Link-Layer-Specification-v1.0.4.pdf

[29]  u-blox. ALEX-R5 Product Summary. https://content.u-blox.com/sites/default/files/ALEX-R5_ProductSummary_UBX-20011723.pdf

[30]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint, Checkpoint Built-In]. Mysterious Writings 2025 Interview, April 3, 2025.

[31]  @jessinthewest. (2026). JIBLE 6.0. Entries [Checkpoint, Hunt Design, Solving, Netflix]. Dillon, Montana Book-Signing Live Q&A, June 21, 2025. https://youtu.be/u1jcFpggC0

[32]  @jessinthewest. (2026). JIBLE 6.0. Entry [Solving: Physical Objects]. Cowlazars & Kpro YouTube Interview, March 31, 2025. https://www.youtube.com/watch?v=P00hE2BMYbc

[33]  @jessinthewest. (2026). JIBLE 6.0. Entry [Solving: Multiple Solves]. Sandal Sanders TikTok Interview, September 27, 2025. https://youtu.be/hx1kvZfSwrk

[34]  Gold & Greed: The Hunt for Fenn's Treasure. (2024). Netflix documentary series. Nomadica Films / Gumstreet Productions.

[35]  @jessinthewest. (2026). JIBLE 6.0. Entries [Accessibility: Snow and Seasonal Conditions]. Multiple sources, 2025–2026.

[36]  U.S. Electronic Code of Federal Regulations. 47 CFR Part 15, §15.247. https://www.ecfr.gov/current/title-47/chapter-I/subchapter-A/part-15/subpart-A

[37]  Banerjee, A., et al. (2014). Violating Privacy Through Walls by Passive Monitoring of Radio Windows. WiSec 2014. https://collections.lib.utah.edu/dl_files/df/08/df08b7dfd9682fcaa1763498bd547ea06a28c213.pdf

[38]  Xie, Z., et al. (2022). WiFi-Based Cross-Domain Gesture Recognition via Modified Prototypical Networks. https://zhang-xie.github.io/papers/WiGr_zhang.pdf

[39]  The Things Network. LoRaWAN Architecture. https://www.thethingsnetwork.org/docs/lorawan/architecture/

[40]  Espressif Systems. ESP-IDF Wi-Fi API Reference and Sleep Modes. https://docs.espressif.com/projects/esp-idf/en/stable/esp32/api-reference/network/esp_wifi.html

[41]  Texas Instruments. IWRL6432 Datasheet. https://www.ti.com/lit/ds/symlink/iwrl6432.pdf

[42]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint: Awareness and Announcement]. Seekers Summit Live Q&A, March 28, 2026. https://www.youtube.com/watch?v=4cjpymh2LXc

[43]  @jessinthewest. (2026). JIBLE 6.0. Entry [Checkpoint: Proximity Confirmation]. Este's Quest YouTube Interview, April 2, 2025.

[44]  Posey, J. M. (2023). Beyond the Map's Edge Treasure Hunt Legal Notice and Rules. https://treasure.quest/en/rules/




Comments


Contact: LowRentsResearch@gmail.com