Detecting the Invisible: Searcher-Facing BLE Broadcast and Owner-Facing Remote Alert as a Unified Cache Detection System
A Proposed
Low-Power Bilateral Detection Architecture in the Beyond the Map's Edge Treasure Hunt:
Searcher-Facing
BLE Broadcast and Owner-Facing Remote Alert as a Unified Cache Detection System
Low Rents, May 2026
ABSTRACT
This paper proposes and provides substantiated technical and biographical
evidence for the hypothesis that Justin M. Posey, creator of the Beyond the
Map's Edge (BTME) wilderness treasure hunt, deployed a low-power,
trigger-activated electronic detection system at or near the location of his
hidden cache. The proposed system is hypothesized to perform two simultaneous
functions upon detecting the approach of a person within a defined perimeter:
(1) initiating a Bluetooth Low Energy (BLE) advertisement broadcast detectable
by any consumer-grade mobile device or BLE scanner, thereby providing the
discovering searcher with an unambiguous electronic signal confirming their
proximity to the cache (the function Posey describes as a
"checkpoint") and (2) transmitting a remote alert via a long-range
radio protocol to notify Posey that a searcher has crossed the detection
threshold, explaining his documented awareness of specific proximity events
despite having no physical presence at the site. The architecture proposed is
consistent with commodity, battery-operated hardware (ESP32-class Wi-Fi/BLE
SoCs, Semtech SX1262 LoRa radio, µA-class passive trigger sensors), and is
substantiated by (a) the engineering literature on device-free localization,
radio tomographic imaging, and low-power duty-cycled Wi-Fi CSI sensing; (b)
multiple structural analogs embedded in Posey's memoir; and (c) multiple
statements in the publicly compiled JIBLE 6.0 interview record. The system's
dormant-until-triggered design philosophy aligns with Posey's documented
background in large-scale systems architecture, his narcolepsy diagnosis as a
biographical metaphor for the sleep-wake duty cycle, and the precedents he
establishes in the memoir for layered perimeter detection and multi-modal
biological sensing. The paper argues that recognizing the BLE broadcast
function of the checkpoint fundamentally reframes how a searcher should
approach the final leg of the BTME hunt: the checkpoint is not a physical
landmark to be identified by sight but an electronic signal event to be
detected by instrument.
Keywords: Beyond the Map's Edge, BTME, Wi-Fi CSI, BLE beacon,
device-free localization, radio tomographic imaging, LoRa, wilderness cache
detection, treasure hunt technology, Justin Posey, checkpoint hypothesis
1. INTRODUCTION
Justin M. Posey, software engineer, former Microsoft product developer,
and self-described lifelong treasure hunter, published Beyond the Map's Edge
in 2025 [1]. The memoir describes his decade-long pursuit of Forrest Fenn's
famous bronze chest, his subsequent acquisition of that treasure, and his
creation of a new hunt, the BTME hunt, in which he hid approximately sixty
pounds of gold, gems, coins, and artifacts in the western United States during
2023. The hunt is accompanied by a poem, a legally documented notarized record
of the hiding event, and a cryptographic hash posted publicly in November 2023,
all of which establish the treasure's existence and provenance beyond
reasonable dispute [2].
One of the most distinctive features of the BTME hunt is Posey's
documented claim of a built-in "checkpoint": an event or location in
the hunt's progression that, in his words, will give the finder "zero
doubt" that they are in the right place [3]. Unlike Forrest Fenn's hunt,
where the blaze and other physical landmarks were interpretive and subjective,
Posey explicitly frames the BTME checkpoint as providing unambiguous
confirmation. He has also made a series of public statements that are difficult
to explain under conventional interpretations: that if the checkpoint is found,
he will become aware of it and announce it [4]; that specific searchers have
been "within 200 feet" of the checkpoint [5]; and that he is "at
least aware of people that have been close" [6]. These statements, taken
together, imply that Posey receives real-time or near-real-time information
about searcher proximity to the checkpoint from a source other than searcher
self-reporting.
This paper proposes that the source of this awareness is an electronic
detection and notification system Posey deployed at the cache site;
specifically, a low-power, trigger-activated architecture capable of: (1)
detecting human approach within a defined perimeter radius using passive
sensors and Wi-Fi Channel State Information (CSI) burst sampling; (2)
broadcasting a Bluetooth Low Energy (BLE) advertisement packet to any nearby
device upon detection, providing the searcher with the electronic "checkpoint"
signal; and (3) transmitting a remote owner alert via a long-range LoRa radio
or cellular uplink, notifying Posey of the intrusion event with geographic
specificity. The system is hypothesized to remain in ultra-low-power deep sleep
between events, consuming microamp-level current from a long-life battery, and
to wake only when a passive trigger sensor detects disturbance in its monitored
perimeter.
The case for this hypothesis rests on three independent bodies of
evidence. The first is the published engineering literature on device-free
localization, radio tomographic imaging (RTI), and Wi-Fi CSI sensing
[7,8,9,10,11,12], which demonstrates that the proposed architecture is
technically feasible using commercially available commodity hardware. The
second is Posey's memoir, which contains multiple narratively embedded
structural analogs to the proposed system's key functional layers: the passive
perimeter trigger, the sleep-wake duty cycle, the multi-node detection
topology, the false alarm rejection mechanism, and the remote event-log
retention architecture, many of which are discussed in the context of his
formative experiences and professional background. The third is the JIBLE 6.0
compilation of Posey's public interview statements [13], which contains
specific claims about the checkpoint's nature, Posey's remote awareness of
proximity events, and the hunt's design philosophy that are most parsimoniously
explained by the proposed bilateral detection system.
It is important to note the epistemological status of this paper. The
hypothesis presented here is analytical and inferential; it is not based on
physical access to the cache location or confirmation from Posey. It is offered
as a research framework for serious BTME searchers, consistent with prior Low
Rents Research methodology of applying technical and psychological
analysis to the structure of treasure hunt design. The hypothesis, if correct,
has direct operational implications: a searcher within the detection radius
should be able to identify the checkpoint event through a BLE scan on any
modern smartphone rather than through visual identification of a physical
landmark, and Posey's remote awareness of such events can be treated as
independent validation that a searcher has reached the correct zone.
2. BACKGROUND AND TECHNICAL FOUNDATION
2.1 Device-Free Localization and Radio Tomographic Imaging
Device-free localization (DFL) refers to the class of wireless sensing
systems in which the network itself acts as the sensor, detecting the presence
and position of a person or object without requiring any instrumented tag on
that person's body. Patwari and Wilson's foundational work on RF sensor
networks for device-free localization [7] and their radio tomographic imaging
(RTI) formalization [8] demonstrated that changes in received signal strength
(RSS) across wireless links correlate measurably with the position of an
obscuring body in the link's Fresnel zone. In RTI, multiple spatially
distributed link pairs are combined to reconstruct a spatial loss field,
enabling coarse localization of a person within the monitored volume.
The device-free paradigm is particularly valuable for cache protection
applications because it requires no cooperation from the detected party. An
approaching searcher need not carry a radio tag, activate an app, or announce
their presence; their physical body's interruption of the RF propagation
environment is sufficient to trigger detection. Early RTI implementations used
only RSS measurements. Youssef and colleagues' Nuzzer system [14] demonstrated
that standard Wi-Fi infrastructure (access points and monitoring laptops) could
be reused for passive sensing without custom hardware, establishing the
conceptual basis for repurposing commodity Wi-Fi as a sensing medium.
2.2 Wi-Fi Channel State Information as a Richer Sensing Signal
A significant advance over RSS-based systems came with the exploitation
of Wi-Fi Channel State Information (CSI). Where RSS is a single scalar
aggregate of received power, CSI provides per-subcarrier amplitude and phase
information across all OFDM subcarriers, preserving the frequency-selective
multipath structure of the channel. Espressif Systems' CSI documentation [15]
states explicitly that CSI contains amplitude, phase, propagation delay, SNR,
and channel matrix information unavailable in RSS. Wang and colleagues' CARM
system [16] demonstrated that CSI-based activity recognition, using PCA-based
denoising and DWT-based feature extraction, achieves accuracy above 96% for
human motion classification. SpotFi [17] showed that per-subcarrier phase
information can be exploited for sub-decimeter indoor localization by
estimating time-of-flight and angle-of-arrival from the phase gradient across
subcarriers.
More recent work has focused on generalization and environmental
robustness. Widar3.0 [18] proposed body-coordinate velocity profiles derived
from Doppler information as a domain-independent representation, achieving
strong cross-domain accuracy. SenseFi [19] benchmarked multiple deep learning
architectures for Wi-Fi sensing, while a 2025 survey on Wi-Fi sensing
generalizability [20] organized domain adaptation approaches into
domain-independent features, transfer learning, and few-shot methods. Hernandez
and Bulut's edge sensing survey [21] identified the practical limitations of
laboratory-validated systems deployed in real-world environments, including the
critical observation that outdoor deployments face wind-driven vegetation,
humidity and temperature fluctuations, and non-stationary environmental noise
that necessitate adaptive recalibration and careful link selection.
2.3 Low-Power Architecture: The Trigger-Activated Sleep-Wake Paradigm
The central engineering challenge for a wilderness deployment of any RF
sensing system is power. Commodity Wi-Fi radios are far too energy-hungry to
operate continuously on battery power for multi-year deployments. Espressif's
ESP32-S3 datasheet [22] lists approximately 7–8 µA deep-sleep current versus
approximately 88 mA in Wi-Fi receive mode and roughly 283 mA peak for 802.11n
HT20 transmit. A system running continuously in Wi-Fi receive mode would drain
even a large primary cell within days. The solution established in the
literature and validated through the outdoor RTI work [23] is a two-tier wake
hierarchy: ultra-low-power passive trigger sensors (reed switches at zero
quiescent current; ST LIS2DW12 accelerometers at 50 nA to 5 µA in low-power
mode [24]; Panasonic EKMB PIR sensors at 1.0–1.9 µA [25]) maintain an always-on
perimeter watch, and the Wi-Fi CSI subsystem wakes only when the trigger fires,
collecting a brief burst of channel measurements before returning to deep
sleep.
Under this architecture, with a sleep current of approximately 11 µA
(ESP32-S3 plus trigger sensors plus retained LoRa state) and 10-second CSI
bursts triggered at rates of one to ten per day, a 3.2 V, 3 Ah LiFePO4-class
battery [22] can sustain multi-year operation. The dominant energy cost is
event-driven, not idle; event rate determines lifetime, not quiescent current.
This architecture is the only credible path to long-lived wilderness battery
operation with commodity hardware.
2.4 BLE Advertising as a Searcher-Facing Signal Medium
Bluetooth Low Energy (BLE) advertisement packets are the mechanism by
which BLE-capable devices announce their presence to any scanning listener
within radio range (typically 10–100 meters depending on TX power and
environment) without requiring a prior pairing relationship. BLE advertising is
the foundation of beacon systems (iBeacon, Eddystone), proximity marketing, and
indoor positioning systems. Critically, BLE advertisement scanning is a native
function of every modern smartphone operating system without the installation
of any specialized application; iOS and Android both expose BLE scanning APIs
accessible to standard apps. The Nordic nRF52840 system-on-chip, referenced in
the proposed hardware stack, supports BLE advertisement at 0 to +8 dBm TX power
with 0.4 µA system OFF current [26], making it suitable for both the
trigger-event advertisement broadcast and the low-power maintenance mode
between events.
The ESP32-S3, Espressif's primary CSI-capable SoC, also natively supports
Bluetooth 5.0 and BLE advertisement [22], enabling a unified single-chip
solution for both Wi-Fi CSI sensing and BLE broadcast without requiring a
separate BLE SoC. When a trigger event wakes the ESP32-S3 and the CSI burst
confirms human approach, the same chip can immediately begin broadcasting a
custom BLE advertisement packet encoding a predetermined UUID or payload that a
searching party's device can detect as the checkpoint signal. This broadcast
can persist for a defined window (e.g., 30–300 seconds) before the system
returns to deep sleep, ensuring that a nearby searcher has sufficient time to
identify the signal on their device.
2.5 LoRa as an Owner-Facing Remote Alert Channel
The Semtech SX1262 LoRa radio [27] provides the long-range alert path.
LoRa (Long Range) spread-spectrum modulation achieves link budgets of 150–170
dB, enabling communication ranges of tens of kilometers in open terrain from a
device consuming 45 mA at +14 dBm transmit power and 4.6 mA in receive mode,
with sub-µA sleep current (160 nA cold sleep, 600 nA retained sleep [27]). A
single LoRa alert packet transmitted from a wilderness cache location to a
gateway within range or to a direct point-to-point receiver, and can deliver a
timestamped intrusion notification to Posey's monitoring infrastructure with
the burst energy cost of approximately 0.038 mAh per event at the SX1262's
optimal efficiency point.
Under standard LoRaWAN Class A architecture [28], each uplink is followed
by two short downlink windows, making it suitable for outbound alert telemetry
from a fixed cache node. Where a LoRaWAN gateway is unavailable within range of
the cache site, a direct point-to-point custom LoRa uplink protocol or a
cellular fallback (u-blox ALEX-R5 LTE-M/NB-IoT [29], 0.5 µA PSM idle) can
deliver the alert to any Internet-connected monitoring service. Either path
enables Posey to receive near-real-time notification that a searcher's device
has crossed the detection perimeter, without requiring any searcher action or
self-report.
3. THE BILATERAL NOTIFICATION HYPOTHESIS
3.1 System Overview and State Machine
The proposed system is conceptually a state machine with three primary
states. In the default Dormant State, all major subsystems (Wi-Fi radio,
BLE radio, LoRa TX) are powered down. The ESP32-S3 and nRF52840 MCUs are in
deep sleep. Only the passive trigger sensor tier (reed switches, LIS2DW12
accelerometers, and/or a Panasonic EKMB PIR) remains active, consuming a
combined quiescent current of approximately 2–3 µA. In this state the system is
electronically invisible: no RF emissions, no detectable Wi-Fi beacon, no BLE
advertisement. It may remain in this state indefinitely, consuming
approximately 0.052 mAh per day.
A trigger event, defined as physical vibration at the cache body, lid
disturbance, or thermal motion of a human-sized body within the PIR's field of
view, elevates the system to the Detection State. The ESP32-S3 wakes
from deep sleep (wake latency approximately 300 µs [22]), enables Wi-Fi in
promiscuous mode, and coordinates a 10–20 second time-division multiplexed CSI
burst across its link geometry. Per-subcarrier amplitude and phase data from each
burst packet are processed through a compact feature extraction pipeline
(temporal variance, short-time spectral energy, principal component envelopes)
and compared against a stored site-specific baseline. If the disturbance
signature is consistent with human approach rather than wind, animal, or other
environmental noise, the confidence score crosses the alert threshold and the
system transitions to the Broadcast and Alert State.
In the Broadcast and Alert State, two actions occur in parallel. The
ESP32-S3's integrated BLE radio (or an optionally co-located nRF52840) begins
transmitting BLE advertisement packets on the standard 37/38/39 advertising
channels at a user-configured TX power and interval, encoding a predetermined
service UUID and optional RSSI payload that functions as the checkpoint signal
detectable by any scanning device. Simultaneously, the SX1262 LoRa radio wakes
from retained sleep and transmits an encrypted alert packet upstream, either to
a LoRaWAN gateway or a point-to-point receiver, delivering a timestamped
intrusion notification to Posey's monitoring infrastructure. Both broadcasts
continue for a configurable window before the system returns to the Dormant State
and updates its environmental baseline.
3.2 The Checkpoint as a BLE Signal Event
Under this hypothesis, the "checkpoint" Posey describes in
multiple interviews [3,30,31,32] is not a physical object to be found by visual
search but an electronic signal event to be detected by instrument. Posey
states the checkpoint will provide "zero doubt" [3], a threshold of
certainty that is difficult to achieve with any visually identified physical
landmark, which is always subject to interpretive uncertainty, but is trivially
achievable with a BLE UUID match. A searcher scanning for BLE advertisements on
a modern smartphone who detects a predefined service UUID at increasing RSSI as
they approach the cache site has, by the ordinary standards of electronic
instrument reading, zero doubt about the direction and approximate distance to
the signal source.
The 200-foot proximity statement [5] is particularly significant under
this interpretation. BLE at standard advertising TX power (+0 to +4 dBm)
achieves reliable detection ranges of 50–80 meters (approximately 165–260 feet)
in open outdoor environments with a clear line of sight. A searcher who has
triggered the detection perimeter and entered the BLE broadcast range will
receive a progressively strengthening RSSI reading as they approach. At 200
feet from a +4 dBm BLE transmitter in open terrain, RSSI values in the range of
-80 to -90 dBm are typical, detectable on a standard smartphone but not yet at
maximum strength. The fact that Posey specifically cites "200 feet"
as a meaningful proximity benchmark is consistent with the BLE broadcast radius
of the proposed system. A searcher at 200 feet has entered the BLE detection
envelope; they are receiving the checkpoint signal. Posey knows this because
his LoRa uplink has told him.
3.3 Posey's Remote Awareness: A Necessary Consequence of the Architecture
Posey's repeated public acknowledgments of awareness about searcher
proximity: "If the checkpoint is actually found and I become aware of it,
I will announce it" [4]; "I'm at least aware of people that have been
close" [6]; these statements create an explanatory problem for any
hypothesis that does not posit an active notification mechanism. The BTME hunt
has attracted thousands of searchers. The probability that any given searcher
who reaches the detection zone would self-report to Posey before announcing publicly
or privately to their search community is low. The more parsimonious
explanation is that Posey's awareness is instrument-mediated: the LoRa uplink
from the deployed system delivers him a timestamped notification when a
searcher crosses the detection threshold, independently of any searcher action.
This interpretation also resolves the otherwise puzzling phrasing of
Posey's checkpoint announcement commitment: "If the checkpoint is actually
found and I become aware of it" [4]. The conditional "if I become
aware of it" suggests a mechanism by which Posey becomes aware that is not
guaranteed, consistent with a radio link that may fail (gateway outage, terrain
shadowing, battery depletion) but is otherwise reliable. A searcher
self-reporting, by contrast, would always make Posey aware if they contacted him;
there would be no conditional. The LoRa alert model predicts exactly this
conditional phrasing: the system notifies Posey when it functions correctly,
but the notification may not arrive if the radio link fails.
4. MEMOIR EVIDENCE: STRUCTURAL ANALOGS IN JUSTIN POSEY'S NARRATIVE
Posey's memoir is not a technical manual. It does not describe,
reference, or explain any electronic detection system. Nevertheless, close
reading of the memoir reveals a consistent pattern of embedded structural
analogs to the proposed system's functional layers; analogies so specific that
they suggest not only a familiarity with the underlying principles but an
authorial intent to encode them into the memoir's narrative texture. What
follows is a systematic analysis of the most significant of these analogs,
organized by functional layer.
4.1 The Trigger Layer: Dad's Tin Can Perimeter System
In the chapter entitled "The Bandit Banquet," Posey describes
his father's response to the family's recurring raccoon problem. After repeated
overnight raids on the vegetable garden, the elder Posey installed what the
memoir calls a "sophisticated early warning system": tin cans
"strewn like metallic confetti" throughout the garden perimeter [1].
The cans served as a passive, zero-power, mechanical intrusion detection
network: inert objects physically distributed around a protected asset that
produce an auditory alert signal only when physically disturbed by an intruder
crossing the boundary.
This is the mechanical precursor of the proposed system's trigger layer.
The paper's recommended trigger hardware includes reed switches drawing zero
quiescent current at the switch element, LIS2DW12 accelerometers drawing 50 nA
in power-down mode and 0.38–5 µA in low-power mode [24], and Panasonic EKMB PIR
sensors drawing 1.0 µA in sleep mode [25]; these are the electronic equivalents
of the tin cans: passive, always-present, consuming negligible energy, and
producing an alert only when physically activated by intrusion. The philosophy
is identical: do not waste energy monitoring when nothing is present; let the
environment itself signal the detection event.
The memoir also records the logical conclusion of a single-tier perimeter
defense: the raccoons eventually defeat the tin cans by learning to circumvent
the boundary. Professor Pudge, the largest raccoon in the family's recognized
hierarchy, "demonstrated the art of sliding open our patio door" [1],
bypassing the perimeter entirely to access the interior of the house. This
defeat of the single-mode perimeter maps directly to the paper's argument for
multi-layer detection: the trigger tier provides the first alert, but the CSI
burst layer runs the secondary discriminating analysis that can distinguish
between a raccoon (low mass, low thermal signature, non-human motion pattern)
and a person, just as the paper recommends fusing PIR, accelerometer, and CSI
signatures to reduce false alarms and circumvention risk.
4.2 The Sleep-Wake Duty Cycle: Narcolepsy as a Living Power Budget
The chapter "The Sleep Study" documents Posey's diagnosis with
narcolepsy following his wife's insistence on a clinical evaluation [1]. The
chapter is the memoir's most technically precise metaphor for the proposed
system's power management architecture, and it merits detailed analysis.
The Multiple Sleep Latency Test (MSLT), the diagnostic instrument used in
Posey's evaluation, measures sleep latency, defined as the time interval from
active wakefulness to confirmed sleep onset, and the presence of REM sleep at
or near the beginning of each sleep episode. In the clinically normal
population, sleep latency is 10–20 minutes with REM sleep delayed or absent in
daytime nap episodes. Posey achieves sleep onset in two minutes flat with
immediate REM at every measurement opportunity. He describes the technician's
reaction: "You don't even realize you're falling asleep, do you?" [1]
The ESP32-S3 in deep sleep achieves approximately 7–8 µA total system
current [22], with the wake-from-deep-sleep latency on the order of 300 µs. The
system goes dormant almost instantaneously when released from active
processing, consuming negligible power in the interim, and requires an external
interrupt (the trigger sensor's GPIO wake signal) to return to active state,
exactly the behavior the MSLT documents in Posey's biology. His narcoleptic
episodes are not failures of regulation; they are optimal energy management.
The system allocates zero resources to maintaining wakefulness when no task
demands attention, and returns to full processing capability within
milliseconds of an external demand.
The clinical structure of the MSLT itself maps to the proposed system's
operational cycle. The test consists of five scheduled nap opportunities of 20
minutes each, during which the technician monitors the subject and wakes them
at the first confirmed REM onset. The technician is functionally the trigger
event; the nap window is the burst window; the waking interruption is the
controller pod ending the burst and returning the node to deep sleep. Posey
enters dormancy within 2 minutes at each opportunity, the technician detects
the state transition and interrupts, and the cycle repeats. This is the
proposed system's sleep-wake-burst-sleep loop operating at biological
timescales.
The chapter's conclusion amplifies the technical parallel. In the same
clinical appointment where Posey receives his narcolepsy diagnosis, he learns
of his father's death from brain cancer. He reflects: "Life, with its
merciless tick and tock, waits for no one, not even those lost in the depths of
an unbidden dream" [1]. The paper's power budget calculation makes the
same statement in engineering terms: every percentage point of active Wi-Fi
time is energy that cannot be recovered; the system's longevity depends on the
discipline of its dormancy. Posey's narcolepsy is not incidental to the
memoir's structure; it is the memoir's most intimate expression of a systems
design principle that governs the proposed hardware at every operational level.
4.3 Tucker as a Living CSI Pipeline: The Snout Scout
"The Snout Scout" describes Posey's multi-year project to train
his vizsla, Tucker, to detect buried bronze by scent [1]. The chapter's
narrative arc maps the full signal processing pipeline of the proposed
detection system in biological terms, and the methodological rigor Posey
describes is strikingly parallel to the paper's evaluation protocol.
Tucker's olfactory system is a high-dimensional sensor array: 300 million
olfactory receptors (compared to six million in humans) producing continuous,
parallel signal streams across multiple chemical detection channels
simultaneously. The proposed CSI system captures per-subcarrier amplitude and
phase across 52–256 OFDM subcarriers per packet [15], producing a similarly
high-dimensional parallel signal stream. Tucker does not detect bronze through
a single molecular receptor; he detects a characteristic chemical profile: a
multi-dimensional covariance signature distinguishable from the ambient
environmental baseline. The CSI system does not detect intrusion through a
single RSSI reading; it detects a characteristic disturbance pattern across
subcarriers and time [16].
Posey's training methodology is notable for its technical rigor. He wore
latex gloves during every training session "to eliminate my own scent from
the test" [1], thereby removing a confounding signal from the training
environment so Tucker's classifier would not learn to associate the operator's
presence with bronze detection. This is the biological equivalent of the
paper's gain compensation step [15], in which automatic gain control artifacts
are removed from the CSI pipeline before feature extraction so that the
classifier responds to environmental disturbance rather than operator-induced
channel changes. Posey also left bronze samples outdoors to weather and oxidize
for a full year before beginning field validation tests [1], establishing a
training sample set that matched the spectral profile of an aged,
environmentally exposed bronze cache, directly equivalent to the paper's
recommendation to collect site-specific negative data under real environmental
conditions before calibrating detection thresholds [21].
The field validation protocol, comprising twelve bronze samples buried at
varying depths and GPS-logged coordinates with Tucker performing a blind
search, is the paper's controlled-field evaluation methodology applied to a
biological sensor [19]. Tucker achieved detection of all twelve samples,
including the deepest, with a brief hesitation period on the deepest sample
before sitting and locking eye contact to signal a confirmed find. The paper
identifies exactly this uncertainty-proportional latency in its discussion of
confidence-threshold crossing: a deeper, more attenuated target produces a
lower initial confidence score that requires additional burst cycles to clear
the alert threshold, resulting in longer time-to-alert but ultimately the same
detection outcome [23].
4.4 The Home Depot Hound: Device-Free Localization in a Complex Environment
"The Home Depot Hound" describes Tucker's unauthorized
departure from Posey's vehicle in a shopping center parking lot, his navigation
through two unsecured parking areas and an automatic entry system, and his
successful location of Posey in the hardware department of a large-format
retail store [1]. Tucker performed this navigation without a map, without
explicit instruction, and without any electronic aid; Tucker used scent
gradient following to track the propagation of a chemical signal through a
complex multipath environment crowded with ambient human traffic, air handling
systems, and shelf-obstructed sightlines.
This is a behavioral demonstration of device-free passive localization.
The paper cites Wilson and Patwari's foundational formulation [8]: "The
sensing system does not literally 'see' the target; it infers the target from
how the radio field changes across links and time." Tucker does not see
Posey; he infers Posey's position from how the scent field changes as he moves
through the store's spatial domain. His search behavior, characterized by broad
initial sweeps narrowing to directed convergence, mirrors the paper's
description of the RTI reconstruction process: a coarse spatial loss field is
estimated from multiple link pairs, and the region of maximum disturbance is
progressively localized through additional measurement iterations [8].
The practical implication of this parallel is significant. Posey trained
Tucker to locate buried bronze by scent using the same biological mechanism he
demonstrates in the Home Depot. He then extended that capability to the
wilderness, where Tucker located twelve buried samples in open forest terrain.
A Wi-Fi CSI detection system around a buried or surface-concealed bronze cache
operates on the same physical principle: detecting the disturbance to the
electromagnetic propagation environment caused by a human body approaching the
cache, rather than detecting the cache itself. Tucker and the proposed CSI
system are solving the same inverse problem through different sensing
modalities.
4.5 Multi-Node Topology: The Aft Assault and the Grizzly Gathering
Two chapters in the memoir address the vulnerability of single-node
detection through direct narrative demonstration. In "The Aft
Assault," Posey is fly fishing on Grasshopper Creek, completely absorbed
in observation of a large trout in front of him [1]. His sensor, attention, is
directed forward. A badger attacks from the rear. The assault is total and
effective because no sensor covered the approach vector. Posey sustains a bite
wound and loses his rod before he can respond.
This paper's recommended multi-node topology creates multiple pairwise
CSI links that collectively cover the protected zone from multiple angles
[8,23], specifically to eliminate the directional gap that cost Posey in this
chapter. No single approach vector goes unmonitored across all six link pairs
simultaneously. The engineering lesson of the badger attack is expressed in the
paper's link count formula: for N nodes, pairwise link count scales as
N(N-1)/2, so the transition from one node (zero links, no coverage) to three
nodes (three links, minimum practical coverage) to four nodes (six links,
recommended coverage) represents a qualitative improvement in angular coverage
that directly addresses the single-direction monitoring failure.
In "The Grizzly Gathering," Posey, his stepfather Gary, and
Tucker encounter three separate grizzly bears in a single afternoon along the
North Fork of the Blackfoot River [1]. Each encounter occurs at a different
spatial location and is detected by a different member of the party: Gary spots
the first bear upstream before Posey sees it; Tucker detects the third bear
near the truck before any human can see or hear it; Gary again provides the
alert for the second bear. The distributed detection team functions as a
multi-node sensor network, with overlapping fields of awareness and
complementary detection modalities (visual for Gary, olfactory for Tucker)
providing coverage that no single node could maintain alone.
Gary's warning, shouted across the water when Posey cannot see the
approaching bear, is the LoRa alert packet: a short, high-priority message
delivered over distance to a receiver who would otherwise have no awareness of
the event. Tucker's low growl and hackled stare toward the treeline is the PIR
sensor firing before the visual link registers the intrusion; this represents
the ultra-low-power first-tier sensor detecting the thermal signature of a
large body before the secondary confirmation system can run. The structure of
the afternoon's events demonstrates, through lived experience, the value of the
layered multi-node detection architecture the paper formalizes.
4.6 False Alarm Architecture: The Stormy Stakeout and the Postal Pilgrimage
The memoir's most detailed treatment of the false alarm problem appears
in "The Stormy Stakeout," which describes a two-night covert
surveillance operation Posey conducted at a housesitting assignment [1]. The
operation's structure is a direct, if accidental, analog of the paper's outdoor
detection evaluation protocol: a two-node detection team (Posey and his wife
Jennie), a wired communications link (the telephone), a camera sensor, adverse
weather conditions (a monsoon), and real-time intelligence exchange about a
suspected intruder.
The resolution is that the "intruder" is a patio umbrella with
a crank handle, oscillating in the monsoon wind and illuminated obliquely by
porch light at a specific distance and approach angle that produces a humanoid
signature. Advance toward it and it disappears; retreat and it reappears. This
precisely models the outdoor CSI false alarm phenomenon described in Hernandez
and Bulut [21] and the microchanges paper by Turetta et al. [12]: wind-animated
objects (foliage, patio furniture, loose signage) create motion signatures in
the RF propagation environment that are locally indistinguishable from human
motion when observed from a single viewpoint at a specific angle. The
multi-link fusion approach the paper recommends, which requires a persistent
signature across multiple link pairs rather than a single-link detection, would
have rejected the umbrella false positive, because the umbrella's oscillating
signature would appear at different intensities and phases across different
link pairs and would not cohere into the spatially consistent intrusion
signature of a human body.
"The Postal Pilgrimage" addresses the complementary problem of
false negative suppression through overly aggressive alarm dismissal. Posey
hears a rattlesnake rattle twice on his grandfather's driveway, retreats twice,
and is twice told by his grandfather that his mind is playing tricks on him
[1]. On the third approach, two snakes in courtship are confirmed at close
range, validating the original detection entirely. The grandfather's dismissal
policy of treating all unconfirmed alerts as false positives produces a
systematic false negative bias that would have been costly had Posey been less
cautious. The paper addresses this calibration challenge explicitly,
recommending that the full operating ROC curve be presented rather than a
single threshold point, and that the final threshold be justified by the
operator's tolerance for missed intrusions versus nuisance dispatches [23].
4.7 Event Logging and the Black Box: The Midnight Menace
"The Midnight Menace" describes the shooting of Posey's
mother's locomotive near Maricopa, Arizona, by a person whose license plate
happened to fall from his vehicle at the crime scene [1]. The subsequent legal
case collapses not for lack of a suspect but because Union Pacific Railroad
failed to download data from the locomotive's event recorder (the "black
box" that logs precise GPS coordinates, speed, and timestamped events)
before the retention window closed. Without the event recorder data, the
railroad cannot contradict the shooter's claim that the crime occurred at a
different location. The case moves to federal jurisdiction and dissolves.
This chapter is a direct biographical encoding of the paper's firmware
design requirement that "the firmware must copy the data immediately [from
the CSI callback buffer] if it is needed later" [15]. The CSI callback
buffer is deallocated after the callback returns, the Wi-Fi equivalent of the
event recorder's rolling overwrite window. The engineer who does not implement
bounded event retention and immediate buffer copy makes the same error Union
Pacific made: the data existed, the retention window was finite, and the
retrieval opportunity was missed. Posey learned from his mother's professional
life what it costs when the black box data is not captured in time. The legal
architecture he built for the BTME hunt, comprising notarized documents,
cryptographic hashes posted publicly, and a designated steward holding split
key material [2], reflects exactly this lesson, applied to treasure hunt
documentation rather than railroad incident investigation.
4.8 The Systems Architect: The Obsession's Oath
"The Obsession's Oath" is the memoir's most direct statement of
Posey's professional identity as a large-scale systems architect. He describes
building "high-throughput, low-latency ingestion systems that process
petabytes of data" [1] at Microsoft and subsequent employers, monitoring
distributed systems for latency and anomalies, and building streaming
architectures that serve millions of concurrent users. He describes the South
Korean banking collapse caused by an ActiveX vulnerability as a professional milestone:
"a single flaw in ActiveX controls had brought a nation to its
knees." [1]
The packet storm incident at Microsoft, in which Posey inadvertently
created a network denial-of-service condition by plugging both ends of a
network cable into the same switched network, is a specific technical
experience that maps to the paper's failure mode analysis for multi-node CSI
systems [23]. A network cable loop creates a broadcast storm in which every
packet is reflected and amplified until bandwidth is saturated. Insufficiently
synchronized CSI nodes broadcasting simultaneously on the same channel create
an equivalent condition in the RF domain, degrading detection performance
through self-interference. Posey experienced this failure mode at scale before
designing any wilderness detection system, and would have applied its lesson to
node timing architecture.
His transition from software engineering to treasure hunting, described
at the chapter's conclusion, is framed as the recognition that the same
systems-thinking skills apply to physical puzzle design as to software
architecture: finding vulnerabilities others have missed, extracting covert
information from observable signals, and engineering solutions for environments
where the adversary is not a software bug but a physical system that actively
resists measurement [1]. This self-description is the most direct evidence in
the memoir that Posey brings professional-grade systems design capability to
the BTME hunt's technical infrastructure, including any detection system he may
have deployed.
5. JIBLE EVIDENCE: INTERVIEW STATEMENTS SUPPORTING THE HYPOTHESIS
The JIBLE 6.0, compiled by community researcher @jessinthewest with
support from @hi-imerica and @k, represents a comprehensive indexed record of
Posey's public statements across 22 identified interview sources from 2023
through May 2026 [13]. The following statements are directly germane to the
proposed bilateral detection hypothesis.
5.1 The Checkpoint as an Unambiguous Confirmation Event
Posey introduced the checkpoint concept in the April 2025 Mysterious
Writings interview, stating: "My treasure hunt has a built-in checkpoint
that will give you zero doubt that you are in the right place" [30]. The
language "built-in" is architecturally significant, suggesting a
designed feature of the hunt's infrastructure rather than an incidental
physical feature of the landscape. A GPS coordinate, a rock formation, or a
tree blaze would not typically be described as "built-in" to a hunt;
electronic hardware physically installed at the site would be. The phrase
"zero doubt" sets a certainty threshold that matches an electronic
signal confirmation (UUID detection) rather than the interpretive certainty
achievable from visual landmark identification, which is always subject to
ambiguity about whether the searcher has correctly identified the intended
object.
In the Dillon, Montana book-signing Q&A (June 21, 2025) [31], Posey
confirmed that the poem mentions the checkpoint in the sense that the
checkpoint is "a stage of your journey," a waypoint in the path
encoded by the poem's clues. In the Cowlazars and Kpro interview (March 31,
2025), he confirmed that "there are physical objects that you can find
along the way" [32]. Under the proposed hypothesis, the physical objects
are the deployed sensor nodes, hardware components physically present in the
environment that a careful searcher might observe, and the checkpoint is the
BLE broadcast event that those nodes initiate upon detecting approach.
5.2 Posey's Remote Awareness of Proximity Events
The most operationally specific statement in the JIBLE record appears in
Posey's Facebook and Twitter post of August 1, 2025: "Some people have
been within 200 feet of the checkpoint" [5]. This statement implies
precise spatial knowledge of searcher positions at a specific time, knowledge
that Posey possesses despite being physically absent from the search area. As
discussed in Section 3.3, this precision is most parsimoniously explained by
the LoRa uplink notification architecture, which would deliver a timestamped
alert with the knowledge that the detection perimeter (approximately 5–10
meters) has been crossed, implying the searcher is within the system's
protective radius and hence within BLE broadcast range (approximately 50–80
meters, or 165–260 feet), of the cache.
Posey's July 11, 2025 Facebook post reinforces this interpretation:
"Many people have claimed to have found the checkpoint... If the
checkpoint is actually found and I become aware of it, I will announce it"
[4]. The passive construction "I become aware of it" is telling. If
awareness depended on searcher self-report, Posey would naturally phrase this
as "If someone contacts me" or "If someone tells me they've
found it." The passive construction is consistent with automated
notification: a system that makes Posey aware without requiring any action from
the searcher or from Posey himself. The conditional "if I become aware of
it" accommodates the possibility of alert delivery failure (gateway
outage, radio link shadowing, battery depletion) while maintaining the general
reliability of the notification architecture.
In the March 2026 X Marks the Spot interview [6], Posey was asked
directly whether he is aware of anyone who has been to the checkpoint. He
replied: "I'm at least aware of people that have been close." The
phrasing "at least aware" and "close" suggests a graduated
spatial awareness consistent with the detection system's perimeter geometry.
People who crossed the outer trigger perimeter activated the system and
generated a LoRa uplink; Posey knows they were "close" but cannot
confirm from the alert alone whether they identified the BLE broadcast signal,
because that would require the searcher to act on the signal by approaching the
cache.
5.3 Redundant Solve Architecture and Engineering Safeguards
In the Sandal Sanders TikTok interview (September 27, 2025) [33], Posey
was asked whether there are multiple solves in the hunt. He replied: "I
felt like it's kind of like safeguards, you know, in case certain aspects of
the treasure hunt mechanics don't work for whatever reason, then there are
other ways to approach it so that you end up finding it either way." [33]
The phrase "treasure hunt mechanics" is an engineering descriptor: it
refers to the functional components of the hunt's design rather than its
narrative or poetic content. Mechanical safeguards are designed for systems
that might fail; Posey's language implies that the hunt contains components
whose failure he anticipated and compensated for with redundant paths.
This is precisely the paper's architectural argument for the four-node
square topology over the two-node single-link configuration [8,23]. Multiple
pairwise links provide redundancy against individual node failure (battery
depletion, water ingress, physical damage) so that the detection function
persists even if one node in the network becomes inoperative. Multiple solve
paths provide redundancy against individual clue interpretation failure, so
that the search succeeds even if one stage of the puzzle resists resolution. In
both cases, the designer's stated rationale is identical: "in case certain
aspects of the mechanics don't work for whatever reason."
6. SYSTEM DESIGN IMPLICATIONS FOR SEARCHERS
6.1 BLE Scanning Protocol
If the proposed hypothesis is correct, any searcher who has reached the
correct general area of the cache should equip themselves with a BLE scanning
application on their primary mobile device. Several no-cost applications
provide full BLE advertisement scanning with RSSI display and UUID
identification across both iOS and Android platforms, including nRF Connect
(Nordic Semiconductor), LightBlue (PunchThrough), and BLE Scanner (Bluepixel
Technologies). The searcher should enter the application's scanning mode while
moving through the final approach zone and monitor for any advertisement packet
that: (a) does not correspond to a known commercial device in the vicinity; (b)
presents a consistent UUID across multiple scans; and (c) increases in RSSI as
the searcher advances toward the suspected cache location.
Because the system is hypothesized to be dormant until triggered, a
searcher who passes through the detection perimeter without being detected (for
example, by moving too quickly, or approaching at a time when the PIR trigger
has not fully armed) may not receive the BLE broadcast. A systematic approach
that includes pausing within the estimated detection radius for 30–60 seconds
before scanning is recommended, as this gives the trigger sensor time to
confirm the thermal or motion event and the CSI burst time to evaluate the
disturbance signature before the broadcast state is initiated.
6.2 Directionality of the RSSI Signal
BLE RSSI values decrease logarithmically with distance in free space,
following approximately a -20 dB per decade relationship with modifications for
local environmental multipath. A searcher who scans and detects a
non-commercial BLE advertisement can use the RSSI value as a directional guide
by moving in each of four cardinal directions for 10–15 meters and noting which
direction produces increasing RSSI. The direction of maximum RSSI increase is
the bearing toward the transmitting node. Multiple directional samples taken
from different positions can triangulate the node's approximate location using
manual bearing intersection, a technique that requires no specialized equipment
beyond the BLE scanning application and a compass.
The magnetic anomaly hypothesis discussed in Section 5.4 suggests that a
compass may behave erratically near the final cache location, consistent with
the Netflix hint. If compass behavior is anomalous in the final approach zone,
a searcher should be aware that traditional magnetic bearing techniques will be
unreliable and should rely on the BLE RSSI gradient rather than compass-based
triangulation.
6.3 Environmental and Seasonal Considerations
The proposed system's dormant state will appear identical to an absent
system under all external observation: no RF emissions, no BLE advertisement,
no detectable Wi-Fi beacon. A searcher scanning for BLE in the detection zone
during periods when the system is dormant (between trigger events) will detect
nothing. This creates an important operational implication: a null scan result
does not disprove the hypothesis. It may simply indicate that the searcher has
not yet activated the system's trigger. Only a positive detection, specifically
a stable, non-commercial BLE advertisement with increasing RSSI as the searcher
approaches, constitutes evidence relevant to the hypothesis.
Posey has stated in multiple interview contexts [35] that the cache
should not be searched in snowy conditions, and that seasonal access varies.
The detection system's battery, if a LiFePO4-class chemistry as proposed, is
rated for operation down to -20°C but will exhibit capacity derating in cold
temperatures [22]. If the system has been deployed since 2023 without
servicing, battery state is a genuine operational variable. The system may have
entered a low-battery protection state that prevents normal triggering while
preserving the stored baseline in non-volatile memory. This eventuality would
be consistent with Posey's ability to know that people have been
"close" in prior seasons while being unable to confirm checkpoint
detection in more recent search attempts.
6. THE TWO-TRIP DEPLOYMENT TIMELINE AS CORROBORATING EVIDENCE
Posey discloses in "The Treasure" chapter of his memoir that
hiding the cache required two separate journeys, each exceeding 4,500 miles,
for a combined travel distance of over 9,000 miles [1]. He describes the first
trip as "essentially a dry run, a rehearsal for madness" undertaken
to verify that his plan was feasible before committing to the irreversible act
of placement. He states that the first trip allowed him to "get the kinks
worked out," and that only after completing it did he set out a second time
to "hide my treasure somewhere along my journey." [1] The second
trip, conducted with heightened security consciousness including the use of a
disguise when observed, was the trip during which the cache was actually
placed.
The memoir's description of the first trip is notably sparse on
specifics. Posey does not describe finding a hiding location on that trip, does
not describe arriving at a final destination, and does not describe returning
home with any confirmed outcome beyond the decision to proceed. He went, he
assessed, and he returned. Under a conventional interpretation, this is simply
a scouting trip: Posey visited the candidate location, evaluated it, and
departed without placing the cache. This interpretation is adequate but
incomplete. It does not explain why a journey of 4,500-plus miles was necessary
for reconnaissance that could, in principle, have been accomplished through
satellite imagery, topographic maps, and land status databases that Posey
demonstrably had access to through his research capabilities.
The bilateral detection hypothesis provides a more complete explanation
of the first trip's purpose. Under this framework, the first trip served three
functions that could not be performed remotely: physical site assessment for
sensor node placement geometry; deployment and physical installation of the
detection hardware; and initiation of a calibration and baseline-building
period before the cache was placed. Each of these functions required physical
presence at the site, and none of them required placing the cache on the same
trip. The second trip was therefore not the first time Posey visited the site
but the second: the trip during which, with the detection system already
installed, operational, and calibrated, he placed the cache within the system's
protective perimeter and verified that the bilateral notification architecture
was functioning correctly before departing.
6.1 Hardware Deployment Logistics
Physical deployment of a multi-node wireless sensor network in a
wilderness environment requires on-site activities that cannot be abbreviated
without compromising system integrity. Node placement geometry must be walked
to confirm that the desired link pairs cross the protected zone with sufficient
clearance, and that foliage, terrain features, and soil composition do not
create dead zones in the detection field [9]. Physical enclosures must be
mounted or buried to protect against water ingress, condensation, and UV
degradation, as the paper's reference design recommends IP-rated enclosures
with conformal coating and desiccant for all outdoor nodes [22]. Antenna
orientation must be verified in situ for each node, since ground reflection,
nearby conductive surfaces, and vegetation proximity all affect radiation
pattern in ways that cannot be predicted from maps alone.
Beyond placement, the initial calibration protocol requires time on-site.
The paper recommends collecting at least several days of negative data in
ordinary weather before enabling real alerts [10], specifically to build a
site-specific environmental baseline that reflects the location's actual
multipath geometry, diurnal temperature cycle, prevailing wind conditions, and
typical vegetation movement. A detection system calibrated on the day of cache
placement would have no environmental baseline against which to compare
incoming CSI measurements; every wind gust, passing animal, or
temperature-driven foliage movement would register as a potential anomaly until
the baseline stabilizes. The paper addresses this directly: threshold
revisiting is required after temperature swings, rain, and major vegetation
change, and a post-rain recalibration window is recommended before restoring
normal thresholds [9,10].
These requirements are consistent with a first trip of multi-day duration
that ends without cache placement: Posey arrives, installs the hardware, runs
initial calibration passes, verifies the LoRa uplink alert path to his
monitoring infrastructure, and departs with the system running but no cache in
place. The 4,500-mile travel distance suggests the site is not near any of
Posey's known residential or professional locations, consistent with his stated
intent to minimize the number of people who saw him traveling toward the site
[42]. A site requiring such deliberate, circuitous travel, chosen in part for
its remoteness from traceable travel patterns, would also be a site where
driving out once for deployment and again for cache placement is a practical operational
necessity rather than an inefficiency.
6.2 The Calibration Period Between Trips
If the first trip deployed the detection hardware and initiated the
baseline calibration period, the interval between the two trips served as the
system's environmental seasoning window. The outdoor RTI literature documents
that site-specific environmental baselines require exposure to the full range
of local conditions, including seasonal temperature variation, precipitation
events, wind patterns at different times of day, and animal traffic, before
detection thresholds are stable enough to reliably discriminate human approach
from environmental noise [9,11]. A system deployed in early-season conditions
and left to run for weeks or months before cache placement would, by the time
of the second trip, have accumulated a statistically robust environmental baseline
covering the expected range of ambient conditions at that location.
Posey's memoir description of the interval between the two trips is
consistent with this interpretation. He does not describe the period as idle;
he describes it as a time during which his appetite for the project intensified
rather than diminished, suggesting ongoing engagement with the project's
progress. Under the deployment hypothesis, this engagement would have included
monitoring the LoRa uplink telemetry from the deployed system, reviewing the
environmental baseline data accumulating in the node logs, and adjusting
detection thresholds remotely based on the observed false-alarm rate during the
seasoning period. This remote monitoring function is a native capability of the
proposed architecture: the LoRa uplink can transmit periodic health pings, battery
voltage readings, and aggregated baseline statistics to Posey's monitoring
infrastructure on a scheduled basis without requiring any trigger event.
The calibration period hypothesis also explains a detail of the memoir
that is otherwise puzzling: Posey's characterization of the first trip as
having "gotten the kinks worked out." [1] In the context of a simple
scouting trip, there are no kinks to work out beyond evaluating whether the
candidate location meets his criteria, a determination that would be made
within hours of arrival. In the context of a hardware deployment, kinks is a
natural engineering descriptor for the unexpected complications that arise
during field installation: a node placement that produces insufficient link
geometry, a PIR sensor whose field of view is blocked by a terrain feature, a
LoRa gateway range test that requires antenna repositioning, or a baseline
calibration that reveals unexpectedly high environmental noise requiring
threshold adjustment. Working out these complications over the course of the
first trip, then verifying the corrected system performs as designed during the
inter-trip monitoring period, is exactly the bench-to-field evaluation
progression the paper recommends [9].
6.3 Cache Placement Within the Operational System Perimeter
The second trip's primary purpose, under the bilateral detection
hypothesis, was to place the cache within the detection perimeter of the
already-operational system and to verify the end-to-end alert chain from
detection event through LoRa uplink to Posey's monitoring infrastructure. This
verification would have required Posey to approach the cache site from the
expected search vectors, confirm that his own approach triggered the detection
system by receiving his own LoRa alert notification, verify that the BLE
advertisement broadcast initiated correctly and was detectable at the expected
range on a scanning device, and confirm that the system returned to the dormant
state after the burst window expired. Only after this end-to-end verification
would placing the cache within the perimeter be operationally sensible; a cache
placed before the detection system is confirmed functional provides no
protection during the critical early period after placement.
The memoir's description of the second trip is again sparse on
operational detail, consistent with Posey's intent to maintain the secrecy of
his route and methods. He notes that he traveled farther than strictly
necessary and used a circuitous route [1]. He also discloses that by the time
of the second trip he was operating with a broken tibia, sustained in a jack
failure while helping a neighbor with a moving truck. The physical impairment
would have affected the approach path he used to reach the cache site and,
notably, would have produced an asymmetric gait that differs from the normal
bipedal approach signature the detection system's classifier was calibrated
against. This is a meaningful operational detail: if the system was calibrated
on normal-gait approach patterns during the inter-trip seasoning period,
Posey's injured approach on the placement trip would have generated an atypical
motion signature. A competent systems engineer in Posey's position would have
accounted for this by temporarily disabling or adjusting the classifier during
the placement visit, adding a concrete procedural step to the second trip's
operational timeline that is consistent with the deployment hypothesis and has
no equivalent under the conventional scouting interpretation.
6.4 Consistency With Posey's Stated Security Protocol
Posey's description of his travel security measures on both trips is
consistent with the operational security requirements of a hardware deployment
mission rather than a simple cache placement mission. He describes going
completely off-grid on both trips, leaving no digital breadcrumbs, using a
disguise when observed, and deliberately routing through unnecessary distance
to obscure his destination [1]. In the Seekers Summit Q&A (March 2026)
[42], he elaborated that anonymous travel in the United States is difficult
because license plates are captured by numerous commercial and governmental
camera systems, creating a travel record even for drivers who take no active
steps to be observed. His stated solution was a very convoluted and very
deliberate route undertaken twice.
The operational security concern about travel record creation is more
acute for a hardware deployment trip than for a cache placement trip. A cache
placement trip produces a historical record that points to the cache's general
region but does not require any future revisit; once the cache is placed, it is
placed. A hardware deployment trip, if it produces a discoverable travel
record, points to a site that will be revisited in the future, doubling the
eventual exposure and allowing route correlation across multiple visits.
Posey's evident awareness of traffic camera systems and his willingness to add
4,500-plus miles of deliberate circuitous routing suggests a security calculus
proportional to ongoing rather than one-time exposure. The two-trip architecture,
under the deployment hypothesis, represents the minimum visit count necessary
to deploy a functional bilateral detection system: one trip to install and
calibrate, one trip to verify end-to-end function and place the cache. Any
additional trips increase the probability of route correlation across multiple
discoverable travel records, which is precisely the risk Posey's memoir
indicates he was most focused on managing.
7. DISCUSSION
7.1 Alternative Hypotheses
The most obvious alternative hypothesis is that Posey's awareness of
searcher proximity derives entirely from searcher self-report, social media
monitoring, and inference from the pattern of public search activity. Under
this interpretation, "within 200 feet" is an estimate based on
publicly reported search locations rather than instrument measurement, and the
checkpoint is a physical landmark that a searcher finds by sight. This
hypothesis is consistent with some of the evidence but struggles with the specificity
and precision of the 200-foot claim, the passive "become aware"
construction in Posey's checkpoint announcement commitment, and the
"built-in" language applied to the checkpoint feature; three separate
phrasings that, individually, might be explained away but collectively suggest
an active notification mechanism rather than passive social media monitoring.
A second alternative is that the checkpoint is a physical object Posey
placed (a sealed container, a marker stone, or a specific arrangement of
natural materials) whose discovery is confirmed to Posey when a searcher who
has found it contacts him with a photograph or description. Under this
interpretation, the "zero doubt" threshold is achieved by the
unambiguous distinctiveness of the object (e.g., a manufactured item in a
wilderness context). This hypothesis cannot be fully ruled out, but it does not
explain the "built-in" language or the passive awareness
construction, and it requires a level of searcher discipline (immediate and
private contact with Posey before any public announcement) that is inconsistent
with the behavior patterns observed in other treasure hunt communities.
The electronic bilateral detection hypothesis advanced in this paper
remains the most parsimonious unified explanation of the totality of the
evidence, including Posey's professional background, the memoir's structural
analogs, the JIBLE's specific proximity claims, the "built-in"
checkpoint language, and the passive awareness construction. It is not,
however, the only plausible interpretation, and its empirical confirmation
requires either physical access to the cache site or a direct admission from
Posey.
7.2 Ethical and Legal Considerations
The proposed detection system, if deployed on publicly accessible
wilderness land, raises questions under FCC Part 15 unlicensed device
regulations. Under 47 CFR §15.247 [36], digital-modulation systems operating in
the 2400–2483.5 MHz band (Wi-Fi and BLE) may not cause harmful interference and
must accept any interference received, with a maximum peak conducted output
power of 1 W for qualifying systems. BLE advertisement at standard power levels
(0 to +8 dBm) and Wi-Fi CSI at standard 802.11 power levels are well within
Part 15 limits. LoRa sub-GHz operation in the 902–928 MHz band is similarly
compliant under §15.247 at the power levels proposed. The proposed system's
brief duty-cycled transmissions (BLE advertising for short windows and LoRa
uplinks of milliseconds duration) represent minimal interference contribution
to the shared spectrum environment.
The physical placement of unattended electronic equipment on public land
is subject to the jurisdiction of the relevant land management agency. Posey's
legal disclosures confirm that the cache was placed on land that was
"legally accessible at the time of abandonment" and that land status
"may change over time" [2]. The BTME rules prohibit the use of metal
detectors in areas where they are prohibited by law [2], but do not address BLE
scanning, which requires no physical disturbance of the environment and is not
regulated by any current land management rule applicable to wilderness
recreation. A BLE scanning application is a passive receiver function; it does
not transmit in the standard scanning mode and creates no interference with the
environment.
7.3 Contribution to BTME Search Methodology
If the bilateral detection hypothesis is correct, it reframes the final
stage of the BTME search in a way that has immediate methodological
consequences. The conventional approach to treasure hunt endgame searches is
visual: the searcher examines the environment for physical markers, distinctive
geological features, or placed objects that match the clues' description. The
proposed hypothesis suggests that the correct endgame approach is instrumental:
the searcher carries a BLE scanning device, enters the estimated final zone,
and waits for a signal event rather than searching for a visual indicator.
This distinction may explain why some searchers who have reached the
correct general area have not found the cache despite apparently exhaustive
visual searches: they were looking for the wrong category of evidence. Under
the proposed hypothesis, the cache itself may be minimally visually
distinctive, deliberately concealed to resist visual detection, while the
electronic checkpoint is unambiguous to any searcher carrying an active BLE
scanner. The hunt's design would thus implement a form of technological gatekeeping:
the searcher who arrives at the correct location with a BLE scanner receives a
definitive confirmation signal; the searcher who arrives without one receives
nothing, regardless of how thoroughly they search the immediate area by sight.
8. CONCLUSION
This paper has proposed and substantiated the hypothesis that Justin
Posey deployed a low-power, trigger-activated bilateral detection system at or
near the BTME cache location, with two simultaneous functions: broadcasting a
BLE advertisement checkpoint signal detectable by any nearby mobile device, and
transmitting a remote LoRa uplink alert notifying Posey of the proximity event.
The hypothesis is supported by three independent bodies of evidence: the
established engineering literature on device-free localization, low-power Wi-Fi
CSI sensing, and BLE proximity detection; multiple structurally precise
metaphorical analogs embedded in Posey's memoir, spanning the trigger layer,
the sleep-wake duty cycle, the multi-node detection topology, the false alarm architecture,
and the event-log retention requirement; and specific JIBLE interview
statements regarding the checkpoint's built-in nature, Posey's passive
awareness of proximity events, and the precision of the 200-foot distance
claim.
The hypothesis, if correct, has direct operational consequences for BTME
searchers. The checkpoint is an electronic signal event rather than a physical
visual landmark. It is detectable with a standard BLE scanning application on
any modern smartphone. The RSSI gradient of the detected advertisement provides
directional guidance to the transmitting node. And Posey's remote awareness of
checkpoint events, the mechanism by which he will announce the checkpoint's
discovery, is an automated notification function of the deployed hardware, not
a process dependent on searcher self-report.
The design principles underlying the proposed system are not external to
Posey's character or experience. They emerge directly from his professional
history as a large-scale systems architect, his biographical encounter with
narcolepsy as a living model of the sleep-wake duty cycle, his decade of
training a vizsla to detect buried bronze using a biological analog of the CSI
pipeline, and his family's ingrained practice of layered perimeter detection
from his father's raccoon-deterrence experiments. The proposed system is, in
the fullest sense, the technical infrastructure that Justin Posey was uniquely
qualified and personally motivated to build.
REFERENCES
[1]
Posey, J. M.
(2025). Beyond the Map's Edge. Beyond the Map's Edge LLC. ISBN
978-1-966862-01-7.
[2]
Posey, J. M.
(2023). Beyond the Map's Edge Legal Documentation, Notarized Records, and
Digital Fingerprint. Posted publicly November 17, 2023 via X (formerly
Twitter). Retrieved from https://treasure.quest/en/legal/
[3]
@jessinthewest.
(2026). JIBLE 6.0: A Compilation of Statements by Justin Posey for Beyond the
Map's Edge Treasure Hunters. Entry [Checkpoint]. Mysterious Writings 2025
Interview, April 3, 2025. Version 6.0, updated May 19, 2026.
[4]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint]. Justin Posey Facebook page, July 11,
2025.
[5]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint]. Justin Posey Twitter/Facebook page,
August 1, 2025.
[6]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint]. X Marks the Spot YouTube Interview,
March 17, 2026.
[7]
Patwari, N.,
and Wilson, J. (2010). RF Sensor Networks for Device-Free Localization:
Measurements, Models, and Algorithms. Proceedings of the IEEE.
https://oamonitor.ireland.openaire.eu/rpo/rcsi/search/publication?pid=10.1109%2Fjproc.2010.2052010
[8]
Wilson, J.,
and Patwari, N. (2010). Radio Tomographic Imaging with Wireless Networks. IEEE
Transactions on Mobile Computing. https://span.ece.utah.edu/uploads/RTI.pdf
[9]
Alippi, C.,
Bocca, M., et al. (2014/2016). Radio Tomographic Imaging for Outdoor People
Detection and Localization in Wireless Sensor Networks.
https://arxiv.org/pdf/1407.8509
[10]
Turetta, C.,
et al. (2024). Environmental Microchanges in WiFi Sensing. DATE Conference
Proceedings.
https://past.date-conference.com/proceedings-archive/2024/DATA/10005_pdf_upload.pdf
[11]
Hernandez, S.
M., and Bulut, E. (2022). WiFi Sensing on the Edge: Signal Processing
Techniques and Challenges for Real-World Systems. IEEE Communications Surveys
& Tutorials. https://ebulutvcu.github.io/COMST22_WiFi_Sensing_Survey.pdf
[12]
Turetta, C.,
et al. (2024). Environmental Microchanges in WiFi Sensing. DATE 2024. [Cited
separately for microchanges characterization.]
https://past.date-conference.com/proceedings-archive/2024/DATA/10005_pdf_upload.pdf
[13]
@jessinthewest.
(2026). JIBLE 6.0: A Compilation of Statements by Justin Posey for Beyond the
Map's Edge Treasure Hunters. Version 6.0, updated May 19, 2026. Prepared with
support from @hi-imerica and @k. Contact: jessinthewest5@gmail.com
[14]
Youssef, M.,
Mah, M., and Agrawala, A. Device-Free Passive Localization for Wireless
Environments. (Nuzzer system.) IEEE Transactions on Mobile Computing and
related publications. https://saeed.github.io/files/nuzzer-tmc.pdf
[15]
Espressif
Systems. Introduction to ESP-CSI Solution. ESP-Techpedia.
https://docs.espressif.com/projects/esp-techpedia/en/latest/esp-friends/solution-introduction/esp-csi/esp-csi-solution.html
[16]
Wang, W.,
Liu, A. X., and Shahzad, M. (2015). Understanding and Modeling of WiFi Signal
Based Human Activity Recognition. ACM MobiCom.
https://www.sigmobile.org/mobicom/2015/papers/p65-wangA.pdf
[17]
Kotaru, M.,
Joshi, K., Bharadia, D., and Katti, S. (2015). SpotFi: Decimeter Level
Localization Using WiFi. ACM SIGCOMM.
https://web.stanford.edu/~skatti/pubs/sigcomm15-spotfi.pdf
[18]
Zhang, Y.,
Zheng, Y., Qian, K., et al. Widar3.0: Zero-Effort Cross-Domain Gesture
Recognition with Wi-Fi. IEEE TPAMI.
https://tns.thss.tsinghua.edu.cn/widar3.0/data/TPAMI_Widar3.0_paper.pdf
[19]
Yang, J.,
Chen, X., et al. (2023). SenseFi: A Library and Benchmark on
Deep-Learning-Empowered WiFi Human Sensing. Patterns.
https://arxiv.org/abs/2207.07859
[20]
Wang, F., et
al. (2025). A Survey on Wi-Fi Sensing Generalizability: Taxonomy, Techniques,
Datasets, and Future Research Prospects. https://arxiv.org/abs/2503.08008
[21]
Hernandez, S.
M., and Bulut, E. (2022). WiFi Sensing on the Edge. [Full citation at Ref. 11
above.]
[22]
Espressif
Systems. ESP32-S3 Series Datasheet.
https://documentation.espressif.com/esp32-s3_datasheet_en.pdf
[23]
Alippi, C.,
Bocca, M., et al. (2014/2016). Radio Tomographic Imaging for Outdoor People
Detection. [Full citation at Ref. 9 above.] https://arxiv.org/pdf/1407.8509
[24]
STMicroelectronics.
LIS2DW12 Datasheet. https://www.st.com/resource/en/datasheet/lis2dw12.pdf
[25]
Panasonic.
EKMB110111 WL Series PIR Motion Sensor Reference Specification.
https://industrial.panasonic.com/cdbs/www-data/pdf/EWA0000/bltn_eng_ekmb110611_ast-ind-247372.pdf
[26]
Nordic
Semiconductor. nRF52840 Product Brief.
https://www.mouser.com/datasheet/2/297/nrf52840_soc_v3_0-2942478.pdf
[27]
Semtech.
SX1261/2 Datasheet.
https://cdn.sparkfun.com/assets/6/b/5/1/4/SX1262_datasheet.pdf
[28]
LoRa
Alliance. LoRaWAN Link Layer Specification v1.0.4.
https://lora-alliance.org/wp-content/uploads/2021/11/LoRaWAN-Link-Layer-Specification-v1.0.4.pdf
[29]
u-blox.
ALEX-R5 Product Summary.
https://content.u-blox.com/sites/default/files/ALEX-R5_ProductSummary_UBX-20011723.pdf
[30]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint, Checkpoint Built-In]. Mysterious Writings
2025 Interview, April 3, 2025.
[31]
@jessinthewest.
(2026). JIBLE 6.0. Entries [Checkpoint, Hunt Design, Solving, Netflix]. Dillon,
Montana Book-Signing Live Q&A, June 21, 2025. https://youtu.be/u1jcFpggC0
[32]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Solving: Physical Objects]. Cowlazars & Kpro
YouTube Interview, March 31, 2025. https://www.youtube.com/watch?v=P00hE2BMYbc
[33]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Solving: Multiple Solves]. Sandal Sanders TikTok
Interview, September 27, 2025. https://youtu.be/hx1kvZfSwrk
[34]
Gold &
Greed: The Hunt for Fenn's Treasure. (2024). Netflix documentary series.
Nomadica Films / Gumstreet Productions.
[35]
@jessinthewest.
(2026). JIBLE 6.0. Entries [Accessibility: Snow and Seasonal Conditions].
Multiple sources, 2025–2026.
[36]
U.S.
Electronic Code of Federal Regulations. 47 CFR Part 15, §15.247.
https://www.ecfr.gov/current/title-47/chapter-I/subchapter-A/part-15/subpart-A
[37]
Banerjee, A.,
et al. (2014). Violating Privacy Through Walls by Passive Monitoring of Radio
Windows. WiSec 2014.
https://collections.lib.utah.edu/dl_files/df/08/df08b7dfd9682fcaa1763498bd547ea06a28c213.pdf
[38]
Xie, Z., et
al. (2022). WiFi-Based Cross-Domain Gesture Recognition via Modified
Prototypical Networks. https://zhang-xie.github.io/papers/WiGr_zhang.pdf
[39]
The Things
Network. LoRaWAN Architecture.
https://www.thethingsnetwork.org/docs/lorawan/architecture/
[40]
Espressif
Systems. ESP-IDF Wi-Fi API Reference and Sleep Modes.
https://docs.espressif.com/projects/esp-idf/en/stable/esp32/api-reference/network/esp_wifi.html
[41]
Texas
Instruments. IWRL6432 Datasheet. https://www.ti.com/lit/ds/symlink/iwrl6432.pdf
[42]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint: Awareness and Announcement]. Seekers
Summit Live Q&A, March 28, 2026.
https://www.youtube.com/watch?v=4cjpymh2LXc
[43]
@jessinthewest.
(2026). JIBLE 6.0. Entry [Checkpoint: Proximity Confirmation]. Este's Quest
YouTube Interview, April 2, 2025.
[44]
Posey, J. M.
(2023). Beyond the Map's Edge Treasure Hunt Legal Notice and Rules.
https://treasure.quest/en/rules/
Comments
Post a Comment