Like I said, only hackers drink the cheap stuff at Starbucks. (I prefer hot chocolate). The really dedicated hackers order tea and coffee. They pocket the tea bag for later use at home, and use the hot water to dilute and extend the coffee. One cup can then last all afternoon.
For this you need a coffee shop environment? Couldn't you do this at home?
My suspicions about you are confirmed.
Clients don't broadcast, so are you using the Blackberry as a WAP or cellular router? Having an AP (or cellular router) broadcast is not necessary to get a connection. The client only needs to know the SSID of the AP in order to connect.
Known problem, but with the client, not the AP. The default behavior is for the client to associate with the list of known saved SSID's before doing a probe request. Somewhat faster and less traffic. The problem is that it needs to belch the SSID of the saved SSID's while attempting to associate. The list can be collecting, giving your ex-wife or former girlfriend a clue where you have been hanging. You can disarm this feature in various ways. No clue on the Blackberry, but in Windoze XP, you just turn off the "connect automatically" mis-feature.
The cammo shorts are usually worn by those that do their laundry infrequently. The stains don't show.
Unrelated drivel: I got convinced into designing some more ADS-B AMOS/Franklin derivative antennas. Here's an inverted AMOS-3 that will be part of a 4 antenna array. Note that with 4 of these, at 200 ohms each, I don't need the 4:1 balun:
Works nicely (on paper) but the insulator is much longer than the normal AMOS antenna.
Ignore this one as it's totally screwed up (it was late and I was tired):
I'll fix it after Field Day.