It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Zaphod58
Besides observing, there is another interesting possibility. What would something that has antenna pointed at the sky be good for? And who would be the go to agency if you were moving something from that location?
originally posted by: Zaphod58
Besides observing, there is another interesting possibility. What would something that has antenna pointed at the sky be good for? And who would be the go to agency if you were moving something from that location?
originally posted by: Fiscal
a reply to: BigDave-AR
Yeah, I mean, anything is possible, but from an IT and business perspective, you’d build your infrastructure along the lines of the use cases for the facility. An observatory pulls data and sends data, true, but from what I’ve looked into, the data that this facility seems to send is limited (in terms of bandwidth requirements). Even sending high quality images daily rapidly is not going to suck that much resource unless the images are of fairly huge size.
Maybe someone knows more about an observatory’s data transmission requirements of this caliber. That would help in determining what type of IT infrastructure they would require and we could speculate from there. But the images I’ve seen from the observatory are nothing special in terms of data size.
originally posted by: Fiscal
a reply to: Vasa Croe
That actually possibly confirms my point about the Internet connection there being shoddy. In the video I referenced this secret service source says they are running gigabytes of data constantly. Satellite connections are notoriously terrible.
They do have a specific upside though and that’s use in remote or rural locations like this. Their connection alone makes the interview with ‘Sam’ suspect, especially as his technical talk track seems more like something from an old TV show with poor writing.
It also makes the hacking angle interesting. On a limited connection, it would be theoretically easier to notice suspect activity—depending on what load they’re running relative to resources.