Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20350112
5.4.3 (U) Handling and Persistent Storage of Beacon Information...................................21
5.4.4 (U) Handling and Persistent Storage of Alert Information.......................................21
5.4.5 (S) Alerts Forwarded to Catapult..............................................................................21
5.4.6 (U) Handling and Persistent Storage of Copy Data..................................................21
5.4.7 (U) Persistent Storage and Tasking of Missions.......................................................22
5.4.8 (U) One-Way Transfer of System Data....................................................................22
5.5 (U) CherryWeb............................................................................................................22
5.5.1 (U) Overview............................................................................................................22
5.5.2 (U) Web Browser User Interface..............................................................................22
5.5.3 (U) HTTPS Secure Socket Login and Connection...................................................22
5.5.4 (U) Compartmentalization of Information Via Operations and User Permissions...22
5.5.5 (U) Display of Alert Information..............................................................................22
5.5.6 (U) Display of Flytrap Status....................................................................................22
5.5.7 (U) Display, Creation, Editing, and Assignment of Missions..................................23
6 (U) DEVICE SUPPORT.....................................................................................24
6.1 (U) Confidence and Difficulty Estimates for Supporting a New Device....................26
6.2 (U) Supported Devices That Have Passed FAT..........................................................28
6.3 (S) Feature/Svn Revision Map.....................................................................................29
6.4 (S) Wireless Upgrade/Administrator Password Support.............................................29
6.5 (U) Firmware Types....................................................................................................31
6.6 (U) Requesting a Production Release Firmware/Wireless Upgrade Package.............31
7 (U) TARGET HANDLING..................................................................................32
7.1 (U) Primitive and Derived Targets..............................................................................32
7.2 (U) Target Decks.........................................................................................................32
7.3 (U) Target Detection....................................................................................................32
7.4 (U) Target Tracking and the “Derived MAC”.............................................................33
7.5 (U) Alerting.................................................................................................................33
7.6 (S) Target Monitoring after an Alert...........................................................................34
7.7 (S) Target Actions........................................................................................................35
7.7.1 (S) Target Action Inheritance ..................................................................................35
7.8 (S) Target Analysis Using CherryWeb .......................................................................37
8 (U) SYSTEM ADMINISTRATION......................................................................38
8.1 (U) Users, Operations, and Permissions......................................................................38
8.1.1 (U) Users...................................................................................................................38
8.1.2 (U) User Roles..........................................................................................................38
8.1.3 (U) The “cwadmin” User.........................................................................................38
8.1.4 (U) User Management...............................................................................................39
8.1.5 (U) Operations..........................................................................................................39
8.1.5.1 (U) Operation-Owned Entities.......................................................................39
8.1.6 (U) The “DEFAULT” Operation..............................................................................40
8.1.7 (U) Operation Management......................................................................................40
8.1.8 (U) Assigning User Permissions on a per-Operation Basis......................................40
8.1.9 (U) Permissions Management...................................................................................41
3
SECRET//20350112

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh