There are both over and covert ways of going about this, in some cases there will be an agreement to procure/transfer such threat databases to the user or vice versa but then there are other ways also..
These signatures will be stored on the mission computers supplied by the OEM and it is the...