Army uses proxy cache engines to foil hackers

Army uses proxy cache engines to foil hackers

By Bill Murray

GCN Staff

The Army is using proxy cache engines to protect the nearly 1,000 Web sites the service maintains at offices and on bases within the continental United States.

Using the cache engines, the service will mirror each of its sites. The proxy engines will replenish the sites with data from original production sites continually, said Phillip J. Loranger, operations officer for information assurance in the Directorate of Information Systems for Command, Control, Communications and computers (DISC4).

The Web sites will be replenished on such short cycles that a hacked site will be replaced with new data within milliseconds so no one will know the difference, he said.

The program will reduce Web site intrusion and unauthorized use, Loranger said.

Army officials have been battling to protect Web sites from hackers. In June, a hacker altered the home page of the service's main Web site, at The damaged site stayed online for about 13 hours [GCN, July 5, Page 45].

Army DISC4 officials are using several proxy cache engine products, Loranger said, but he would not list specific vendors. 'We're going to put some of them across the board. We'll see which ones work,' he said.

If the program goes well, DISC4 officials will expand it to Army facilities abroad, Loranger said.


  • business meeting (Monkey Business Images/

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected