Army uses proxy cache engines to foil hackers

Army uses proxy cache engines to foil hackers

By Bill Murray

GCN Staff

The Army is using proxy cache engines to protect the nearly 1,000 Web sites the service maintains at offices and on bases within the continental United States.

Using the cache engines, the service will mirror each of its sites. The proxy engines will replenish the sites with data from original production sites continually, said Phillip J. Loranger, operations officer for information assurance in the Directorate of Information Systems for Command, Control, Communications and computers (DISC4).

The Web sites will be replenished on such short cycles that a hacked site will be replaced with new data within milliseconds so no one will know the difference, he said.

The program will reduce Web site intrusion and unauthorized use, Loranger said.

Army officials have been battling to protect Web sites from hackers. In June, a hacker altered the home page of the service's main Web site, at The damaged site stayed online for about 13 hours [GCN, July 5, Page 45].

Army DISC4 officials are using several proxy cache engine products, Loranger said, but he would not list specific vendors. 'We're going to put some of them across the board. We'll see which ones work,' he said.

If the program goes well, DISC4 officials will expand it to Army facilities abroad, Loranger said.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.