Decoding Bitcoin's Military Utility: A Guide to Cyber Power Projection
Overview
In April 2026, Admiral Samuel Paparo of the U.S. Indo-Pacific Command (INDOPACOM) publicly described Bitcoin as a “valuable computer science tool as power projection” and disclosed that the command was running a Bitcoin node in experimental cybersecurity exercises. This statement, combined with Iran’s contemporaneous demand for Bitcoin payment to allow safe passage through the Strait of Hormuz, thrust a previously niche concept into mainstream strategic discussion. The idea—developed extensively by Jason Lowery, an MIT fellow and special assistant to the INDOPACOM commander, in his book Softwar: A Novel Theory on Power Projection—argues that Bitcoin’s proof-of-work mechanism offers a unique form of deterrence in cyberspace. This tutorial explains the military’s perspective on Bitcoin’s “power projection,” its theoretical foundations, and practical implications for national security. No prior military or Bitcoin expertise is required, though a basic understanding of both domains is helpful.

Prerequisites
- Basic knowledge of Bitcoin: Understand that Bitcoin is a decentralized digital currency secured by proof-of-work mining, which consumes significant electrical energy.
- Familiarity with military strategy concepts: Especially deterrence, power projection, and cyberspace operations.
- Reading materials (optional): The Department of Defense Dictionary of Military and Associated Terms (2002 edition) for official definitions of “power projection” and “deterrence.”
- Internet access: To explore additional resources on Jason Lowery’s thesis and INDOPACOM’s experiments.
Step-by-Step Guide to Understanding Bitcoin Power Projection
Step 1: Grasp the Traditional Definition of Power Projection
According to the 2002 DoD Dictionary, power projection is the ability of a nation to apply all or some of its elements of national power—political, economic, informational, or military—to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability.
In plain language, it means a country’s capacity to influence events beyond its borders, whether through diplomacy, economic sanctions, or military force. Classic examples include the U.S. Navy’s carrier strike groups, long-range bombers, or economic sanctions against a hostile nation.
Step 2: Understand the Role of Deterrence
Deterrence is defined as the prevention from action by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction.
In the physical domain, the U.S. military deters adversaries through visible capabilities like nuclear submarines, forward-deployed troops, or missile defenses. The key is credibility—the adversary must believe that the threatened response will be executed and that it will be devastating enough to outweigh any potential gain.
Step 3: Identify the Cyberspace Gap
Unlike the physical domains (land, sea, air, space), cyberspace lacks effective deterrence mechanisms for several reasons:
- Attribution difficulty: Cyberattacks can be launched anonymously or via proxies, making it hard to identify the perpetrator.
- Asymmetric costs: Offensive cyber tools are cheap to develop compared to their potential impact, while defensive measures are expensive.
- No credible countermeasure: A cyberattack often cannot be retaliated against in a proportional, timely, and clearly visible manner.
This creates a strategic vulnerability: a major cyber incident could cripple critical infrastructure without giving the targeted nation a clear path to respond or deter.
Step 4: Introduce Lowery’s Thesis—Bitcoin as a “Macrochip”
Jason Lowery offers a novel analogy. He compares the global electrical grid to a massive computer motherboard—a “macrochip”—where power and information flow together. Inside a microchip, electricity moves through circuits in an encoded logic (0s and 1s). Similarly, the grid carries electrical power that can be used to perform logical operations when harnessed by proof-of-work mining. Bitcoin’s mining process effectively turns electricity into a scarce, verifiable digital asset—a form of “work” that can be observed and measured.
Step 5: Understand Power Projection Through Proof-of-Work
Lowery argues that proof-of-work allows a nation to project power by consuming electrical energy to secure a global ledger. The key points:
- Verifiable commitment: A nation that dedicates significant electrical resources to Bitcoin mining proves its ability to sustain a large-scale energy-intensive operation. This signals a credible threat of “burning” electricity for strategic purposes.
- Cybersecurity deterrence: By running a Bitcoin node and mining, a military can demonstrate its infrastructure’s resilience—any adversary attempting to corrupt the ledger would need to match that energy expenditure, a potentially unacceptable cost.
- International signaling: As seen with Iran demanding Bitcoin for safe passage, Bitcoin can be used as a lever in geopolitical negotiations, creating a new dimension of economic and informational power.
Step 6: Examine INDOPACOM’s Implementation
Admiral Paparo revealed that INDOPACOM is experimenting with a Bitcoin node. In practical terms, this means they are running Bitcoin Core software, maintaining a full copy of the blockchain, and possibly mining or validating transactions. The node serves multiple functions:
- Monitoring the Bitcoin network for anomalous activity that could signal cyber attacks.
- Participating in the consensus process to understand the protocol’s security parameters.
- Exploring how Bitcoin’s energy footprint can be leveraged in force planning.
Step 7: Connect to National Security Policy
The U.S. military’s interest in Bitcoin is not about cryptocurrency speculation but about strategic advantage. By embedding Bitcoin into cyber operations, the military gains a new tool for:
- Attribution: Bitcoin’s transparent ledger can help trace malicious transactions, aiding in identifying state-sponsored hackers.
- Resilience: A decentralized currency could maintain economic functionality if traditional financial networks are disrupted during conflict.
- Deterrence signaling: Publicly mining and holding Bitcoin sends a signal of energy capability and willingness to deploy resources in cyberspace.
Common Mistakes and Misunderstandings
Assuming Bitcoin Is Just a Currency
Many observers dismiss Bitcoin’s military applications because they see it only as a volatile investment or payment system. The power projection argument is about proof-of-work as a strategic resource, not about using Bitcoin to buy goods.
Underestimating Energy Costs
Critics often point to Bitcoin’s energy consumption as wasteful. However, from a military perspective, the ability to consume large amounts of energy is a feature, not a bug—it represents a measurable capability that can be projected.
Confusing Lowery’s Work with Advocacy
Jason Lowery’s book Softwar was taken down from distribution at the request of his superiors, leading to speculation about censorship. However, the removal was likely due to operational security concerns, not because the ideas are incorrect. It does not imply the military rejects the concept—on the contrary, the INDOPACOM node experiment indicates active interest.
Overlooking the Deterrence Dimension
Some analysts focus only on the offensive potential of Bitcoin (e.g., ransomware payments), missing the point that the real value lies in creating a credible deterrent posture that prevents attacks from happening in the first place.
Summary
Bitcoin’s “power projection” for the U.S. military refers to the ability to deter adversaries in cyberspace through verifiable, energy-intensive proof-of-work operations. By running a Bitcoin node and mining, the military can signal a credible threat of resource allocation, fill the deterrence gap in the cyber domain, and gain strategic advantages in attribution and resilience. Jason Lowery’s macrochip analogy and INDOPACOM’s experimental node demonstrate that Bitcoin is being taken seriously as a tool of national power, not just a financial technology.
Related Articles
- Unmasking Silver Fox: New ABCDoor Backdoor Targets Tax Authorities in Russia and India
- The Hidden Accessibility Challenge: Session Timeouts in Authentication Design
- Critical Linux Privilege Escalation Bug 'Copy Fail' Puts Every Distribution Since 2017 at Risk
- How to Respond to a Critical Git Push RCE Vulnerability: A Step-by-Step Incident Response Guide
- 7 Incredible Features of the ESP32-Powered Spark Portable Synthesizer
- The Genetic Blueprint: How Legumes Steer Rhizobia Evolution in Nitrogen-Fixing Partnerships
- Beyond the Endpoint: Key Data Sources for Comprehensive Threat Detection
- ACSC Warns of ClickFix Campaign Spreading Vidar Stealer – What You Need to Know