How to Decode Bitcoin's Power Projection for U.S. Military Strategy
Introduction
In April 2026, Admiral Samuel Paparo of U.S. Indo-Pacific Command made headlines by revealing that his command was experimenting with a Bitcoin node and describing Bitcoin as a “valuable computer science tool as power projection.” This remark, coming just after Iran demanded Bitcoin for safe passage through the Strait of Hormuz, sparked curiosity about what “power projection” means in the context of cryptocurrency. This guide will walk you through the concept step by step, drawing from official Department of Defense definitions and the work of Jason Lowery, author of Softwar: A Novel Theory on Power Projection. By the end, you'll understand how Bitcoin might serve as a tool for deterrence and influence in cyberspace.

What You Need
- Basic familiarity with Bitcoin (what it is and how blockchain works)
- Interest in military strategy, cybersecurity, or geopolitical concepts
- Access to a browser to explore linked sources (optional)
- A willingness to think about non-traditional applications of cryptocurrency
Step 1: Understand the Military Definition of Power Projection
Before linking Bitcoin to military strategy, you must grasp what the U.S. military means by “power projection.” According to the Department of Defense’s 2002 Dictionary of Military and Associated Terms, it is:
“The ability of a nation to apply all or some of its elements of national power – political, economic, informational, or military – to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability.”
In simpler terms, it’s the capacity to influence other nations or entities beyond your own borders using tools like diplomacy, economic pressure, or military force (e.g., long-range missiles, aircraft carriers). The key goal is deterrence – preventing an adversary from taking action by making the consequences too costly. Note the phrase “credible threat of unacceptable counteraction” from the DoD’s definition of deterrence.
Step 2: Recognize the Problem – Deterrence in Cyberspace
Traditional military deterrence works in the physical world with tanks, ships, and warheads. But cyberspace lacks equivalent tools. You cannot park a battleship in a network. The U.S. military has struggled to project power or impose costs in a way that deters cyberattacks. This is where Bitcoin enters the picture. It offers something unique: a way to impose economic and computational costs in a digital environment that mirrors physical deterrence. As Jason Lowery argues, Bitcoin transforms the global electric grid into a kind of “macrochip” where proof-of-work mining acts as a physical deterrent – a way to assert influence by consuming real-world energy and resources.
Step 3: Learn About Jason Lowery’s Theory of “Softwar”
Jason Lowery, an MIT Fellow and Special Assistant to the Commander of INDOPACOM, wrote a thesis and a book titled Softwar: A Novel Theory on Power Projection. In it, he proposes that Bitcoin’s proof-of-work is not just about securing transactions – it’s a mechanism for projecting power in cyberspace. Lowery compares microchips in a computer to the global electric grid: just as wires carry power in encoded logic, Bitcoin mining encodes energy into a digital proof of work that can be used to deter adversaries. His ideas gained traction but also controversy; the book was later taken down at the request of his superiors, fueling speculation that its contents were sensitive. This step is crucial because Lowery’s framework bridges Bitcoin from a financial tool to a strategic military asset.
Step 4: Connect the Dots – Admiral Paparo’s Comments and the Iran Incident
On April 21–22, 2026, Admiral Samuel Paparo told the Senate Armed Services Committee that INDOPACOM was running a Bitcoin node and viewed Bitcoin as a “valuable computer science tool as power projection.” This is a real-world validation of Lowery’s theory. Just days earlier, Iran demanded Bitcoin payment for safe passage through the Strait of Hormuz – a move that highlights how Bitcoin can be used by adversarial states to exert economic leverage. Taken together, these events show that Bitcoin is being considered not merely as a currency, but as a tool for geopolitical influence. INDOPACOM’s experiments signal that the military is actively exploring how to use Bitcoin to project power in cyberspace.
Step 5: Analyze How Bitcoin Provides Deterrence Costs
The core of Bitcoin’s power projection lies in its ability to create verifiable, costly proofs of work. Mining requires significant electricity and hardware, which translates into real-world economic expenditure. If a nation wants to launch a cyberattack, it must consider that the defender might have a large Bitcoin mining operation that can impose economic retaliation (e.g., by directing hash power to disrupt the attacker’s network or by using Bitcoin-based sanctions). In Lowery’s view, this creates a “credible threat of unacceptable counteraction” in cyberspace – exactly what the DoD definition of deterrence requires. The energy cost makes Bitcoin a physical anchor in the digital realm.
Step 6: Consider the Implications and Controversies
Not everyone agrees with Lowery’s theory. Critics argue that Bitcoin’s energy consumption is wasteful and that its decentralized nature makes it hard to weaponize. Supporters see it as a breakthrough for cybersecurity. The fact that Lowery’s book was pulled from distribution suggests the military believes the concept has merit – or that it’s too disruptive to discuss publicly. In any case, understanding the debate helps you see both the potential and the pitfalls. As the U.S. military continues to experiment with Bitcoin nodes (like INDOPACOM’s), the concept of power projection may evolve. Keep an eye on future Senate hearings and publications from military think tanks.
Tips for Further Understanding
- Read Jason Lowery’s original MIT thesis (if available) for a deeper dive into the technical aspects of proof-of-work as power projection.
- Monitor news from the U.S. Indo-Pacific Command for any updates on their Bitcoin node experiments – they may publish findings later.
- Compare the military’s definition of deterrence with how Bitcoin’s mining difficulty adjusts to maintain a constant block time – this analogy highlights the self-regulating nature of the “macrochip.”
- Discuss with cybersecurity experts: ask how proof-of-work could be used as a retaliatory mechanism. Some suggest that hash rate could be weaponized to censor transactions or disrupt networks.
- Remember that this is an evolving theory. The “power projection” label is not official doctrine yet, but it’s gaining attention. Return to Step 1 to reinforce the fundamentals if needed.
By following these steps, you’ve decoded the meaning of “power projection” in relation to Bitcoin – from official DoD definitions to real-world military experiments and the controversial ideas of Jason Lowery. The concept is still emerging, but it represents a fascinating intersection of cryptocurrency and national security.
Related Articles
- 10 Critical Insights into Hypersonic Supply Chain Attacks and Next-Gen Defense
- Authorities Unmask Alleged Mastermind Behind Notorious Ransomware Gangs GandCrab and REvil
- AI-Driven Vulnerability Discovery: How Enterprises Can Adapt to a Faster Threat Landscape
- How Scientists Detect Giant Squid Using Environmental DNA in Seawater
- Major Cybersecurity Wins and Emerging Threats: Week 19 Roundup
- 6 Essential Insights into Streamlining Kubernetes Secret Management with Vault
- Rethinking Cybersecurity for the AI Era: A Q&A with Tarique Mustafa
- Old Android Phones Outperform Cheap IP Cameras as Home Security Solutions, Experts Say