Cryptocurrency

What Does Bitcoin “Power Projection” Mean To The U.S. Military?

Bitcoin’s Role in Cybersecurity and Military Power Projection

During a recent Senate Armed Services Committee meeting on April 21st and 22nd, 2026, Admiral Samuel Paparo of U.S. Indo-Pacific Command discussed the potential utility of Bitcoin in cybersecurity for the country’s military. He referred to Bitcoin as a “valuable computer science tool for power projection” and revealed that INCOPACOM is currently running a Bitcoin node as part of their experiments with the protocol.

This discussion by the INCOPACOM Commander came shortly after the Islamic Republic of Iran demanded payment in Bitcoin for safe passage across the Strait of Hormuz. The concept of “power projection” mentioned by Admiral Paparo resonated with the work of Jason Lowery, a prominent figure in the Bitcoin community. Lowery, known for his controversial book “Softwar: A Novel Theory on Power Projection,” is an MIT Fellow and Special Assistant to the Commander of INDOPACOM.

In his book, Lowery delves into the cybersecurity value of Bitcoin and its unique ability to facilitate power projection in cyberspace, an area crucial for national security and military operations that lacks traditional deterrence options. Despite gaining both supporters and critics within the Bitcoin industry, Lowery’s book was later removed from circulation at the request of his superiors, hinting at the sensitive nature of its contents.

But what exactly does Bitcoin bring to military affairs, and how does “Power Projection” manifest in this context? According to the Department of Defense’s 2002 Dictionary of Military and Associated Terms, power projection involves the application of a nation’s elements of power to deploy and sustain forces in multiple locations to respond to crises, contribute to deterrence, and enhance regional stability. This ability allows a nation to influence the behavior of other entities beyond its borders through various means, including military capabilities.

Lowery’s work introduces the concept of the “Bitcoin macrochip,” likening the global electric grid to a massive computer motherboard with Bitcoin mines acting as logic gates. By harnessing large amounts of energy to mine Bitcoin, nations can potentially utilize this resource as a form of cybersecurity defense, linking physical energy output to digital security.

One of the most notable applications of Bitcoin’s security features is the use of multisignature wallets, which require multiple private keys to authorize transactions. This decentralized approach to securing Bitcoin wealth poses a significant challenge to potential hackers, making it a potent form of deterrence.

Lowery further explores the idea of the “Electro-Cyber Dome” as a cybersecurity defense mechanism against various threats such as email spam, Sybil attacks, and misinformation campaigns. By leveraging proof-of-work protocols similar to Bitcoin’s, networks can enhance their security and resilience against external attacks.

Critics of Lowery’s Softwar thesis argue that Bitcoin’s technology may not be suitable for securing external networks outside the realm of cryptocurrency. While Lowery’s vision of using Bitcoin as a cybersecurity tool is ambitious, practical challenges such as relying on China’s ASIC manufacturing industry for mining hardware raise concerns about the feasibility of implementing such strategies.

Despite these criticisms, several projects have demonstrated the potential of Bitcoin in securing non-financial data. SimpleProof’s use of Bitcoin for timestamping data and Michael Saylor’s development of a decentralized digital identity system on the blockchain showcase innovative applications of Bitcoin’s technology beyond monetary transactions.

In conclusion, while the idea of using Bitcoin for military power projection and cybersecurity defense is intriguing, practical considerations and criticisms highlight the need for a nuanced approach to integrating Bitcoin’s capabilities into broader security frameworks. As the technology evolves, we may see more innovative uses of Bitcoin-like protocols to safeguard networks and data in the future.

Related Articles

Back to top button