How Bitcoin Is Reshaping U.S. Military Strategy: The Concept of Power Projection in Cyberspace
In late April 2026, Admiral Samuel Paparo, commander of U.S. Indo-Pacific Command (INDOPACOM), made headlines during a Senate Armed Services Committee hearing. He described Bitcoin as a "valuable computer science tool as power projection" and disclosed that INDOPACOM is actively running a Bitcoin node as part of its experimental efforts. This statement marked a significant moment in the ongoing conversation about cryptocurrency’s role in national defense.
The Context Behind the Comment
Paparo’s remarks came just days after Iran demanded payment in Bitcoin for safe passage through the Strait of Hormuz — a strategic chokepoint for global oil shipments. The mention of "power projection" immediately drew attention to the work of Jason Lowery, a controversial yet influential Bitcoiner, MIT fellow, and special assistant to the INDOPACOM commander. Lowery authored Softwar: A Novel Theory on Power Projection, which explores Bitcoin’s unique cybersecurity value and its ability to extend military deterrence into cyberspace.

What Is Power Projection?
According to the U.S. Department of Defense’s 2002 Dictionary of Military and Associated Terms, power projection is:
"The ability of a nation to apply all or some of its elements of national power — political, economic, informational, or military — to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability."
In simpler terms, power projection is the capacity of a nation to influence the behavior of other nations or entities beyond its own borders. This influence can take many forms: diplomatic pressure, economic sanctions, or military might like long-range missiles, drones, or a powerful navy.
Deterrence and Bitcoin’s Role
Central to the concept of power projection is deterrence. The DoD defines deterrence as:
"The prevention from action by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction."
Lowery’s groundbreaking insight is to view the global electric grid as a kind of "macrochip" — analogous to the microchip inside a computer. Just as microchips route electric power through encoded logic to perform computations, the world’s energy infrastructure can be seen as a vast network carrying not just electricity but security and influence.
Bitcoin, Lowery argues, introduces a novel form of cyber-physical power projection. By requiring proof-of-work — an energy-intensive computational process — Bitcoin creates a tangible link between cyberspace and the physical world. This linkage provides a mechanism for deterrence in a domain that otherwise lacks traditional defensive options. In cyberspace, attacks can be cheap, anonymous, and difficult to trace. Bitcoin’s energy consumption introduces cost and accountability, making it a tool for imposing consequences on malicious actors.
Lowery, the Book, and the Military’s Interest
Lowery’s book Softwar gained significant traction within Bitcoin circles, earning both praise and criticism. However, the book was later taken down from distribution at the request of his military superiors. This action led many to speculate that the ideas within it were considered too sensitive for public consumption — perhaps because they reveal a strategic advantage the U.S. government wishes to keep quiet.
The fact that INDOPACOM is now experimenting with Bitcoin nodes suggests that these ideas are being taken seriously at the highest levels of military planning. Admiral Paparo’s public acknowledgment of Bitcoin as a tool for "power projection" indicates that the U.S. military is actively exploring how cryptocurrency can enhance cybersecurity and deterrence.
Practical Implications for National Defense
So, what does this mean in practice? Here are some possible applications:
- Enhanced cybersecurity: Bitcoin’s proof-of-work can serve as a proof of resource expenditure, making it expensive for adversaries to launch sustained cyberattacks.
- Secure communication channels: Running a Bitcoin node allows the military to verify transactions and messages without relying on centralized infrastructure that could be compromised.
- Economic deterrence: By adopting Bitcoin, the U.S. could signal that any attempt to disrupt financial systems would be met with a decentralized, resilient alternative.
- Strategic signaling: Iran’s demand for Bitcoin for safe passage through the Strait of Hormuz shows that even adversaries recognize the currency’s geopolitical significance.
Challenges and Criticism
Not everyone is convinced. Critics argue that Bitcoin’s energy consumption is a liability, that its volatility makes it unreliable, and that its pseudonymous nature could aid criminals and state adversaries. However, proponents counter that these very features — energy use, scarcity, and decentralization — are what give Bitcoin its strategic value.
The controversy surrounding Lowery’s book further muddies the waters. Some see the removal of Softwar as evidence that the military is hiding a revolutionary capability; others believe it was simply a matter of protocol regarding a serving officer’s unauthorized publication.
Conclusion
Admiral Paparo’s comments — and the broader context of Iran’s Bitcoin demand and Lowery’s work — suggest that Bitcoin is no longer just a financial asset. It is increasingly viewed as a strategic tool for national security, capable of projecting power across both physical and digital domains. As the U.S. military continues to experiment with this technology, the world may witness a new era of peer-to-peer defense, where energy and computation become the new battlegrounds for deterrence.
Related Articles
- Zero-Day Supply Chain Attacks Crush Trust: SentinelOne Blocks Three Unseen Payloads in One Day
- Weekly Cybersecurity Threat Landscape: April 20th Edition
- BleepingComputer Retracts Instructure Data Breach Story Due to Outdated Information
- Copy Fail: Unpacking the Critical Linux Kernel Privilege Escalation Vulnerability
- Apple's Mac Terminal Tightens Security Against Social Engineering Attacks
- Massive Data Breach at UK Biobank Exposes 500,000 Volunteer Records; Multiple Cyber Incidents Rock Industry
- 10 Critical Insights Into Anthropic's Mythos and the Future of Cybersecurity
- Weekly Cybersecurity Roundup: Train Hacker Arrest, New Linux Backdoor, and CISA Leadership Update