How to Decode Bitcoin's Power Projection for U.S. Military Strategy

By

Introduction

In April 2026, Admiral Samuel Paparo of U.S. Indo-Pacific Command made headlines by revealing that his command was experimenting with a Bitcoin node and describing Bitcoin as a “valuable computer science tool as power projection.” This remark, coming just after Iran demanded Bitcoin for safe passage through the Strait of Hormuz, sparked curiosity about what “power projection” means in the context of cryptocurrency. This guide will walk you through the concept step by step, drawing from official Department of Defense definitions and the work of Jason Lowery, author of Softwar: A Novel Theory on Power Projection. By the end, you'll understand how Bitcoin might serve as a tool for deterrence and influence in cyberspace.

How to Decode Bitcoin's Power Projection for U.S. Military Strategy
Source: bitcoinmagazine.com

What You Need

Step 1: Understand the Military Definition of Power Projection

Before linking Bitcoin to military strategy, you must grasp what the U.S. military means by “power projection.” According to the Department of Defense’s 2002 Dictionary of Military and Associated Terms, it is:

“The ability of a nation to apply all or some of its elements of national power – political, economic, informational, or military – to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability.”

In simpler terms, it’s the capacity to influence other nations or entities beyond your own borders using tools like diplomacy, economic pressure, or military force (e.g., long-range missiles, aircraft carriers). The key goal is deterrence – preventing an adversary from taking action by making the consequences too costly. Note the phrase “credible threat of unacceptable counteraction” from the DoD’s definition of deterrence.

Step 2: Recognize the Problem – Deterrence in Cyberspace

Traditional military deterrence works in the physical world with tanks, ships, and warheads. But cyberspace lacks equivalent tools. You cannot park a battleship in a network. The U.S. military has struggled to project power or impose costs in a way that deters cyberattacks. This is where Bitcoin enters the picture. It offers something unique: a way to impose economic and computational costs in a digital environment that mirrors physical deterrence. As Jason Lowery argues, Bitcoin transforms the global electric grid into a kind of “macrochip” where proof-of-work mining acts as a physical deterrent – a way to assert influence by consuming real-world energy and resources.

Step 3: Learn About Jason Lowery’s Theory of “Softwar”

Jason Lowery, an MIT Fellow and Special Assistant to the Commander of INDOPACOM, wrote a thesis and a book titled Softwar: A Novel Theory on Power Projection. In it, he proposes that Bitcoin’s proof-of-work is not just about securing transactions – it’s a mechanism for projecting power in cyberspace. Lowery compares microchips in a computer to the global electric grid: just as wires carry power in encoded logic, Bitcoin mining encodes energy into a digital proof of work that can be used to deter adversaries. His ideas gained traction but also controversy; the book was later taken down at the request of his superiors, fueling speculation that its contents were sensitive. This step is crucial because Lowery’s framework bridges Bitcoin from a financial tool to a strategic military asset.

Step 4: Connect the Dots – Admiral Paparo’s Comments and the Iran Incident

On April 21–22, 2026, Admiral Samuel Paparo told the Senate Armed Services Committee that INDOPACOM was running a Bitcoin node and viewed Bitcoin as a “valuable computer science tool as power projection.” This is a real-world validation of Lowery’s theory. Just days earlier, Iran demanded Bitcoin payment for safe passage through the Strait of Hormuz – a move that highlights how Bitcoin can be used by adversarial states to exert economic leverage. Taken together, these events show that Bitcoin is being considered not merely as a currency, but as a tool for geopolitical influence. INDOPACOM’s experiments signal that the military is actively exploring how to use Bitcoin to project power in cyberspace.

Step 5: Analyze How Bitcoin Provides Deterrence Costs

The core of Bitcoin’s power projection lies in its ability to create verifiable, costly proofs of work. Mining requires significant electricity and hardware, which translates into real-world economic expenditure. If a nation wants to launch a cyberattack, it must consider that the defender might have a large Bitcoin mining operation that can impose economic retaliation (e.g., by directing hash power to disrupt the attacker’s network or by using Bitcoin-based sanctions). In Lowery’s view, this creates a “credible threat of unacceptable counteraction” in cyberspace – exactly what the DoD definition of deterrence requires. The energy cost makes Bitcoin a physical anchor in the digital realm.

Step 6: Consider the Implications and Controversies

Not everyone agrees with Lowery’s theory. Critics argue that Bitcoin’s energy consumption is wasteful and that its decentralized nature makes it hard to weaponize. Supporters see it as a breakthrough for cybersecurity. The fact that Lowery’s book was pulled from distribution suggests the military believes the concept has merit – or that it’s too disruptive to discuss publicly. In any case, understanding the debate helps you see both the potential and the pitfalls. As the U.S. military continues to experiment with Bitcoin nodes (like INDOPACOM’s), the concept of power projection may evolve. Keep an eye on future Senate hearings and publications from military think tanks.

Tips for Further Understanding

By following these steps, you’ve decoded the meaning of “power projection” in relation to Bitcoin – from official DoD definitions to real-world military experiments and the controversial ideas of Jason Lowery. The concept is still emerging, but it represents a fascinating intersection of cryptocurrency and national security.

Tags:

Related Articles

Recommended

Discover More

Unlock Smoother Mobile Gaming: How to Use Lossless Scaling Frame Generation on AndroidHow to Contain a Wildfire in a Radioactive Exclusion Zone After a Drone Crash10 Critical Updates in Safari Technology Preview 240 That Web Developers Need to KnowEnhancing Deployment Safety at GitHub with eBPF: Breaking Circular DependenciesThree Tech Trends Reshaping Our Future: IVF Innovation, Balcony Solar, and AI Resistance