Bitcoin and Military Power Projection: A Comprehensive Guide for Defense Analysts
Overview
In April 2026, Admiral Samuel Paparo, Commander of U.S. Indo-Pacific Command (INDOPACOM), publicly acknowledged that his command was experimenting with a Bitcoin node and described Bitcoin as a “valuable computer science tool for power projection.” This statement came shortly after Iran demanded Bitcoin payment for safe passage through the Strait of Hormuz—a clear example of Bitcoin influencing geopolitical behavior.

But what exactly does “power projection” mean in this military context, and how can a decentralized digital currency contribute to it? This guide unpacks the concept, drawing on the Department of Defense’s official definitions and the controversial work of Jason Lowery, author of Softwar: A Novel Theory on Power Projection. By the end, you will understand how Bitcoin’s proof-of-work mechanism provides a unique form of deterrence in cyberspace—a domain that has historically lacked effective deterrent options.
Prerequisites
To get the most from this guide, you should have a basic understanding of:
- Bitcoin fundamentals – including proof-of-work, mining, and decentralized ledgers.
- Military terminology – such as deterrence, force projection, and strategic influence.
- Cybersecurity concepts – especially the challenges of attribution and response in cyberspace.
No prior knowledge of Jason Lowery’s work is required; we will cover his key ideas.
Step-by-Step Guide to Understanding Bitcoin Power Projection
Step 1: Define Power Projection (Military Context)
According to the U.S. Department of Defense’s 2002 Dictionary of Military and Associated Terms, power projection is: “The ability of a nation to apply all or some of its elements of national power—political, economic, informational, or military—to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability.”
In simpler terms, power projection means influencing another state’s behavior from a distance, using tools ranging from diplomatic pressure to aircraft carriers. The key word here is deterrence: creating a credible threat of unacceptable consequences to prevent an adversary from acting.
Step 2: Understand the Cyberspace Deterrence Gap
Traditional deterrence works well in the physical world—a nation can threaten retaliation with missiles or sanctions. But cyberspace is different. Attacks can be anonymous, rapid, and deniable. The DoD defines deterrence as “the prevention from action by fear of the consequences,” but in cyber operations, fear is hard to instill when attribution is murky. This creates a deterrence vacuum.
Jason Lowery recognized this gap. In his MIT thesis and later book Softwar, he argued that Bitcoin’s proof-of-work (PoW) system offers a solution: it introduces a physical cost (electricity, hardware) into digital interactions, making cyber actions more predictable and attributable.
Step 3: Bitcoin as a “Macrochip” for Global Deterrence
Lowery’s central insight is metaphorical: Just as microchips route electrical power through logic gates on a motherboard, the global electricity grid can be viewed as a “macrochip” where Bitcoin mining acts as a logic operation. By requiring massive energy expenditure to validate transactions, Bitcoin ties digital actions to physical resources. This creates a credible deterrent because any attempt to disrupt the network would require an attacker to command enormous energy and hardware—making the attack both costly and detectable.
In this framework, Bitcoin is not just a currency; it is a power projection tool for cyberspace. Nations can use it to signal commitment, impose costs on adversaries, or even sanction behavior—similar to how a carrier strike group projects power in the ocean.
Step 4: Real-World Application—INDOPACOM’s Bitcoin Node
Admiral Paparo’s disclosure that INDOPACOM is running a Bitcoin node validates Lowery’s theories. A node does not mine but validates transactions and enforces consensus rules. By operating a node, the U.S. military gains two advantages:
- Monitoring – Understanding the network’s state and detecting anomalies.
- Influence – Being a participant in the global consensus, giving the U.S. a seat at the table in shaping the network’s evolution.
Furthermore, Iran’s demand for Bitcoin in the Strait of Hormuz incident shows that even adversaries see Bitcoin as a strategic asset—a means of projecting economic power.
Step 5: Examine Lowery’s Book and Its Significance
Lowery’s Softwar (originally published and later taken down at the request of his superiors) posits that Bitcoin is a form of “soft power” that can prevent conflict by making cyber attacks prohibitively expensive. The book earned both praise and criticism, but its removal from distribution intrigued many: if the military wanted it quiet, perhaps the ideas were more potent than they seemed.
For defense analysts, the key takeaway is that Bitcoin offers a new layer of cybersecurity deterrence—one that relies on physics and economics rather than secrecy or speed.
Common Mistakes
- Confusing Bitcoin with cryptocurrency trading – Power projection is not about Bitcoin’s price; it’s about the underlying proof-of-work mechanism.
- Assuming Bitcoin is anonymous – While pseudonymous, Bitcoin’s public ledger creates accountability over time. The military cares about this traceability.
- Overlooking the energy aspect – Critics call Bitcoin wasteful; Lowery sees that “waste” as a feature—it creates a physical barrier to malicious behavior.
- Thinking nodes are irrelevant – Running a full node (like INDOPACOM does) gives a participant control over their own sovereignty in cyberspace.
Summary
Bitcoin’s role in military power projection is rooted in its proof-of-work consensus, which introduces physical cost and deterrence into cyberspace. By operating a node, the U.S. military can monitor and influence the network, while also signaling strategic commitment. Jason Lowery’s controversial theory frames Bitcoin as a “macrochip” that turns global electricity into a deterrent force—a concept that is now being tested in real-world military experiments.
For defense analysts, understanding this concept is crucial to navigating the future of cyber warfare and geopolitical influence. The era of purely digital deterrence is beginning, and Bitcoin is at its center.
Related Articles
- Modern Access Control for Windows: How Boundary and Vault Eliminate Static Credentials and Network Sprawl
- Weekly Cyber Threat Digest: April 20, 2025
- How to Protect Your LiteLLM Deployment from the CVE-2026-42208 SQL Injection Vulnerability
- DDoS Protection Provider Huge Networks Unmasked as Origin of Attacks on Brazilian ISPs
- Former Security Professionals Handed Four-Year Sentences for Ransomware Aid
- Akamai Stock Jumps 26% After Landing $1.8B AI Cloud Deal with Leading Frontier Model Maker
- 7 Critical Facts About the .NET 10.0.7 Security Update You Must Know
- April 2026 Patch Tuesday: Critical Fixes, Zero-Days, and the AI Impact