What Does Bitcoin “Power Projection” Mean To The U.S. Military?

When the U.S. Military speaks about “power projection,” the imagery is usually visceral: aircraft carriers cutting through the Pacific, long-range missiles poised in silos, or a fleet of drones patrolling a contested border. It is the art of applying national strength—political, economic, or military—to influence behavior far beyond one’s own shores. It is about deterrence: making the cost of an enemy’s action so high that the action is never taken.

But during a Senate Armed Services Committee hearing on April 21 and 22, 2026, Admiral Samuel Paparo, Commander of U.S. Indo-Pacific Command (INDOPACOM), introduced a new, invisible variable into this equation: Bitcoin. Paparo didn’t describe Bitcoin as a speculative asset or a digital currency, but as a “valuable computer science tool as power projection.” He further disclosed that INDOPACOM is currently running a Bitcoin node as part of a series of experiments with the protocol.

The timing of these comments was not accidental. They arrived just days after the Islamic Republic of Iran demanded payment in Bitcoin to ensure safe passage for ships crossing the Strait of Hormuz. The intersection of geopolitical brinkmanship and cryptographic protocols suggests that the Pentagon is looking past the price charts and focusing on the underlying physics of Bitcoin’s network.

At the heart of this shift is the influence of Jason Lowery, an MIT Fellow and Special Assistant to the Commander of INDOPACOM. Lowery, a controversial figure in the Bitcoin community, authored Softwar: A Novel Theory on Power Projection. His thesis argues that Bitcoin provides a unique form of deterrence in cyberspace—a realm where traditional military threats often fail to provide a credible counter-action.

The “Macrochip” Theory: Binding Code to Energy

To understand why a military commander would view a blockchain as a tool for power projection, one has to move beyond the idea of “digital money” and think about energy. In plain English, Lowery argues that the global electric grid can be viewed as a “macrochip.”

Just as a microchip uses wires to move electricity in encoded logic on a motherboard, the world’s power grids move massive amounts of electricity across borders. Bitcoin mining acts as a “logic gate” for this macrochip. By consuming vast quantities of energy to secure the network via Proof of Work (PoW), Bitcoin converts raw physical power into a scarce digital asset that can be programmed.

The "Macrochip" Theory: Binding Code to Energy
Proof of Work

This creates a physical cost for digital actions. While a government can print currency or a hacker can spoof an identity with a few lines of code, they cannot “print” electricity. Summoning the massive amounts of energy required to influence Bitcoin’s PoW competition is orders of magnitude more difficult than traditional cyberattacks. This, Lowery suggests, binds cybersecurity to the physical world, creating a foundation for resilience that software alone cannot provide.

Element Traditional Power Projection Bitcoin “Power Projection”
Primary Tool Naval fleets, missiles, sanctions Hash rate, Proof of Work, Multisig
Mechanism Physical presence/threat of force Computational cost/energy expenditure
Deterrence Fear of kinetic retaliation Prohibitive cost of computational attack
Constraint Logistics and geography Energy availability and ASIC hardware

From Multisig to the “Electro-Cyber Dome”

The most immediate application of this logic is found in multisignature (multisig) wallets. Unlike traditional bank accounts, which can be frozen by a centralized authority—as seen during the Cyprus “bail-in” or the U.S. Seizure of Russian foreign reserves—multisig wallets require multiple private keys to authorize a transaction.

By geographically decentralizing these keys across different jurisdictions, a nation can ensure its assets remain secure and accessible regardless of local political pressure. This imposes a high cost on attackers, who would need to compromise multiple keys across different locations simultaneously, fitting the military definition of deterrence: the prevention of action through fear of unacceptable consequences.

From Instagram — related to Proof of Work, Cyber Dome

However, Admiral Paparo’s comments hinted at something broader than the asset itself. Lowery’s more ambitious proposal is the “Electro-Cyber Dome.” This concept addresses the fundamental vulnerability of networked machines: “insufficient constraints on control signals.” This is the root cause of DDoS attacks, Sybil attacks and weaponized disinformation—essentially, it is too “cheap” for an attacker to send a malicious signal.

By implementing a Proof of Work requirement—similar to Adam Back’s “Hash Cash” or the mechanism Satoshi Nakamoto used for Bitcoin—a network can force any sender to “pay” in computational energy before their signal is accepted. This makes spamming or flooding a military network prohibitively expensive, effectively creating a digital shield powered by electricity.

The China Dilemma and the Critics

The theory is not without its detractors. Within the Bitcoin community, some have dismissed the idea of “hash rate wars” as a substitute for military conflict as delusional. Jameson Lopp, a prominent Bitcoin developer, praised aspects of Lowery’s work but argued that Softwar falls short as a practical blueprint for the future.

U.S. military runs Bitcoin node, sees crypto as power projection versus China

There is also a glaring strategic contradiction. China currently dominates the manufacturing of ASICs—the specialized chips used for Bitcoin mining. For INDOPACOM, the military branch tasked with maintaining stability in the Indo-Pacific, securing U.S. Networks with an algorithm that China is best equipped to brute-force seems counterintuitive. If the U.S. Military switches to a different PoW algorithm to avoid this dependency, they lose the “macrochip” advantage of the existing Bitcoin network.

This suggests that Lowery’s affinity for Bitcoin may be as much about the inspiration of the protocol as it is about the specific tool. The lesson for the Pentagon may not be “use Bitcoin,” but rather “use the physics of Proof of Work.”

The Middle Ground: Real-World Proofs

Despite the theoretical debates, fragments of this logic are already appearing in the wild. SimpleProof has used the Bitcoin blockchain as a notary to record data hashes, a technique that helped defend against fraud allegations during elections in Guatemala. Michael Saylor’s “Orange Checkmark” protocol attempts to build a decentralized identity system on top of Bitcoin, though it has yet to see widespread adoption.

Even skeptics like Jameson Lopp have implemented PoW-based spam protection on their own websites, proving that while the “Electro-Cyber Dome” may be an ambitious vision, the underlying principle of making digital signals “cost” something is highly effective.

Disclaimer: This article is for informational purposes only and does not constitute financial, investment, or legal advice.

The military’s exploration of these protocols remains in the experimental phase, but the precedent is set. The next critical checkpoint will be the upcoming quarterly review of INDOPACOM’s cybersecurity initiatives, where the results of their Bitcoin node experiments may be further detailed.

What do you think about the military’s interest in Bitcoin’s protocol? Let us know in the comments or share this story on social media.

You may also like

Leave a Comment