During a recent Senate Armed Services Committee session on April 21st and 22nd, 2026, Admiral Samuel Paparo, the Commander of U.S. Indo-Pacific Command (INDOPACOM), made noteworthy remarks regarding the role of Bitcoin in military cybersecurity. He characterized Bitcoin as a “valuable computer science tool for power projection” and revealed that INDOPACOM is currently experimenting with a Bitcoin node as part of its research into the protocol’s utility.
These comments came in the wake of a significant demand from Iran for payments to be made in Bitcoin for the safe passage of vessels through the Strait of Hormuz, underscoring the geopolitical relevance of cryptocurrencies. The phrase “power projection,” a cornerstone of military strategy, has been elaborated upon by Jason Lowery, a notable figure in the Bitcoin community whose work includes “Softwar: A Novel Theory on Power Projection.” Lowery’s thesis examines Bitcoin’s potential to enhance cybersecurity and deliver power projection in a domain where traditional deterrence strategies fall short.
The U.S. Department of Defense defines power projection as the capacity to swiftly deploy national resources—political, economic, informational, or military—to influence situations beyond national borders. This capability is crucial in deterrence, often defined as maintaining peace through the credible threat of retaliation. Lowery’s thesis posits that Bitcoin’s unique attributes could contribute to a form of deterrence in cyberspace, emphasizing the scarcity of energy required to secure Bitcoin’s blockchain compared to fiat currencies.
At the heart of this discussion is Bitcoin’s proof-of-work (PoW) mechanism, which Lowery likens to a “macrochip” concept, suggesting that the global energy grid can be viewed similarly to a network of interconnected systems utilizing massive amounts of electrical power. He argues that Bitcoin mining—an energy-intensive process—is integral to its resilience and security, providing a formidable challenge for potential cyber attackers.
One of Bitcoin’s prominent features, the multisignature (multisig) wallet, represents a significant advancement in wallet security. Multisig wallets necessitate several private keys to authorize transactions, complicating the hacking process by requiring access to multiple geographically dispersed keys. This decentralization raises the costs of attacks, potentially serving a dual purpose of deterrence and power projection, as Bitcoin funds can be securely stored and used globally.
Interestingly, while INDOPACOM did not explicitly reference Bitcoin as a financial asset in their exploration, they seemed to imply that Bitcoin’s PoW could provide security for data and networks beyond the cryptocurrency itself. Lowery’s concept of the “Electro-Cyber Dome” further develops this idea, suggesting that modern cybersecurity challenges could be mitigated through systems leveraging PoW protocols, similar to Bitcoin’s operations.
Despite its potential, Lowery’s “Softwar” thesis has sparked controversy within the Bitcoin community, with critics questioning its feasibility. Detractors argue that securing external networks with Bitcoin’s technology stack may be impractical. A critical analysis by notable Bitcoin advocate Jameson Lopp acknowledged many of Lowery’s ideas yet ultimately dismissed the notion that Bitcoin could serve as a blueprint for future cybersecurity frameworks.
The complexities of implementing such ideas were further illustrated by the ongoing dominance of China’s ASIC manufacturing for Bitcoin mining, raising questions about whether U.S. military efforts could feasibly employ protocols reliant on hardware produced by a geopolitical rival.
However, there are emerging projects that explore practical applications of Bitcoin’s technology beyond traditional finance. Initiatives like SimpleProof utilize the Bitcoin blockchain to timestamp data, providing verifiable evidence in electoral processes, while the “Orange Checkmark” protocol aims to create a privacy-respecting digital identity system.
In a more philosophical context, Jameson Lopp even implemented a proof-of-work mechanism on his own site to combat spam, highlighting the continued relevance of older concepts in modern technology. The discourse surrounding Bitcoin’s integration into military and cybersecurity paradigms reflects a complex intersection of innovation, security, and geopolitical strategy, making it an area ripe for continued exploration and debate.


