Bitcoin, Cybersecurity, and “Power Projection”: Why the U.S. Military Is Paying Attention

May 24, 2026By Nikos Gournas
Nikos Gournas

Bitcoin Enters the Pentagon Conversation
Bitcoin is no longer just a financial asset discussed by traders and tech enthusiasts. It is increasingly becoming part of national security conversations inside Washington and the U.S. military establishment.

That shift became public in April 2026 when Samuel Paparo, commander of United States Indo-Pacific Command (INDOPACOM), told the Senate Armed Services Committee that Bitcoin functions as a “valuable computer science tool as power projection.” He also revealed that INDOPACOM has been experimenting with Bitcoin by running a node.

The comments immediately sparked debate across the crypto industry because they echoed ideas popularized by Jason Lowery, the controversial Bitcoin researcher and author of Softwar: A Novel Theory on Power Projection.

But what exactly does “power projection” mean in the context of Bitcoin? And why would the U.S. military care about a decentralized network originally created as digital money?

The answer sits at the intersection of cybersecurity, energy, deterrence, and geopolitical competition.

 
What “Power Projection” Means in Military Strategy
In military doctrine, “power projection” refers to a nation’s ability to influence or deter adversaries beyond its borders.

According to the U.S. Department of Defense, power projection includes the use of political, economic, informational, and military tools to shape outcomes internationally. Traditionally, this has involved:

Aircraft carriers
Long-range missiles
Intelligence systems
Economic sanctions
Strategic alliances
Cyber operations
Closely connected to power projection is the concept of deterrence — preventing adversaries from acting because the consequences would be too costly.

Historically, deterrence has been easier in the physical world. Nuclear weapons, for example, create deterrence because the damage from retaliation is obvious and devastating.

Cyberspace is different.

Hackers can attack anonymously, cheaply, and from anywhere in the world. Traditional military responses often struggle to deter digital attacks because attribution is difficult and the cost of attacking is usually very low.

This is where Bitcoin enters the conversation.

 
Jason Lowery’s “Softwar” Theory Explained
Softwar: A Novel Theory on Power Projection argues that Bitcoin’s proof-of-work system represents a new form of digital deterrence.

Lowery’s central idea is surprisingly simple:

Bitcoin ties cyberspace to physical reality through energy expenditure.
In Bitcoin’s network, miners compete by spending real-world electricity and computational power. This makes attacks expensive.

Unlike fiat money, which governments can create digitally with little physical constraint, Bitcoin security depends on measurable physical resources:

Energy
Hardware
Infrastructure
Semiconductor supply chains
Lowery compares the global electrical grid to a giant “macrochip” — a planetary-scale computer where Bitcoin mining acts as logic gates powered by real energy.

Under this framework, proof-of-work becomes more than a monetary mechanism. It becomes a way to impose real-world costs on digital behavior.

That cost structure is what creates deterrence.

 
Why Bitcoin’s Proof-of-Work Matters for Cybersecurity
Bitcoin’s security model originated from older anti-spam technologies like Adam Back’s Hashcash system.

Hashcash was designed to fight email spam by requiring senders to perform small amounts of computational work before messages could be delivered.

The idea was elegant:

Sending one email remains cheap for legitimate users.
Sending millions of spam emails becomes prohibitively expensive.
Bitcoin expanded this concept into a decentralized monetary network.

Lowery believes similar proof-of-work systems could eventually defend broader digital infrastructure against threats such as:

DDoS attacks
Spam campaigns
Sybil attacks
Bot networks
Fake identities
Automated misinformation
Forged control signals
By forcing attackers to spend meaningful computational resources, proof-of-work can make cyberattacks more expensive and less scalable.

This is what some military thinkers mean when they describe Bitcoin as a cybersecurity tool rather than merely a currency.

 
Bitcoin Multisignature Wallets as Digital Deterrence
One of the clearest examples of Bitcoin’s security architecture is multisignature custody.

A multisig wallet requires multiple private keys before funds can move. Those keys can be distributed across:

Different countries
Different organizations
Different hardware systems
Different individuals
This creates a powerful deterrence model.

An attacker cannot simply compromise one server or one employee. They must breach multiple systems simultaneously without triggering defensive actions.

In military and institutional contexts, this resembles distributed command-and-control security.

For governments or corporations managing strategic Bitcoin reserves, multisig architecture offers advantages traditional banking systems cannot easily replicate:

No single point of failure
Resistance to political seizure
Global accessibility
Geographic redundancy
Reduced insider risk
This capability becomes especially relevant in an era where geopolitical sanctions and financial weaponization are increasingly common.

 
The “Electro-Cyber Dome” Concept
Lowery extends these ideas further through a concept he calls the “Electro-Cyber Dome.”

The theory proposes that proof-of-work systems could serve as digital defensive barriers protecting networks from malicious traffic.

Instead of allowing unlimited free requests, systems would require computational work before access is granted.

The principle resembles Bitcoin mining:

A participant performs computational work.
The network verifies the work cheaply.
Attackers face escalating costs as attacks scale.
In theory, this could dramatically reduce the effectiveness of:

Mass bot attacks
Automated spam
Coordinated cyber warfare
Identity manipulation systems
The more aggressive the attacker becomes, the more physical energy they must consume.

That physical limitation is what Lowery sees as the foundation for digital deterrence.

 
Why Critics Say the Theory Falls Short
Despite attracting attention inside military circles, the Softwar thesis remains highly controversial.

Critics argue that Bitcoin’s security model only protects Bitcoin itself.

Prominent Bitcoin security expert Jameson Lopp has argued that external systems cannot simply “inherit” Bitcoin’s security guarantees without directly anchoring themselves to the Bitcoin blockchain.

Others question whether military cybersecurity systems would ever rely on Bitcoin’s exact infrastructure, especially given concerns around semiconductor manufacturing concentration in countries like China.

There are also practical concerns:

Proof-of-work systems can consume enormous energy.
Attackers may still overwhelm weaker systems.
Alternative cybersecurity methods may prove more efficient.
Bitcoin’s mining ecosystem was not designed for military command systems.
Even critics sympathetic to Lowery’s ideas often argue that what he describes resembles enhanced versions of Hashcash rather than Bitcoin itself.

In other words, the military may borrow concepts inspired by Bitcoin without literally building on the Bitcoin network.

 
Why the U.S. Military Is Still Interested
Even if Lowery’s broader theories never fully materialize, the Pentagon’s interest in Bitcoin reveals several important realities.

1. Bitcoin Demonstrated Large-Scale Digital Resilience
Bitcoin has operated continuously for more than 17 years without central control.

For military planners, that level of resilience is remarkable.

The network survives:

Nation-state hostility
Censorship attempts
Infrastructure failures
Regulatory pressure
Coordinated attacks
Any system demonstrating that level of survivability naturally attracts defense interest.

 
2. Energy Is Becoming a Strategic Asset Again
Bitcoin transforms electricity into digital scarcity.

That has implications for:

Energy policy
Grid management
Industrial competition
Semiconductor manufacturing
National infrastructure planning
Countries increasingly recognize that computational power and energy production are strategic geopolitical resources.

 
3. Cybersecurity Needs Better Deterrence Models
Modern cyber warfare suffers from asymmetry:

Attacks are cheap.
Defense is expensive.
Proof-of-work flips some of those incentives by forcing attackers to bear escalating costs.

That concept alone is enough to attract serious national security research.

 
Real-World Examples Already Exist
Some projects already use Bitcoin’s infrastructure for applications beyond payments.

OpenTimestamps and Data Verification
Projects like OpenTimestamps allow users to anchor data hashes to the Bitcoin blockchain.

This creates tamper-resistant timestamping systems capable of proving:

A file existed
At a specific moment
Without trusting a central authority
Such systems have already appeared in election integrity and legal verification use cases.

 
Bitcoin-Based Digital Identity Systems
Michael Saylor has also supported decentralized identity initiatives built around Bitcoin infrastructure.

These systems aim to create privacy-preserving identity verification without relying entirely on centralized databases.

While adoption remains limited, they demonstrate how Bitcoin’s architecture could support broader security applications.

 
Bitcoin as Strategic Infrastructure
The most important takeaway is not whether every part of the Softwar thesis proves correct.

It is that Bitcoin is increasingly being viewed as strategic infrastructure rather than merely speculative finance.

To traders, Bitcoin may look like:

A volatile asset
Digital gold
An inflation hedge
But to military planners and governments, Bitcoin increasingly represents:

A resilient communications system
A censorship-resistant network
A model for digital deterrence
An energy-backed security architecture
A geopolitical technology platform
That shift in perception could have long-term implications far beyond price speculation.

 
Final Thoughts
The Pentagon’s interest in Bitcoin signals a broader transformation in how governments understand digital power.

Bitcoin’s true innovation may not simply be decentralized money. It may be the discovery that cyberspace can be anchored to physical reality through energy, computation, and cryptographic verification.

Whether Lowery’s “Softwar” framework ultimately succeeds or not, the debate itself reveals something important:

Bitcoin is no longer confined to economics.

It has entered the strategic arena of national security, cyber warfare, energy competition, and global power projection.

And that means the conversation around Bitcoin is only getting started.