Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

May 9, 2026

Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

May 9, 2026

What Does Bitcoin “Power Projection” Mean To The U.S. Military?

May 9, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    Are overvalued U.S. equities signaling the next crypto market risk? Assessing…

    May 9, 2026

    Swiss Bitcoin Reserve Campaign Fails to Reach Referendum Threshold

    May 9, 2026

    Kraken parent goes for the OCC charter in bid to become a federal crypto bank

    May 8, 2026

    Ethereum Sees Sharp Decline In High-Leverage Long Positions — See What Happens Next

    May 9, 2026

    Ethereum To $10k? Analyst Says ETH Must Clear This Level First

    May 8, 2026

    Ethereum Struggles as Traders Await CLARITY Act Catalyst

    May 8, 2026

    Tom Lee Says Ethereum Price Could Reach $22,000 Leading Next Crypto Rally

    May 8, 2026

    Adoption & Activity Plunge From 2024 Peak

    May 9, 2026

    Analyst Predicts Bitcoin Price Will Top $320,000 After ‘Cleanest Signal’ Emerged

    May 8, 2026

    100K BTC Vanish From Exchanges

    May 8, 2026

    Bitcoin Found Support Where Recent Buyers Can’t Afford to Lose: Discover the Mechanics

    May 8, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    Xange.com, Aptos Labs, and Decibel Foundation Partner

    May 9, 2026

    Chainlink Completes Compliance Initiative With Bermuda Monetary Authority

    May 9, 2026

    AWS Launches AI Agent Payment Infrastructure with Coinbase and Stripe

    May 9, 2026

    Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns

    May 5, 2026

    Digital Asset Security Moves Beyond Keys as Bitgo Adds 5-Layer Checks

    May 1, 2026

    Defillama Confirms April 2026 as Crypto’s Most-Hacked Month With 30 Incidents

    May 1, 2026

    Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto W

    April 29, 2026

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026
  • Web 3
    1. Gaming
    2. View All

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Top NFT games in 2026 shift from speculation to real ownership risks

    May 9, 2026

    What the CLARITY Act Means for NFT Projects: A 2026 Builder’s Guide

    May 8, 2026

    Top 8 play-to-earn NFT games to play in May 2026

    May 7, 2026

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026

    30 Defendants Charged in Massive Insider Trading Ring Linked to Law Firms

    May 9, 2026

    South Korean Court Rules Orbit Bridge Operator Liable for $80.5 Million Hack

    May 9, 2026

    Monaco opens Zondacrypto probe as Poland alleges pyramid scheme

    May 8, 2026

    Cardano’s Charles Hoskinson says the future of crypto wallets will be inside iPhones and Androids

    May 8, 2026

    How to choose a safe DeFi platform before you deposit in 2026

    May 7, 2026

    If GameStop buys eBay, Bitcoin payments could suddenly have a 135M-buyer marketplace test case

    May 5, 2026

    Canada wants to ban crypto ATMs as fraud fears turn Bitcoin access into a political target

    May 3, 2026

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026
  • Analysis

    Can XTZ Price Escape Its Multi-Year Downtrend?

    May 8, 2026

    STRK Price Jumps 50% But Starknet Still Faces Brutal Reality

    May 8, 2026

    Global Gold Demand Soars to Record $193,000,000,000 As Trade Group Says Geopolitical Risk Premium To Continue Raising Demand

    May 8, 2026

    How XRP can break its all-time high this year

    May 8, 2026

    Will Insurance Adoption Push HBAR Price Higher?

    May 7, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Coinbase went down for over 5 hours after missing earnings. Bulls still see a path to $300 billion by 2030

    May 8, 2026

    Coinbase cuts 14% of staff as Armstrong ties cost reset to AI and market volatility

    May 6, 2026

    Bitcoin is still in charge

    May 3, 2026

    CLARITY Act stablecoin fight shifts from yield to who captures digital-dollar economics

    April 29, 2026

    Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

    May 9, 2026

    Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

    May 9, 2026

    What Does Bitcoin “Power Projection” Mean To The U.S. Military?

    May 9, 2026

    South Korea to Impose Crypto Tax, Starting January 2027

    May 9, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Bitcoin»What Does Bitcoin “Power Projection” Mean To The U.S. Military?
Bitcoin

What Does Bitcoin “Power Projection” Mean To The U.S. Military?

May 9, 2026No Comments11 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

On April 21st and 22nd 2026, during a Senate Armed Services Committee, Admiral Samuel Paparo of U.S. Indo-Pacific Command made comments on Bitcoin’s utility in cybersecurity for the country’s military, calling it a “valuable computer science tool as power projection,” and disclosing that INCOPACOM is running a Bitcoin node in their experiments with the protocol.  

The comments by the INCOPACOM Commander came just days after the Islamic Republic of Iran demanded payment in Bitcoin for safe passage across the Strait of Hormuz. The mention of “power projection” echoed the work of a famous and controversial Bitcoiner, Jason Lowery, author of Softwar: A Novel Theory on Power Projection, MIT Fellow and Special Assistant to the Commander of INDOPACOM. 

In his work — which involved an MIT thesis and book expanding on his work — Lowery discussed the cybersecurity value of Bitcoin and its unique ability to deliver “power projection” in cyberspace, a landscape of national security and military operations that otherwise lacks traditional deterrence options. 

The book gained significant popularity and earned Lowery both fans and critics across the Bitcoin industry, but was later taken down from distribution by Lowery at the request of his superiors. An event that suggested to some that the book might have something important enough that the U.S. military wants to keep it quiet. 

But what is this unique value that Bitcoin brings to military matters, and what does “Power Projection” in this context actually mean? 

According to Department of Defense’s 2002 Dictionary of Military and Associated Terms, power projection is; “The ability of a nation to apply all or some of its elements of national power – political, economic, informational, or military – to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises, to contribute to deterrence, and to enhance regional stability.” In other words, the ability of a nation to influence the behavior of other nations or political entities of interest, at a range beyond its national borders. Examples can range from diplomatic to economic influence, as well as military capabilities such as long-range missiles, drones or a powerful navy. 

The word deterrence is also doing a lot of work here. The DoD defines it as: “The prevention from action by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction.”

Lowery brings Bitcoin into the world of deterrence in the physical world by presenting a particularly interesting insight. That just as microchips are essentially wires moving electric power in “encoded logic” inside a computer’s motherboard, so can the globe’s electric grid be seen as a kind of “macrochip”, with giant wires moving large amounts of electricity from power sources across nations and throughout the world. These macrochips now also have logic gates in the form of Bitcoin mines — Lowery argues — they consume large quantities of energy, converting it into the scarce digital asset, which can be programmed via Bitcoin script. 

The Bitcoin macrochip could, in theory, bind cybersecurity matters to the physical world, since energy output is one of the most important and expensive resources a nation can muster. While governments can print paper money at will, summoning massive amounts of electricity to influence something like Bitcoin’s proof of work competition is orders of magnitude more difficult and is the basis of Bitcoin’s resilience.

See also  $110B in Crypto Flees South Korea in 2025 as Strict Trading Rules Push Investors Offshore

Bitcoin’s Multisignature Deterrence

The most obvious and powerful demonstration of Bitcoin’s “embedded logic” security is the invention of multisignature Bitcoin wallets, which safeguard much of the Bitcoin wealth today. 

Multisignature wallets require multiple predefined private keys to sign valid transactions before Bitcoin can be transferred, making it possible to geographically decentralize the storage of Bitcoin private keys across space and jurisdictions. 

Multisig challenges hackers not just to hack one key pair, but multiple, across multiple locations under time constraints, since users have the advantage of legitimate access to those keys and can potentially move the bitcoin quickly in response to a threat. Hackers must gain access to enough keys while also fooling alarms and safeguards, avoiding getting caught. Multisig imposes high costs on attackers and, as such, might very well fit the definition of ‘deterrence’. It may even fit the definition of ‘power projection’ as Bitcoin funds can be kept secure and available to be sent when needed anywhere in the world, thanks to Bitcoin’s other networking-based censorship resistance qualities. 

This differs from traditional finance and its centralized databases since Banks can freeze and confiscate assets from their rightful owners when pressured politically, as seen in cases like that of Cyprus and their 40% bail in, or the United States’ confiscation of Russia’s foreign treasury reserves held in European custody.

But INDOPACOM did not explicitly talk about Bitcoin, the asset, in their comments; they seemed to think Bitcoin’s proof of work protocol could secure data and networks external to the Bitcoin asset. But the Bitcoin script, the logic internal to the Bitcoin blockchain, only governs BTC, its internal asset. 

For external networks to benefit from Bitcoin’s powerful proof of work macrochip, they would have to be anchored to Bitcoin somehow, and that’s where much of Lowery’s thesis starts to stall out. He does, however, develop this idea further by proposing the “Electro-Cyber Dome”.

Cyber Security Threats and the Electro-Cyber Dome

In Software 2.5, Lowery argues that “software system security vulnerabilities are derived from insufficient constraints on control signals” sent to networked machines. An example of this might be fake login attempts that cost a website more computer resources to authenticate than they cost attackers to send. Lowery adds that such vulnerabilities “can be exploited in such a way that it puts software into insecure or hazardous states.” Examples of such network security exploits include, but are not limited to:

  • Email spam and comment spam — superfluous emails and comments that flood inboxes or forums.
  • Sybil attacks — creation of large numbers of fake identities to manipulate systems.
  • Bots and troll farms — automated or coordinated accounts used to amplify malicious activity.
  • Weaponized misinformation/disinformation campaigns — flooding networks with false or manipulated information.
  • Distributed Denial-of-Service (DDoS) attacks — flooding networks with superfluous control signals (service requests) to overwhelm bandwidth.
  • Forged or replayed control signals — impersonating legitimate commands, orders, or data that put software into insecure/hazardous states.
  • Systemic exploitation of administrative permissions/insider abuse — exploitation of trust-based hierarchies where high-privilege accounts can be compromised or misused.
See also  Tennessee Lawmakers Weigh Strategic Bitcoin Reserve Bill

Lowery suggests that other networks could defend themselves against all of these threats to some significant degree using proof of work (POW) protocols like Bitcoin’s.

In the Bitcoin white paper, Satoshi Nakamoto defined Bitcoin’s POW quite elegantly: “The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash.”

Nakamoto specifically references Adam Back’s “Hash Cash, A Denial of Service Counter-Measure”, which was designed to make email spam costly by requiring computers sending an email to produce a POW stamp of a difficulty defined by the recipient of the email. Recipient servers would need to keep a list of stamps already used, in order to prevent reuse of the same work by attackers, aka to prevent “double-spending” attacks. These stamps, however, were not transferable, a quality which some cypherpunks wanted in their pursuit of digital money. Hal Finney was one such engineer who furthered the field by inventing RPOW, or reusable proof of work.

RPOW essentially tokenized POW stamps via a centralized server that kept track and facilitated transfers. One of Nakamoto’s key innovations was decentralizing this server and its list of spent stamps, in the form of the blockchain, while also defining a global difficulty algorithm that all Bitcoin miners must satisfy, rather than relative difficulty targets chosen by each website at will. 

Lowery, in his concept of the Electro-Cyber Dome, is essentially talking about Hash Cash. He specifically says that servers can choose the difficulty target they see fit, and never proposes that the Dome would or should use Bitcoin’s SHA-256 protocol, though it is implied in his idea of the macrochip. What he does do is use Bitcoin as the principal example of such a cybersecurity network actually working at scale; “We know for sure that electro-cyber domes can function successfully as a security protocol because this is what Bitcoin uses to secure itself and its own bits of information against systemic exploitation.”

Lowery goes further than defense, pointing out that as such systems gain adoption, a concept of aggression becomes possible by large miners, he writes; “it should be noted that this wouldn’t be a strictly “defensive” power projection capability…People with access to proof-of-power can theoretically “smash” through these electro-cyber dome defenses if desired. Thus, proof-of-power protocols are not strictly “defense only” protocols as some have argued. A top threat to people using physical cost function protocols like Bitcoin is other people using the same protocol (hence why Nakamoto mentions the word “attack” 25 times in an 8-page whitepaper, each time referring to people running the same protocol).”

Criticisms of Lowery’s Softwar Thesis 

Lowery’s Softwar thesis can be fairly described as controversial within the Bitcoin community. It’s optimistic take that large portions of military conflict could instead be settled via hash rate wars in some future has been described by Shinobi at Bicoin Magazine as “delusional”. 

See also  Stablecoin Supply Hits Record $304.5 Billion—Is a Massive DeFi and Bitcoin Rally Next?

Broadly speaking, critics reject the idea that data or networks external to Bitcoin can be secured in any way with Bitcoin’s technology stack, be it its POW, its blockchain or its native asset. Jameson Lopp did a multi-part review of Lowery’s thesis and book, praising many aspects of the thesis but ultimately dismissing its conclusions, saying that: “Softwar falls short on acting as a blueprint for how we should build the future.”

The most obvious question to me is whether using SHA-256 proof of work to gatekeep access to networks outside of Bitcoin makes sense in the first place, or if it could even be considered using Bitcoin. If the Electro-Cyber Dome is not demanding a high enough POW difficulty to mine any Bitcoin, if it does not use Bitcoin’s target difficulty, its asset or its blockchain, then is it using Bitcoin? 

Furthermore, given that China has the bulk of the ASIC manufacturing industry for Bitcoin mining, would INDOPACOM — the U.S. military branch in charge of keeping the Indo Pacific in check — really want to secure its cyber networks with algorithms that China mass produces chips to brute force? That seems like an awkward decision to make at best, and is more likely to lead them to consider alternative POW algorithms. But at that point, they certainly would not be using Bitcoin and would lose the macrochip argument. It would instead be using classic Hash Cash, and maybe that’s the lesson in this story. Lowery’s affinity with Bitcoin might be more of a marketing strategy and a shout-out to an industry that inspired him, rather than the actual tool that INDOPACOM might end up using.  

The Happy Middle Ground

In the gap between theory, implementation, and criticisms of Software style ideas, there exist some projects that serve as young but curious examples of how Bitcoin can secure more than money. 

SimpleProof, an Open Time Stamps-based Bitcoin notary of sorts, has been using the blockchain to record hashes of data, demonstrating that a certain version existed at a certain time. This very narrow use of Bitcoin as a time-stamping server helped defend one side of the Guatemala elections a few years ago from accusations of fraud by the opposition, resulting in real political consequences for the country. 

Michael Saylor, on the other hand, led the creation of what some have called the Orange Checkmark protocol on top of Bitcoin. This tech stack, which can be found on Github, is a privacy preserving Bitcoin native decentralized digital identity system. It gained some interest from the Bitcoin community when it was announced a couple of years ago, but it does not appear to have gained any adoption. 

Finally and ironically enough, Jameson Lopp, perhaps Lowery’s most verbose critic with three dedicated articles on the topic, actually implemented a proof-of-work-based spam protection mechanism on his website for a submission form, which, according to Lopp, works well. So if even he can see the use of these old ideas, even if just based on Hash Cash, then perhaps we will one day see Bitcoin-like technologies used to secure the networks and data of the world. 

Bitcoin military power projection U.S
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Are overvalued U.S. equities signaling the next crypto market risk? Assessing…

May 9, 2026

Swiss Bitcoin Reserve Campaign Fails to Reach Referendum Threshold

May 9, 2026

Kraken parent goes for the OCC charter in bid to become a federal crypto bank

May 8, 2026

Analyst Predicts Bitcoin Price Will Top $320,000 After ‘Cleanest Signal’ Emerged

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Bitcoin’s $100,000 climb hindered by US financial turbulence

February 13, 2026

Strait Of Hormuz Chaos Could Trigger Ripple’s New Financial Era — Here’s How

March 3, 2026

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Miniverse Partners with UNIPLAY to Expand CoFi Across DeFi and GameFi

May 9, 2026

Fomoin Partners with Catto Verse to Advance AI-Powered Web3 Innovation

May 9, 2026

What Does Bitcoin “Power Projection” Mean To The U.S. Military?

May 9, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.