Notification
Mycryptopot
  • Home
  • News
  • Crypto
    • Altcoins
    • Bitcoin
    • Blockchain
    • Cardano
    • Ethereum
    • Nft
    • Solana
    • XRP
    • Tron
  • MarketCap
  • Market
  • Forex
  • Mining
  • Metaverse
  • Exchange
  • Regulations
  • Analysis
    • Crypto Bubbles
    • Multi Currency
    • Evaluation
Reading: Has Congress quietly forced the Department of War to use Bitcoin to bankrupt Chinese hackers?
Share
bitcoin
Bitcoin (BTC) $ 77,643.00
ethereum
Ethereum (ETH) $ 2,339.67
tether
Tether (USDT) $ 0.999874
bnb
BNB (BNB) $ 629.01
usd-coin
USDC (USDC) $ 0.999846
xrp
XRP (XRP) $ 1.40
binance-usd
BUSD (BUSD) $ 0.998534
dogecoin
Dogecoin (DOGE) $ 0.109766
cardano
Cardano (ADA) $ 0.252968
solana
Solana (SOL) $ 85.28
polkadot
Polkadot (DOT) $ 1.25
tron
TRON (TRX) $ 0.323281
MycryptopotMycryptopot
Search
  • Home
  • News
  • Crypto
    • Altcoins
    • Bitcoin
    • Blockchain
    • Cardano
    • Ethereum
    • Nft
    • Solana
    • XRP
    • Tron
  • MarketCap
  • Market
  • Forex
  • Mining
  • Metaverse
  • Exchange
  • Regulations
  • Analysis
    • Crypto Bubbles
    • Multi Currency
    • Evaluation
© 2024 All Rights reserved | Powered by Crypto My Crypto Pot
Mycryptopot > News > Crypto > Bitcoin > Has Congress quietly forced the Department of War to use Bitcoin to bankrupt Chinese hackers?
Bitcoin

Has Congress quietly forced the Department of War to use Bitcoin to bankrupt Chinese hackers?

December 11, 2025 10 Min Read
Share
Has Congress quietly forced the Department of War to use Bitcoin to bankrupt Chinese hackers?
mycryptopot

Contents
Pentagon secretly exploring Bitcoin’s army energy?Cybersecurity businesses hyperlink BRICKSTORM backdoor to long-running VMware compromiseThe modification’s associated reporting rails matter for execution.Eventualities to observe over the 2026 horizon stream instantly from the statutory tasking.

The Home’s new fiscal 2026 protection invoice directs the Pentagon to develop choices to impose prices on state-backed hackers who goal defense-critical infrastructure in our on-line world.

Part 1543 of the chamber’s modification orders the Underneath Secretary of Protection for Coverage and the Chairman of the Joint Chiefs of Workers, highlighted by Jason Lowery, in session with different federal entities, to review how army capabilities can elevate adversary prices and cut back incentives to assault, with a briefing and report due by Dec. 1, 2026.

In accordance with the Home Armed Providers Committee textual content, the examine should consider offensive cyber operations on their very own and together with non-cyber measures. It should develop methodologies for selectively revealing or concealing capabilities.

mycryptopot

The mandate is exact in scope and outcomes.

The Pentagon is tasked with assessing adversary capabilities and intent, figuring out targets the place price imposition would have leverage, prioritizing goals, inventorying related Protection Division capabilities and investments, and integrating with different businesses, allies, trade, and academia.

The examine should additionally evaluate authorized and coverage authorities for tailor-made response choices, together with actions in opposition to pre-positioning in vital networks. The modification defines imposing prices as actions that ship financial, diplomatic, informational, or army penalties adequate to vary the adversary’s habits.

Pentagon secretly exploring Bitcoin’s army energy?

Whereas the directive will not be about Bitcoin, it formalizes a cost-imposition framework that aligns with Jason Lowery’s SoftWar thesis, which frames proof-of-work as a power-projection system in our on-line world.

mycryptopot

Additional, the doc goes out of its method to keep away from explicitly naming Bitcoin, opting as a substitute for broader language about “proof-of-work” and price imposition in our on-line world.

That omission could also be deliberate: protecting terminology obscure would restrict what outsiders can infer about capabilities, targets, or operational intent.

The warning additionally tracks with Lowery’s personal historical past; he has beforehand deleted posts and walked again public framing, and SoftWar itself was positioned beneath an official safety evaluate final October, underscoring that elements of this discourse have already been handled as delicate.

In prior reporting, SoftWar has been introduced as a nationwide safety doctrine, not only a crypto narrative, with the core declare that proof-of-work can value abuse and make sure lessons of cyberattacks uneconomical at scale.

A Division of Warfare (previously Protection) safety and coverage evaluate of the thesis positioned the idea into the dwell coverage debate, and subsequent protection of a proposed U.S. Bitcoin nationwide protection coverage described a Mutually Assured Destruction strategy that makes use of credible, energy-backed prices as a deterrent.

Michael Saylor’s public alignment characterised Bitcoin as a digital protection system, an internet-scale cost-imposition layer, reinforcing the doctrinal framing.

The quick context for Part 1543 is an advisory marketing campaign on Chinese language state-sponsored exercise that highlights the long-term persistence of virtualization control-plane exercise.

Cybersecurity businesses hyperlink BRICKSTORM backdoor to long-running VMware compromise

In accordance with Reuters, U.S. and Canadian businesses warned that PRC-linked operators used a customized Go-based BRICKSTORM backdoor in opposition to VMware vSphere, vCenter, and ESXi to determine sturdy entry for lateral motion and potential sabotage, together with a case the place entry spanned from April 2024–September 2025.

Division of Warfare malware evaluation and CISA’s report point out that the tradecraft is in line with pre-positioning that may very well be activated for disruption. Part 1543 goals to design methods to impose prices on that habits, together with choices that mix offensive cyber operations with non-cyber instruments.

SoftWar’s lens turns the statutory language into system design selections.

If the aim is to boost attacker working bills, then right-sized, adaptive proof-of-work turns into a candidate management at high-risk interfaces.

That may embrace consumer puzzles that rate-limit distant administrative actions, pricing bulk API entry, or gating anomalous RPC calls that contact techniques supporting shipyards, depots, and bases.

Selective reveal might sign thresholds that set off pricey verification on the attacker’s path, whereas concealment might quietly drain automated campaigns by changing low cost replay into materials useful resource burn.

Our protection of AuthLN, a proof-of-work-based authentication sample that costs login abuse, confirmed how financial friction modifications attacker return on funding on the level of contact, offering a micro instance of SoftWar economics at work.

The modification’s associated reporting rails matter for execution.

Part 1545 requires annual Mission Assurance Coordination Board reporting on defense-critical infrastructure cyber danger and mitigations, creating an oversight channel that may floor the place cost-imposition would chunk the toughest.

Part 1093’s critical-infrastructure tabletop workouts name out power, water, visitors management, and incident response, the civilian dependencies that underpin protection missions. These venues are appropriate for piloting proof-of-work-priced entry in opposition to conventional charge limits, particularly at public-facing or cross-domain choke factors the place bots have a price benefit.

For practitioners, Part 1543 creates a near-term modeling agenda that blends doctrine and engineering.

One line of effort is to quantify attacker price per motion throughout authentication, administration, and repair endpoints when adaptive proof-of-work is utilized.

One other is to measure the half-life of adversary persistence after public burns and synchronized sanctions or export controls, utilizing dwell-time home windows as a proxy for raised working prices. A 3rd is to trace doctrinal traction by counting official makes use of of ‘impose prices’ or ‘cost-imposition’ in DoD and CISA outputs as soon as the examine is underway.

Metric What it captures The place to use SoftWar tie-in
Attacker Price per 1,000 gated actions Incremental price to execute login/API/admin actions beneath proof-of-work Distant admin, password resets, bulk API, anomalous RPC Costs abuse so automation loses price benefit
Persistence half-life after public burn Time from advisory to eviction and retooling Virtualization management planes, id suppliers, OT gateways Measures capital and time prices imposed on adversary
Coverage traction index Frequency of cost-imposition language in official outputs DoD, CISA, ONCD issuances and pilots Indicators institutional adoption of price design

The most typical pushback in opposition to proof-of-work is the power overhead. The techniques contemplated right here usually are not world puzzles plastered throughout each endpoint.

The design house is right-sizing and adapting proof-of-work at vital choke factors, the place tipping attacker ROI destructive yields outsized protection advantages, which is strictly what a cost-imposition mandate asks the Pentagon to contemplate.

Fee limits and CAPTCHAs exist already; nevertheless, they don’t pressure non-spoofable useful resource burn on the attacker. SoftWar’s premise is that priced actions beat friction, changing low cost spam and brute pressure into measurable expense.

The AuthLN sample provides one blueprint for a way such pricing can match into current authentication stacks with out reinventing upstream structure, aligning with Part 1543’s encouragement to combine with different businesses, trade, and academia.

Eventualities to observe over the 2026 horizon stream instantly from the statutory tasking.

A pilot that attaches dynamic proof-of-work stamps to high-risk actions inside defense-critical infrastructure dependencies would check financial DDoS mitigation and abuse-resistant administration.

A public burn-and-sanctions playbook for an additional BRICKSTORM-like disclosure would goal to pressure the adversary to retool whereas synchronizing diplomatic and financial devices. Coalition norms that use cost-imposition language might formalize a persistent financial friction in opposition to spam and mass automation at public-sector endpoints, complementing episodic takedowns with sustained deterrence.

Every transfer will be tracked in opposition to the metrics above and reported by means of the MACB channel set by Part 1545.

Part 1543 states that the Secretary of Warfare (previously Protection) shall conduct a examine on the usage of army capabilities to extend the prices to adversaries of concentrating on defense-critical infrastructure in our on-line world.

It defines imposed prices as actions that produce financial, diplomatic, informational, or army penalties adequate to vary adversary habits. The report is due Dec. 1, 2026.

Talked about on this article
mycryptopot

You Might Also Like

Is Bitcoin Entering Another 2022-Style Crash? Analyst Warns of Rising-Channel Breakdown

Options gamma pin at $123k holds Bitcoin in a tight range after new ATH

Former New York Stock Exchange President Says Bitcoin Volatility Is “Here to Stay,” Explains Reasons for Decline

Ethereum Reclaims $2,000 as ETF Inflows and Upgrade Roadmap Boost Momentum

Corporate Bitcoiners eye Thailand as gateway to $3.8 trillion ASEAN Bitcoin treasury play

TAGGED:AnalysisBitcoinBitcoin AnalysisBitcoin NewsCoinscryptoFeaturedLegislationPrivacyTechnology
Share This Article
Facebook Twitter Copy Link
Previous Article Bears Still Dominate TRX Crypto As Short-Term Exhaustion Builds Bears Still Dominate TRX Crypto As Short-Term Exhaustion Builds
Next Article image daGama Teams Up with HyperGPT to Transform Real-World Location Discovery
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
mycryptopot

Popular News

Tangle Network Partners with Orochi Network to Advance Blockchain Capabilities
Tangle Network Partners with Orochi Network to Advance Blockchain Capabilities
SONEX launches on Soneium’s mainnet 
SONEX launches on Soneium’s mainnet 
Shiba Inu
Solana Unveils “Seeker” Phone: Will SOL Spike To $250 Now?
Shiba Inu
Cardano: Recent Poll Has ADA Beating Out Ethereum & Solana
image
Big Tech’s multi-billion dollar AI bets are still on track as Mag 7 giants report earnings
Highlights From ABS2024 In Taipei: 13,245 Attendees Gather For Asia’s Premier Blockchain Summit
Highlights From ABS2024 In Taipei: 13,245 Attendees Gather For Asia’s Premier Blockchain Summit
- Advertisement -
mycryptopot

You Might Also Like

image
Bitcoin

BTC Eyes Recovery Toward $85K if Support Holds

March 6, 2026
Morgan Stanley urges CIOs to explore Bitcoin mining stocks amid rising energy prospects
Bitcoin

Morgan Stanley urges CIOs to explore Bitcoin mining stocks amid rising energy prospects

October 14, 2024
Bitcoin
Bitcoin

Bitcoin Vs. Quantum: Saylor Says The Threat Is Over A Decade Off

February 25, 2026
Bitcoin liquidity is drying up in specific regions as a new “pay-to-exit” model quietly takes over
Bitcoin

Bitcoin liquidity is drying up in specific regions as a new “pay-to-exit” model quietly takes over

December 12, 2025
Mycryptopot

"Welcome to MyCryptoPot, your go-to source for the latest insights and developments in the ever-evolving world of cryptocurrency.

Editor Choice

Important Statement from Binance About Two Altcoins – Part of Users’ Losses May Be Refunded
7,143,024,728,061 PEPE in Minutes as PEPE Price Skyrockets
US Pushes $3.7T Stablecoin Surge As China Scrambles To Catch Up

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Facebook Twitter Telegram
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Reading: Has Congress quietly forced the Department of War to use Bitcoin to bankrupt Chinese hackers?
Share
© 2024 All Rights reserved | Powered by Crypto My Crypto Pot
Welcome Back!

Sign in to your account

Lost your password?