We are no longer waging wars in the open. The modern battlefield has become invisible—engineered in code, powered by energy, and enforced through perception. At its center lies a weapon few recognize for what it truly is: Bitcoin. In Part I of this series, we unpacked the origins and architecture of Bitcoin, challenging the familiar myth of a decentralized freedom tool created by a mysterious idealist. What we found instead was a system far too resilient, too strategically aligned, and too timely in its emergence to be coincidence. Bitcoin is not just a currency—it is a sovereign-grade technology, designed to destabilize old powers and empower new ones through an arms race built on energy and encryption. In this installment, we expand the frame: from Baghdad to blockchain, from psychological operations to cryptographic empires, tracing how the lessons of American deception have been reverse-engineered and re-weaponized by the very adversaries it once sought to subdue.
There is a hidden engine behind modern conflict, and none other than Mr. Ryan is impeccably qualified to articulate it. Allow me to build and expand on his accurate assertions. It is no longer speculative—state power is no longer limited to armies, treaties, or even nukes. Today’s wars are algorithmic, financial, and invisible until the market screams. What we’re witnessing is not just another chapter in geopolitical rivalry. This is a new domain of warfare—a decentralized, deniable, and artificially intelligent battleground. At the center of it lies a sovereign-grade weapon disguised as a freedom tool: Bitcoin.
Since its emergence, Bitcoin has defied conventional theories of origin. Its architecture, resilience, and strategic utility point toward something more deliberate, more synthetic, and far more dangerous than a libertarian genius coding in his basement. It was not created to free the masses—it was designed to ensnare nation-states in a new kind of arms race: one based on energy, encryption, and asymmetrical control over inflation itself.
Enter Iran and China. Two nations under constant Western economic pressure, both with massive state-controlled energy infrastructures and a history of opaque strategic operations. The evidence now aligns with what some suspected but could not prove: Iran’s underground nuclear facilities, and China’s hydro-monolith—the Three Gorges Dam—are not merely energy hubs or strategic deterrents. They are digital minting machines, mining Bitcoin not just for capital, but for control.
This isn’t about evading sanctions. It’s about weaponizing the very monetary system that was supposed to be decentralized by monopolizing hashpower, obfuscating flows, and using sudden mining outages as economic pressure points. These installations operate as covert inflation machines, capable of disrupting cryptocurrency markets, shaking rival economies, funding untraceable black operations, and destabilizing fiat currencies without ever firing a shot.
What follows is not theory—it is a breakdown of a modern cryptowar doctrine, already in play.
The wars are happening now. And they’re not just fighting with tanks and drones. They’re fought with terahashes, blackout signatures, and sovereign AIs hiding in plain sight.
The Global Study of American Deception: From Baghdad to Blockchain
There was a moment—seared into global memory—when the world watched the United States fabricate a war with surgical media precision. The lie wasn’t hidden. It was performed. It was televised mass hypnosis. Weapons of Mass Destruction. Colin Powell. Aluminum tubes. Yellowcake uranium.
And nothing was ever found.
But what mattered wasn’t the truth. It was the outcome: regime change, resource extraction, psychological fracturing.
And the world was watching.
The war in Iraq was never just about weapons of mass destruction. It was a masterclass in narrative warfare—a case study in how to overwrite reality through repetition, emotion, and strategic disinformation. The United States didn’t simply launch a military invasion; it launched a psychological campaign of such scale and precision that it rewrote the public’s perception of truth itself. And the world took notes.
France, once considered the gold standard of covert financial influence, found itself eclipsed in this new battlefield. The Lagarde list—an explosive dossier of Swiss account holders leaked from HSBC’s Geneva branch—had once demonstrated France’s prowess in shadow finance. For years, it wielded influence through economic surveillance, banking secrets, and insider manipulation. But when the U.S. marched into Iraq under false pretenses, backed by shaky intelligence and manipulated media, a shift occurred. The old tools of espionage suddenly looked antique. Power had migrated—from wiretaps and briefcases to headlines and hyperlinks.
Iran and China studied the Iraq invasion not just for its military maneuvers but for its messaging infrastructure. They saw how the Pentagon embedded itself into the information stream, deploying what would later be known as IIA—Interactive Internet Activities—designed to create and seed emotionally potent narratives, provoke tribal responses, and erode critical faculties. The war wasn’t won with tanks. It was won with memes before memes had names, with expertly crafted language cycles that trained populations to repeat slogans instead of seek facts.
North Korea understood immediately that this was the new model of conflict. Lacking the economic might of China or the regional depth of Iran, Pyongyang leaned into its strength: asymmetry. It built cyber units instead of armored divisions, investing in hacking schools and crypto-theft networks. The Lazarus Group, operating under North Korean intelligence, would go on to loot hundreds of millions through bank intrusions, ransomware, and elaborate phishing schemes—turning the decentralized promise of crypto into a sovereign piggy bank. But it wasn’t just about the money. North Korea learned how to manipulate digital perception, how to mimic voices, mimic news, and fabricate consensus from behind a firewall of silence.
The psychological operations the United States perfected during the early 2000s weren’t just effective—they were seductive. Viral. Replicable. They became, unintentionally, the instruction manual for authoritarian resilience in the digital age. The WMD lie wasn’t merely a failure of intelligence—it was the proof of concept. If you can lie on that scale and win, why bother telling the truth ever again?
That was the real lesson. And everyone—Tehran, Beijing, Pyongyang, and even Paris— among others was watching.
Perhaps the most astonishing and overlooked achievement of the U.S. campaign in Iraq was not military—it was psychological. Washington managed to do what centuries of caliphates, colonialists, and regional empires had consistently failed to accomplish: it unified the Shia and Sunni factions of Iraq, not in peace, but in shared resistance. Groups that had been divided by generations of sectarian bloodshed and doctrinal rivalry found themselves—however briefly—on the same side, reacting to the same stimuli, resisting the same occupier.
But this unification wasn’t the result of reconciliation or diplomacy. It wasn’t born of compromise. It was engineered through a third axis—one that bypassed religious identity and historical grievances entirely. The United States introduced a form of warfare not rooted in bullets or bombs, but in behavioral design. This was a campaign built on narrative saturation, where language, symbolism, and repetition were used to crowd out coherence and clarity. It was a system of digital mirroring, where every local grievance could be refracted, amplified, and repackaged until no one was sure who was speaking anymore. It was trauma made recursive—an emotional loop designed to collapse the individual’s capacity for reasoned decision-making under the weight of hyper-mediated fear, shame, and confusion.
This wasn’t accidental. It was policy, refined in think tanks and psychological operations units in D.C., and deployed on the streets of Baghdad with breathtaking precision. The tools were not tanks, but instead embedded journalists, disinformation feeds, PSYOP flyers, radio broadcasts, and, later, social media platforms. What began as a military strategy evolved into mass behavior modification.
And others were watching. Iran. China. Russia. North Korea. They weren’t studying the U.S. for its democracy—they were studying it for its machinery of mind control. Because what the Iraq War proved beyond doubt was this: if you can fracture a nation’s sense of self, if you can flood the zone with contradictions and haunt its people with unsolvable fear, then you don’t have to occupy it. You already own it.
The battlefield has shifted. It no longer relies on borders, battalions, or the visible machinery of war. Today, conflict unfolds across digital space, financial systems, and the fragile terrain of public perception. The nations that once cowered beneath America’s surveillance umbrella—the ones targeted, sanctioned, isolated—have not only adapted, they’ve learned to mimic and weaponize the very tools once used against them.
Iran, for example, no longer needs to move gold through backchannels or deal in physical contraband. Instead, its underground nuclear infrastructure now plays a dual role: one part deterrent, one part digital mint. Intelligence reports and leaked internal audits confirm that Iran has harnessed energy from isolated nuclear sites to power expansive cryptomining operations. These aren’t hobbyist rigs; they are scaled operations, disguised behind “flare gas utilization” initiatives and greenwashed rhetoric. The crypto mined in secret moves through dark market channels, funding militias, proxy actors, and networks that can’t be traced through traditional banking systems.
China, meanwhile, has refined its capabilities into a kind of algorithmic statecraft. Even after its public crackdown on Bitcoin mining, the hash rate recovered suspiciously fast, migrating on paper, but with rumors of state-sanctioned shadow mining persisting. Simultaneously, Beijing manipulates capital flows through shell entities and Hong Kong intermediaries, quietly profiting from crypto arbitrage across tightly controlled currency borders. It trains its large-scale AI systems not just on weather models or logistics data, but on the online behavior of American citizens. Platforms like Weibo and TikTok feed vast datasets back into centralized training loops. Western instability becomes a resource, civilizational friction converted into predictive insight.
And then there’s North Korea. It no longer waits for food aid or diplomatic overtures. Instead, it exploits code. Its elite cyber division, housed under Bureau 121 and amplified through the infamous Lazarus Group, has stolen billions in cryptocurrency from decentralized exchanges and state institutions alike. In 2016, it infiltrated the Bank of Bangladesh via the SWIFT network; later attacks targeted Sony Pictures, victims of the WannaCry ransomware, and dozens of cryptocurrency wallets across Asia and Europe. Bitcoin is not a hedge for Pyongyang—it’s a war chest. The regime no longer launders funds through embassies; instead, it moves them through chain-hopping, mixers, and anonymized wallets with surgical precision.
And what of Europe? Once the continent of secret accounts and shadow diplomacy, it now lags in this emerging theater. The Swiss banking system, once untouchable, has been pried open. The Lagarde list exposed thousands of hidden accounts. FATCA and global pressure tore down the old walls of financial opacity. Now, France and its neighbors scramble to catch up—not in gold, but in code. The clandestine arts have shifted to blockchain analytics, metadata tracing, and algorithmic counterintelligence. The ledger has replaced the vault, and the new currency of espionage is computational power.
The surveillance state didn’t collapse. It fragmented, and its most dangerous shards now reside in the hands of those who were once its prey.
What the world learned from Iraq had little to do with military doctrine and everything to do with perception. The U.S. didn’t just invade a country—it rewrote its story in real time, broadcasting justification before facts, conviction before evidence. The weapons of mass destruction never materialized, yet the narrative endured long enough to reshape global opinion, destroy a regime, and fracture a society. It was a demonstration that in modern conflict, perception trumps proof, and reality bends toward whoever controls the signal.
For Iran, China, North Korea, and much of post-glory Europe, the lesson was undeniable. You don’t need to dominate the battlefield if you can dominate belief. You don’t need to present facts if you can flood the zone with symbols. And the most effective weapon is the one that wears the mask of liberation—tools that promise openness, decentralization, and empowerment, even as they silently extract allegiance, data, and control.
The United States became the architect of a new kind of warfare—one fought through language, media, and emotional saturation. It destabilized regimes not just through bombs, but by collapsing the frameworks through which people understand themselves, their governments, and their enemies. Meaning itself became unstable—liquid, fragmented, easily overwritten. And in doing so, the U.S. unwittingly offered the world a new kind of blueprint: a cognitive operating manual for domination without occupation.
Now, the students have surpassed the master. Iran channels nuclear energy into the cryptosphere. China sculpts consensus through digital ecosystems and AI-trained models on imported unrest. North Korea steals entire economies in silence, deploying malware as a substitute for missiles. And across Europe, the legacy intelligence agencies that once thrived on analog secrets now operate in the shadows of global ledgers and algorithmic truth.
But they aren’t merely imitating—they’re innovating. They’ve taken the American model and hardened it. No longer reliant on human persuasion alone, they’ve bound their systems to machine learning, decentralized finance, and energy infrastructures that can’t be easily traced or turned off. They’ve created a battlefield that doesn’t blink, doesn’t rest, and doesn’t ask permission.
What was once a war over territory has become a war over consensus itself. The front lines are now buried in ledgers, cloaked in memes, hidden in anonymized code. These are logic bombs timed not for detonation, but for disruption—quietly altering the foundations of economic stability, digital identity, and political legitimacy.
This isn’t just the future of war. This is the present, unfolding in real time, enforced not by armies, but by algorithms.
Timeline of the Cryptowar: Underground Empires & Digital Weapons
This is not a random sequence of events. It’s a slow detonation. A covert realignment of power where cryptography, electricity, and nuclear ambition intersect—and three nations lead the charge beneath the radar: Iran, China, and North Korea. Each is uniquely isolated. Each is strategically misunderstood. Each is mastering a new kind of warfare.
2002 — The Nuclear Revelation
The world is caught off guard as Iran’s secret underground nuclear facilities are exposed. The United States responds with the Global War on Terror, deploying military pressure on both sides of Iran and Afghanistan to the east, and Iraq to the west.
The pincer is set, but Tehran doesn’t blink. It digs deeper—literally and figuratively.
2011 — The Rise of Digital Extraction
FPGAs begin mining Bitcoin. Inefficient but revolutionary, they mark the start of energy-converted-to-money, untouchable by sanctions or oversight. The mining ecosystem is still small, yet it is not unnoticed.
North Korea, already constrained by global sanctions, begins recruiting cyber talent—the goal: digital theft, cryptocurrency laundering, and sovereign hacking-as-a-service. The Hermit Kingdom isn’t just building bombs.
It’s building an army of keyboard commandos.
2012 — The Second Term, The Quiet Deals
President Obama “wins” re-election. Diplomacy with Iran intensifies in the shadows. Sanctions are crushing, but so is Tehran’s resolve.
Meanwhile, Bitcoin’s price hovers around $13. It’s underestimated. Still obscure. Still ignorable. But in Pyongyang and Tehran, it’s becoming a weapon.
2013 — ASICs Unleashed: Mining Arms Race Begins
ASIC hardware hits the scene, radically outperforming everything before it. Bitcoin mining becomes industrialized, featuring massive server farms, enormous power requirements, and strategic geographic placement.
Iran, already rich in oil and isolated from global banking, pivots:
Underground nuclear facilities double as Bitcoin mining reactors.
The excuse? “Flare-off mitigation.” The reality? Sovereign cryptominting.
North Korea, lacking energy but rich in hackers, pivots the other way:
- Steals crypto wallets.
- Exploits exchange vulnerabilities.
- Deploys Lazarus Group malware campaigns across the globe.
One mines. One steals. Both win.
2016 — $1.6 Billion in Silence
A covert operation: $1.6 billion in foreign cash flown to Iran—a back-channel payout tied to the nuclear deal, off-books and off-ledger. The mainstream press calls it a settlement by Obama (#impeach44)
But the deeper question is: What was that money used to buy?
- Mining equipment?
- Blockchain infrastructure?
- Strategic reserve of BTC?
Meanwhile, North Korea hacks Bangladesh Bank, siphoning off $81 million via the SWIFT system. It’s the first sign: Pyongyang is weaponizing finance with a hybrid model of malware and Bitcoin.
2020–2024 — The Shadow Escalates
Between 2020 and 2024, the shadow war intensified, expanding into the realms of cryptocurrency, cyber sabotage, and infrastructure manipulation. Iran, despite enduring some of the harshest economic sanctions in modern history, has dramatically expanded its cryptocurrency mining operations. Official admissions revealed that tens of megawatts of electrical capacity were being funneled into mining Bitcoin—a strategic move to bypass international financial restrictions and generate untraceable revenue. These operations, often disguised as energy efficiency projects or “flare gas initiatives,” allowed Iran to convert isolated energy into decentralized capital beyond the reach of SWIFT or the IMF.
Meanwhile, North Korea sharpened its cyber tactics with chilling precision. It began targeting blockchain developers directly, using fake job offers and phishing campaigns to infiltrate the very architecture of decentralized technologies. These efforts weren’t limited to theft—they involved the implantation of malware into source code, allowing North Korean actors to compromise platforms at their core, extract private keys, and redirect flows of capital in real time. It was a cyberwar disguised as freelancing.
China maintained its paradoxical posture. While publicly banning cryptocurrency mining and trading, it continued to exert influence behind the scenes. Reports of clandestine operations linked to state-controlled energy producers persisted, particularly in regions dense with hydroelectric infrastructure. The narrative of prohibition masked a deeper strategy: using its command over energy distribution, hardware supply chains, and digital policy frameworks to manipulate global crypto flows from the shadows.
Together, these three nations now operate as a triangulated force in the new era of asymmetric digital warfare. Iran mines the coins. North Korea steals them. And China shapes the battlefield itself—controlling the flow of electricity, the price of hardware, and the backchannels of market movement—all behind a carefully maintained wall of deniability.
What the world learned from Iraq was not simply that wars could be justified on pretenses, but that those pretenses, if delivered with enough precision and emotional weight, could become indistinguishable from truth. The invasion did not depend on finding weapons of mass destruction—it depended on the belief that they existed. Perception, not verification, carried the weight of action. And in that sleight of hand, in that audacious performance of certainty, the United States revealed something far more potent than firepower: the ability to control reality by narrating it first.
This was not lost on America’s rivals. Iran, China, North Korea, and Europe, still reeling from their own post-imperial fragmentation, understood that the battlefield had fundamentally shifted. The real war was no longer for land, but for belief. If a nation could manipulate perception, if it could make people feel threatened, hopeful, enraged, or confused at scale, it could achieve strategic dominance without ever needing to win a firefight. Symbols, language, and emotion—these became tools of disruption. America had perfected the art of collapsing meaning structures: turning once-stable ideas like democracy, sovereignty, and freedom into unstable, volatile signals. The Iraq War wasn’t just a regime change; it was semantic warfare, and the world took notes.
Now, those former observers have become practitioners. But they are not simply mimicking the tactics—they are evolving them. Iran doesn’t just evade sanctions—it builds nuclear-backed cryptomining infrastructures that produce untraceable capital flows. China doesn’t just surveil its population—it trains artificial intelligence on the chaos of Western discourse, creating feedback loops that can predict, preempt, and redirect the behavior of millions. North Korea doesn’t just hack banks—it inserts malware into the very protocols of decentralized finance, weaponizing trust itself. And across Europe, the legacy of covert finance and statecraft has been pushed aside by the cold efficiency of blockchain surveillance, metadata warfare, and synthetic media.
What they all inherited was America’s playbook. What they built from it is something far more enduring. This new warfare is not waged with guns or flags. It is invisible, permanent, and mathematical. It is enforced by algorithms, concealed within consensus protocols, and driven by a belief system that can be updated in real-time.
This is no longer a clash of armies or ideologies. It is a war of ledgers, illusions, and logic bombs—an ongoing contest to control the architecture of reality itself. The Arrogance of former US leadership is evident.
Part III—the final installment of this IC series—will be published shortly. In the meantime, for full context and continuity, you can revisit Part I HERE.
If you like my work, you can tip or support me via TIP ME or subscribe to me on Subscribestar! You can also follow and subscribe to me on Rumble and Locals or subscribe to my Substack. I am 100% people-funded. www.toresays.com
Digital Dominion Series is now on Amazon: VOLUME I, VOLUME II, and Volume III – and Pre-order for Digital Dominion Volume IV is now on sale.