The White House has released President Trump’s National Cyber Strategy for America, marking the first U.S. cybersecurity framework that explicitly names cryptocurrencies and blockchain technologies as priorities for federal protection and security support.
The March 6, 2026 document outlines six policy pillars addressing adversary deterrence, federal network modernization, and emerging technology leadership, while language targeting criminal infrastructure has sparked industry speculation about potential enforcement actions against mixers, privacy coins, and unregulated off-ramps.
Galaxy Digital’s head of firmwide research Alex Thorn noted that crypto and blockchain are explicitly named as technologies to be “protected and secured,” a first for any U.S. cybersecurity strategy. The six-page document states: “We will build secure technologies and supply chains that protect user privacy from design to deployment, including supporting the security of cryptocurrencies and blockchain technologies.”
This marks a significant policy shift from prior frameworks, which addressed crypto largely through the lens of illicit finance. The latest strategy frames blockchain as essential to American innovation and positions it as a counterweight to foreign digital platforms that enable censorship or state surveillance.
The strategy’s fifth pillar focuses on critical and emerging technologies, grouping blockchain alongside post-quantum cryptography, quantum computing, and artificial intelligence as strategic U.S. priorities. The administration commits to securing the AI technology stack—including data centers—while promoting innovation in AI security.
CFTC Chair Mike Selig commented on the strategy’s significance, stating: “President Trump’s Cyber Strategy for America makes it a national priority to secure crypto networks and protocols against cyber threats. This is critical as the CFTC modernizes its rules and regulations for on-chain markets.”
Industry executives are closely analyzing sections of the document beyond explicit crypto mentions. Thorn pointed to a provision pledging to “uproot criminal infrastructure and deny financial exit and safe haven,” noting that this language could easily justify crackdowns on mixers, privacy coins, and unregulated off-ramps.
The strategy’s first pillar, focused on shaping adversary behavior, commits to disrupting cybercrime networks and imposing costs on threat actors with burden-sharing among allies. This dual signal—protecting legitimate crypto infrastructure while targeting illicit financial tools—creates a nuanced policy landscape for industry participants.
The pledge to cut off financial exit routes has raised questions about the future of privacy-preserving technologies within the U.S. regulatory framework. While the strategy explicitly supports cryptocurrency security, the language targeting criminal infrastructure could provide justification for enforcement actions against tools designed to obscure transaction visibility.
Castle Island Ventures founder Nic Carter highlighted the strategy’s attention to quantum computing risks. The document states the government “will accelerate the modernization, defensibility, and resilience of federal information systems by implementing cybersecurity best practices, post-quantum cryptography, zero-trust architecture, and cloud transition.”
Carter noted: “Sure seems like they’re taking quantum seriously. Nothing to worry about, I’m sure,” in an X post. The comment reflects ongoing industry debate about how close quantum computing is to becoming a serious threat to Bitcoin’s cryptographic foundations.
On February 15, Carter expressed concerns that major Bitcoin-holding institutions may eventually lose patience with Bitcoin developers for not addressing quantum computing concerns quickly enough. The cyber strategy’s explicit promotion of post-quantum cryptography directly addresses this risk, though it sets direction without specifying timelines or responsible agencies.
The cyber strategy fits into a wider set of digital asset policy moves by the Trump administration, including exploration of a U.S. Bitcoin reserve, proposed stablecoin legislation through the CLARITY Act and GENIUS Act framework, and efforts to provide clearer tax treatment for digital assets through recent IRS proposals.
The CFTC is currently expanding oversight of spot digital asset markets, reducing the SEC’s jurisdiction over assets like Bitcoin and Ethereum classified as commodities. Selig’s remarks connecting the cybersecurity strategy directly to that regulatory buildout frame secure blockchain infrastructure as a precondition for functioning on-chain markets.
Trump emphasized the importance of recruiting the next generation of workers in the cyber workforce to “design and deploy exquisite cyber technologies and solutions.” This focus on human capital development aligns with the strategy’s broader goals of maintaining American technological leadership.
The six policy pillars cover adversary deterrence, federal network modernization, and leadership in emerging technologies. However, the document sets direction without specifying timelines or agencies responsible for implementation, leaving industry participants to monitor how the framework translates into concrete regulatory actions.
The strategy’s dual nature—supporting crypto infrastructure while targeting illicit financial tools—creates both opportunities and risks for industry participants. As enforcement priorities develop, the interpretation of provisions targeting criminal infrastructure will determine whether mixers, privacy coins, and other privacy-preserving technologies face heightened scrutiny.
Q: How does the new cyber strategy differ from previous U.S. cybersecurity frameworks regarding crypto?
A: This is the first U.S. national cybersecurity strategy that explicitly names cryptocurrencies and blockchain technologies as priorities for federal protection and security support. Prior frameworks addressed crypto largely through the lens of illicit finance, while the current strategy frames blockchain as essential infrastructure warranting protection.
Q: Does the strategy signal potential crackdowns on mixers and privacy coins?
A: Industry analysts interpret language pledging to “uproot criminal infrastructure and deny financial exit and safe haven” as potentially justifying enforcement actions against mixers, privacy coins, and unregulated off-ramps, even as the strategy separately commits to supporting cryptocurrency security.
Q: How does the strategy address quantum computing threats to crypto?
A: The document explicitly promotes post-quantum cryptography as part of federal information system modernization. This acknowledges the risk quantum computing poses to current blockchain cryptographic standards, though it sets policy direction without specifying implementation timelines.
Q: What role does the CFTC play in implementing the strategy?
A: CFTC Chair Mike Selig connected the cybersecurity strategy to the agency’s ongoing modernization of rules for on-chain markets, framing secure blockchain infrastructure as a precondition for functioning digital asset markets under CFTC oversight.