Japan has enacted the Active Cyberdefence Law, a groundbreaking legislative shift that grants sweeping powers to national security agencies to counter growing cyber threats. The move signals a turning point in Japan's traditionally restrained digital posture and aligns its capabilities with global powers, amid escalating tensions in the Asia-Pacific.
In a major departure from Japan's historically cautious approach to national security, the country's parliament has passed the Active Cyberdefence Law (ACD), a sweeping reform that grants authorities the power to actively intercept and disable foreign cyber threats.
The law empowers the National Police Agency (NPA) and Japan's Self-Defense Forces (JSDF) to pre-emptively respond to malicious cyber activity, including disabling overseas servers used in attacks on Japanese networks. The move marks a profound shift in Japan's cybersecurity doctrine, which has long been constrained by Article 9 of its pacifist constitution and by Article 21, which protects the secrecy of domestic communications.
"For years, Japan's cybersecurity strategy has been shackled by legal and cultural limitations . But the volume and sophistication of attacks, many state-sponsored, have made inaction untenable." said a senior government adviser.
The law, introduced by the ruling Liberal Democratic Party in January and passed with bipartisan support, is being hailed as the country's most ambitious cybersecurity reform in decades. Chief Cabinet Secretary Yoshimasa Hayashi called it a "milestone in strengthening Japan's ability to identify and respond to cyber attacks quickly and effectively."
The legislative breakthrough comes amid an unprecedented surge in cyber attacks targeting Japanese infrastructure, government systems, and private corporations. A recent NPA report revealed record-high instances of ransomware, phishing, and espionage-style operations. Many of these are believed to be state-sponsored, particularly by actors in China and North Korea.
Among the most high-profile campaigns was "MirrorFace," a multi-year espionage operation attributed to Chinese threat actors, targeting sensitive national security and defense-related data. The attacks underscored vulnerabilities in Japan's aging cyber infrastructure and pushed policymakers to act.
The government has also highlighted the reluctance of critical infrastructure operators to report breaches, often due to fears of reputational harm. The ACD law now mandates compulsory reporting marking another cultural shift in Japan's cybersecurity landscape.
Additionally, Japan is grappling with a severe talent shortage, with the Ministry of Economy, Trade and Industry (METI) estimating a deficit of over 110,000 cybersecurity professionals. Addressing this skills gap is now seen as integral to the success of the ACD and its long-term strategy.
Beyond giving enforcement agencies new teeth, the ACD signals a broader ambition technological self-reliance. According to a report, the legislation reflects Tokyo's intent to reduce dependence on foreign-built cyber tools, especially those from the U.S. and Israel, and instead develop homegrown solutions tailored to Japan's unique legal and cultural environment.
While the ACD does not permit domestic surveillance, it introduces a constitutional workaround—allowing monitoring of international IP traffic traversing Japanese networks. This aligns Japan more closely with the cyber practices of major Western democracies, while respecting domestic privacy norms.
With geopolitical tensions rising in the Asia-Pacific region, especially around the Taiwan Strait and the Korean Peninsula, Japan's move is being seen as both reactive and strategic a long overdue recalibration of its national security apparatus for the digital age.
As Japan enters this new chapter in cybersecurity policy, the world will be watching how the balance between aggression and accountability, and between protection and privacy, is maintained in a rapidly evolving threat landscape.