Japan passes cybersecurity law granting powers for preemptive defense

Japan passes cybersecurity law granting powers for preemptive defense

The Japanese government has passed a landmark cybersecurity law that authorizes local agencies to conduct preemptive cyber operations aimed at thwarting or suppressing future attacks on the country’s digital infrastructure, Japanese news outlet Kyodo News reported.

Formally titled the Active Cyberdefense Law, the legislation was approved last week and is scheduled to come into full effect by 2027. While its name emphasizes proactive defense, the law goes much further—introducing broad reforms to modernize Japan’s cybersecurity framework.

Under the new law, operators of critical infrastructure such as power grids and railway systems will be legally required to report cyber breaches.

The law also grants authorities the ability to monitor certain international internet traffic passing through Japanese infrastructure, though it explicitly prohibits surveillance of domestic communications or message contents.

Responsibility for neutralizing threats will be divided: local police will handle most attacks, while Japan’s Self-Defense Forces will intervene in more complex, organized threats.

A key component of the law is the creation of “cyber harm prevention officers” within the national police. The officers will be empowered to disable attacker infrastructure, including foreign-based servers, in real time. A newly established independent panel will oversee operations, approving data collection and ensuring that surveillance measures remain within legal bounds.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025