Skip to main content

Application of International Law to Cyber Conflicts Outline of Japan’s Legal Response Against Low-Intensity Cyber Conflicts Through Countermeasures

  • Conference paper
  • First Online:
Human Choice and Digital by Default: Autonomy vs Digital Determination (HCC 2022)

Abstract

Cyber conflicts are an important security challenge, but the applicable legal regime remains ambiguous. Especially, low-intensity cyber conflicts, which do not amount to armed conflicts under international law, are difficult to handle legally because the boundary between conflicts and crimes is ambiguous. Domestic debates on the legal response to such cyber conflicts so far have mainly focused on the applicability of self-defense under Japan’s extreme pacifist constitution. However, applying self-defense to low-intensity conflicts is quite difficult under the constitution, and further progress in the debate is unlikely. This study proposes specific ways to respond to cyber conflicts by utilizing countermeasures as a new legal framework. In the first part, after touching on an overview of the application of international law in cyberspace, this study will show the advantages of countermeasures under low-intensity cyber conflicts. In the latter part, through some scenario analyses, this study will clarify concrete ways of how to apply countermeasures, foreseeable problems, and how to respond to them as conclusions. The rationale for this study was mainly based on a literature review, including previous studies, and the scenario study method was also used to draft the conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The International Institute for Strategic Studies (U.K.) produced a report that assessed 15 countries’ cyber power. It ranks a country’s cyber capacity and effectiveness and ranks Japan in the lowest layer, tier.3, due to the delay in developing effective domestic legislation for cyber operations.

  2. 2.

    The Constitution of Japan, articles 9 and 22.

  3. 3.

    The Basic Act on Cybersecurity, article 18, provides that “The national government is to provide necessary measures with the intention to.... clarify the division of roles among relevant bodies as actions to address threats which may critically affect the country’s safety concerning Cybersecurity-related incidents,” which means that those have not been clarified yet.

  4. 4.

    Here, “low-intensity cyber conflicts” means the cyber conflicts which don’t achieve the threshold of armed conflicts.

  5. 5.

    For example, there are several studies about self-defense in cyberspace that are done by Japanese researchers, but it is difficult to find the works related to the application of countermeasures to cyber conflicts considering specific Japanese situations.

  6. 6.

    Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 2.

  7. 7.

    Therefore, in principle, non-State actors cannot owe the responsibility of international wrongful cyber acts.

  8. 8.

    Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 12.

  9. 9.

    Charter of the United Nations, article 2 paragraph 4 and Article 51.

  10. 10.

    Ibid, paras. 194–195. The court said, “the prohibition of armed attacks may apply to the sending by a State of armed bands to the territory of another State, if such an operation, because of its scale and effects, would have been classified as an armed attack rather than as a mere frontier incident had it been carried out by regular armed forces.”

  11. 11.

    Charter of the United Nations, article 33.

  12. 12.

    Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 20–25.

  13. 13.

    There are a few opinions that self-defense can be applied to the use of force that does not meet the threshold of an armed attack, such as the USA, but they are in the minority.

  14. 14.

    For example, the Liberal Democratic Party’s “First Proposal of the Liberal Democratic Party Cyber Security Task Force” (April 24, 2018) advocates “cyber self-defense.”

  15. 15.

    According to Tallinn Manual2.0, there still has been discussion as to whether to include the use of force as a means of necessity.

  16. 16.

    A number of international legal scholars, including Michael N. Schmitt, Jeff Kosseff, Gary Corn, and Sean Watts, have expressed their views on the need for collective countermeasures, and the perceptions of countries appear to be changing. For example, Estonian President Kersti Kaljulaid made a positive affirmation of collective countermeasures in her keynote speech at the 2019 CyCon.

  17. 17.

    Please note that the scenarios and premises are fictional.

  18. 18.

    The Guidelines for Japan-U.S. Defense Cooperation (April 27, 2015) says “To help ensure the safe and stable use of cyberspace, the two governments will share information on threats and vulnerabilities in cyberspace in a timely and routine manner, as appropriate.”

  19. 19.

    COG: Center of Gravity. Identifying the enemy’s COG and attacking it enable countermeasures to be more effective with causing less damage.

  20. 20.

    Concerning self-defense, the U.S.–Japan Security Consultative Committee affirmed that collective self-defense will be applied to a cyber-attack in certain circumstances, based on the U.S.-Japan Security Treaty. However, there is no such agreement regarding international wrongful cyber acts below the threshold of armed attack.

References

  1. The Government of Japan: Cyber Security Strategy. https://www.nisc.go.jp/materials/index.html. Accessed 12 May 2022

  2. International Institute for Strategic Studies (IISS): Cyber Capabilities and National Power: A Net Assessment (2021). https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power. Accessed 12 May 2022

  3. Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, U.N. Doc. A/76/135 (2021)

    Google Scholar 

  4. Open-ended working group on developments in the field of information and telecommunications in the context of international security: Final Substantive Report, U.N. Doc. A/AC.290/2021/CRP.2 (2021)

    Google Scholar 

  5. Schmitt, M. (ed.): Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)

    Google Scholar 

  6. Schmitt, M.: “Below the threshold” cyber operations: the countermeasures response option and international law. Va. J. Int. Law 54, 697–732 (2014)

    Google Scholar 

  7. Kosseff, J.: Collective countermeasures in cyberspace. Notre Dame J. Int. Comp. Law 10, 18–34 (2020)

    Google Scholar 

  8. Keiko, K.: Invoking the right of self-defense against cyber-attacks. In: Eto, J. (ed.) Aspects of International Law Studies Reaching: The Point and Looking Ahead: Mr. Murase Shinya’s Rare Memories, pp. 847–862. Shinzan-sha, Tokyo (2015)

    Google Scholar 

  9. Draft Articles on Responsibility of States for Internationally Wrongful Acts, in Report of the International Law Commission on the Work of its Fifty-third Session, UN GAOR 56th Sess., Supp. No. 10, at 43, U.N. Doc. A/56/10 (2001)

    Google Scholar 

  10. Sugihara, T.: Lectures on International Law. 2nd edn. Yuhikaku, Tokyo (2013)

    Google Scholar 

  11. Case Concerning Military and Paramilitary Activities in and against Nicaragua, 1986 I.C.J.14,181, Merits, Judgement, 27 June

    Google Scholar 

  12. Case The Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania), 1949 I.C.J. 105, Merits, Judgement, 9 April

    Google Scholar 

  13. Ministry of Foreign Affairs of Japan.: Basic Position of the Government of Japan on International Law Applicable to Cyber Operations. https://www.mofa.go.jp/policy/page3e_001114.html. Accessed 12 May 2022

  14. The Liberal Democratic Party: First Proposal of the Liberal Democratic Party Cyber Security Task Force, 24 April 2018. https://www.jimin.jp/news/policy/137263.html. Accessed 12 May 2022

  15. Fischerkeller, M., Harknett, R.: Persistent engagement, agreed competition, and cyberspace interaction dynamics and escalation. In: The Cyber Defense Review, Special Edition, International Conference on Cyber Conflict (CYCON U.S.), 14–15 November 2018, Cyber Conflict During Competition, pp. 267–287. Army Cyber Institute, New York (2019)

    Google Scholar 

  16. Corn, G., Jensen, E.: The use of force and cyber countermeasures. Temple Int. Comp. Law J. 32(2), 127–133 (2018)

    Google Scholar 

  17. Schmitt, M., Watts, S.: Collective cyber countermeasures? Harvard Nat. Secur. J. 12(2), 373–411 (2021)

    Google Scholar 

  18. Roguski, P.: Collective countermeasures in cyberspace: Lex Lata, progressive development or a bad idea? In: The 12th Annual International Conference on Cyber Conflict (Cycon 2020), pp. 25–42. NATO CCDCOE Publications, Tallinn (2020)

    Google Scholar 

  19. The Government of Japan.: The Guidelines for Japan-U.S. Defense Cooperation, 27 April 2015. https://www.mofa.go.jp/region/n-america/us/security/scc/index.html. Accessed 12 May 2022

  20. Ministry of Foreign Affairs of Japan: Joint Statement of the Security Consultative Committee (2019). https://www.mofa.go.jp/mofaj/files/000470738.pdf. Accessed 21 Dec 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tetsunosuke Jinnai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jinnai, T. (2022). Application of International Law to Cyber Conflicts Outline of Japan’s Legal Response Against Low-Intensity Cyber Conflicts Through Countermeasures. In: Kreps, D., Davison, R., Komukai, T., Ishii, K. (eds) Human Choice and Digital by Default: Autonomy vs Digital Determination. HCC 2022. IFIP Advances in Information and Communication Technology, vol 656. Springer, Cham. https://doi.org/10.1007/978-3-031-15688-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15688-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15687-8

  • Online ISBN: 978-3-031-15688-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics