Abstract
Cyber conflicts are an important security challenge, but the applicable legal regime remains ambiguous. Especially, low-intensity cyber conflicts, which do not amount to armed conflicts under international law, are difficult to handle legally because the boundary between conflicts and crimes is ambiguous. Domestic debates on the legal response to such cyber conflicts so far have mainly focused on the applicability of self-defense under Japan’s extreme pacifist constitution. However, applying self-defense to low-intensity conflicts is quite difficult under the constitution, and further progress in the debate is unlikely. This study proposes specific ways to respond to cyber conflicts by utilizing countermeasures as a new legal framework. In the first part, after touching on an overview of the application of international law in cyberspace, this study will show the advantages of countermeasures under low-intensity cyber conflicts. In the latter part, through some scenario analyses, this study will clarify concrete ways of how to apply countermeasures, foreseeable problems, and how to respond to them as conclusions. The rationale for this study was mainly based on a literature review, including previous studies, and the scenario study method was also used to draft the conclusions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The International Institute for Strategic Studies (U.K.) produced a report that assessed 15 countries’ cyber power. It ranks a country’s cyber capacity and effectiveness and ranks Japan in the lowest layer, tier.3, due to the delay in developing effective domestic legislation for cyber operations.
- 2.
The Constitution of Japan, articles 9 and 22.
- 3.
The Basic Act on Cybersecurity, article 18, provides that “The national government is to provide necessary measures with the intention to.... clarify the division of roles among relevant bodies as actions to address threats which may critically affect the country’s safety concerning Cybersecurity-related incidents,” which means that those have not been clarified yet.
- 4.
Here, “low-intensity cyber conflicts” means the cyber conflicts which don’t achieve the threshold of armed conflicts.
- 5.
For example, there are several studies about self-defense in cyberspace that are done by Japanese researchers, but it is difficult to find the works related to the application of countermeasures to cyber conflicts considering specific Japanese situations.
- 6.
Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 2.
- 7.
Therefore, in principle, non-State actors cannot owe the responsibility of international wrongful cyber acts.
- 8.
Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 12.
- 9.
Charter of the United Nations, article 2 paragraph 4 and Article 51.
- 10.
Ibid, paras. 194–195. The court said, “the prohibition of armed attacks may apply to the sending by a State of armed bands to the territory of another State, if such an operation, because of its scale and effects, would have been classified as an armed attack rather than as a mere frontier incident had it been carried out by regular armed forces.”
- 11.
Charter of the United Nations, article 33.
- 12.
Draft Articles on Responsibility of States for Internationally Wrongful Acts, article 20–25.
- 13.
There are a few opinions that self-defense can be applied to the use of force that does not meet the threshold of an armed attack, such as the USA, but they are in the minority.
- 14.
For example, the Liberal Democratic Party’s “First Proposal of the Liberal Democratic Party Cyber Security Task Force” (April 24, 2018) advocates “cyber self-defense.”
- 15.
According to Tallinn Manual2.0, there still has been discussion as to whether to include the use of force as a means of necessity.
- 16.
A number of international legal scholars, including Michael N. Schmitt, Jeff Kosseff, Gary Corn, and Sean Watts, have expressed their views on the need for collective countermeasures, and the perceptions of countries appear to be changing. For example, Estonian President Kersti Kaljulaid made a positive affirmation of collective countermeasures in her keynote speech at the 2019 CyCon.
- 17.
Please note that the scenarios and premises are fictional.
- 18.
The Guidelines for Japan-U.S. Defense Cooperation (April 27, 2015) says “To help ensure the safe and stable use of cyberspace, the two governments will share information on threats and vulnerabilities in cyberspace in a timely and routine manner, as appropriate.”
- 19.
COG: Center of Gravity. Identifying the enemy’s COG and attacking it enable countermeasures to be more effective with causing less damage.
- 20.
Concerning self-defense, the U.S.–Japan Security Consultative Committee affirmed that collective self-defense will be applied to a cyber-attack in certain circumstances, based on the U.S.-Japan Security Treaty. However, there is no such agreement regarding international wrongful cyber acts below the threshold of armed attack.
References
The Government of Japan: Cyber Security Strategy. https://www.nisc.go.jp/materials/index.html. Accessed 12 May 2022
International Institute for Strategic Studies (IISS): Cyber Capabilities and National Power: A Net Assessment (2021). https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power. Accessed 12 May 2022
Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, U.N. Doc. A/76/135 (2021)
Open-ended working group on developments in the field of information and telecommunications in the context of international security: Final Substantive Report, U.N. Doc. A/AC.290/2021/CRP.2 (2021)
Schmitt, M. (ed.): Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)
Schmitt, M.: “Below the threshold” cyber operations: the countermeasures response option and international law. Va. J. Int. Law 54, 697–732 (2014)
Kosseff, J.: Collective countermeasures in cyberspace. Notre Dame J. Int. Comp. Law 10, 18–34 (2020)
Keiko, K.: Invoking the right of self-defense against cyber-attacks. In: Eto, J. (ed.) Aspects of International Law Studies Reaching: The Point and Looking Ahead: Mr. Murase Shinya’s Rare Memories, pp. 847–862. Shinzan-sha, Tokyo (2015)
Draft Articles on Responsibility of States for Internationally Wrongful Acts, in Report of the International Law Commission on the Work of its Fifty-third Session, UN GAOR 56th Sess., Supp. No. 10, at 43, U.N. Doc. A/56/10 (2001)
Sugihara, T.: Lectures on International Law. 2nd edn. Yuhikaku, Tokyo (2013)
Case Concerning Military and Paramilitary Activities in and against Nicaragua, 1986 I.C.J.14,181, Merits, Judgement, 27 June
Case The Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania), 1949 I.C.J. 105, Merits, Judgement, 9 April
Ministry of Foreign Affairs of Japan.: Basic Position of the Government of Japan on International Law Applicable to Cyber Operations. https://www.mofa.go.jp/policy/page3e_001114.html. Accessed 12 May 2022
The Liberal Democratic Party: First Proposal of the Liberal Democratic Party Cyber Security Task Force, 24 April 2018. https://www.jimin.jp/news/policy/137263.html. Accessed 12 May 2022
Fischerkeller, M., Harknett, R.: Persistent engagement, agreed competition, and cyberspace interaction dynamics and escalation. In: The Cyber Defense Review, Special Edition, International Conference on Cyber Conflict (CYCON U.S.), 14–15 November 2018, Cyber Conflict During Competition, pp. 267–287. Army Cyber Institute, New York (2019)
Corn, G., Jensen, E.: The use of force and cyber countermeasures. Temple Int. Comp. Law J. 32(2), 127–133 (2018)
Schmitt, M., Watts, S.: Collective cyber countermeasures? Harvard Nat. Secur. J. 12(2), 373–411 (2021)
Roguski, P.: Collective countermeasures in cyberspace: Lex Lata, progressive development or a bad idea? In: The 12th Annual International Conference on Cyber Conflict (Cycon 2020), pp. 25–42. NATO CCDCOE Publications, Tallinn (2020)
The Government of Japan.: The Guidelines for Japan-U.S. Defense Cooperation, 27 April 2015. https://www.mofa.go.jp/region/n-america/us/security/scc/index.html. Accessed 12 May 2022
Ministry of Foreign Affairs of Japan: Joint Statement of the Security Consultative Committee (2019). https://www.mofa.go.jp/mofaj/files/000470738.pdf. Accessed 21 Dec 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Jinnai, T. (2022). Application of International Law to Cyber Conflicts Outline of Japan’s Legal Response Against Low-Intensity Cyber Conflicts Through Countermeasures. In: Kreps, D., Davison, R., Komukai, T., Ishii, K. (eds) Human Choice and Digital by Default: Autonomy vs Digital Determination. HCC 2022. IFIP Advances in Information and Communication Technology, vol 656. Springer, Cham. https://doi.org/10.1007/978-3-031-15688-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-15688-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15687-8
Online ISBN: 978-3-031-15688-5
eBook Packages: Computer ScienceComputer Science (R0)