A Cyber Attack On Japan Could Bring The USA To War

US secretary of state Mike Pompeo recently declared that “a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.” The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.

“This is significant from the perspective of deterrence,” said Japanese defense secretary Takeshi Iwaya, also present at the briefing.

In the first such meeting between Japanese and US defense officials since 2017, the two sides shared their concerns for stability in the region.

“Geopolitical competition and coercive attempts to undermine international rules, norms, and institutions, especially from China, present challenges to the alliance,” Pompeo said.

At a time when US lawmakers argue over what constitutes state-coordinated digital espionage, definitions are in order.

According to the Japanese Defence Ministry, a cyber-attack is an “abuse of information and communications networks” in the attempt to “access, steal, falsify or destroy information.” Defense against such attacks, there were almost 130b of them against Japan in 2016, has become a pressing issue for the Japanese government. With a majority of these attacks originating from China, it’s difficult to say how the US and Japan will now respond to them.

In a statement, from their defense officials, they said actions would be merited “on a case-by-case basis, and through close consultations.”

But difficulty in tracking responsible actors poses a challenge. In February, when the Australian parliament experienced an attack on its networks, there was speculation that the attempted breach originated from China. 

The attack “suggests a state actor because it’s hard to make money from breaching a parliamentary system,” said Fergus Hanson, head of the International Cyber Policy Center in Australia.

Until simple-to-understand evidence is possible in cyber-attacks, denying as slander will remain the status quo for world powers like China.

Meanwhile, defensive cooperation between allies like the US and Japan will continue behind the scenes.And it would appear that Japan can use all the help it can get. Late last year its minister of cybersecurity admitted not knowing how to use a computer and being confused as to what USB drives are.

Quartz

You Might Also Read:

NATO Could Go To War In Response To A Cyber Attack?:

 

 

« Hackers Delight: Poor Password Security
The CIA's Cloud Contract Is Worth Billions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.