Japan s Cyber Diplomacy

Similar documents
The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

China and International Governance of Cybercrime

Protecting Critical Information Infrastructure in times of increasing cyber conflict

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Resolution: Advancing the National Preparedness for Cyber Security

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Japan-UK Joint Declaration on Security Cooperation

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Australia-Indonesia Facility for

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

Draft Resolution for Committee Consideration and Recommendation

ASEAN s Cyber Confidence Building Measures

Cybersecurity for ALL

International Policy Division, Global ICT Strategy Bureau

Cybersecurity & Spam after WSIS: How MAAWG can help

Investing in Japan Speech by Shuichi Hirano Managing Director, JETRO Sydney. Copyright (C) 2015 JETRO. All rights reserved.

Commonwealth Cyber Declaration

Internet Governance and the World Summit on the Information Society (WSIS)

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks

Promoting Quality Infrastructure Investment in Africa

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Indonesia Cyber Security Market

Hannover Declaration

EU policy on Network and Information Security & Critical Information Infrastructures Protection

International cyber strategy for Norway

ASEAN: One Community, One Destiny.

UNISPACE+50 - the first UN Global

Cybersecurity & Digital Privacy in the Energy sector

Outcomes of the Sendai Framework of Disaster Risk Reduction and the 3rd World Conference on Disaster Risk Reduction

Measures to Maintain Post-Nuclear Security Summit Momentum for Continuously Enhancing Nuclear Security

The Role of International Cooperation in Cyber Security

QBPC s Mission and Objectives

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Singapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

An Internet of Governments: How Policymakers Became Interested in Cyber. Maarten Van Horenbeeck, FIRST Klee Aiken, APNIC

Provisional Translation

U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E ,

3.4 The EU as a partner in cyber diplomacy and defence

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

ITU Model Cybercrime Law: Project Overview

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Related to the Internet

Internet Governance from a Foreign Policy Perspective

RESOLUTION 130 (Rev. Antalya, 2006)

Forum. Ningbo, China 25 February

When Digital Technologies and the Sharing Economy Help Reinvent the Energy Sector

Statement by the President of the European Council. The Hague Nuclear Security Summit. Let me begin by thanking Prime Minister Rutte and the Dutch

Trade Impacts of Forced Localization Measures. April 18, 2016 Japan Electronics and Information Technology Industries Association

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

European Directives and reglements for Information security

ISSUE OBJECTIVES FOR THE 2002 G8 KANANASKIS SUMMIT - DIGITAL OPPORTUNITIES TASK FORCE (DOT FORCE) -

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

RESOLUTION 130 (REV. BUSAN, 2014)

Updates on ASEAN Cooperation on Disaster Management

OCHA POLICY & RESEARCH CONFERENCE

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

10496/18 MC/sl 1 DGD 2

Arms Control Today. The UN Takes a Big Step Forward on Cybersecurity

Why Japan? Masashi Nakazono JETRO Genève. Prepared for Handelskammer beider Basel & JETRO seminar on 4 Nov 2016

German Research Strategy in the Area of Civil Security Research

KISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016

WORKSHOP ON CYBERSECURITY 14 TO 17 AUGUST 2017

Australian Government Cyber-security Activities in the Pacific

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

A Modern European Data Protection Framework

Cyber Security in Europe

European Union Financing Mechanisms for ICT in Latin American context

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Opportunities and Obstacles for Enabling the Use of Geospatial Applications

10025/16 MP/mj 1 DG D 2B

Itu regional workshop

Japan s Measures against Spam

Delegations will find in an Annex a non-paper of the Presidency.

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security

Promoting Energy Efficiency Finance: Examples of Tools and Best Practices. 30 November 2017

Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

Minsk, Belarus

Beijing Call for Action

High-Level Taskforce on Innovative International Financing for Health Systems

Economy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position

What are the next Steps after the UN GGE?

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

Transcription:

Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure a free, fair, and secure cyberspace, strengthening coordination with other countries. In close cooperation with relevant ministries and agencies and a wide range of actors in the private sector, the MOFA will continue to actively conduct foreign policy in the field of cyber, especially 1) promoting the rule of law in cyberspace; 2) developing confidence building measures; and 3) cooperating on capacity building. 1

Growing Cyber Threats There have been cyber attacks against not only Japanese government institutions but also private firms. Japan is no exception of rapidly-growing cyber threats. Data volume related to cyber attacks observed by NICT (annual total packet per one IP address on darknet (approximate figure) ) Rapidly increasing in the last three years 19,000 19,000 36,000 40,000 63,000 115,000 213,000 559,000 469,000 Cases of cyber attacks (reported by news media) Sep. 2011 Attacks against Mitsubishi Heavy Industries, ltd. in Japan Nov. 2012 Attacks against HP of the Supreme Court and the Agency for Cultural Affairs Jun. 2015 Leakage of personal information of 1.25 million people from Japan Pension Service Dec. 2015 Attacks against HP of Prime Minister Abe by Anonymous Jun. 2016 Suspected leakage of personal information of about 6.8 million people rom JTB Corp., a Japanese travel agency Jan. 2018 Coincheck lost 58 billion JPY in hacking attack 2005200620072008200920102011201220132014201520162017 Source: National Institute of Information and Communications Technology (NICT) 2

Differences in Positions on Cyber Security in the International Sphere Ensuring cyber security Maintaining the free flow of information Protecting privacy In balancing these three, there are differences in positions among countries. Prioritizing free flow of information and multi-stakeholder (governments, businesses, civil society and others) approach as fundamental principles Reconfirming existing international law applicable to cyberspace Approach Other neutral countries Approach Prioritizing domestic control based on sovereignty (strengthening regulations, requesting source code and etc. based on domestic law) Being cautious with the application of existing international law to cyberspace. 3

Japan s Cyber Security Diplomacy With the three pillars consisting of 1) promotion of the rule of law in cyberspace, 2) development of confidence-building measures and 3) cooperation on capacity building, Japan aims to further contribute to the peace and stability of the Asia-Pacific region as well as the international community. 2Development of Confidence- Building Measures Promoting discussions on the application of international law to cyberspace and the development of non-binding norms in peacetime 1Promotion of the Rule of Law in Cyberspace UNGGE G7 ARF Developing confidence building measures in peacetime to prevent cyber conflicts and escalations through enhanced transparency and stability in cyberspace 3Cooperation on Capacity Building Conducting capacity building and providing assistance for human resource development considering that security holes in other countries are risk factors for the entire world including Japan 1 Partnerships and dialogues with other countries (1) Currently, Japan has bilateral dialogues on cyber with 11 countries (the US, Australia, the UK, France, Germany, Russia, India, ROK, Israel, Estonia and Ukraine). (2) Japan also has dialogues on cyber with the EU and ASEAN as well as within the Japan-China-ROK and Japan-US-ROK trilateral frameworks. 2 Major Global/Regional Frameworks (1) United Nations Group of Governmental Experts (UNGGE): Governmental cyber experts from different countries discuss issues such as the rule of law and confidence-building in cyberspace within the framework of the UN. Since 2004, five sessions have been held. (2) G7 (Summit Meeting and Foreign Ministers Meeting): The G7 leaders decided to establish a new working group on cyber at Ise-Shima Summit 2016. (3) G20: Cyber is among the agenda and mentioned in the joint statement. (4) ASEAN Regional Forum (ARF): The forum has held Inter-sessional Meeting on Security of and in the Use of Information Communications Technologies(ARF-ISM on ICTs Security) and workshops on cyber. (5) Global Conference on Cyber Space (GCCS) (so called the London Process): Minister-level participants comprehensively discuss various issues on cyber. *In addition, there are a number of track 1.5 dialogues and symposiums sponsored by the non-governmental sector. 4

Way Forward Japan will work together with countries which have common values with Japan to promote the rule of law in cyberspace. Japan will further promote the confidence-building measures and capacity building, mainly in the Asia Pacific region. By doing so, Japan will strive to play an active and key role in securing peace and stability in the region and the international community.