This article describes the information security policies and institutions of the Japanese government and draws attention to comparable policies and institutions of the U.S. government. We begin with a discussion of Japan’s cybersecurity system. In Part II, we examine a particular type of information security policy, namely, cryptography policy, as a special example of how the different systems operate. Japan has implemented a cryptography policy that draws extensively on the Organization for Economic Cooperation and Development (OECD) Cryptography Policy Guidelines. These guidelines are discussed to highlight issues that might emerge in the future in cryptography and merit attention at an international level. Part III analyzes anti-bot policy. Bots, an increasing concern on the Internet, break into an individual user’s PC and remotely control it. Bots pose a real problem for many nations, and there is clearly a need for multinational cooperation. This article concludes by suggesting that all involved parties must determine the appropriate extent of lawful access to communications. Moreover, cooperation in eliminating bots provides a good opportunity for Japan and the United States to lead an international effort.
Cybersecurity has become a national imperative and a government priority. Increased cybersecurity will help protect consumers and businesses, ensure the availability of critical infrastructures on which our economy depends, and strengthen national security. However, cybersecurity efforts must be carefully tailored in order to preserve privacy, liberty, innovation, and the open nature of the Internet.2 To design an effective and balanced cybersecurity strategy, each part of the country’s critical infrastructure3 must be considered separately. Solutions that may be appropriate for the power grid or financial networks may not be suitable for securing the public portions of the Internet that constitute the very architecture for free speech essential to our democracy. Policy toward government systems can be much more prescriptive than policy toward private systems. The characteristics that have made the Internet such a success – its openness, its decentralized and user-controlled nature, and its support for innovation and free expression – may be put at risk if heavy-handed policies are enacted…
Debate continues as to the transformations in terrorism evidenced by the September 11 attacks and since that time. Some, including the former U.S. President, point to changes in the nature of terrorism and argue that September 11 constituted a wholly new form of terrorism that demanded a novel response. Given the prior events of the World Trade Center bombing in 1993 and the East African embassy bombings in 1998, it would appear more appropriate to depict a transformation in scale and tactics rather than nature.
This article seeks to explore a third perspective. It accepts the fact that there have been transformations in terrorism, but it focuses on the actors rather than on their actions. It suggests that one’s neighbor has become a potential foe and that this trend became apparent only gradually after September 11. There are important consequences for law enforcement beyond the major adaptations already incurred. The move toward neighbor terrorism has perhaps been masked by the other more brutal changes, but it is this trend that has the potential to cause the most lasting and insidious impact on everyone’s lives.