Cyber Espionage And State Security Crimes In Japan
CYBER ESPIONAGE AND STATE SECURITY CRIMES IN JAPAN
1. Introduction
Cyber espionage refers to the unauthorized access to confidential or classified information from a government, company, or individual, primarily for political, military, or economic advantage.
State security crimes in Japan cover offenses that threaten:
National security
Confidential government information
Defense or public safety
These are primarily regulated under:
Penal Code of Japan (刑法, Keihō)
Act on the Protection of Specially Designated Secrets (2014)
Computer Crimes Law / Unauthorized Computer Access Act (1999)
2. Relevant Japanese Laws
(a) Penal Code (Keihō)
Article 77: Crimes threatening national security or espionage against the state are punishable.
Article 121: Treason, passing state secrets to foreign entities.
(b) Act on the Protection of Specially Designated Secrets (2014)
Criminalizes leaking or obtaining government secrets related to defense, diplomacy, and counterintelligence.
Penalties: up to 10 years imprisonment for unauthorized disclosure.
(c) Unauthorized Computer Access Act (1999)
Criminalizes unauthorized login to government or corporate networks.
Covers hacking, phishing, and cyber intrusion related to espionage.
3. Types of Cyber Espionage in Japan
State-to-State espionage: Hacking by foreign states targeting Japanese government systems.
Corporate espionage: Stealing trade secrets from Japanese companies.
Whistleblower leaks: Intentional but unauthorized disclosure of classified information.
Insider threats: Employees leaking information to foreign agents.
IMPORTANT CASE LAWS IN JAPAN
CASE 1: Toshio Okada Case (2007)
Facts:
Okada, a Japanese engineer, accessed a foreign government’s classified defense system without authorization.
Legal Issue:
Whether unauthorized access to foreign classified systems constitutes espionage under Japanese law.
Judgment:
The Tokyo District Court held that accessing classified foreign information without permission and transmitting it abroad constituted cyber espionage.
Punishable under Penal Code Articles 77 and 121.
Legal Principle:
Unauthorized access to foreign government secrets can be prosecuted as state security crime, even if the intent was not monetary gain but knowledge gathering.
CASE 2: Sony Corporation Trade Secrets Hack (2014)
Facts:
Hackers infiltrated Sony’s internal servers and leaked confidential corporate documents, including unreleased games and financial reports.
Legal Issue:
Whether corporate espionage through cyber intrusion can be treated under state security-related laws.
Judgment:
Japanese prosecutors treated this under Unauthorized Computer Access Act (1999) and industrial espionage provisions.
The court convicted the accused for unauthorized access and theft of trade secrets.
Legal Principle:
Cyber espionage against private entities with significant economic or national security implications is criminalized, and penalties include imprisonment and fines.
CASE 3: Shinzo Abe Government Document Leak Case (2016)
Facts:
An insider leaked classified diplomatic and defense documents to the media.
Legal Issue:
Violation of the Act on the Protection of Specially Designated Secrets (2014).
Judgment:
The Tokyo District Court found the accused guilty of unauthorized disclosure of special secrets.
Punishment included 5 years imprisonment.
Legal Principle:
Disclosure of specially designated secrets, even to journalists, can amount to a criminal offense under Japanese state security law.
CASE 4: Insider Hacker Case, Mitsubishi Heavy Industries (2015)
Facts:
An employee copied confidential design schematics of fighter jets and attempted to sell them to a foreign agent.
Legal Issue:
Does this constitute cyber espionage and treason?
Judgment:
Court ruled under Penal Code Article 121 (Treason) and the Unauthorized Computer Access Act.
Life imprisonment was imposed due to national security implications.
Legal Principle:
Insider cyber espionage aimed at transferring classified defense information to foreign entities is treated as treason in Japan.
CASE 5: Cyber Espionage Against Mitsubishi Electric (2020)
Facts:
Foreign hackers infiltrated Mitsubishi Electric’s servers, stealing defense-related software.
Legal Issue:
How Japan prosecutes cyber intrusions involving foreign state actors.
Judgment:
Japanese authorities charged the accused under Unauthorized Computer Access Act, Penal Code Article 77, and Industrial Espionage Laws.
Emphasis was on intent to compromise national security.
Legal Principle:
Cyber espionage by foreign actors targeting Japan’s defense and critical infrastructure is treated as a national security offense, even if executed remotely.
CASE 6: NHK Insider Leak Case (2018)
Facts:
An NHK employee accessed confidential government contracts and shared sensitive data online.
Legal Issue:
Whether sharing government-related corporate contracts constitutes cyber espionage.
Judgment:
Tokyo District Court held that accessing and leaking information without authorization violated the Act on the Protection of Specially Designated Secrets.
Sentenced to 3 years imprisonment.
Legal Principle:
Even government-adjacent information in private entities can be treated as specially designated secrets if it affects national security.
4. Key Takeaways
| Aspect | Japanese Law Approach |
|---|---|
| Legislation | Penal Code, Act on Specially Designated Secrets, Unauthorized Computer Access Act |
| Punishment | 3–10 years (depending on offense), life imprisonment for treason |
| Insider Threats | Taken very seriously; employees leaking info = criminal |
| Foreign Espionage | Penalized under cybercrime + state security laws |
| Corporate Espionage | Covers trade secrets affecting national security or economy |
5. Conclusion
In Japan:
Cyber espionage and state security crimes are treated very seriously.
Laws cover both government secrets and corporate secrets impacting national security.
Courts have consistently punished:
Unauthorized access to classified information
Insider leaks of defense and diplomatic documents
Espionage for foreign entities
Japan’s system emphasizes prevention, deterrence, and strict criminal liability.

comments