‘Cyberattacks are having a huge impact on people’s lives and economic activities’: Japan joins list of countries turning towards offensive cyber operations
Offensive cyber operations are becoming the norm
Sign up for breaking news, reviews, opinion, top tech deals, and more.
You are now subscribed
Your newsletter sign-up was successful
- Japan's military will be allowed to conduct offensive cyber operations
- The government's decision involved a reinterpretation of the constitution
- Japan faces "the most complicated national security environment" since 1945
From October 1 2026, Japan’s Self-Defense Force will be allowed to conduct offensive cyber-operations.
Japan’s government made the decision to interpret Clause 9 of the country's constitution to allow for offensive cyber-operations that pursue infrastructure used to conduct cyber attacks.
Chief Cabinet Secretary Minoru Kihara explained in his afternoon briefing that Japan faces, “the most complicated national security environment” it has seen since World War II.
Article continues belowReinterpreting the constitution
When Japan adopted its modern constitution in 1946, Article 9 outlawed the nation’s ability to participate in any military acts of aggression. As a result, the Japanese military has been known as the Japan Self-Defense Forces (JSDF) since its founding in 1954.
However, there have been several reinterpretations of Article 9, including a 2014 reinterpretation to allow the Self-Defense Forces to contribute towards and support allied actions that are combating a situation that threatens the existence of Japan.
Now, with cyberspace increasingly becoming a further platform for countries to conduct offensive operations, Japan is once again changing its interpretation.
The decision to pursue offensive actions in cyberspace will not be the sole discretion of the JSDF. A government cyber-management committee will provide authorization on offensive cyber actions on a case-by-case basis.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
This is quickly becoming a global trend. The Trump administration recently unveiled its National Cyber Strategy to provide the administration with the capacity to “deploy the full suite of US government defensive and offensive cyber operations”. The strategy also stated that the US “will not confine [its] responses to the “cyber” realm,” suggesting real world actions against infrastructure used to commit cyber attacks.
Why are nations turning towards offensive cyber ops?
Traditionally, cyber attacks committed by, or on behalf of, nation states have been for intelligence gathering purposes or for sabotage. Russia, Iran and China have been spotted probing US critical infrastructure for years, with the likely intention being supportive attacks in the outbreak of a full conflict.
Now, with AI lowering the barriers for entry into the world of cyber, attacks have spiked significantly. Much of our life exists in the digital world and is an attractive target for both low caliber attackers looking to make some quick money, and for nation states looking to influence elections or cripple communications.
It is becoming clear that many countries are beginning to see offense as the best defense, especially as months long international operations to shut down online forums selling stolen data can be circumvented by simply rehosting the forum elsewhere. Targeting the real-world infrastructure appears to be a preferable choice.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Benedict has been with TechRadar Pro for over two years, and has specialized in writing about cybersecurity, threat intelligence, and B2B security solutions. His coverage explores the critical areas of national security, including state-sponsored threat actors, APT groups, critical infrastructure, and social engineering.
Benedict holds an MA (Distinction) in Security, Intelligence, and Diplomacy from the Centre for Security and Intelligence Studies at the University of Buckingham, providing him with a strong academic foundation for his reporting on geopolitics, threat intelligence, and cyber-warfare.
Prior to his postgraduate studies, Benedict earned a BA in Politics with Journalism, providing him with the skills to translate complex political and security issues into comprehensible copy.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.