Japanese government will hack citizens' IoT devices

(Image credit: Image Credit: Chesky / Shutterstock)

In preparation for the Tokyo 2020 Summer Olympics, the Japanese government has approved a law amendment that will allow government workers to hack into unsecured Internet of Things (IoT) devices as part of a national survey.

The survey will be conducted by employees of the National Institute of Information and Communications Technology (NICT) under the supervision of the country's Ministry of Internal Affairs and Communications.

By using default passwords and password dictionaries, NICT employees will attempt to log into the IoT devices of Japanese consumers in an effort to gauge their security or lack thereof.

A list of insecure IoT devices that use default and simple passwords will be prepared and passed on to the authorities and ISPs so that they can alert consumers regarding how to properly secure these devices.

The survey will begin next month when NICT plans to test the password security of more than 200m IoT devices starting with routers and web cams. Both consumer devices in citizens homes will be tested along with those on enterprise networks.

Olympic security

The Japanese government decided to carry out its unconventional survey as part of its plan to prepare for the Tokyo 2020 Summer Olympics. 

The government fears that hackers could exploit insecure IoT devices to launch attacks against the Games' IT infrastructure just as Russian nation-state hackers deployed the Olympic Destroyer malware ahead of last year's Pyeongchang winter Olympics.

However, the Japanese government's plan has been met with criticism as many have argued that it could deal with problem by simply sending out a security alert to all users. Even if its hacking attempts are successful, there is no guarantee that consumers would take the time to update the passwords on their IoT devices after the fact.

Securing the IoT has long been a thorn in the side of the cybersecurity community and even if Japan's survey fails drastically, it will still help raise awareness of the issue and could lead consumers and businesses alike to beef up their own IoT security.

Via ZDNet

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Pro
An image of network security icons for a network encircling a digital blue earth.
Why multi-CDNs are going to shake up 2025
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Millwall FC The Den
The UK's first football club mobile network is here - but you probably won't guess which team has launched it
A person using a smartphone with a cybersecurity lock symbol appearing over it.
The growing threat of device code phishing and how to defend against It
Cybersecurity
Why OT security needs exposure management to break the cycle of endless patching
Latest in News
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Gemini on a smartphone.
Gemini 2.5 is now available for Advanced users and it seriously improves Google’s AI reasoning
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025