Vol. 78 No. 3 (2025): US-Russia Relations – Global Rivalry and Regional Interests
Temat numeru
Cyber Security as a Vector of Tension and Negotiation in Relations between the United States and the Russian Federation
Abstract
Cyberspace has become a key dimension of international relations, going beyond communication and administrative functions to become a full-fledged field of strategic competition. This article undertakes an analysis of the relationship between the United States and the Russian Federation as implemented in cyberspace, showing it as a complex mix of interdependence, confrontation and attempts at dialogue. From the Cold War foundations of network infrastructure, through the geopolitical transformations of the 1990s, to contemporary cyber defence strategies, the two sides have developed different approaches to cyber security. The Russian Federation integrates information operations with intelligence and military operations, focusing on asymmetric influence through disinformation, sabotage of critical infrastructure and cyber espionage. The USA, on the other hand, has adopted a proactive defend forward and persistent engagement strategy, seeking to neutralise threats outside its own territory. Influence operations, which, as the 2016 and 2020 US elections have shown, have destabilising potential, are an important tool in this competition. The protection of critical infrastructure is also becoming critical. In the face of escalating tensions, three scenarios for the relationship are possible: further confrontation, cyber cold war or reset through digital diplomacy. Each depends on the effectiveness of trust mechanisms, legal norms and willingness to cooperate in a dynamically evolving cyber environment.
References
- Bowcut S., Digital Safeguards: Navigating Cybersecurity in Transportation, „Cybersecurity Guide” [online], 3 IV 2025 [dostęp: 7 IV 2025]: <https://cybersecurityguide.org/industries/transportation/>.
- Bryjka F., Grupa Wagnera – paramilitarne narzędzie rosyjskich operacji hybrydowych, „Sprawy Międzynarodowe” 2022, t. 75, nr 2.
- Bryjka F., Chłoń T., Kupiecki R., Dezinformacja międzynarodowa. Pojęcie, rozpoznanie, przeciwdziałanie, Wydawnictwo Naukowe „Scholar”, Warszawa 2022.
- Cohen-Almagor R., Internet History, „International Journal of Technoethics” 2011, vol. 2, No. 2.
- Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, red. M. Górka, Difin, Warszawa 2014.
- Galbreath J., The Internet: Past, Present, and Future, „Educational Technology” 1997, vol. 37, No. 6.
- Greenberg A., Foreign Meddling Flooded the 2020 Election – but Not by Hackers, „Wired” [online], 16 III 2021 [dostęp: 5 IV 2025]: <https://www.wired.com/story/odni-russia-iran-2020-election-interference/>.
- Hogeveen B., The UN Norms of Responsible State Behaviour in Cyberspace. Guidance on Implementation for Member States of ASEAN, Australian Strategic Policy Institute, [b.m.w.] March 2022.
- Hoyle A., Šlerka J., Cause for Concern: The Continuing Success and Impact of Kremlin Disinformation Campaigns, Hybrid CoE, [b.m.w.] March 2024 (Hybrid CoE Working Paper, 29).
- Jones S., Pedro Sánchez Vows to Find the Cause of Huge Power Cut in Spain and Portugal, „The Guardian” [online], 29 IV 2025 [dostęp: 30 IV 2025]: <https://www.theguardian.com/world/2025/apr/29/spain-portugal-returning-normal-experts-cause-blackout>.
- Judah J., Hamilton F., Russia Using AI to Target Britons with Flood of Fake News, „The Times” [online], 29 IV 2025 [dostęp: 5 IV 2025]: <https://www.thetimes.com/uk/defence/article/russia-ai-disinformation-pravda-fake-news-plbwwn7v0>.
- Kane B.R., Webber S., Tucker K.H., Wallace S., Chang J., McCarthy D., Murphy D., Egel D., Wingfield T., Defending the United States against Critical Infrastructure Attacks. Exploring a Hypothetical Campaign of Cascading Impacts, RAND Corporation, [b.m.w.] 2024 (Inverted Rook Research Report).
- Kroustek J., WannaCry Ransomware That Infected Telefonica and NHS Hospitals Is Spreading Aggressively, with over 50,000 Attacks so far Today, „Avast” [online], 12 V 2017 [dostęp: 7 IV 2025]: <https://blog.avast.com/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today>.
- Lily B., Cheravitch J., The Past, Present, and Future of Russia’s Cyber Strategy and Forces, [w:] 2020 12th International Conference on Cyber Conflict, ed. T. Jančárková, L. Lindström, M. Signoretti, I. Tolga, G. Visky, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn 2020.
- Meller R.S., III, Report on the Investigation into Russian Interference in the 2016 Presidential Election, vol. 1, U.S. Department of Justice, Washington, March 2019.
- The National Cybersecurity Strategy, „The White House” [online], March 2023 [dostęp: 3 IV 2025] <https://bidenwhitehouse.archives.gov/oncd/national-cybersecurity-strategy/>.
- Nowakowski Z., Protasowicki I., Bezpieczeństwo informacyjne a cyber terroryzm, „Zeszyty Naukowe WSIZiA” 2009, nr 1 (9).
- Nowakowski Z., Szafran H., Szafran R., Bezpieczeństwo w XXI wieku. Strategie bezpieczeństwa narodowego Polski i wybranych państw, Fundacja Niepodległości, Rzeszów 2009.
- Packard N., Internet Prehistory: ARPANET Chronology, „Cogent Social Sciences” 2023, vol. 9, issue 2.
- Pudełko M., Prawdziwa historia internetu na świecie, wyd. 4, IT Start, Piekary Śląskie 2020.
- Smeets M., U.S. Cyber Strategy of President Engagement & Defend Forward: Implications for the Alliance and Intelligence Collection, „Intelligence and National Security” 2020, vol. 35, No. 3.
- Sułek M., Prakseologiczna teoria stosunków międzynarodowych, „Przegląd Strategiczny” 2012, nr 1.
- Sułek M., Trzy działy prakseologii, „Rocznik Naukowy Wydziału Zarządzania w Ciechanowie” 2008, t. 2, z. 1–2.
- Targowski A., From the Cold War to Internet Cathedral, „International Journal of Information and Communication Technology Education” 2005, vol. 1, issue 2.
- [Twenty-twenty] 2020 12th International Conference on Cyber Conflict, ed. T. Jančárková, L. Lindström, M. Signoretti, I. Tolga, G. Visky, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn 2020.
- Ukaz Prezidenta Rossijskoj Federacii ot 02.07.2021 g. № 400 „O Strategii nacional′noj bezopasnosti Rossijskoj Federacii”, „Konsul′tant plûs” [online, dostęp: 16 II 2025]: <https://www.consultant.ru/document/cons_doc_LAW_389271/>.
- US Invokes Emergency Powers after Cyber-Attack on Fuel Pipeline, „The Guardian” [online], 10 V 2021 [dostęp: 7 IV 2025]: <https://www.theguardian.com/us-news/2021/may/10/us-invokes-emergency-powers-after-cyberattack-shuts-crucial-fuel-pipeline>.
- Van Epps G., Common Ground: U.S. and NATO Engagement with Russia in the Cyber Domain, „Connections The Quarterly Journal” 2013, vol. 12, No. 4.
- Wang T., Wang Zh., Zhang Zh., Liao W., Ji J., SORM‐Enhanced Inverse Reliability Analysis for Geotechnical Multiobjective Reliability‐Based Design Optimization, „International Journal for Numerical and Analytical Methods in Geomechanics” 2025, vol. 49, issue 1.
- Xu M., Lu Ch., China–U.S. Cyber‑Crisis Management, „China International Strategy Review” 2021, vol. 3, issue 1: <https://pmc.ncbi.nlm.nih.gov/articles/PMC8237537/pdf/42533> [dostęp: 10 IV 2025].
- Zhukov D., The Phone-a-Friend Option: Use Cases for a U.S.-U.K.-French Crisis Communication Channel, Institute for Security and Technology, [b.m.w.] June 2024: <https://securityandtechnology.org/wp-content/uploads/2024/10/CATALINK-P3.pdf> [dostęp: 16 II 2025].
Downloads
Download data is not yet available.