A year before US federal prosecutors accused Maria Butina of operating as a secret agent for the Russian government, she was a graduate student at American University (AU) working on a sensitive project involving cybersecurity.
Butina’s college assignment called for her to gather information on the cyberdefenses of US nonprofit organizations that champion media freedom and human rights. It was information that could help the groups plug important vulnerabilities, but also would be of interest to the Russian government.
In fact, the Russians previously had in their sights at least two of the groups that she and other students interacted with.
Butina participated in the project under the tutelage of a respected professor who advised the US Department of State on cybersecurity matters. It was carried out for the nonprofit group Internews, which works extensively with the US government to bolster the free flow of information in dangerous parts of the world and has drawn Russian ire with some of its programs in Russia and neighboring countries. The group also advises other nonprofits on cybersecurity.
Internews confirmed Butina’s involvement and a broad description of what the project involved.
A lawyer for Butina did not respond to a request for comment.
Butina’s project raised few eyebrows before her arrest in July, despite news reports already having posed questions about her rapid rise from selling furniture in Siberia and her ties with Kremlin officials.
As part of the project, a small group of students led by Butina were given a list of Internews partners working on human rights and press freedom issues for research purposes only, with the understanding that they not be contacted without consultation.
However, the students contacted some of the groups anyway, according to people involved in the project who spoke on condition of anonymity because they were not authorized to describe the work.
An individual who has worked on US programs in Ukraine told reporters that after Butina’s arrest, he was briefed by US officials who expressed concern that two Internews programs in Ukraine — dealing with media freedom and cybersecurity, and funded by the State Department — might have been exposed to Russian intelligence and might be at risk due to Butina’s student work.
Department spokesman Robert Palladino said that it was not involved with the Internews project Butina worked on.
“We have verified that all documents Internews provided to its students were publicly available and we remain confident in the integrity of the State Department’s programs with Internews,” Palladino said.
Kostiantyn Kvurt, who heads a local nonprofit that Internews helped establish, Internews Ukraine, said he was unaware of Butina’s project before being informed of it by reporters, but already was wary of potential Russian intelligence interference.
“If they understand how to break our firewalls, they could find our partners,” Kvurt said. “People could get detained, tortured, killed.”
Internews said the students were never given access to the group’s work or systems.
“The selection of the students and their roles and activities in the research was solely determined by AU faculty,” spokeswoman Laura Stein Lindamood said. “Internews is currently reviewing our relationship with university-led student projects.”
The access that Butina won through her coursework illustrates how academia and the extensive network of entities that often carry out sensitive, but not classified, work for the US government remain national security vulnerabilities.
In this case, all the institutions expected someone else to vet Butina. Internews thought American University stood behind her; the university said it does not do background checks and expects the State Department to vet foreign applicants fully before issuing visas.
Prosecutors allege in court documents that attending the university was Butina’s “cover,” as she cultivated political contacts and ties with the National Rifle Association.
They contend she was part of a clandestine political-influence campaign directed by a former Russian lawmaker who has been sanctioned by the US Department of the Treasury for his alleged ties to Russian President Vladimir Putin.
John Sipher, who once ran the CIA’s Russian operations, said Butina fits the profile of the kind of lightly trained asset frequently used to help identify espionage targets without attracting attention from counterintelligence, which is often focused on high-level contacts with government officials.
“The project is perfect, because a student can do that research legitimately,” Sipher said. “You can just imagine why that would be of interest. It’s a sort of gold mine.”
Butina’s student project was led by Eric Novotny, a cybersecurity expert who has a high security clearance as an adviser to the State Department. One of Novotny’s courses was called “Cyber Warfare, Terrorism, Espionage and Crime.” The project was aimed at helping Internews identify ways that it could help US-based nonprofits improve their cybersecurity.
Novotny told reporters that even after press reports about Butina raised questions about her connections to the Russian government, he was obligated to treat her like any other student.
“I have always observed university policies and rules during my entire academic career,” Novotny said.
The university declined comment, citing federal privacy rules.
After the spring semester, Butina and three other students signed on to the work-study project, according to people familiar with the work, who spoke on condition of anonymity because they were not authorized to discuss it publicly.
One of the organizations that Butina contacted, prominent digital-rights organization Electronic Frontier Foundation, had frequent contact with Internews on cybersecurity issues before and had previously been a Russian target.
However, Butina did not mention Internews in an encrypted e-mail from June 14 last year.
In the e-mail, addressed to cybersecurity director Eva Galperin, she wrote: “My name is Maria Butina and I’m the captain of an American University student group doing research on US [civil society organizations] and their cybersecurity challenges. We have several questions about cybersecurity concerns facing human rights organizations and your expertise would be very beneficial.”
Novotny, who was later interviewed by the FBI about Butina, learned his instructions about not reaching out to partners had been ignored when the cybersecurity adviser of one nonprofit called him after becoming suspicious that a Russian student was asking about cybervulnerabilities.
He sternly warned the students not to ignore the protocol.
Research published by Toronto University-based The Citizen Lab analyzing Russian hacking attempts has found that civil society groups ranked behind only governments as the most frequent targets. Most often, it appeared Russian spies were trying to determine who the organizations were working with in places of strategic interest, the research found.
“Russian security services view civil society groups as a threat and treat their local partners with great suspicion,” said John Scott-Railton, a cybersecurity researcher at Citizen Lab.
Reporters found no evidence that Butina passed any information from the university project to Moscow, but the work allowed her to contact likely Russian targets.
It is not clear why Butina’s work raised concerns for the two Internews programs in Ukraine, which has not been a focus of prosecutors’ case against her, but Ukraine has been a hotspot of US-Russian tensions, where the two countries vie for influence. The US runs multiple programs aimed at strengthening democracy and boosting pro-Western sentiment in Russia’s backyard and in parts of the world where Washington and Moscow are vying for influence. Often they are run by contractors or nonprofit groups. By penetrating the programs, the Russians could determine who the organizations are working with and learn details about their security measures.
Galperin said she had a conference call with Butina and the other students, but did not make the connection with the arrested Russian until reporters contacted her.
Galperin said the students asked general questions about the threat landscape, and that she passed along no sensitive information.
After the student group prepared a report for Internews, Butina continued her cyberpolicy studies. Soon after she finished her spring semester this year, US authorities charged her with trying to influence senior US politicians and infiltrate political organizations on behalf of the Russian government.
An article on the Nature magazine Web site reports that 22 scientists last month wrote to the daily Dagens Nyheter criticizing Sweden’s no-lockdown response to COVID-19. However, evidence-based analysis shows that a lockdown is not a one-size-fits-all strategy and Sweden is showing the world a sustainable way for everybody to fearlessly live with the virus, which is an inevitable situation that everyone must face and accept for a while. The biggest myth about lockdowns is that they are the only solution when an epidemic worsens. A lockdown is a measure to cordon off a seriously affected area so that people in
On Monday, Chinese President Xi Jinping (習近平) spoke during the opening ceremony of this year’s World Health Assembly (WHA). For the first time in the assembly’s history, attendees, including Xi, had to dial in virtually. Xi made no acknowledgement of the Chinese government’s role in causing the COVID-19 pandemic, nor was there any meaningful apology. Instead, he painted China as a benign force for good and a friend to all nations. Except Taiwan, of course. The address was a reheated version of the speech Xi gave at the 2017 World Economic Forum in Davos, Switzerland. Xi again attempted to step into the