Roundup

The Generics

The Roundup suite is a collection of client and server applications developed mainly by the University of Massachusetts Amherst mainly under the direction of Brian Levine . The purpose of these tools is stated to be the investigation of sexual contraband on the internet.

The components of Roundup consist of several parts. Those parts include but are not limited too:

“RoundUp was developed by entities and individuals including the University of Massachusetts Department of Computer Science, the Georgetown University Department of Computer Science, and former Pennsylvania State Police Computer Crimes supervisor Robert Erdely , among others.”

~ See Merrill v. Maine No. 2:19-cv-00391-JDL

Some Specifics

The Roundup suite as a whole has always raised questions in one form or another. Some of it’s modules such as Torrential Downpour have been subject to repeated critiques resulting in the government choosing to dismiss charges rather than allow a defendant to examine or question the software itself.

The typical rebuttal of the government in regards to all Roundup modules revolve around the following: (1) You can’t examine our software, and (2) Our software is the one, single, perfect creation in all of history - trust us (zero failure rate).

Regardless moral or ethical arguments, regardless fearmongering or conflation of ideas, and regardless the guilt or innocence of any defendant - the government’s end goal results in lives ending even if only by accusation. The government must be held to every burden of proof.

Ultimately, if the Roundup suite functioned as advertised by investors there isn’t reason to withhold any information. Source code included. Certainly, government withholding information is at a minimum, questionable.

Despite the previous points, it cannot be forgotten that the government goes through great lengths in order to artifically separate liabilities and responsibilities regarding their ventures into these softwares and investigations. It should come as no surprise in at least two examples.

The first example is Roundup itself. Much of the work was intentionally outsources to various educationaly institutions rather than being claimed under the banner of any governmenal entity.

A second notable example is the NCMEC reporting entity being a “non-profit”, rather than a direct government-run operation.

These examples exist plainly as what they appear to be. They are effectively shell entities which protect the government and it’s assets under the guise of being a non-governmental agency. Setups such as these are aimed at allowing the government to operate without being subject to laws or scrutiny which would otherwise hinder them. A notable example has occurred in cases involving Torrential Downpour, where the government has used the excuse that - (1) it cannot turn over something that isn’t within it’s possession, (2) it isn’t allowed to show people Torrential Downpour without permission from it’s creators, and (3) the creator’s don’t want to allow testing because it may hinder their income. These points all referring to attempts at having these tools tested. All have eventually failed, and at the current time of writing we now sit nearly half a decade since Roundup’s unceremonious exile into the realm of junk. Though in TD and TDR’s regards, the government still chose to drop the charges related to the software and bypass testing by the defense.

WIP.