Language selection

Search

Royal Canadian Mounted Police

National Technology Onboarding Program

On this page

About the National Technology Onboarding Program

The RCMP's National Technology Onboarding Program (NTOP) was established to ensure the responsible use of operational technologies by the RCMP and encourage more public transparency of those technologies.

Operational technologies play a critical role in modern policing. They are used to combat crime, investigate suspects, protect children and vulnerable groups, collect evidence, improve data analytics and strengthen police accountability.

NTOP's primary goal is to centralize and bring consistency and oversight to how the RCMP identifies, evaluates and tracks its use of operational technologies.

More specifically, NTOP is responsible for conducting thorough assessments and evaluations of new and existing operational technologies to ensure that they have an operational need, provide a clear benefit to the public, and meet privacy, legal, policy, and ethical standards.

What is an operational technology?

An operational technology is any technology-based tool, technique, device, software, application, or dataset that will be used to support an RCMP investigation or to gather intelligence.

Categories of operational technologies assessed

The types of operational technologies that NTOP assesses fall into one or more of the following categories:

  1. Algorithmic policing technology

    Tools that collect or analyze large amounts of data from various sources, or that use predictive methods to forecast crime by identifying high-risk places or individuals. These tools may use artificial intelligence (AI), including generative models and natural language processing, to help law enforcement make decisions and allocate resources.

  2. Biometrics technology

    Tools that identify or verify people using unique physical or behavioural traits like fingerprints, DNA (deoxyribonucleic acid), facial features, iris scans, or voice. These tools help designated users accurately confirm identities, match individuals to criminal databases, and support investigations with reliable evidence.

  3. Communication and data-sharing technology

    Tools that allow the secure and efficient sharing of legally obtained information within and between police units and partners. These tools help protect sensitive data, support teamwork, and ensure important information is accessible.

  4. Cryptocurrency analysis technology

    Tools that help search, track, and examine cryptocurrency transactions. These tools allow designated users to follow the flow of digital assets, detect suspicious activities, and gather evidence or intelligence to support investigations into crimes involving cryptocurrencies.

  5. Cyber investigation and security technologies

    Tools that detect, investigate, and analyze cyber-related incidents and crimes. These tools find and analyze digital evidence, attribute threats, and conduct comprehensive cybercrime investigations. Cyber investigation and security technologies are used to enhance the security of the RCMP's networks, infrastructure, and data.

  6. Datasets and databases

    Store and organize legally obtained information from various sources. They make it easier for designated users to find and use data for investigations, intelligence work, and case management (for example, by quickly identifying illegal files, financial records, or online activity to support law enforcement operations).

  7. Digital forensic technology

    Tools and methods for identifying, collecting, keeping, and examining digital evidence from electronic devices. These tools and methods help designated users recover deleted files, track digital activity, and gather information from computers and phones to support criminal investigations and court cases.

  8. Interception, monitoring, and detection systems

    Tools that are used to observe, record, and respond to activities or communications important for law enforcement. These tools help collect and analyze data, video, images, and signals in real time or after the fact, supporting investigations and keeping designated users and the public safe. They are used to spot, track, and document events in different settings, whether in the air, on the ground, or through digital networks.

  9. Open source technologies

    Tools, including open source intelligence (OSINT) tools, with publicly available code, or that collect, aggregate, or analyze publicly available information. These tools help the RCMP create secure, adaptable solutions, allowing the quick development and customization of technology while keeping data safe.

Transparency and operational technologies

Transparency Blueprint: Snapshot of operational technologies
Provides an overview the responsible use of operational technologies by the RCMP while detailing the types of technologies assessed by NTOP.
Operational technology transparency spotlight: National Child Exploitation Crime Centre
Find out how the National Child Exploitation Crime Centre uses some operational technologies to carry out its mandate and protect children.
Date modified: