Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Police Audit Finds Investigation Backlog Poses Significant Risk

An internal audit of the Royal Canadian Mounted Police (RCMP) has discovered a backlog that poses a significant risk to its cybercrime investigative progress, meaning some crimes may go without investigation, officials fear.

An internal audit of the Royal Canadian Mounted Police (RCMP) has discovered a backlog that poses a significant risk to its cybercrime investigative progress, meaning some crimes may go without investigation, officials fear.

The audit focused on the RCMP’s technical crime program, which investigates cases ranging from child pornography to Web-based fraud, and discovered an “increasing backlog of requests” that required immediate attention.

“All five units visited had a backlog of requests, devices that had been received but not yet analyzed. The definition of what constitutes a backlog is unclear and units quantified their backlogs differently,” the final report explains.

Some units measured their backlogs in terms of turnaround time, while others measured on the number of items in queue. Some units were able to account for the number of request received in a given year, but “no historical data was being captured on the number of requests and devices processed year after year, nor the length of time it took to process each device. In addition, no information related to the backlog was reported to [Technological Crime Branch].”

According to the report, these backlogs constituted a significant risk to the technical crimes program. Responding to the audit, Line Carbonneau, RCMP deputy commissioner for policing support services, said that the program has found itself in a “period of unprecedented global technological change,” creating an extremely challenging operating environment.

“Furthermore, cybercrime is quickly becoming a phenomenon which has garnered the attention of the public, media, law enforcement and governments around the world… The risks associated with our ability to conduct and support organized crime and national security investigations is contingent on an effective and efficient Technological Crime Program, and therefore we are committed to addressing the deficiencies identified by the audit.”

The audit itself was conducted in early 2012, but was only recently released to the public. Parts of the official report were redacted before publishing, in order to account for operational security.

There was no timeline available to account for when the problems were to be resolved, including the breakdown in accountability and reporting between the various programs.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.