Accessibility Skip to Top Navigation Skip to Main Content Home  |  Change Text Size  |  Contact IRS  |  About IRS  |  Site Map  |  Español  |  Help  

9.4.11  Investigative Services (Cont. 1)

9.4.11.3 
Electronic Crimes Program

9.4.11.3.1 
Field Services

9.4.11.3.1.1  (12-01-2006)
The Computer Investigative Specialist Mission

  1. The mission of the CIS is to serve as an investigator who contributes computer expertise to criminal investigations.

  2. The CIS has successfully completed a comprehensive training program which enables the CIS to:

    1. Seize and analyze evidence stored electronically and used by computers and other devices.

    2. Enhance the efficiency of investigations through the use of computer technology.

    3. Use computer technology to enable investigations to be completed in a timely manner which otherwise would not be possible.

  3. The Office of Electronic Crimes is a service integral to operations, not automation. It is organized under the oversight of the Director, CI:TOIS:EC.

  4. The CIS is trained to offer a variety of tools, techniques and innovative approaches in computer related investigations.

9.4.11.3.1.2  (12-01-2006)
Computer Investigative Specialist as a Field Office Resource

  1. The CIS is a member of his/her respective field office, and as such serves as a field office resource and should be on the SAC’s staff. The CIS’s workload is managed by the ALI, who in coordination with the field office, provides knowledgeable oversight and functional supervision to ensure timely and quality workload management, completion of assignments and support for related personnel matters. If necessary, the ALI will ensure that a CIS's case work assignments are completed by reassignment of workload to other CIS's within the field office, or from other field offices. Each CIS has received extensive training, at a substantial time and financial commitment by CI, and should be used exclusively for CIS assignments. (A CIS may assist in other collateral assignments, when it does not impact the performance of the CIS's assignments.) National projects and initiatives require the specific skills offered by a CIS, and up to 50% of a CIS's time may be utilized for nationwide assignments that benefit the entire Criminal Investigation Division.

9.4.11.3.1.3  (12-01-2006)
Support for the Computer Investigative Specialist

  1. RESERVED

9.4.11.3.1.4  (12-01-2006)
Computer Investigative Specialist Position Requirements and Training

  1. Special agents selected to attend CIS training should be experienced GS-13 Criminal Investigators who have a technical interest, aptitude and background in using information technology. The field office (SAC), through the ALI, will nominate potential CIS candidates. Candidates undergo a selection process to determine technical knowledge and general ability to ensure successful completion of the CIS training. Final acceptance of CIS candidates into the program is reserved to the Director, CI:TOIS:EC.

  2. The CIS training consists of initial basic training, on the job instruction, and advanced training. The CIS basic training involves an initial six week training course. On the job instruction includes mentoring by an experienced CIS and annual mandatory technical training. Advanced training consists of a minimum two week course and may include other specialized training received throughout the CIS career.

  3. The CIS duties will require a top secret clearance and official passport. Duties may also require frequent travel.

9.4.11.3.1.5  (12-01-2006)
Early Involvement in Investigations

  1. Special agents should consult with the CIS early in an investigation. By participating early in the investigative planning process, the CIS may provide insight into digital evidence issues and planning for enforcement actions involving digital evidence. This includes identifying potential legal issues relating to digital evidence and assisting the special agent, Criminal Tax Counsel, and the United States Attorney’s office in addressing these issues prior to any enforcement action.

  2. The CIS may provide ongoing feedback during the course of the investigation, with insight, guidance and techniques that may substantially assist the case agent.

9.4.11.3.1.6  (12-01-2006)
Services Provided by the Computer Investigative Specialist

  1. The CIS may provide the following services:

    1. Participate in interviews of suspects, subjects, witnesses and informants when computers or electronic data are involved.

    2. Give direction to other special agents during the execution of search warrants at sites where computers are located, including the authorized seizure of computers and devices containing digital evidence.

    3. Seize, preserve and maintain chain of custody of digital evidence to assure admissibility in trials and other court proceedings.

    4. Recover digital evidence, which may include repairing and recovering lost, deleted or corrupted files, breaking passwords and decrypting data.

    5. Provide extracted evidence and reports of evidentiary findings to the special agent, and provide relevant trial testimony if needed.

    6. Convert data between various formats into one usable by the special agent.

    7. Provide technical assistance in internet related investigations.

    8. Serve as a liaison with the DIC.

9.4.11.3.1.7  (12-01-2006)
Request for Computer Investigative Specialist Assistance

  1. Computer Investigative Specialist assistance is requested by submission of Form 10908, Computer Investigative Specialist Request for Assistance (see Document Manager) through the SSA, to the CIS, who forwards it to the ALI. The request must include sufficient detail so that resources can be properly assigned.

9.4.11.3.2  (12-01-2006)
Electronic Crimes Development Center

  1. The Electronic Crimes Technology and Support Center (ECTSC) provides support to CI’s investigative efforts through the development and use of technology. The ECTSC provides training and resources to the field CIS, and researches and develops emerging technologies.

  2. Research and Development - The ECTSC acts as a research and development facility for the Electronic Crimes Program. Computer forensics procedures, techniques, equipment, and software used in the data recovery and analysis process are evaluated, tested, and documented at the ECTSC as to their effectiveness and validity. Because issues related to computers evolve quickly and continuously, the ECTSC spearheads the adaptation of the computer forensic processes to accommodate such developments.

  3. Training - The ECTSC develops basic and advanced training programs for the CIS. The ECTSC also develops and provides basic and advanced digital evidence training for other special agents and specialty functions within CI. In addition, ECP, in coordination with our partner Federal Law Enforcement agencies, provides computer forensic training to domestic and international Federal, state and local law enforcement officials.

  4. Resources - The ECTSC provides support to the CIS through the procurement of hardware and software and maintenance of resources. These include the procurement of standard CIS lab equipment and software, development and maintenance of knowledge and management information systems, and procurements (large case, asset forfeiture, and counter terrorism initiatives) where specialized investigative needs exist. The ECTSC also supports the hardware and software requirements of SIT initiatives.

  5. Internet Crimes – The ECTSC is responsible for developing the internet related investigative efforts (electronic wiretaps, pen registers, trap and trace, e-mail issues), and maintaining a liaison with the online investigative components of other law enforcement agencies and the intelligence community.

9.4.11.3.3  (12-01-2006)
Data Input Center

  1. The DIC provides support to the field in creating database application programs, maintaining and upgrading these programs, and providing data input and conversion service. The DIC develops programs to meet the investigative needs of the requesting special agent. The special agent will consult with the CIS to determine the feasibility of using existing or creating custom DIC applications. The DIC also has the capacity for high speed scanning and conversion of documents using optical character recognition capabilities to digitize text. This process permits the use of computer analysis tools on the text.

9.4.11.3.3.1  (12-01-2006)
When to Use the Data Input Center

  1. Special agents should consider using the services of the DIC when:

    1. records input would be beyond the capacity of the field office to complete in a timely fashion

    2. when there may be a need for the information to be processed and organized into various output formats

    3. when there is a large volume of documents to be scanned and converted, or a large amount of records to be input

  2. The DIC workload may be a relevant factor in the decision to make a request.

9.4.11.3.3.2  (12-01-2006)
Approval of the Data Input Center Requests

  1. The SSA and the assigned CIS must approve all requests for the services of the DIC. Special agents will request DIC services using Form 13435, Office of Electronic Crime Data Input Center Request for Services (see Document Manager). Care should be taken to state all requirements and requests clearly and completely on Form 13435. If requirements change after the initial request, an addendum to Form 13435 will be prepared in writing, and forwarded through the SSA and CIS.

  2. The CIS will serve as the liaison between the DIC and the field office. All contact with the DIC concerning transcription services including project status, data entry instructions, and quality issues must be coordinated through or conducted by the CIS.

  3. The ALI will provide managerial oversight of all DIC requests in their respective areas.

  4. In all instances, the CIS must contact the DIC before the records are sent to the DIC. Assignments relating to criminal investigations are handled on a first-in, first-out basis, based on the following hierarchy: subject criminal investigations (SCI) and counter terrorism related investigations, primary investigations (PI) and lastly general investigations (GI). Investigations pending trial and time critical counter terrorism investigations may take precedence for elevation in priority to meet relevant time constraints. Requests for expedited handling will be initiated through the assigned CIS. Conflicting priorities among expedited requests will be resolved through the Director, Electronic Crimes Program (CI:TOIS:EC), after consultation with the respective SACs.

9.4.11.3.3.3  (12-01-2006)
Requirements for Submitting Records to the Data Input Center

  1. When possible, special agents should attempt to obtain records in electronic form. The CIS should be consulted before requesting electronic records from a witness or record keeper.

  2. If records are obtained in paper form, special agents should provide the original records to the DIC for data entry. If the original records are not available, special agents must provide the most readable records available for data entry.

  3. Special agents must submit records in an organized fashion, i.e., canceled checks, deposit tickets, and deposited items should be associated with the respective bank statements, to facilitate program development and efficient data entry. Records may be returned unprocessed if not properly organized when submitted. The amount of each deposit item is input, when available on the deposit ticket. The amount, check number, and cleared date are input for checks. The checks and deposit items over $1000.00 have the payee or payer, the memo line, and the date written also captured. Additional details (payee, payer, memo line, date written) for items under $1000.00 will not be input without justification from the special agent, specifying investigative importance. The special agent will submit such requests through the CIS. Please note that supplemental requests to input details on items under $1000.00 may be submitted if a subsequent review of the transactions reveals an investigative need.

  4. Documents submitted to the DIC will not be marked on without the concurrence of the requesting special agent.

  5. Special agents should ship the records to the DIC using a tracked shipping method (such as UPS overnight). In sensitive investigations, it may be necessary for special agents to hand carry the records to the DIC. In some situations, special agents may be requested to travel to the DIC to assist in the data entry or programming aspects of the application.

9.4.11.3.3.4  (12-01-2006)
Returning Records to the Field Office

  1. Upon completion of the approved request, the DIC will return the final work product along with the records using a tracked shipping method to the field office. The DIC will also include a listing of the names of all persons who had access to the records. As above, in sensitive investigations special agents may pick up completed work product and records to hand carry back to the field office.

9.4.11.4  (12-01-2006)
Investigative Analyst

  1. The Investigative Analyst (IA) is an individual who is experienced in researching, collecting, analyzing, and evaluating raw data. This allows the IA to assist in the identification of noncompliance with tax laws and to support ongoing criminal investigations.

  2. The IA is responsible for the following activities:

    1. production and dissemination of reports

    2. determination of the relationships of financial and other data

    3. completion of research assignments

    4. evaluation of available information relating to tax noncompliance

9.4.11.4.1  (12-01-2006)
Investigative Analyst Mission

  1. The mission of the IA is to contribute analytical expertise to criminal investigations.

9.4.11.4.2  (12-01-2006)
Field Office Resource

  1. The IA is a field office resource, he/she should be a member of the SAC's staff. The IA is available to support any investigation in the field office.

9.4.11.4.3  (12-01-2006)
When to Request

  1. Special agents may request the assistance of the IA at any time during the investigation. When a special agent encounters a name, individual, or company, and would like some research on the entity, the special agent should request the assistance of the IA at that time through his/her SSA.

9.4.11.4.4  (12-01-2006)
Services Provided by the Investigative Analyst

  1. An IA provides the following functions:

    1. Assists in the development of profile data and investigation selection techniques to enable special agents to more efficiently conduct their investigation.

    2. Collects, develops, and disseminates information relating to violations of tax, money laundering, and other laws under the jurisdiction of CI.

    3. Participates in the preparation of strategic enforcement trend analyses and forecasts by management for policy planning and resource allocation.

    4. Correlates collected information by arranging and evaluating available data to identify all possible sources of information that will substantiate or refute information presently on hand. The sources of information include complex investigative reports, information available from or promulgated by other federal and local law enforcement agencies, Treasury Enforcement Communication System (TECS) and intelligence contained in data that is available from other informational data bases such as National Crime Information Center (NCIC) and Narcotics & Dangerous Drugs Information System (NADDIS).

    5. Analyzes collected information to produce a more complete picture of tax-related activities and to support criminal investigations currently underway.

    6. Assembles strategic and tactical reports concerning organized crime, money laundering organizations, tax shelters/havens, financial task forces, and other special projects of similar entities/organizations.

    7. Researches databases such as Integrated Data Retrieval System (IDRS), Currency Banking & Retrieval System (CBRS), TECS, NCIC, NADDIS, Western Union, and LEXIS/NEXIS.

    8. Performs other related services as approved by field office management.

9.4.11.4.5  (12-01-2006)
Request for Investigative Analyst Assistance

  1. To request the services of an Investigative Analyst, special agents should prepare Form 11207, Investigative Analyst Request for Assistance (see Document Manager). The SSA of the requesting special agent will approve the request and forward it to the SAC. These procedures may be modified by the SAC in each field office as appropriate to meet operational needs.

9.4.11.5  (12-01-2006)
Tax Fraud Investigative Assistant

  1. A Tax Fraud Investigative Assistant (TFIA) is an individual who provides support to special agents. The TFIA regularly operates various types of communications equipment and serves as the central communications point for the field office and subordinate offices.

9.4.11.5.1  (12-01-2006)
Tax Fraud Investigative Assistant Mission

  1. The mission of the TFIA is to provide support to special agents conducting investigations of alleged tax fraud and other financial crimes.

9.4.11.5.2  (12-01-2006)
Group Resource

  1. The TFIA is assigned to a specific work group in the field office. The TFIA is available to support any investigation within the work group.

9.4.11.5.3  (12-01-2006)
When to Request

  1. Special agents may request the assistance of a TFIA anytime during an investigation. Special agents should consider requesting the services of a TFIA whenever the services provided will save time.

9.4.11.5.4  (12-01-2006)
Services Provided by a Tax Fraud Investigative Assistant

  1. A TFIA provides a variety of services. The list of possible services performed by a TFIA includes, but is not limited to, the following functions:

    1. serves summonses and subpoenas

    2. assists in preparing search warrants using applicable software

    3. serves as a witness-corroborator during interviews with principals or third parties

    4. plans and conducts collateral investigations of lesser complexity and prepares final drafts of collateral requests and responses

    5. assembles investigation files and reports by mounting exhibits/evidence, proofreading to ensure that cited documents are present and numbered consecutively with references made in factual statements; and assembles and packages evidence

    6. researches internal and external investigative databases, public records, banks, brokerage houses, etc.; develops specialized information from research results for special agents using word processing, spread sheets, or graphic software

    7. gathers data and conducts limited inquires on primary investigation or general investigation assignments

    8. assists special agents with trial preparation by reviewing testimony of witnesses; indexing data and preparing analyses of evidence and supporting documentation to be presented during trial; locating, transporting, and coordinating appearances of witnesses; and helping with visual aids

    9. assists in forfeiture activities including inventory control, completion of forfeiture forms, or inventory reporting

    10. maintains an inventory of investigative equipment and schedules maintenances and repairs on equipment and automobiles

9.4.11.5.5  (12-01-2006)
Request for Tax Fraud Investigative Assistant

  1. To request the services of a TFIA, special agents should prepare Form 11209, Tax Fraud Investigative Assistant Request for Assistance (see Document Manager). The SSA will review and approve the request, as appropriate. These procedures may be modified by the SSA as appropriate to meet the field office's operational needs.

9.4.11.6  (12-01-2006)
Compliance Support Assistant

  1. The Compliance Support Assistant (CSA) provides clerical and program assistance, and systems administration support to a work group of special agents in a CI field office.

9.4.11.6.1  (12-01-2006)
Compliance Support Assistant Mission

  1. The mission of the CSA is to provide clerical and program assistance to SSAs and support to special agents conducting investigations of alleged tax fraud and other financial crimes.

9.4.11.6.2  (12-01-2006)
Group Resource

  1. Generally, there will be one CSA for each group in the field office.

  2. The CSA duties and support are normally limited to the office environment. A CSA is not authorized to perform field investigation work typically performed by TFIAs.

9.4.11.6.3  (12-01-2006)
When to Request

  1. Special agents may request the assistance of a CSA anytime during an investigation or when help is needed. Special agents should consider requesting the services of a CSA whenever the services will result in more efficient use of CI's resources.

9.4.11.6.4  (12-01-2006)
Services Provided by a Compliance Support Assistant

  1. A CSA provides a variety of services. The list of possible services performed by a CSA includes, but is not limited to, the following functions:

    1. Performs complex research in support of ongoing investigations and gathers, extracts, and compiles information from a variety of sources. These sources include internal and external investigative databases and the internet.

    2. Assists as directed in verifying accounting records; extracts information from books and records; interviews informants or witnesses; administers handwriting and handprinting exemplars; prepares related reports, correspondence, and other documents; and serves as corroborator/witness during interviews with principals or third parties.

    3. Selects and uses small computer applications for presentation of word processing, database, and spreadsheet tools to meet users' needs.

    4. Assembles investigation files and reports into prescribed formats, ensuring that all required or related materials have been included.

    5. Inputs CIMIS updates; assists in the maintenance of Criminal Investigation Equipment Control System (CIECS); requisitions tax returns using IDRS; maintains the tax return inventory; and oversees the maintenance of office files.

    6. Performs minor systems administration troubleshooting for routine computer-related problems, and assists in the input and maintenance of Integrated Network and Operations Management System (INOMS).

    7. Changes computer backup tapes and runs tape cleaning cartridge.

9.4.11.6.5  (12-01-2006)
Request for Compliance Support Assistant

  1. To request the services of a CSA, special agents should coordinate the assistance of the CSA through their CSA’s immediate supervisor.

9.4.11.7  (12-01-2006)
Request for Lead Development Center Assistance

  1. RESERVED


More Internal Revenue Manual