Tucson Private Investigator & Tucson Process Server by THE MAXO PI Agency Woman Owned & Run 520-284-5226
  • MAXO Tucson Private Investigator Agency
  • Private Investigator Tucson
  • Process Server Tucson
  • Expert Witness Wireless
  • About Michele Yontef
  • Tucson Detective Blog
Picture

Michele Yontef Tucson Private Investigator

Tucson Detective Michele Yontef's Blog 

Interesting Issues Relating To:
Private Investigation in Tucson and nationwide
Wireless Communications Forensics
Protective Matters
Investigative Interests
Questions? Call us: 520-284-5226

Protecting Your Privacy: How Can a Private Investigator Help with Identity Theft?

6/6/2024

0 Comments

 
Hi I’m Michele Yontef owner of Tucson PI Agency MAXO Private Investigations, occasionally I’m asked Investigative questions like this one regarding ID Theft.
​​
My Answer: They sure can, private investigators use their expertise to research and provide analysis which allows for client and law enforcement collaboration.  
​
Contact Michele at 520-284-5226 for further information on how we can help!
Email MAXO Investigations Tucson
Call Us - MAXO Private Investigator Tucson
Main Page - MAXO PI Agency Tucson
0 Comments

"Finding Closure: Can a Private Investigator Locate Missing Persons?"

6/6/2024

 
Im Michele Yontef owner of MAXO - a Woman Owned and Run, Tucson PI Agency.  I was recently asked, " Is it possible for a private investigator to find a missing person?"

Answer: Yes, finding missing persons is one of the core services offered by private investigators. Through a combination of investigative techniques such as database searches, surveillance, and witness interviews, we work tirelessly to locate individuals who have disappeared under various circumstances. Whether it's a runaway teenager, a lost loved one, or a person of interest in a legal case, our goal is to bring closure to families and reunite them with their missing loved ones.
Main Page MAXO Investigations
Email MAXO Tucson PI Agency
Call us MAXO - Private Investigator in Tucson

"Uncovering Hidden Truths: How Can a Private Investigator Assist in Legal Cases?"

6/6/2024

 
Im Michele Yontef owner of Tucson PI Agency MAXO Investigations, I was recently asked, "What role does a private investigator play in legal cases?"
​
Answer: Private investigators serve as invaluable allies in legal proceedings, offering expertise in evidence gathering, witness interviews, and case preparation. From conducting background checks to locating key witnesses, we work diligently to uncover crucial information that can strengthen your case and support your legal strategy. Our goal is to provide you with the comprehensive investigative support you need to achieve a favorable outcome in court.

​Contact Michele Yontef - Owner MAXO Private Investigations Tucson, AZ to speak further! 520-284-5226
Call MAXO PI Agency
Email MAXO Investigations
Main Page MAXO

IMPORTANT: Unsubscribing spam email can be dangerious

3/13/2020

 
Below is an alert released by Mcaffe which I have copy and pasted (if you wish to read the alert on their website their clik link at end of post).  Folks PLEASE READ this is something everyone needs be aware of effects all of us!  
"​We all receive loads of unwanted email solicitations, warnings, and advertisements. The number can be overwhelming to the point of obnoxiousness. Some days it feels like an unending barrage of distracting deliveries that require a constant scrubbing of my inbox.
Beyond being frustrating, there are risks. In addition to the desired and legitimate uses of email, there are several shady and downright malicious uses. Email is a very popular method for unscrupulous marketers, cybercriminals, and online threats to conduct social engineering attacks. Spam, phishing, and fraud are common. Additionally, many attackers seeking to install malware will use email as a delivery channel. Electronic mail can be an invasive communication mechanism, so we must take care.

Unfortunately, like most people, I tend to make my own situation even worse. In my professional role, I devour a tremendous amount of industry data, news, and reports to keep my finger on the pulse of change for technology and security. This attention usually requires me to register or provide my email address before I get a “free” copy of some analysis I desire. I could just give a false email, but that would not be ethical in a business environment. It is a reasonable and expected trade that benefits both parties. I get the information I seek and some company gets a shot at trying to sell me something. Fair enough, so I suffer and give my real work email. In this tacit game, there is an escape clause. I can request to no longer be contacted with solicitations after the first email lands in my inbox. Sounds simple, but it is not always that easy.

The reality is I receive email from many more organizations than I register with. Which means someone is distributing my electronic address to many others. They in turn repeat and the tsunami surging into my inbox gains strength. I become a target of less-than-ethical marketers, cyberattackers, and a whole lot of mundane legitimate businesses just trying to reach new customers.

Some include an unsubscribe link at the bottom of the message. This link holds an appealing lure of curbing the flood of email destined for the trash folder. But be careful. Things are not always as they seem. While attempting to reduce the load in your inbox, you might actually increase the amount of spam you receive, and in the worst case you could be infecting your system with malware by clicking that link. Choose wisely!

Recommendations for unsubscribing from email

Rule #1: If it is a legitimate company, use the unsubscribe option. Make sure the link points to a domain associated with the purported sender. Legit companies or their marketing vendor proxy will usually honor the request.

Rule #2: If it is a shady company, do not unsubscribe, just delete. If your mail service supports it, set up a block or spam rule to automatically delete future messages from these organizations.
If the message is seriously malicious, the “unsubscribe” link may take you to a site configured to infect or compromise your system. This is just another way bad guys get people to click on embedded email links. Don’t fall for this ruse! It may result in a malware infection or system compromise.

If the message is semimalicious, like a spam monster that will send mail to any address it can find, then clicking the “unsubscribe” link tells them this is a valid email address and that someone is reading the mail. This knowledge is valuable for them; they will sell that email address as “validated” to others and use it for future campaigns. Result: more spam.

Rule #3: Some spam and solicitations don’t offer any unsubscribe option. Just delete. Probably not a company you want to patronize anyways.

If you are in a work environment, be sure to know and follow your corporate policies regarding undesired email. Many companies have security tools that can inspect, validate, or block bad messages. They may also have solutions that leverage employees reporting of bad email to better tune such protections. Open attachments only from trusted sources.
​
Just remember, if you are not sure the email is legit, do not open or click anything, and NEVER open any attachments, including PDFs, Office documents, HTML files, or any executables because they can be used by attackers to deliver Trojans to infect your system with malware, ransomware, or other remote manipulation tools. Cybercriminals often pose as real companies with real products. Make your email life easier by unsubscribing with care and forethought."

Please Contact Michele Yontef with further quesitons
Phone 520-284-5226
Private Investigation Tucson MAXO
This Repost was originally a full COPY AND PASTE obtained from Mcaffe Website

Tips To Protect Children

7/14/2015

 

Child Abduction
Prevention
www.tucsonaz.gov/police/child--abduction
 
 
 I thought this would be helpful for both kids and parents to have options and confidence in an uncertain situation.

  • Yell, Kick, & Scream - This may seem obvious, but many
    children freeze when they are grabbed by strangers. Kidnappers want children to
    go along quietly. Yell - "This person is a stranger!"
    Kick - kidnapper's foot, groin, or knee.
    Scream.

  • Area Code & Phone Number - Make sure your child knows
    your area code and phone number. Does your child know how to make a collect call
    or dial in case of an emergency? Teach your child not to give
    your phone number or address to strangers.

  • Buddy System - A child alone is an easy target. Encourage
    your children to use the buddy system and to watch out for each other.

  • Current Photos & Records - Get photos taken every 6
    months of your children and keep a photo on your person at all times.
    Fingerprints should be taken by a law enforcement, (TPD can assist you. More
    info here).
    Copies of their dental and medical records are a must.

  • Lure Tactics - " I have lost my puppy. Will you help me
    find him?" "I'll give you $10 if you'll help me put this in the car."

    Parents, teach your children how to respond to these people. It is best to
    ignore them, avoid any conversation, and run.

  • Family Code Word - Parents, a code word is a lock and key
    for your child. "Your Mom and Dad have been in a car wreck. You need come
    with me right now!"
    Child: " What is the code word?" If they don't
    know it then child doesn't go. The child runs away from that person and tells
    whomever is responsible for them--teacher or parent--what happened. Get a
    description of the perpetrator if possible.

  • Separation Plan - Teach your children to go to a cashier or
    ticket booth if they are separated from you while at a mall, amusement park, or
    any place you travel.

  • Check Route to School - The route to school should be
    established by a parent and under no circumstances should the child deviate from
    that route. Avoid alleys, etc.

  • Notify School - Make sure the school will notify you if
    your child does not arrive at school. Let the principal know who is authorized
    to pick up your child.

  • Communication - Keep good communication lines open with
    your children.

  • Neighbors - Organize a Neighborhood Watch group and participate in a safe
    home program.

  • Child's Clothes - Make a mental note of what your child
    wears every day! Do not put your child's name on the outside of the clothing
    because it allows a stranger to become verbally intimate with your child. Put
    the name on inside of clothes.

AZ Confidential Intermediary Program Info

7/6/2015

0 Comments

 

I am often asked about adoption searches in AZ. I want to take a moment and let folks know about the Confidential Intermediary Program in AZ. I hope it will help many who are searching for answers regarding finding family.

There are options for locating/contacting your birth parent, adopted child, or sibling(s) in our State. You might contact Catholic Social Services to see if an adoption was handled by their organization. In fact, Catholic Social Services will often cooperate in the reuniting process where many other organizations in AZ are 'closed file'.  There are a few other cooperative sources, but I  recommend to folks to contact a Confidential Intermediary (CI). A CI is a person licensed by the State Supreme Court to open the 'closed file'. Those who are searching do not need court permission to engage a CI.  Read more about State of Arizona Confidential Intermediaries below:

https://www.azcourts.gov/Portals/26/CIP/pdf/2011/CIPBrochure2011.pdf
and:
https://www.azcourts.gov/Portals/26/CIP/pdf/2011/SIXBrochure2011.pdf

Please contact a certified CI for more information.

Best wishes,
Michele

0 Comments

RESOURCES / READING FOR EW

4/23/2013

0 Comments

 

I noticed there aren't many resources gathered together on one page for EW needs - so here's a little list of helpful data that I can update as time goes by - let me know of any suggestions - I'll be pleased to add!


Federal Rules of Evidence

http://www.law.cornell.edu/rules/fre/#article_vii



State Rules of Evidence
http://expertpages.com/news/state_rules_of_evidence.htm



Balancing Legal Process with Scientific Expertise: Expert Witness Methodology in Five Nations and Suggestions for Reform of Post-Daubert U.S. Reliability Determinations and other good reads at below link, helpful PDFarticless Andrew W. Jurs - copy/paste:

 http://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=5134&contex



0 Comments

More on Wordpress Attack

4/20/2013

0 Comments

 
On group we had been talking about the Wordpress Attacks and the failure to choose proper passwords, here is an informative article - check it out (exactly what we were talking about, fending off concerns before they happen with basic security protocols):

http://www.technewsdaily.com/17790-avoid-wordpress-attack.html


0 Comments

Isabel Celis Case

4/20/2013

0 Comments

 
My work as an Expert Witness extremely rewarding, but those that know me recognize my first drive in the investigative world has always been safety of children. I encourage professionals to get involved in volunteer work that will make a difference, for me it is the bringing home of missing persons and abducted children.

Taking a break from Communications, this post is primarily for the folks on my private group who had been talking about the 'Celis Interviews' - below is the link to the local news interview regarding the Celis case (this was prior to Nancy Grace, Celis interview talks).

If anyone has information about the Celis case please contact TPD immediately, all of Tucson prays for this little girl to come home.


http://www.tucsonnewsnow.com/story/17723918/private-investigator-offers-insight-into-isabel-celis-search


0 Comments

Metadata free, prog, works great!

8/4/2011

0 Comments

 
Sharing a nice tool for reading Metadata off pictures (does lots more too)!

EXIF Tool is FANTASTIC!  Free too!  Download here:

http://owl.phy.queensu.ca/~phil/exiftool/

I use it to extract data off photos, but far below, I’ve listed from the EXIF Tool site, a small column of other uses for this tool.

Spoof Deconstruction Experts and Law Enforcement, EXIF Tool reads, and writes.  There are other progs that are desinged specifically to allow the user to distort Metadata from Photos (and other digital devices).  Keep this in mind both when your looking to show evidence could have been distorted by a spoof, thereby interjecting doubt of scientific data, and from LE perspective - try to white hat your scientifically sound evidence.  This way your ready for any doubt that the other side might cast on the evidence.

Picasa and other free online progs can see photo Metadata too, of course, that is how they are showing you Lat/Long from GPS enabeled device photos that have apps enabeled for location log.  EXIF Tool gives you full control over ALL the collectable MD, very professional.  With this, you have the 'back end' of Picasa in you shop.


Other things that EXIF Tool can do (from their site):
•Powerful, fast, flexible and customizable
•Supports a large number of different file formats
•Reads EXIF, GPS, IPTC, XMP, JFIF, MakerNotes, GeoTIFF, ICC Profile, Photoshop IRB, FlashPix, AFCP, ID3 and more...
•Writes EXIF, GPS, IPTC, XMP, JFIF, MakerNotes, ICC Profile, Photoshop IRB, AFCP and more...
•Reads and writes maker notes of many digital cameras
•Decodes a riddle wrapped in a mystery inside an enigma
•Numerous output formatting options (including tab-delimited, HTML, XML and JSON)
•Multi-lingual output (cs, de, en, en_ca, en_gb, es, fr, it, ja, ko, nl, pl, ru, sv, tr, zh_cn or zh_tw)
•Geotags images from GPS track log files (with time drift correction!)
•Generates track logs from geotagged images
•Shifts date/time values to fix timestamps in images
•Renames files and organizes in directories (by date or by any other meta information)
•Extracts thumbnail images, preview images, and large JPEG images from RAW files
•Copies meta information between files (even different-format files)
•Reads/writes structured XMP information
•Deletes meta information individually, in groups, or altogether
•Sets the file modification date from EXIF information
•Supports alternate language tags in XMP, PNG, ID3, Font, QuickTime, ICC Profile, MIE and MXF information
•Processes entire directory trees
•Creates text output file for each image file
•Creates binary-format metadata-only (MIE) files for metadata backup
•Automatically backs up original image when writing
•Organizes output into groups
•Conditionally processes files based on value of any meta information
•Ability to add user-defined tags
•Support for MWG (Metadata Working Group) recommendations
•Recognizes thousands of different tags
•Tested with images from thousands of different camera models
•Advanced verbose and HTML-based hex dump outputs
0 Comments

Great database - cure subpoena compliance phone company location issues and ports needs!

7/29/2011

0 Comments

 
Greetings,

LE, Expert Witness working on Telecommunications Issues, Attorneys, Private Investigators, here is a website, offering a prog that you might find interesting.  The 'Telco Solutions' Website offers a 30 day free trial to check out their Carrier ID and Subpoena Compliance service.   


There are ways to find a numbers current carrier, even if ported, very fast, and ways to ID a carrier of the Defendants long past disconnected numbers as well – I’ll share that in a later post, but Telco Solutions includes this service with a host of other exciting abilities.  They allow you to personalize needed subpoena compliance forms, as well as ID and get contact addressing and phone info for you, you just fill out the forms onsite – and your subpoena is on its way!  In 1 stroke, you’re done!  For folks needing a great deal of compliance - this is going to make a giant impact on easing your workday! 

Check them out here: www.TelcoSolutions.com

Take care,
Michele
Submitted by Michele Yontef at
http://GoMaxo.com
0 Comments


    YOUR READING:
    Spoof  Deconstruction and Investigative tips.

    ABOUT THE POSTS:
    To figure out, 'how they done it' - you need to deconstruct every possible event.
    Exponential growth of the criminal spoof ability, within wireless and land line communications arenas, has created need for highly specialized forensic communications investigators working for the Court System.

    Investigative Communications has  been a passion and life’s work and I’d be pleased to share and connect with associated professionals via this medium.  Continued education and study, in order to stay abreast of the continued hacking and phreaking abilities in our culture is a critical aspect to our ability to succeed in fulfillment of testimony.

    Email: Michele Yontef  (Site Contributor)

    Archives

    June 2024
    March 2020
    July 2015
    April 2013
    August 2011
    July 2011

    Picture
Private Investigation Tucson Private Detective Agency MAXO LLC  Phone 520-284-5226 PRIVACY STATEMENT: all offerings by our Tucson AZ PI Agency including all Expert Witness Investigations, Tucson Process Service, Skip Trace, Gomaxo.com & Background services have always been 100% confidential.  We NEVER share your information.  Copyright 2024 MAXO llc
  • MAXO Tucson Private Investigator Agency
  • Private Investigator Tucson
  • Process Server Tucson
  • Expert Witness Wireless
  • About Michele Yontef
  • Tucson Detective Blog