Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Natalie's Acevedo Porfolio digital

My Portfolio of design, advertisement, newsletter,posters,and typography

  • Loggen Sie sich ein, um Kommentare anzuzeigen.

  • Gehören Sie zu den Ersten, denen das gefällt!

Natalie's Acevedo Porfolio digital

  1. 1. natalieacevedo355@yahoo.com (210) 454-1979
  2. 2. (210) 454-1979 natalieacevedo355@yahoo.com Ps IA Id Mu Technical Skills Profile Work Experience Pursing Bachelors Of Fine Arts in Graphic Design Sanford-Brown College San Antonio Tx,78250 Education Freelance Work Designed logos for different com- panies, such a Project X Print Co, Advantage Sci, Vital Apps Freelance in artwork for clients, as in painting band flags, patches, accessories, basic graphics for T-shirts done manually Restaurants menus created in Indesign software 5 years of experience in creating company logos for privately held companies using traditional art drawing and illustration software. Incorporated ideas from college and secondary research of Fortune 500 companies. Diligently monitor marketing strategies that trend well and are effective based on consumer reviews Scored a 135 in Professional Special Intelligence Assessment Retail Stock Merchandising Associate Sales Associate Improve mechandise and prod- ucts space and by consolidating Recognized by store management and also regional director for training new hires as a result of my knowledge Tueday Morning: 2014 - 2015 Unload and to unpack new merchandise, and also including shipments, and prepare them for the selling on the floor Utilize Macy’s system and proce- dures to effciencies and Complete support duties Macy’s: 2014 - 2015
  3. 3. Branding
  4. 4. Idenity
  5. 5. Control Movie Poster
  6. 6. Beat’s Promotional Advertisement
  7. 7. Billboard Poster
  8. 8. Inspirational Poster
  9. 9. Typography
  10. 10. Food Advertisement Typography
  11. 11. Juice Skateboard Magazine Cover
  12. 12. Nike Magazine Adverteisment
  13. 13. Advantagesci Securing Tomorrow Today!
  14. 14. I n addition, Kiriakou admitted that he disclosed to Journalists A and B the name and contact information of a CIA officer, identified in court records as Officer B, along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002. Kiriakou knew that the association of Officer B with theAbu Zubaydah operation was classified. Based in part on this information, Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer B’s alleged role in the Abu Zubaydah operation. Kiriakou provided this information to journalists without inquiring what the journalists would do with the information. Without Kiriakou’s knowledge, Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay. The investigator had been unable to successfully identify either officer. Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifying. Kiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique, referred to as a magic box,while seeking permission from the CIA’s Publications Review Board to include the classified technique in a book. Mr. Kiriakou was playing a dangerous game here. He compromised the name of an intelligence agent, possibly putting that agents safety at risk. He could have compromised intelligence activities, and possibly put lives in jeopardy. In a statement of facts filed with his plea agreement, Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvementinclassifiedoperations Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009. Again here, we have an individual who thinks the rules do not apply to him. No malicious intent, no revenge or greed, perhaps just wanting to establish his knowledge and expertise to aggrandize himself. Still, a potentially dangerous game for the person whom he was referring to, and, ultimately, dangerous to him for at least the 30 months he will be in federal confinement. Another BoI in the Mumbai-based Western Navy Command has recommended stringent action, including dismissal from service, against at least two commanders for posting confidential infor- mation and data, including location of warships and their patrolling patterns, on Facebook. In spite of the size of the bust, U.S. officials at the time presented the group‘s spying activity as conflict. Counter Intelligence Brief Homland Security FBI U.S. Defense
  15. 15. CREATING NEW STRATGIES TO SURROUNDER THE SAFE! A dvantage SCI hosted its first CI/Cyber Security Seminar on Wednesday, February 27th 2013. With more than 35 attendees, a diverse mix of cleared defense contractors, government, and municipal employees was in attendance. Advantage SCI CEO and President, Elsa Lee, welcomed our guests, and provided a brief overview of the company. Mike discussed the art of counter intelligence and its current state. He delineated case examples and current legal precedents affecting counterintelligence. Finally, he pointed out trends and issues the discipline faces going forward. Following Mike was Brian Smith from Advantage SCI (pictured at right, middle photo). Brian is a retired Lieutenant Colonel from the USAF. Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence. Next, Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke. Deb retired from the USAF as an OSI agent, then worked at Boeing before joining Disney. Deb discussed the protection of intellectual property and some of the inherent challenges. Our final presenter of the day was Jason Smolanoff of Stroz Friedberg. Jason was a Supervisory Special Agent with the FBI, heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg. Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world. Our seminar was a great success. Our guests provided great reviews of the day’s presentations. With the favorable reviews and positive comments, another seminar will be planned for the late summer or early fall. The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link: http://washingtonexaminer.com/ watchdog-alert-fbi -arrests-nasa- contract-employer-trying-to-flee- to- china/article/2524691 iTravelSafe App allows you when you travel and you can check if the state is safe or not. where the arrest of Chinese national Bo Jiang is reported: Jiang was employed by the National Institute of Aerospace, a Hampton, VA-based NASA contractor. The position afforded Jiang virtually unlimited to a unescorted access to the NASL angley cility, which is the location for classified. China, was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs, information and access related to the U.S. Consulate to China’s Ministry of State Security (MSS), announced Lisa Monaco,Assistant Attorney General for the Justice Department’s National Security Division; Ronald C.
  16. 16. Trading Confidential Is Leading To Crime! B elow, from the FBI website is a new internet scam. The scam generates fake emails that appear to be coming from the FBI. Recipients of the email are faced with a dilemma. Pay up or your computer will be locked (frozen, inoperable) until the fee is paid. Of course, it‘s a scam. Pic- tured above is an example of what such an email would look like. Please view the original post at the following hyperlink. h t t p : / / w w w. f b i . g o v / n e w s / stories/2012/august/new -internet-scam There is a new drive-by virus on the Internet, and it often carries a fake message and fine purportedly from the FBI. “Were getting inundated with complaints, ”said Donna Gregory of the Internet Crime Complaint Center (IC3), referring to the virus known as Reveton ransomware, which is designed to extort money from its victims. The information provided at OnGuardOnline.gov is valuable to security educators, Counter intelligence are professionals, that are cleared individuals, and relative family members alike. Reveton is described as drive- by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website. Once infected, the victim‘s computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law.The bogus message goes on to say that the user‘s Internet address was identified by the FBI. Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms. Recently, there have been instances of travelers‘ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available. The Federal Trade Commission manages On GuardOnline. gov, in partnership a variety of Federal Government agencies, departments, bureaus, offices and otherentities to OnGuardOnline. gov is a partner in the Stop Think Connect campaign, led by the Department of Homeland Security, and part of the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology. Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow. And by all means,pleaseencourageyourclients to visit the OnGuardOnline.gov
  17. 17. Advantage Sci
  18. 18. Brochure
  19. 19. Magazine Page
  20. 20. Retro Vintage Advertisement