Natalie Acevedo is pursuing a Bachelors of Fine Arts in Graphic Design from Sanford-Brown College in San Antonio, Texas. She has 5 years of experience creating logos for private companies using both traditional art and design software. Her technical skills include branding, identity design, typography, and print/digital advertisements. Her work experience includes freelance graphic design work and retail jobs at Tuesday Morning and Macy's.
2. (210) 454-1979
natalieacevedo355@yahoo.com
Ps
IA
Id
Mu
Technical Skills
Profile
Work Experience
Pursing Bachelors Of Fine Arts in
Graphic Design
Sanford-Brown College
San Antonio Tx,78250
Education Freelance Work
Designed logos for different com-
panies, such a Project X Print Co,
Advantage Sci, Vital Apps
Freelance in artwork for clients,
as in painting band flags, patches,
accessories, basic graphics for
T-shirts done manually
Restaurants menus created in
Indesign software
5 years of experience in creating company logos for
privately held companies using traditional art drawing
and illustration software.
Incorporated ideas from college and secondary
research of Fortune 500 companies.
Diligently monitor marketing strategies that trend well
and are effective based on consumer reviews
Scored a 135 in Professional Special Intelligence
Assessment
Retail Stock Merchandising Associate Sales Associate
Improve mechandise and prod-
ucts space and by consolidating
Recognized by store management
and also regional director for
training new hires as a result of
my knowledge
Tueday Morning: 2014 - 2015
Unload and to unpack new
merchandise, and also including
shipments, and prepare them for
the selling on the floor
Utilize Macy’s system and proce-
dures to effciencies and Complete
support duties
Macy’s: 2014 - 2015
14. I
n addition, Kiriakou admitted
that he disclosed to Journalists
A and B the name and contact
information of a CIA officer,
identified in court records as Officer
B, along with his association with
an operation to capture terrorism
subject Abu Zubaydah in 2002.
Kiriakou knew that the association
of Officer B with theAbu Zubaydah
operation was classified. Based in
part on this information, Journalist
B subsequently published a June
2008 front-page story in The New
York Times disclosing Officer B’s
alleged role in the Abu Zubaydah
operation.
Kiriakou provided this information
to journalists without inquiring
what the journalists would do
with the information. Without
Kiriakou’s knowledge, Journalist A
passed the information he obtained
from Kiriakou to an investigator at
Guantanamo Bay. The investigator
had been unable to successfully
identify either officer.
Officer is being suspicious secretly
photographed and his photographs
being tendered to high-value
terrorist detainees result Kiriakou
himself described as terrifying.
Kiriakou also admitted that he lied
to the CIA regarding the existence
and use of a classified technique,
referred to as a magic box,while
seeking permission from the CIA’s
Publications Review Board to
include the classified technique in
a book.
Mr. Kiriakou was playing
a dangerous game here. He
compromised the name of an
intelligence agent, possibly
putting that agents safety at risk.
He could have compromised
intelligence activities, and
possibly put lives in jeopardy.
In a statement of facts filed with his
plea agreement, Kiriakou admitted
that he made illegal disclosures
about two CIA employees and their
involvementinclassifiedoperations
Journalist A and ournalist Bin court
records) on multiple occasions
between 2007 and 2009. Again
here, we have an individual who
thinks the rules do not apply to him.
No malicious intent, no revenge
or greed, perhaps just wanting
to establish his knowledge and
expertise to aggrandize himself.
Still, a potentially dangerous
game for the person whom he
was referring to, and, ultimately,
dangerous to him for at least the
30 months he will be in federal
confinement.
Another BoI in the Mumbai-based
Western Navy Command has
recommended stringent action,
including dismissal from service,
against at least two commanders
for posting confidential infor-
mation and data, including location
of warships and their patrolling
patterns, on Facebook. In spite of
the size of the bust, U.S. officials
at the time presented the group‘s
spying activity as conflict.
Counter
Intelligence
Brief Homland
Security
FBI U.S. Defense
15. CREATING NEW
STRATGIES TO
SURROUNDER
THE SAFE!
A
dvantage SCI hosted its
first CI/Cyber Security
Seminar on Wednesday,
February 27th 2013. With more
than 35 attendees, a diverse mix
of cleared defense contractors,
government, and municipal
employees was in attendance.
Advantage SCI CEO and
President, Elsa Lee, welcomed
our guests, and provided a brief
overview of the company.
Mike discussed the art of counter
intelligence and its current state.
He delineated case examples and
current legal precedents affecting
counterintelligence. Finally, he
pointed out trends and issues the
discipline faces going forward.
Following Mike was Brian Smith
from Advantage SCI (pictured at
right, middle photo). Brian is a
retired Lieutenant Colonel from
the USAF. Brian gave an excellent
presentation on the collection of
intelligence and the methods used
by foreign governments to obtain
that intelligence.
Next, Deb Thomas (pictured
at bottom right) from The Walt
Disney Company spoke. Deb
retired from the USAF as an
OSI agent, then worked at
Boeing before joining Disney.
Deb discussed the protection of
intellectual property and some of
the inherent challenges. Our final
presenter of the day was Jason
Smolanoff of Stroz Friedberg.
Jason was a Supervisory
Special Agent with the FBI,
heading up one of the FBI Los
Angeles Cyber prior to joining
Stroz Friedberg. Jason gave
a very lively and informative
presentation regarding the current
state of cyber crime and the threats
we face going forward into the
electronic world.
Our seminar was a great success.
Our guests provided great reviews
of the day’s presentations. With
the favorable reviews and positive
comments, another seminar will
be planned for the late summer
or early fall. The next arrest of
interest is outlined In this brief
extract from the Washington
Examiner at web link:
http://washingtonexaminer.com/
watchdog-alert-fbi -arrests-nasa-
contract-employer-trying-to-flee-
to- china/article/2524691
iTravelSafe App allows you
when you travel and you can
check if the state is safe or not.
where the arrest of Chinese
national Bo Jiang is reported:
Jiang was employed by the
National Institute of Aerospace,
a Hampton, VA-based NASA
contractor. The position afforded
Jiang virtually unlimited to a
unescorted access to the NASL
angley cility, which is the location
for classified.
China, was sentenced to nine years
in prison in connection with his
efforts to sell for personal financial
gain classified photographs,
information and access related
to the U.S. Consulate to China’s
Ministry of State Security (MSS),
announced Lisa Monaco,Assistant
Attorney General for the Justice
Department’s National Security
Division; Ronald C.
16. Trading
Confidential
Is Leading
To Crime!
B
elow, from the FBI website
is a new internet scam. The
scam generates fake emails
that appear to be coming from
the FBI. Recipients of the email
are faced with a dilemma. Pay up
or your computer will be locked
(frozen, inoperable) until the fee is
paid. Of course, it‘s a scam. Pic-
tured above is an example of what
such an email would look like.
Please view the original post at the
following hyperlink.
h t t p : / / w w w. f b i . g o v / n e w s /
stories/2012/august/new
-internet-scam
There is a new drive-by virus
on the Internet, and it often
carries a fake message and
fine purportedly from the FBI.
“Were getting inundated with
complaints, ”said Donna Gregory
of the Internet Crime Complaint
Center (IC3), referring to the virus
known as Reveton ransomware,
which is designed to extort money
from its victims.
The information provided at
OnGuardOnline.gov is valuable
to security educators, Counter
intelligence are professionals, that
are cleared individuals, and relative
family members alike.
Reveton is described as drive-
by malware because unlike many
viruses which activate when users
open a file or attachment this
one can install itself when users
simply click on a compromised
website. Once infected, the victim‘s
computer immediately locks, and
the monitor displays a screen stating
there has been a violation of federal
law.The bogus message goes on to
say that the user‘s Internet address
was identified by the FBI.
Recent analysis from the FBI
and other government agencies
demonstrates that malicious actors
are targeting travelers abroad
through pop-up windows while
they are establishing an Internet
connection in their hotel rooms.
Recently, there have been instances
of travelers‘ laptops being infected
with malicious software while
using hotel Internet connections.
In these instances, the traveler
was attempting to set up the hotel
room Internet connection and was
pre- sented with a pop-up window
notifying the user to update a widely
used software product.
If the user clicked to accept
and install the update, malicious
software was installed on the laptop.
The popup window appeared to
be offering a routine update to a
legitimate software product for
which updates are frequently
available.
The Federal Trade Commission
manages On GuardOnline.
gov, in partnership a variety of
Federal Government agencies,
departments, bureaus, offices and
otherentities to OnGuardOnline.
gov is a partner in the Stop Think
Connect campaign, led by the
Department of Homeland Security,
and part of the National Initiative
for Cybersecurity Education, led by
the National Institute of Standards
and Technology. Readers of our
publication are encouraged to
provide electronic copies of this
publication to individuals that might
benefit from the tips located at the
hyperlinks that follow. And by all
means,pleaseencourageyourclients
to visit the OnGuardOnline.gov