20
[email protected] (210) 454-1979

Deeply Inspired Designs Porfolio

Embed Size (px)

Citation preview

Page 1: Deeply Inspired Designs Porfolio

[email protected] (210) 454-1979

Page 2: Deeply Inspired Designs Porfolio

(210) [email protected]

Ps

IA

Id

Mu

Technical Skills

Profile

Work Experience

Pursing Bachelors Of Fine Arts in Graphic DesignSanford-Brown CollegeSan Antonio Tx,78250

Education Freelance Work

Designed logos for different com-panies, such a Project X Print Co, Advantage Sci, Vital AppsFreelance in artwork for clients, as in painting band flags, patches, accessories, basic graphics for T-shirts done manuallyRestaurants menus created in Indesign software

5 years of experience in creating company logos forprivately held companies using traditional art drawing and illustration software. Incorporated ideas from college and secondaryresearch of Fortune 500 companies.Diligently monitor marketing strategies that trend well and are effective based on consumer reviewsScored a 135 in Professional Special IntelligenceAssessment

Retail Stock Merchandising Associate Sales AssociateImprove mechandise and prod-ucts space and by consolidatingRecognized by store managementand also regional director for training new hires as a result of my knowledge

Tueday Morning: 2014 - 2015

Unload and to unpack new merchandise, and also including shipments, and prepare them for the selling on the floorUtilize Macy’s system and proce-dures to effciencies and Complete support duties

Macy’s: 2014 - 2015

Page 3: Deeply Inspired Designs Porfolio

Branding

Page 4: Deeply Inspired Designs Porfolio

Identity

Page 5: Deeply Inspired Designs Porfolio

Control Movie Poster

Page 6: Deeply Inspired Designs Porfolio

Beat’s Promotional Advertisement

Page 7: Deeply Inspired Designs Porfolio

Billboard Poster

Page 8: Deeply Inspired Designs Porfolio

Inspirational Poster

Page 9: Deeply Inspired Designs Porfolio

Typography

Page 10: Deeply Inspired Designs Porfolio

Food Advertisement Typography

Page 11: Deeply Inspired Designs Porfolio

Juice Skateboard Magazine Cover

Page 12: Deeply Inspired Designs Porfolio

Nike Magazine Advertisement

Page 13: Deeply Inspired Designs Porfolio

Advantagesci

Securing Tomorrow Today!

Page 14: Deeply Inspired Designs Porfolio

In addition, Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer, identified in court records as Officer B, along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002. Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified. Based in part on this information, Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer B’s alleged role in the Abu Zubaydah operation.

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information. Without Kiriakou’s knowledge, Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay. The investigator had been unable to successfully identify either officer.

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifying.Kiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique, referred to as a magic box,while seeking permission from the CIA’s Publications Review Board to include the classified technique in a book.

Mr. Kiriakou was playing a dangerous game here. He compromised the name of an intelligence agent, possibly putting that agents safety at risk. He could have compromised intelligence activities, and possibly put lives in jeopardy.

In a statement of facts filed with his plea agreement, Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009. Again here, we have an individual who thinks the rules do not apply to him. No malicious intent, no revenge or greed, perhaps just wanting to establish his knowledge and expertise to aggrandize himself. Still, a potentially dangerous game for the person whom he was referring to, and, ultimately, dangerous to him for at least the 30 months he will be in federal confinement.

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action, including dismissal from service, against at least two commanders for posting confidential infor- mation and data, including location of warships and their patrolling patterns, on Facebook. In spite of the size of the bust, U.S. officials at the time presented the group‘s spying activity as conflict.

CounterIntelligence Brief Homland

Security

FBI U.S. Defense

Page 15: Deeply Inspired Designs Porfolio

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE!

Advantage SCI hosted its first CI/Cyber Security Seminar on Wednesday,

February 27th 2013. With more than 35 attendees, a diverse mix of cleared defense contractors, government, and municipal employees was in attendance.Advantage SCI CEO and President, Elsa Lee, welcomed our guests, and provided a brief overview of the company.

Mike discussed the art of counter intelligence and its current state. He delineated case examples and current legal precedents affecting counterintelligence. Finally, he pointed out trends and issues the discipline faces going forward. Following Mike was Brian Smith from Advantage SCI (pictured at right, middle photo). Brian is a retired Lieutenant Colonel from the USAF. Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence.

Next, Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke. Deb retired from the USAF as an OSI agent, then worked at Boeing before joining Disney. Deb discussed the protection of intellectual property and some of the inherent challenges. Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg. Jason was a Supervisory Special Agent with the FBI, heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg. Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world.

Our seminar was a great success. Our guests provided great reviews of the day’s presentations. With the favorable reviews and positive comments, another seminar will be planned for the late summer or early fall. The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link:

http://washingtonexaminer.com/watchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- china/article/2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not.

where the arrest of Chinese national Bo Jiang is reported:Jiang was employed by the National Institute of Aerospace, a Hampton, VA-based NASA contractor. The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility, which is the location for classified.

China, was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs, information and access related to the U.S. Consulate to China’s Ministry of State Security (MSS), announced Lisa Monaco, Assistant Attorney General for the Justice Department’s National Security Division; Ronald C.

Page 16: Deeply Inspired Designs Porfolio

Trading Confidential Is Leading To Crime!

Below, from the FBI website is a new internet scam. The scam generates fake emails

that appear to be coming from the FBI. Recipients of the email are faced with a dilemma. Pay up or your computer will be locked (frozen, inoperable) until the fee is paid. Of course, it‘s a scam. Pic- tured above is an example of what such an email would look like. Please view the original post at the following hyperlink.

h t t p : / / w w w. f b i . g o v / n e w s /stories/2012/august/new -internet-scam

There is a new drive-by virus on the Internet, and it often carries a fake message and fine purportedly from the FBI.“Were getting inundated with complaints, ”said Donna Gregory of the Internet Crime Complaint Center (IC3), referring to the virus known as Reveton ransomware, which is designed to extort money from its victims.

The information provided at OnGuardOnline.gov is valuable to security educators, Counter intelligence are professionals, that are cleared individuals, and relative family members alike.

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website. Once infected, the victim‘s computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law.The bogus message goes on to say that the user‘s Internet address was identified by the FBI.

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.Recently, there have been instances of travelers‘ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product.

If the user clicked to accept and install the update, malicious software was installed on the laptop. The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available.

The Federal Trade Commission manages On GuardOnline. gov, in partnership a variety of Federal Government agencies, departments, bureaus, offices and otherentities to OnGuardOnline.gov is a partner in the Stop Think Connect campaign, led by the Department of Homeland Security, and part of the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology. Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow. And by all means, please encourage your clients to visit the OnGuardOnline.gov

Page 17: Deeply Inspired Designs Porfolio

Advantage Sci

Page 18: Deeply Inspired Designs Porfolio

Brochure

Page 19: Deeply Inspired Designs Porfolio

Magazine Page

Page 20: Deeply Inspired Designs Porfolio

Retro Vintage Advertisement