Internal Office Announcements
Office Status
- February 16th, 2016: KGH Offices will be open during regular business hours.
Security Reminder
- CDSE Job Aid - FIE Targeting
- CDSE Job Aid - Foreign Collection Methods
- CDSE Job Aid - IBTL
- CDSE Job Aid - Insider Threat Case Study - Awwad
- CDSE Job Aid - Insider Threat Case Study - Boyce
- CDSE Job Aid - Insider Threat Case Study - Li
- CDSE Job Aid - Insider Threat Case Study - Liew
- CDSE Job Aid - Insider Threat Case Study - Liu
- CDSE Job Aid - Insider Threat Case Study - Underwood
Security
As a federal contractor, it is imperative that we safeguard our nation’s interests through smart security practices that protect U.S. classified information and technologies. We operate under the guidelines of the National Industrial Security Program. This program is administered and implemented by the Defense Security Service (DSS). DSS provides oversight and assistance to cleared contractor facilities, and assists the organizations’ management in ensuring the protection of national security information.
Having a security clearance is a privilege, not a right. When you accept the privilege of access to classified information, you are also accepting the responsibilities that accompany the privilege. It is critical that you do your part to protect the information and materials entrusted to you by the U.S. government. You are not only protecting U.S. citizens at home, but also citizens and warfighters abroad.
For any security-related questions or concerns, e.g. clearance inquiries, foreign travel, classified visits, or suspicious contacts, you can reach KGH’s FSO, Janet Glasby, at glasby@kiernan.co. There are also briefing forms and security training materials available through this portal. Please send all completed forms and certificates to your FSO.
- KGH January 2017 Newsletter
- KGH December 2016 Newsletter
- KGH November 2016 Newsletter
- KGH October 2016 Newsletter
- Foreign Collection Methods Indicators and Countermeasures
- Insider Threat Indicators
- Reporting Requirements and Examples
- Resource List
- CyberThreats
- Security Indoctrination Briefing
- Identifying Suspicious Contacts
- Foreign Travel Briefing
- Foreign Travel Briefing Presentation
- Foreign Travel Debriefing
- 2014_Hotline_Poster_Final
- FreeSpeech
- Visit Request Policy