About Us

The CSE provides dedicated SCI security support and oversight of the Army SCI Industrial Security Program. The CSE, Contract Monitor (CM), Unit Industrial Security Specialist (ISS), Facility Security Officer (FSO), and/or Contractor Special Security Officer (CSSO) and Special Security Officers (SSO) will track and process all contractor access, visit requests, debriefs, transfer-in-status, awarded DD254/SCI addendum and courier orders in the ACCS for contractor employees. A Defense Security Service (DSS) Final Top Secret Facility Clearance (FCL) is a prerequisite for award of an Army SCI contract to a specific contractor.

For commands who have an Army SCI contractual requirement, SCI will be managed in accordance with DoDM 5105.21-V1-3, AR 380-28, AR 380-49, AR 715-30, Intelligence Community Policy Guidance (as appropriate), and the Army Handbook for SCI Contracts. Senior Intelligence Officers (SIO), CMs, FSOs, Unit ISS and CSSO's must ensure that these contracts and personnel must be entered into ACCS and actions must remain within ACCS until close-out or a final DD254 is issued. AR 380-28, AR 380-49, DoDM 5105.21-V1-3 and the Army Handbook for SCI Contracts also delineates the specific SCI responsibilities assigned to the CSE, COR, CM, FSO, CSSO, Unit ISS and SSO.

Navigation

Authorized Users



Accounts
New Users
New ACCS users click the link above to register for an account with CSE.


For all log in issues and certificate registration, contact the Enterprise Service Desk at 571-515-4000 option 2 or usarmy.belvoir.gisa.mbx.esd@army.mil

For all other account related issues (i.e., adding/changing a company/agency, name change) please contact CSE by sending an email to usarmy.belvoir.inscom.list.contractor-support-element@army.mil.


This is a DoD interest computer system. All DoD computer systems and related equipment are intended for communications, transmissions, processing and storage of official U. S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. Monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials and are subject to disciplinary action.