US Army CSE Mission
The U.S. Army Intelligence and Security Command, DCS, G-2, through the Contractor Support Element (CSE) or its successor organization, acting on behalf of DCS, G-2 is the Cognizant Security Agency (CSA) for the Department of the Army (DA) and has exclusive administrative security oversight responsibility for all SCI released to the contractor or developed under the DA contract and provides oversight of the Army SCI Industrial Security Program. The CSE provides dedicated SCI Security support to Army Commands (ACOM), Army Service Component Commands (ASCC), Direct Reporting Units (DRU), Joint Service Commands, and to affiliated contractors. The CSE uses the Army Centralized Contracts and Security Portal (ACCS) to process and monitor the entirety of the Army SCI contracting business processes and oversight mission. Point of Contact Chief, CSE 703-428-4372 Training & Staff Assistance Visits/Accreditations 703-428-4762 Personnel Security 703-428-4756 Industrial Security Specialists 703-428-4811/4380/4982/4753/5696/4806/4355 |
Navigation
Authorized Users For all log in issues and certificate registration, contact the Enterprise Service Desk at 571-515-4000 or usarmy.belvoir.gisa.mbx.esd@army.mil For all other account related issues (i.e., adding/changing a company/agency, name change) please contact CSE by sending an email to usarmy.belvoir.inscom.list.contractor-support-element@army.mil. Accounts New Users New ACCS users click the link above to register for an account with CSE. |
|
This is a DoD interest computer system. All DoD computer systems and related equipment are intended for communications, transmissions, processing and storage of official U. S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. Monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials and are subject to disciplinary action. |