Confidence-building measures

Last updated

Confidence-building measures (CBMs) or confidence- and security-building measures (CSBMs) are actions taken to reduce fear of attack by both (or more) parties in a situation of conflict. [1] The term is most often used in the context of armed conflict, but is similar in logic to that of trust and interpersonal communication used to reduce conflictual situations among human individuals. [1]

Contents

History

Embassies and people to people contacts

Confidence-building measures between sovereign states for many centuries included the existence of and increased activities by embassies, which are state institutions geographically located inside the territory of other states, staffed by people expected to have extremely good interpersonal skills who can explain and resolve misunderstandings due to differences in language and culture which are incorrectly perceived as threatening, or encourage local knowledge of a foreign culture by funding artistic and cultural activities.

A much more grassroots form of confidence building occurs directly between ordinary people of different states. Short visits by individual children or groups of children to another state, and longer visits (6–12 months) by secondary and tertiary students to another state, have widely been used in the European Union as one of the methods of decreasing the tensions which had earlier led to many centuries of inter-European wars, culminating in the first and second world wars.

Cold War

The use of confidence-building measures (CBMs) as an explicit security management approach emerged from attempts by the Cold War superpowers and their military alliances (the North Atlantic Treaty Organization and the Warsaw Pact), as well as the European neutral and non-aligned states, to avoid conventional or nuclear war by accident or miscalculation. The term appears to have been first used in United Nations General Assembly Resolution 914 (x) in 1955, prompted by the U.S. "Open Skies" proposal. CBMs were a major component of the Helsinki Final Act Document (August 1975), the Stockholm CSBM Document (September 1986), and the Vienna Document (November 1990) and its iterations of 1992, 1994, 1999, and 2011. All were products of the Conference on Security and Co-operation in Europe (CSCE)/Organization for Security and Cooperation in Europe (OSCE). [2] CBMs also existed at other levels of conflict situations during the Cold War. [3] [ citation needed ]

Information exchange and verification

In international relations, the way that confidence-building measures are intended to reduce fear and suspicion (the positive feedbacks) is to make the different states' (or opposition groups') behaviour more predictable. [1]

This typically involves exchanging information and making it possible to verify this information, especially information regarding armed forces and military equipment. [1]

Mathematical model

Mathematically, confidence-building measures are assumed to be useful as a peace mechanism based on the positive feedback model of conflict, where fear (and/or suspicion) of military attack or human rights violations is the positive feedback factor, is a valid model of the conflict. The actions which constitute confidence-building measures provide negative feedback to the conflict, which weakens, possibly cancels or reverses the tension which would otherwise grow exponentially and eventually continue or turn into a war. Here, "positive" and "negative" refer to the mathematical nature of the feedback; positive feedback leads to worsening intensity in a conflict, while negative feedback leads to de-escalation of the conflict, a "peace spiral" or Gradual Reduction in Tension (GRIT). [1]

Validity of the model in the Internet era

If the feedback model assumed by the confidence-building measure mechanism is correct, then the rapidly developing improvement in communication between ordinary people by the internet should provide extremely robust, fast methods of information exchange and verification, as well as improved people-to-people contacts and general building of trust networks, reducing the intensity and frequency of wars. Evidence, however, suggests that the Internet is as likely to inflame opinion and increase conflict (or at least tensions) as individuals are exposed to significantly different points of view.

Typology of confidence-building measures

Existing and proposed confidence-building measures in the context of arms control, also called confidence and security-building measures (CSBMs), can be categorized by three main types. Confidence building can also be viewed as an overall process, rather than a collection of individual measures. In a monograph distributed to the Conference on Disarmament in 1997, [4] Macintosh divides CSBMs into informational type (A), verification type (B) and constraint (C) measures. [5]

Type A: Information, interaction, and communication measures

Informational and similar type measures include: [5]

  1. Information measures: measures requiring or encouraging the provision (exchange) of information about military forces, facilities, structures, and activities. Examples include: publication of defence information; weapon system and force structure information exchange; consultative commissions; publication of defence budget figures; and publication of weapon system development information.
  2. Experience measures: measures requiring or encouraging the opportunity to interact with officials or experts from other countries. Examples include: military personnel exchanges; security expert exchanges; transnational secondments; joint military training and joint military exercises; and seminars discussing doctrine, strategy, and technology issues.
  3. Communication measures: measures requiring or encouraging the creation and/or use of shared means of communication. Examples include: "hot lines" for the exchange of crisis-related information; joint crisis control centres; and "cool lines" for the regularized distribution of required and/or requested information.
  4. Notification measures: measures requiring or encouraging the advance, accurate notification of specified military activities. Examples include: advance notification of exercises, force movements, and mobilizations - including associated information about forces involved.

Type B: Verification and observation facilitation measures

Verification and similar measures, such as those of the Treaty on Conventional Armed Forces in Europe, include: [5]

  1. Observation-of-movement conduct measures: measures requiring or encouraging the opportunity to observe specified military activities. Examples include: mandatory and optional invitations to observe specified activities (with information about the activity) and rules of conduct for observers and hosts.
  2. General observation measures: measures requiring or encouraging the opportunity to engage in non-focused "looks" at relatively small and generally-specified sections of territory within which activities of interest and/or concern may be occurring or may have recently occurred. Examples include: Open Skies agreements.
  3. Inspection measures: measures requiring or encouraging the opportunity to inspect constrained or limited military forces, facilities, structures, and activities. Examples include: special observers for sensitive movements and activities; on-site inspections of various forms; and the use of special tagging and tracking devices.
  4. Monitoring measures: measures requiring or encouraging the opportunity to monitor constrained or limited military forces, facilities, structures, and activities, principally through the use of monitoring devices. Examples include: perimeter monitors; motion sensors for no-go areas; sensors for use in restricted access areas; and activity sensors.
  5. Facilitation of verification measures: measures requiring or encouraging participants to facilitate and/or not interfere with agreed verification efforts. Examples include: agreement to not interfere with inspection and/or monitoring efforts and agreements specifying how verification efforts are to be assisted or facilitated.

Type C: Constraint measures

Types of limitations include: [5]

  1. Activity constraint measures: measures requiring or encouraging participants to avoid or limit specified types of provocative military activity. Examples include: no harassing activities such as "playing chicken" on the high seas; no harassing or provocative close encounters between military aircraft and/or military aircraft and naval or ground forces; and no harassing activities in airspace near territorial boundaries.
  2. Deployment constraint measures: measures requiring or encouraging participants to avoid or limit the provocative stationing or positioning of military forces. Examples include: no threatening manoeuvres or equipment tests; no threatening deployments near sensitive areas (such as tanks near borders); equipment constraints such as no attack aircraft within range of a neighbour's rear area territory; manpower limits; and nuclear free zones.
  3. Technology constraint measures: measures requiring or encouraging participants to avoid or limit the development and/or deployment of specified military technologies, including systems and subsystems, believed by participating states to have a destabilizing character or impact. Examples include: no replacement of deployed military equipment of certain types (typically tanks, heavily armoured combat vehicles, self-propelled artillery, combat aircraft, and combat helicopters) with new, more advanced and capable types; no modernization of deployed military equipment of certain specified types in certain key, well-defined respects; no training with new systems; no field testing of new designs; and no production of specified new systems and/or subsystems.

Confidence building viewed as a process

An alternative analytic approach to understanding confidence building looks at broader process concepts rather than concentrating on specific measures. [5]

Confidence building, according to the transformation view, is a distinct activity undertaken by policy makers with the minimum intention of improving some aspects of a traditionally antagonistic security relationship through security policy coordination and cooperation. It entails the comprehensive process of exploring, negotiating, and then implementing tailored measures, including those that promote interaction, information exchange, and constraint. It also entails the development and use of both formal and informal practices and principles associated with the cooperative development of CBMs. When conditions are supportive, the confidence building process can facilitate, focus, synchronize, amplify, and generally structure the potential for a significant positive transformation in the security relations of participating states. Confidence building in this view is a process that constitutes more than the sum of its parts. [5]

When confidence building leads to the institutionalization of a collection of new rules and practices stipulating how participating states and non-state actors should cooperate and compete with each other in their security relationship, the restructured relationship can reduce the likelihood of armed conflict by redefining expectations of normal behaviour among participating states in a way that is more likely to handle conflict by non-military means. [5]

See also

Related Research Articles

A peace process is the set of sociopolitical negotiations, agreements and actions that aim to solve a specific armed conflict.

<span class="mw-page-title-main">Peacekeeping</span> Activities intended to create conditions that favour lasting peace

Peacekeeping comprises activities, especially military ones, intended to create conditions that favor lasting peace. Research generally finds that peacekeeping reduces civilian and battlefield deaths, as well as reduces the risk of renewed warfare.

<span class="mw-page-title-main">Biological Weapons Convention</span> 1975 treaty that comprehensively bans biological weapons

The Biological Weapons Convention (BWC), or Biological and Toxin Weapons Convention (BTWC), is a disarmament treaty that effectively bans biological and toxin weapons by prohibiting their development, production, acquisition, transfer, stockpiling and use. The treaty's full name is the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction.

The original Treaty on Conventional Armed Forces in Europe (CFE) was negotiated and concluded during the last years of the Cold War and established comprehensive limits on key categories of conventional military equipment in Europe and mandated the destruction of excess weaponry. The treaty proposed equal limits for the two "groups of states-parties", the North Atlantic Treaty Organization (NATO) and the Warsaw Pact. In 2007, Russia "suspended" its participation in the treaty, and on 10 March 2015, citing NATO's alleged de facto breach of the Treaty, Russia formally announced it was "completely" halting its participation in it as of the next day. On 7 November 2023, Russia withdrew from the treaty, and in response the United States and its NATO allies suspended their participation in the treaty.

In computer science, data validation is the process of ensuring data has undergone data cleansing to confirm they have data quality, that is, that they are both correct and useful. It uses routines, often called "validation rules", "validation constraints", or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or by the inclusion of explicit application program validation logic of the computer and its application.

NIEMOpen, frequently referred to as NIEM, originated as an XML-based information exchange framework from the United States, but has transitioned to an OASISOpen Project. This initiative formalizes NIEM's designation as an official standard in national and international policy and procurement. NIEMOpen's Project Governing Board recently approved the first standard under this new project; the Conformance Targets Attribute Specification (CTAS) Version 3.0. A full collection of NIEMOpen standards are anticipated by end of year 2024.

Software assurance (SwA) is a critical process in software development that ensures the reliability, safety, and security of software products. It involves a variety of activities, including requirements analysis, design reviews, code inspections, testing, and formal verification. One crucial component of software assurance is secure coding practices, which follow industry-accepted standards and best practices, such as those outlined by the Software Engineering Institute (SEI) in their CERT Secure Coding Standards (SCS).

Data cleansing or data cleaning is the process of detecting and correcting corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data. Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting or a data quality firewall.

<span class="mw-page-title-main">Conference on Interaction and Confidence-Building Measures in Asia</span>

The Conference on Interaction and Confidence-Building Measures in Asia (CICA) is an inter-governmental forum for enhancing cooperation towards promoting peace, security and stability in Asia. It is a forum based on the recognition that there is a close link between peace, security and stability in Asia and in the rest of the world. The key idea of the Conference is based on the priority of the indivisibility of security, joint initiative and mutually beneficial interaction of small and large states.

Dipankar Banerjee is a retired major general of the Indian Army based in India. He is the founding director of the Institute of Peace and Conflict Studies.

Confidence-building measures (CBMs) were a key element in the Central American peace process. Although CBMs have always existed in some form or another in the hemisphere's conflict situations, the Central American peace process for the first time in a Latin American conflict explicitly used CBM terminology and techniques. This was no accident, and reflected the key role played by the UN and by certain outside actors in bringing these ideas to the peace process.

<span class="mw-page-title-main">ONUCA and ONUSAL</span> United Nations peacekeeping missions

ONUCA and ONUSAL were two United Nations peacekeeping missions deployed in Central America during the late 1980s and early 1990s.

The South American experience with confidence-building measures has been markedly different from the Central American one for the obvious reason that South America did not live through the protracted conflict and peacemaking process which dominated Central America in the 1980s and early 1990s. Thus, there was no UN peace-keeping presence in South America, and there was no overarching treaty or Contadora/ Esquipulas Treaty framework in which to ground specific CBMs.

The Sochi agreement was a ceasefire agreement ostensibly marking the end of both the Georgian–Ossetian and Georgian–Abkhazian conflicts, signed in Sochi on June 24, 1992 between Georgia and Russia, the ceasefire with Abkhazia on July 27, 1993.

<span class="mw-page-title-main">Defence diplomacy</span>

In international relations, defence diplomacy, refers to the pursuit of foreign policy objectives through the peaceful employment of defence resources and capabilities.

<span class="mw-page-title-main">Moscow Summit (1988)</span> 1988 Summit Between the USSR & USA

The Moscow Summit was a summit meeting between U.S. President Ronald Reagan and General Secretary of the Communist Party of the Soviet Union Mikhail Gorbachev. It was held on May 29, 1988 – June 3, 1988. Reagan and Gorbachev finalized the Intermediate-Range Nuclear Forces Treaty (INF) after the U.S. Senate's ratification of the treaty in May 1988. Reagan and Gorbachev continued to discuss bilateral issues like Central America, Southern Africa, the Middle East and the pending withdrawal of Soviet troops from Afghanistan. Reagan and Gorbachev continued their discussions on human rights. The parties signed seven agreements on lesser issues such as student exchanges and fishing rights. A significant result was the updating of Soviet history books, which necessitated cancelling some history classes in Soviet secondary schools. In the end, Reagan expressed satisfaction with the summit.

The Vienna Document is a series of agreements on confidence and security-building measures between the states of Europe, starting in 1990, with subsequent updates in 1992, 1994, 1999 and 2011. The Vienna Document 2011 was adopted by 57 Organization for Security and Co-operation in Europe (OSCE) participating states, including the states of Central Asia and Russia. It described its zone of application (ZOA) as "the whole of Europe, as well as the adjoining sea area and air space".

The Heart of Asia – Istanbul Process (HoA-IP) is an initiative of the Republic of Afghanistan and the Republic of Turkey, which was officially launched at a conference hosted by Turkey in Istanbul on 2 November 2011. Since then, Afghanistan supported by fourteen Participating Countries of the Heart of Asia Region and 16 Supporting Countries beyond the region as well as 12 Regional and International Organizations is leading and coordinating this Process. It is a platform for promoting regional security, economic and political cooperation centered on Afghanistan through dialogue and a set of Confidence Building Measures (CBMs).

The Colombian peace process is the peace process between the Colombian government of President Juan Manuel Santos and the Revolutionary Armed Forces of Colombia (FARC–EP) to bring an end to the Colombian conflict, which eventually led to the Peace Agreements between the Colombian Government of Juan Manuel Santos and FARC-EP. Negotiations began in September 2012, and mainly took place in Havana, Cuba. Negotiators announced a final agreement to end the conflict and build a lasting peace on August 24, 2016. However, a referendum to ratify the deal on October 2, 2016 was unsuccessful after 50.2% of voters voted against the agreement with 49.8% voting in favor. Afterward, the Colombian government and the FARC signed a revised peace deal on November 24 and sent it to Congress for ratification instead of conducting a second referendum. Both houses of Congress ratified the revised peace agreement on November 29–30, 2016, thus marking an end to the conflict.

<span class="mw-page-title-main">Border Peace and Tranquility Agreement, 1993</span> Agreement between China and Indian regarding border management

The Border Peace and Tranquility Agreement is an agreement signed by China and India in September 1993, agreeing to maintain the status quo on their mutual border pending an eventual boundary settlement. The Agreement on Military Confidence Building Measures, 1996, pursuant to the 1993 agreement, incrementally details the military confidence building measures to be implemented that would ensure no-war. The Protocol for the Implementation of Military Confidence Building Measures, 2005 further discussed modalities to implement the confidence building measures.

References

Inline

  1. 1 2 3 4 5 Maiese, Michelle (2003). "Confidence-Building Measures". Moving Beyond Intractability. Archived from the original on 2013-09-08. Retrieved 2005-12-09.
  2. United States Department of State (2017), Arms Control and International Security, Overview of 2011 Vienna Document, Wikidata   Q123151316, archived from the original on 28 January 2022
  3. Macintosh, James (August 1985). Confidence (and Security) Building Measures in the Arms Control Process: A Canadian Perspective. Ottawa: Canadian Department of External Affairs. ISSN   0828-3672. Open Skies reference pp.19-20. This monograph contains a detailed list of pre-Cold War confidence building examples and a detailed discussion of the CBM literature up to 1984.
  4. "Letter dated 97/08/04 from the Permanent Representative of Canada addressed to the Deputy Secretary-General of the Conference on Disarmament transmitting a publication entitled "Confidence building in the arms control process : a transformation view" / by James MacIntosh". United Nations . 1997-08-05. Archived from the original on 2020-02-08. Retrieved 2020-02-08.
  5. 1 2 3 4 5 6 7 Macintosh, James (1996). Confidence building in the arms control process : a transformation view. Ottawa: Department of Foreign Affairs (Canada). ISBN   9780662250296. OCLC   433939801.

Other