Confidence-building measures

Confidence-building measures (CBMs) or confidence- and security-building measures are actions taken to reduce fear of attack by both (or more) parties in a situation of conflict.[1] The term is most often used in the context of armed conflict, but is similar in logic to that of trust and interpersonal communication used to reduce conflictual situations among human individuals.[1]

History

Embassies and people to people contacts

Confidence-building measures between sovereign states for many centuries included the existence of and increased activities by embassies, which are state institutions geographically located inside the territory of other states, staffed by people expected to have extremely good interpersonal skills who can explain and resolve misunderstandings due to differences in language and culture which are incorrectly perceived as threatening, or encourage local knowledge of a foreign culture by funding artistic and cultural activities.

A much more grassroots form of confidence building occurs directly between ordinary people of different states. Short visits by individual children or groups of children to another state, and longer visits (6–12 months) by secondary and tertiary students to another state, have widely been used in the European Union as one of the methods of decreasing the tensions which had earlier led to many centuries of inter-European wars, culminating in the first and second world wars.

Cold War

Confidence-building measures (CBMs) emerged from attempts by the Cold War superpowers and their military alliances (the North Atlantic Treaty Organisation and the Warsaw Pact) to avoid nuclear war by accident or miscalculation. However, CBMs also exist at other levels of conflict situations, and in different regions of the world although they might not have been called CBMs.

Information exchange and verification

In international relations, the way that confidence-building measures are intended to reduce fear and suspicion (the positive feedbacks) is to make the different states' (or opposition groups') behaviour more predictable.[1]

This typically involves exchanging information and making it possible to verify this information, especially information regarding armed forces and military equipment.[1]

Investigation of potential copyright issue

Please note this is about the text of this Wikipedia article; it should not be taken to reflect on the subject of this article.

Do not restore or edit the blanked content on this page until the issue is resolved by an administrator, copyright clerk or OTRS agent.

If you have just labeled this page as a potential copyright issue, please follow the instructions for filing at the bottom of the box.

The previous content of this page or section has been identified as posing a potential copyright issue, as a copy or modification of the text from the source(s) below, and is now listed on Wikipedia:Copyright problems :

Unless the copyright status of the text on this page is clarified, the problematic text or the entire page may be deleted one week after the time of its listing (i.e. after 23:32, 20 January 2020 (UTC)).

Temporarily, the original posting is still accessible for viewing in the page history.

Can you help resolve this issue?
If you hold the copyright to this text, you can license it in a manner that allows its use on Wikipedia.
  1. You must permit the use of your material under the terms of the Creative Commons Attribution-Sharealike 3.0 Unported License (CC-BY-SA) and the GNU Free Documentation License (GFDL) (unversioned, with no invariant sections, front-cover texts, or back-cover texts).
  2. Explain your intent to license the content on this article's discussion page
  3. To confirm your permission, you can either display a notice to this effect at the site of original publication or send an e-mail from an address associated with the original publication to permissions-enwikimedia.org or a postal letter to the Wikimedia Foundation. These messages must explicitly permit use under CC-BY-SA and the GFDL. See Wikipedia:Donating copyrighted materials.
  4. Note that articles on Wikipedia must be written from a neutral point of view and must be verifiable in published third-party sources; consider whether, copyright issues aside, your text is appropriate for inclusion in Wikipedia.
You can demonstrate that this text is in the public domain, or is already under a license suitable for Wikipedia.
Explain this on this article's discussion page, with reference to evidence. Wikipedia:Public domain and Wikipedia:Compatibly licensed may assist in determining the status.
Otherwise, you may write a new article without copyright-infringing material.

Your rewrite should be placed on this page, where it will be available for an administrator or clerk to review it at the end of the listing period. Follow this link to create the temporary subpage.

  • Simply modifying copyrighted text is not sufficient to avoid copyright infringement—if the original copyright violation cannot be cleanly removed or the article reverted to a prior version, it is best to write the article from scratch. (See Wikipedia:Close paraphrasing.)
  • For license compliance, any content used from the original article must be properly attributed; if you use content from the original, please leave a note at the top of your rewrite saying as much. You may duplicate non-infringing text that you had contributed yourself.
  • It is always a good idea, if rewriting, to identify the point where the copyrighted content was imported to Wikipedia and to check to make sure that the contributor did not add content imported from other sources. When closing investigations, clerks and administrators may find other copyright problems than the one identified. If this material is in the proposed rewrite and cannot be easily removed, the rewrite may not be usable.
State that you have created a rewrite on this article's discussion page.
About importing text to Wikipedia
  • Posting copyrighted material without the express permission of the copyright holder is unlawful and against Wikipedia policy.
  • If you have express permission, this must be verified either by explicit release at the source or by e-mail or letter to the Wikimedia Foundation. See Wikipedia:Declaration of consent for all enquiries.
  • Policy requires that we block those who repeatedly post copyrighted material without express permission.
Instructions for filing

If you have tagged the article for investigation, please complete the following steps:

Mathematical model

Mathematically, confidence-building measures are assumed to be useful as a peace mechanism based on the a positive feedback model of conflict, where fear (and/or suspicion) of military attack or human rights violations is the positive feedback factor, is a valid model of the conflict. The actions which constitute confidence-building measures provide a negative feedback to the conflict, which weakens, or possibly cancels or reverses the tension which would otherwise grow exponentially and eventually continue or turn into a war. Here, "positive" and "negative" refer to the mathematical nature of the feedback; positive feedback leads to worsening intensity in a conflict, while negative feedback leads to de-escalation of the conflict, a "peace spiral" or Gradual Reduction in Tension (GRIT).[1]

Validity of the model in the Internet era

If the feedback model assumed by the confidence-building measure mechanism is correct, then the rapidly developing improvement in communication between ordinary people by the internet should provide extremely robust, fast methods of information exchange and verification, as well as improved people-to-people contacts and general building of trust networks, reducing the intensity and frequency of wars. Evidence to date, however, suggests that the internet is as likely to inflame opinion and increase conflict (or at least tensions) as individuals are exposed to significantly different points of view.

Typology of confidence-building measures

Existing and proposed confidence-building measures in the context of arms control, also called confidence-building and security measures (CBSMs), can be categorized in three main types. Confidence building can also be viewed as an overall process, rather than a collection of individual measures. In a monograph distributed to the Conference on Disarmament in 1997,[2] Macintosh divides CBSMs into informational type (A), verification type (B) and constraint (C) measures.[3]

Type A: Information, interaction, and communication measures

Informational and similar type measures include:[3]

  1. Information measures: measures requiring or encouraging the provision (exchange) of information about military forces, facilities, structures, and activities. Examples include: publication of defence information; weapon system and force structure information exchange; consultative commissions; publication of defence budget figures; and publication of weapon system development information.
  2. Experience measures: measures requiring or encouraging the opportunity to interact with officials or experts from other countries. Examples include: military personnel exchanges; security expert exchanges; transnational secondments; joint military training and joint military exercises; and seminars discussing doctrine, strategy, and technology issues.
  3. Communication measures: measures requiring or encouraging the creation and/or use of shared means of communication. Examples include: "hot lines" for the exchange of crisis-related information; joint crisis control centres; and "cool lines" for the regularized distribution of required and/or requested information.
  4. Notification measures: measures requiring or encouraging the advance, accurate notification of specified military activities. Examples include: advance notification of exercises, force movements, and mobilizations - including associated information about forces involved.

Type B: Verification and observation facilitation measures

Verification and similar measures, such as those of the Treaty on Conventional Armed Forces in Europe, include:[3]

  1. Observation-of-movement conduct measures: measures requiring or encouraging the opportunity to observe specified military activities. Examples include: mandatory and optional invitations to observe specified activities (with information about the activity) and rules of conduct for observers and hosts.
  2. General observation measures: measures requiring or encouraging the opportunity to engage in non-focused "looks" at relatively small and generally-specified sections of territory within which activities of interest and/or concern may be occurring or may have recently occurred. Examples include: Open Skies agreements.
  3. Inspection measures: measures requiring or encouraging the opportunity to inspect constrained or limited military forces, facilities, structures, and activities. Examples include: special observers for sensitive movements and activities; on-site inspections of various forms; and the use of special tagging and tracking devices.
  4. Monitoring measures: measures requiring or encouraging the opportunity to monitor constrained or limited military forces, facilities, structures, and activities, principally through the use of monitoring devices. Examples include: perimeter monitors; motion sensors for no-go areas; sensors for use in restricted access areas; and activity sensors.
  5. Facilitation of verification measures: measures requiring or encouraging participants to facilitate and/or not interfere with agreed verification efforts. Examples include: agreement to not interfere with inspection and/or monitoring efforts and agreements specifying how verification efforts are to be assisted or facilitated.

Type C: Constraint measures

Constraint type measures include:[3]

  1. Activity constraint measures: measures requiring or encouraging participants to avoid or limit specified types of provocative military activity. Examples include: no harassing activities such as "playing chicken" on the high seas; no harassing or provocative close encounters between military aircraft and/or military aircraft and naval or ground forces; and no harassing activities in airspace near territorial boundaries.
  2. Deployment constraint measures: measures requiring or encouraging participants to avoid or limit the provocative stationing or positioning of military forces. Examples include: no threatening manoeuvres or equipment tests; no threatening deployments near sensitive areas (such as tanks near borders); equipment constraints such as no attack aircraft within range of a neighbour's rear area territory; manpower limits; and nuclear free zones.
  3. Technology constraint measures: measures requiring or encouraging participants to avoid or limit the development and/or deployment of specified military technologies, including systems and subsystems, believed by participating states to have a destabilizing character or impact. Examples include: no replacement of deployed military equipment of certain types (typically tanks, heavily armoured combat vehicles, self-propelled artillery, combat aircraft, and combat helicopters) with new, more advanced and capable types; no modernization of deployed military equipment of certain specified types in certain key, well-defined respects; no training with new systems; no field testing of new designs; and no production of specified new systems and/or subsystems.

Confidence building viewed as a process

An alternative analytic approach to understanding confidence building looks at broader process concepts rather than concentrating on specific measures.[3]

Confidence building, according to the transformation view, is a distinct activity undertaken by policy makers with the minimum intention of improving some aspects of a traditionally antagonistic security relationship through security policy coordination and cooperation. It entails the comprehensive process of exploring, negotiating, and then implementing tailored measures, including those that promote interaction, information exchange, and constraint. It also entails the development and use of both formal and informal practices and principles associated with the cooperative development of CBMs. When conditions are supportive, the confidence building process can facilitate, focus, synchronize, amplify, and generally structure the potential for a significant positive transformation in the security relations of participating states. Confidence building in this view is a process that constitutes more than the sum of its parts.[3]

When confidence building leads to the institutionalization of a collection of new rules and practices stipulating how participating states and non-state actors should cooperate and compete with each other in their security relationship, the restructured relationship can reduce the likelihood of armed conflict by redefining expectations of normal behaviour among participating states in a way that is more likely to handle conflict by non-military means.[3]

See also

References

Inline

  1. Maiese, Michelle (2003). "Confidence-Building Measures". Moving Beyond Intractability. Archived from the original on 2013-09-08. Retrieved 2005-12-09.
  2. "Letter dated 97/08/04 from the Permanent Representative of Canada addressed to the Deputy Secretary-General of the Conference on Disarmament transmitting a publication entitled "Confidence building in the arms control process : a transformation view" / by James MacIntosh". United Nations. 1997-08-05. Archived from the original on 2020-02-08. Retrieved 2020-02-08.
  3. James, Macintosh (1996). Confidence building in the arms control process : a transformation view. Ottawa: Minister of Foreign Affairs (Canada). ISBN 9780662250296. OCLC 433939801.

Other

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.