Confidence and security-building measures

Confidence building measures (CBMs) or confidence and security building measures are actions taken to reduce fear of attack by both (or more) parties in a situation of tension with or without physical conflict. The term is most often used in the context of international politics, but is similar in logic to that of trust and interpersonal communication used to reduce conflictual situations among human individuals. CBMs emerged from attempts by the Cold War superpowers and their military alliances (the North Atlantic Treaty Organisation and the Warsaw Pact) to avoid nuclear war by accident or miscalculation. However, CBMs also exist at other levels of conflict situations, and in different regions of the world although they might not have been called CBMs.

Mathematically, this term assumes that a positive feedback model, where fear (and/or suspicion) of military attack or human rights violations is the positive feedback factor, is a valid model of the conflict. The actions which constitute confidence building measures provide a negative feedback to the conflict, which weakens, or possibly cancels or reverses the tension which would otherwise grow exponentially and eventually turn into a war.

Contents

Information exchange and verification

In international relations, the way that confidence-building measures are intended to reduce fear and suspicion (the positive feedbacks) is to make the different states' (or opposition groups') behaviour more predictable.

This typically involves exchanging information and making it possible to verify this information, especially information regarding armed forces and military equipment.

Examples

1. CBMs dealing with troop movements and exercises:

a. Notification of maneuvers (with different procedures and length of advance notice for different types and sizes of maneuvers).
b. Notification of alert exercises and mobilization drills.
c. Notification of naval activities outside of normal areas.
d. Notification of aircraft operations and flights near sensitive and border areas.
e. Notification of other military activities (in the "out of garrison" category) which might be misinterpreted.

2. CBMs dealing with exchanges of information. Information may be exchanged, directly or through third parties, in the following categories:

a. Military budgets
b. New equipment and arms
c. Unit locations
d. Significant changes in a unit's size, equipment or mission
e. The major elements of strategic and tactical doctrine

3. CBMs dealing with exchanges of personnel. These personnel exchanges should be balanced in terms of numbers and duration, and could include:

a. Inviting observers to maneuvers, exercises and "out of garrison" activities. (The observers could be from neighboring states, from a third party neutral nation, or from an international organization).
b. Stationing permanent liaison observers at major headquarters. (As in b above, the observers could be from neighbors, neutrals, or international organizations).
c. Exchanging personnel as students or instructors at military academies, military schools, and war colleges.
d. Exchanging military attachés from all three services (land, sea, air). These attaché positions should be filled by highly qualified personnel, and not be used as "golden exiles" to get rid of officers who are politically undesirable.

4. CBMs dealing with the assembly, collation, and dissemination of data.

a. A central registry should be set up (under international organization auspices) to assemble, collect, analyze and publish information on armaments, organization and disposition of military units.
b. Independent technical means (under national or international organization control) should be available to verify this data. There should be agreement on the nature of these means and an understanding that there will be no interference with these means.

5. CBMs dealing with border tensions.

a. Set up demilitarized zones in sensitive border areas. Depending on the sensitivity of the area and the tensions between the two countries, certain types of weapons and units (i.e., armor, artillery) could be excluded from these areas.
b. Establish joint patrols in these areas (with or without the participation of other third party neutrals).
c. Establish fixed observation posts in these areas manned by neutrals and representatives from the two border nations.
d. Set up sensors (ground, tower, air, tethered aerostat) to supplement these patrols and observation posts.

6. CBMs dealing with actions which might be interpreted as provocative.

a. Agreement should be reached on acceptable and unacceptable military activities, especially in sensitive and border areas.
b. Clear limits should be placed on those military activities, such as a mobilizations and calling up selected reserves, which could lead to misunderstandings. Notification procedures should be established for practice movements.

7. CBMs dealing with communications.

a. Direct ("hot line") communications systems should be established between heads of state, chiefs of military forces (defense ministers), general staffs, and units in contact across a border.
b. The use of coded military message traffic (on-line and off-line cryptography) should be limited.

8. CBMs dealing with weapons.

a. Agreement should be reached on levels and types of weapons, with emphasis on the exclusion of high-performance and expensive weapons systems.
b. Agreement should be reached on levels of military arms budgets.
c. Defensive weapons (anti-aircraft artillery, anti-tank weapons, mines) should be given preference in ceilings over offensive weapons (tanks, artillery, aircraft).

9. CBMs dealing with extra-military contacts

a. Encourage visits by military athletic teams.
b. Encourage social and professional contacts through the attaché network and the various elements of the regional military system.

1O. CBMs dealing with training and education.

a. Teach CBM approaches in national military academies, staff schools, and war colleges, as well as in the multinational military schools.
b. Apply CBM techniques in command post and field exercises.
c. Encourage the development of military trans-nationalism (i.e., a sense of military professionalism and mutual respect that transcends national boundaries).
d. Examine primary and secondary school curricula and texts for aggressive, hostile or false information on potential adversaries.

11. CBMs and regional military systems.

a. The institutions and activities of regional military systems such as the Inter-American Military System should be examined to see how they can be used in support of a confidence-building regime. The CBM support functions can include verification, contacts, channel of communications and a forum for expressing a wide range of ideas. (The institutions of the Inter-American Military System include: Inter-American Defense Board, Inter-American Defense College, multinational military schools in Panama, Service Chief's Conferences, military attaches, joint exercises, communications links, etc).
b. Consideration should be given to lowering the presently high U.S. profile in most of the institutions of the Inter-American Military System, and to the possibility of moving key institutions (Board and College) to a Latin American country.

12. CBMs and functionalism. Certain functional areas of military-to-military cooperation should be assessed for their possible value as confidence-builders, even between adversary nations. These include: search and rescue (SAR) missions for aircraft and shipping; disaster relief; hurricane tracking; civic action; humanitarian projects.

13. CBMs dealing with ways of expanding CBMs.

a. Establish a regional or subregional mechanism, similar to the Conference on Security and Cooperation in Europe (CSCE) to study confidence-building measures and ways to improve and increase them.
b. Discuss CBMs at the periodic conferences of service chiefs.
c. Explore the possibility of extending CBMs geographically to other areas. In the Central American case to the Caribbean and South America.

People to people contacts

Confidence building measures between sovereign states have for many centuries also included the existence of and increased activities by embassies, which are state institutions geographically located inside the territory of other states, staffed by people expected to have extremely good interpersonal skills who can explain and resolve misunderstandings due to differences in language and culture which are incorrectly perceived as threatening, or encourage local knowledge of a foreign culture by funding artistic and cultural activities.

A much more grassroots form of confidence building occurs directly between ordinary people of different states. Short visits by individual children or groups of children to another state, and longer visits (6–12 months) by secondary and tertiary students to another state, have widely been used in the European Union as one of the methods of decreasing the tensions which had earlier led to many centuries of inter-European wars, culminating in the first and second world wars.

Validity of the model

If the feedback model assumed by the confidence building measure mechanism is correct, then the rapidly developing improvement in communication between ordinary people by the internet should provide extremely robust, fast methods of information exchange and verification, as well as improved people-to-people contacts and general building of trust networks, reducing the intensity and frequency of wars.

Confidence Building Viewed As A Process

An alternative analytic approach to understanding confidence building looks at broader process concepts rather than concentrating on specific measures. This approach finds its fullest expression in Confidence Building in the Arms Control Process: A Transformation View (James Macintosh (Ottawa, Canada: Department of Foreign Affairs and International Trade, Arms Control and Disarmament Studies Number 2, 1996. JX 1974.M32 1996)).

Confidence Building in the Arms Control Process: A Transformation View sees conventional understandings of confidence building as incomplete and focuses on why and how developing confidence building arrangements can help to improve security relations. Confidence building, according to the transformation view, is a distinct activity undertaken by policy makers with the minimum intention of improving some aspects of a traditionally antagonistic security relationship through security policy coordination and cooperation. It entails the comprehensive process of exploring, negotiating, and then implementing tailored measures, including those that promote interaction, information exchange, and constraint. It also entails the development and use of both formal and informal practices and principles associated with the cooperative development of CBMs. When conditions are supportive, the confidence building process can facilitate, focus, synchronize, amplify, and generally structure the potential for a significant positive transformation in the security relations of participating states. Thus, the confidence building process involves more than simply the production of a confidence building agreement and definitely should not be confused with what specific CBMs do.

The serious pursuit of legitimate confidence building arrangements, according to the transformation view, is an activity that is particularly well-suited to fostering positive changes in security thinking (transformation) when conditions are supportive. This is due to the activity's fundamentally cooperative character and the reinforcing nature of the confidence building measures that comprise an arrangement. Confidence building, because of its basic character, is able to facilitate and structure the potential for change in security relationships when at least some states are dissatisfied with, and beginning to question, status quo security policies and approaches.

A particularly important dimension of the transformation view is the proposition that the changes in security thinking facilitated by confidence building can become institutionalized as a collection of new rules and practices stipulating how participating states should cooperate and compete with each other in their security relationship. This restructured relationship redefines expectations of normal behaviour among participating states. Without at least a modest transformation of basic security expectations flowing from its application, it is difficult to see how confidence building can improve basic security relations in meaningful ways.

Confidence building appears to offer considerable promise as a security management approach. However, this potential cannot be fully realized unless a policy-relevant and conceptually sound understanding of the confidence building process and how it works animates application efforts. Relying on the traditional "minimalist" accounts of confidence building, with their tendency to reify the operational content of confidence building measures as the essence of "confidence building," is unlikely to provide much help. This latter approach does not speak to the conditions that should be in place for effective confidence building to occur and lacks a convincing account of why and how adopting these measures will improve security relations. (Text drawn from the executive summary of Confidence Building in the Arms Control Process: A Transformation View, with permission of the author and the Department of Foreign Affairs and International Trade.)

See also

References

External links