The Freeze phase depends on credible verification. This chapter defines what must be monitored, how incidents are classified, and how information becomes actionable.
Goals
Verification and monitoring should:
make major violations hard to deny,
reduce escalation driven by ambiguity and misinformation,
support conditional incentives (“gates”),
protect civilians and humanitarian operations.
What to Monitor (Minimum Set)
1. Kinetic Activity
Shelling/strike incidents (time, location, type).
Drone/UAV activity (where restricted).
Troop or heavy equipment movements (where restricted).
Air activity (where restricted).
2. Civilian Harm and Protected Infrastructure
Civilian casualties and mass-casualty events.
Strikes on protected sites (power, water, hospitals, schools).
Damage to corridors and repair sites.
3. Access and Obstruction
Monitor access denials.
Interference or intimidation incidents.
Corridor closures and aid delays.
4. Disinformation Indicators (Operational, Not Rhetorical)
Fabricated incident reports.
Manipulated imagery claims.
Systematic denial of verifiable events.
Data Sources (Menu)
A robust monitoring design uses multiple sources:
Field observer reports (with secure comms).
Hotline and liaison reports.
Sensor networks where feasible (acoustic, radar, UAV monitoring).
Satellite imagery and open-source verification (as appropriate).