This playbook translates Freeze–Vote–Rebuild into an operational checklist for international and neutral actors who might provide monitoring, observation, mediation support, or implementation capacity. It is written as a feasibility and mission-design guide.
Primary Goals (Process-Focused)
Provide credible, independent monitoring and observation.
Reduce escalation risks through predictable incident handling and deconfliction.
Protect humanitarian access and critical infrastructure.
Support legitimacy of the Vote phase through observation, audits, and dispute processes.
Enable reconstruction governance integrity through audits and transparency support (where mandated).
Key Risks
Credibility Loss: Mission access denial or intimidation undermining reporting.
Mandate Ambiguity: Leading to mission creep or operational paralysis.
Security Threats: Direct risks to personnel and mission infrastructure.
Perception of Bias: Reducing cooperation from one or more parties.
Data Failures: Privacy breaches or operational security leaks.
Non-Negotiables / Redlines (Operational)
Freedom of Movement: Access for mission personnel within the agreed scope.
Reporting Independence: Authority to report findings independently on a defined schedule.
Security Provisions: Clear Rules of Engagement (ROE) and operational boundaries.
Standardization: Clear incident classification and evidence standards.
Data Governance: Rules that protect privacy while preserving auditability.
Mission Design Checklist
1. Monitoring (Freeze)
Define mandate scope and specific access rights.
Establish incident intake and verification workflows.
Define incident classification rubric and confidence levels.
Stand up 24/7 incident room and secure hotlines.
Establish publication policy and escalation ladder linkages.
2. Observation (Vote)
Define observation coverage targets and statistical sampling plans.
Ensure access to registration sites, polling sites, and counting centers.
Publish methodology and reporting schedules in advance.
Integrate coercion reporting channels and protective procedures.
Coordinate with dispute resolution mechanisms.
3. Reconstruction Integrity (Rebuild)
Define the specific audit role and independence safeguards.
Agree on transparency stack expectations (Project Registry, Disbursement Ledger).
Establish inspection and technical verification capacity.
Define debarment support and integrity reporting paths.
Operational Responsibilities
What neutral actors must prepare:
Staffing & Logistics: Rapid deployment plans and specialized personnel.
Cyber Hygiene: Secure communications and data storage.
Safety Protocols: Evacuation contingencies and field safety training.
Legal Status: Status of Forces/Mission Agreements (SOFA/SOMA) and immunities.
Standardization Training: Training on incident classification and evidence handling.
Coordination Protocols: Standardized interfaces with all relevant parties.
Verification Demands (What to Insist On)
Access Guarantees: Explicit consequences for obstruction.
Time-Bounded Adjudication: Pathways for handling disputes without delays.
Measurable Indicators: Gate definitions that rely on data, not intent.
Publication Rights: Clear rules for what is made public and what is redacted.
Audit Access: Independent access to raw evidence under secure conditions.