UN / OSCE / Neutral States Playbook
This playbook translates Freeze–Vote–Rebuild into an operational checklist for international and neutral actors who might provide monitoring, observation, mediation support, or implementation capacity. It is written as a feasibility and mission-design guide.
Primary Goals (Process-Focused)
- Provide credible, independent monitoring and observation.
- Reduce escalation risks through predictable incident handling and deconfliction.
- Protect humanitarian access and critical infrastructure.
- Support legitimacy of the Vote phase through observation, audits, and dispute processes.
- Enable reconstruction governance integrity through audits and transparency support (where mandated).
Key Risks
- Credibility Loss: Mission access denial or intimidation undermining reporting.
- Mandate Ambiguity: Leading to mission creep or operational paralysis.
- Security Threats: Direct risks to personnel and mission infrastructure.
- Perception of Bias: Reducing cooperation from one or more parties.
- Data Failures: Privacy breaches or operational security leaks.
Non-Negotiables / Redlines (Operational)
- Freedom of Movement: Access for mission personnel within the agreed scope.
- Reporting Independence: Authority to report findings independently on a defined schedule.
- Security Provisions: Clear Rules of Engagement (ROE) and operational boundaries.
- Standardization: Clear incident classification and evidence standards.
- Data Governance: Rules that protect privacy while preserving auditability.
Mission Design Checklist
1. Monitoring (Freeze)
2. Observation (Vote)
3. Reconstruction Integrity (Rebuild)
Operational Responsibilities
What neutral actors must prepare:
- Staffing & Logistics: Rapid deployment plans and specialized personnel.
- Cyber Hygiene: Secure communications and data storage.
- Safety Protocols: Evacuation contingencies and field safety training.
- Legal Status: Status of Forces/Mission Agreements (SOFA/SOMA) and immunities.
- Standardization Training: Training on incident classification and evidence handling.
- Coordination Protocols: Standardized interfaces with all relevant parties.
Verification Demands (What to Insist On)
- Access Guarantees: Explicit consequences for obstruction.
- Time-Bounded Adjudication: Pathways for handling disputes without delays.
- Measurable Indicators: Gate definitions that rely on data, not intent.
- Publication Rights: Clear rules for what is made public and what is redacted.
- Audit Access: Independent access to raw evidence under secure conditions.
Key References:
Failure Triggers and Fallback Options
Plan for:
- Partial Access Denial: Shift to technical verification and remote corroboration.
- Security Deterioration: Site closures, remote observation, or adjusted coverage.
- Politicized Allegations: Publish methodology and evidence standards consistently to maintain trust.
- Mission Withdrawal: Clear criteria for when a mission is no longer viable.
Questions to Ask in the Room
- What are the mission’s exact access rights and physical boundaries?
- What happens automatically when access is denied?
- How are incidents classified, and who adjudicates disputes?
- What is the publication policy (what is public vs. restricted)?
- How are mission safety and legal protections guaranteed?