Diplomatic and consular law: Difference between revisions
(editing references) |
Otakar.horak (talk | contribs) |
||
(8 intermediate revisions by 6 users not shown) | |||
Line 7:
{| class="wikitable mw-collapsible" style="background-color:#ffffcc;"
|-
! scope="col" style="background-color:#ffffaa;" | [[Diplomatic and consular law#Inviolability of documents and archives of diplomatic missions and consular posts|Inviolability of documents and archives of diplomatic missions and consular posts]]
|-
|[[File:
|}<section end=Inviolability/>
Line 16:
{| class="wikitable mw-collapsible" style="background-color:#ffffcc;"
|-
! scope="col" style="background-color:#ffffaa;" | [[Diplomatic and consular law#Premises of the mission|Premises of the mission]]
|-
|[[File:
|}<section end=Premises/>
Line 25:
{| class="wikitable mw-collapsible" style="background-color:#ffffcc;"
|-
! scope="col" style="background-color:#ffffaa;" | [[Diplomatic and consular law#Persona non grata|Persona non grata]]
|-
|[[File:
The declaration as <i>persona non grata</i> is a specific remedy under the VCDR.<ref>[https://www.icj-cij.org/files/case-related/64/064-19800524-JUD-01-00-EN.pdf <i>United States Diplomatic and Consular Staff in Tehran</i>], United States v Iran, Judgment, ICGJ 124 (ICJ 1980), 24 May 1980, paragraph 85.</ref> However, this remedy is not the only one available; if the sending State's operation amounts to an internationally wrongful act, the receiving State could possibly invoke [[countermeasures]] in its response.<ref>
|}<section end=PNG/>
== National positions ==
=== [[National position of Austria (2024)|Austria (2024)]] ===
{{#lst:National position of Austria (2024)|AUT_2024 diplomatic and consular law }}
== Appendixes ==
=== See also ===
* [[Scenario 02: Cyber espionage against government departments]]
* [[Scenario 09: Economic cyber espionage]]
=== Notes and references ===
|
Latest revision as of 06:47, 17 June 2024
Overview[edit | edit source]
The Vienna Convention on Diplomatic Relations and the Vienna Convention on Consular Relations are considered to be broadly reflective of customary international law.[1] Therefore, even if a State had not ratified these Conventions, the rules analysed below would still apply to its diplomatic and consular relations.
Inviolability of documents and archives of diplomatic missions and consular posts[edit | edit source]
Inviolability of documents and archives of diplomatic missions and consular posts |
---|
Premises of the mission[edit | edit source]
Premises of the mission |
---|
Persona non grata[edit | edit source]
Persona non grata |
---|
The declaration as persona non grata is a specific remedy under the VCDR.[13] However, this remedy is not the only one available; if the sending State's operation amounts to an internationally wrongful act, the receiving State could possibly invoke countermeasures in its response.[14] |
National positions[edit | edit source]
Austria (2024)[edit | edit source]
Key Positions |
---|
"ICT infrastructure on the premises of a diplomatic or consular mission, a “data embassy”, or the seat of an international organisation (IO), enjoys inviolability.
Archives, documents and official correspondence of a diplomatic or consular mission, or an IO, that are in electronic form are inviolable. Diplomatic and consular missions, as well as IOs (subject to the provisions of their headquarters agreements) must not engage in cyber activities contrary to the laws and regulations of the receiving state, including espionage activities, and must not interfere in the internal affairs of that state. In addition, their premises must not be used to engage in cyber activities that are incompatible with their functions."[15] |
"Diplomatic and consular missions enjoy inviolability of their premises under customary international law, as codified in the Vienna Convention on Diplomatic Relations (VCDR), and the Vienna Convention on Consular Relations (VCCR), respectively. The premises of a mission are inviolable and must not be entered by agents of the host state except with consent by the head of mission. In addition, any property located within the mission – including ICT infrastructure – is immune from search, requisition, attachment or execution. This means that also remote access to the ICT infrastructure located within the mission without express consent is prohibited.
Moreover, archives and documents, as well as official correspondence of the mission, also in electronic form, are inviolable wherever they are located. Furthermore, the receiving state has a duty to permit free communication on the part of the mission for all purposes.
It is the duty of all persons enjoying privileges and immunities to respect the laws and regulations of the receiving State and not to interfere in the internal affairs of that State. In addition, the premises of the mission must not be used in a manner incompatible with the functions of the mission, or with other rules of general international law or any special agreements in force between the sending and the receiving State. In the cyber context, this also means that persons enjoying privileges and immunities must not engage in unlawful surveillance or espionage activities in the receiving state, and the premises of the mission must also not be used for such purposes.
The receiving state has the duty to take all appropriate steps to protect the mission against any intrusion or damage and to prevent any disturbance of the peace of the mission or impairment of its dignity. Thus, a state that becomes aware of a malicious cyber activity against a diplomatic or consular mission in its territory, has to take all appropriate steps to protect the mission from such an activity."[16]
International Organisations
"Similar rights and obligations apply in the context of IOs, to the extent they are specified in the headquarters agreements between the host state and the IO. The premises of the IO are inviolable and shall not be entered by agents of the host state, except with the consent of the head of the IO. This also entails that remote access to the ICT infrastructure within the premises of the IO is prohibited.
All officials of IOs and state representatives have a duty to respect the laws and regulations of the host state and not to interfere in the internal affairs of that state. This means that these persons must not engage in unlawful surveillance or espionage activities in the host state, and the premises of the IO must not be used for such purposes.
Host states also have a duty to protect the premises of the IO from outside disturbances or unauthorized entry. Thus, if a state becomes aware of a malicious cyber activity against an IO situated on its territory, it has to take all appropriate steps to protect the IO from such an activity. In this regard, Austria is working closely with IOs situated on its territory."[17]
Data Embassies
"In some cases, ICT infrastructure may enjoy inviolability under treaty or customary international law as applicable. Recently, some states and IOs have concluded agreements with other states which enable a state (i.e. the sending state) or an IO to store or process data in the territory of another state (i.e. the receiving state). It is important to note that such bilateral agreements are only binding upon the parties involved, and not on third parties.
However, a cyber activity that causes the destruction of governmental data in the data embassy of state A in the territory of state B, may be considered a violation of sovereignty of both state A and state B."[18]
Appendixes[edit | edit source]
See also[edit | edit source]
Notes and references[edit | edit source]
- ↑ See, for example, J Wouters, S Duquet, and K Meuwissen, “The Vienna Conventions on Diplomatic and Consular Relations” in AF Cooper, J Heine, and R Thakur (eds), The Oxford Handbook of Modern Diplomacy (OUP 2013) 510 (noting that VCDR’s and VCCR’s main provisions have acquired customary status); ICJ, United States Diplomatic and Consular Staff in Tehran [1980] ICJ Rep 3, 31–32 [62] (noting that the relevant obligations under the two treaties are “also obligations under general international law”).
- ↑ Art 24 VCDR; Art 33 VCCR.
- ↑ Tallinn Manual 2.0, commentary to rule 41, para 3.
- ↑ Tallinn Manual 2.0, commentary to rule 41, para. 11. However, commentary to rule 41, para. 8, notices that the Experts were divided on whether the duty to respect the inviolability over archives or material at rest on private servers as opposed to transit lies upon all States and not only the receiving State.
- ↑ Art 41 (1) VCDR.
- ↑ Art 41 (3) VCDR.
- ↑ Art 31 (1) (d) VCDR.
- ↑ See, UK, Official Secrets Act 1911, s 1; US, 18 USC §792–799.
- ↑ Cf. Darien Pun, ‘Rethinking Espionage in the Modern Era’ (2017) 18 Chicago JIL 353, 368; see also ICJ, United States Diplomatic and Consular Staff in Tehran [1980] ICJ Rep 3, 39–40 [84]–[85] (describing espionage as an abuse of diplomatic functions under the VCDR).
- ↑ Art 31 (1) VCDR.
- ↑ Art 9 (1) VCDR.
- ↑ Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008) (updated January 2009): “Given that the reasons need not be given by the receiving State when declaring a diplomatic or consular agent of the sending State persona non grata, the declaration of a diplomatic agent as persona non grata is utterly discretionary. The receiving State may thus make use of it for various reasons, whether for the behaviour of the agent himself or due to the actions of the sending State.”
- ↑ United States Diplomatic and Consular Staff in Tehran, United States v Iran, Judgment, ICGJ 124 (ICJ 1980), 24 May 1980, paragraph 85.
- ↑ Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008) (updated January 2009), para. 16.
- ↑ Austrian Position on Cyber Activities and International Law (April 2024) p. 13.
- ↑ Austrian Position on Cyber Activities and International Law (April 2024) p. 14-15.
- ↑ Austrian Position on Cyber Activities and International Law (April 2024) p. 15.
- ↑ Austrian Position on Cyber Activities and International Law (April 2024) p. 15-16.