Misuse of foreign diplomatic passports

Deckert, A
Item type
Conference Contribution
Degree name
Journal Title
Journal ISSN
Volume Title
Queensland University of Technology

A number of internet consultancies advertise their highly-priced intermediary services for obtaining a genuine diplomatic passport. Clients are promised increased status, tax relief, and diplomatic immunity. Under the Vienna Convention on Diplomatic Relations 1961, diplomatic immunity – meaning exemption from lawsuits and prosecution – shall be granted to accredited diplomats only; however several real-life examples prove that genuine diplomatic passports can be obtained from a number of African and Pacific countries and are being used to claim diplomatic immunity even though passport holders have not been officially accredited as diplomats in a host country. This paper firstly describes how a genuine diplomatic passport is obtained, despite the passport holder’s lack of accreditation. Secondly, it analyses the evidentiary value such a passport holds under international diplomatic law, especially in regards to proving the passport holder’s right to claim diplomatic immunity. It explores how Article 40 of the Vienna Convention on Diplomatic Relations 1961 enables ‘fake diplomats’ to successfully claim diplomatic immunity, and whether the misuse of genuine diplomatic passports constitutes a new form of white-collar crime.

Courts , Eco-justice , Environmental crimes , Global justice , Governance and ethics , Human rights , Indigenous justice , Penal policy , Policing , Sex and gender , Social justice
Crime, Justice and Social Democracy held at Queensland University of Technology, Brisbane/Australia, 2011-09-26to 2011-09-28. Published in Crime, Justice and Social Democracy: An International Conference
Rights statement
Copyright: Authors. NOTICE: this is the author’s version of a work that was accepted for publication. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in (see Citation). The original publication is available at (see Publisher's Version)