属实

评分: 8.0/10

Coalition
C0221

声明内容

“声称其数据保留法主要用于恐怖主义和儿童虐待案件,但实际上主要用于毒品犯罪。”
原始来源: Matthew Davis
分析时间: 30 Jan 2026

原始来源

事实核查

gāi gāi 主张zhǔ zhāng zhǔ zhāng 指出zhǐ chū zhǐ chū le le 澳大利亚ào dà lì yà ào dà lì yà 数据shù jù shù jù 保留bǎo liú bǎo liú statedstated stated purposepurpose purpose 实际shí jì shí jì 执法zhí fǎ zhí fǎ 使用shǐ yòng shǐ yòng 之间zhī jiān zhī jiān de de 关键guān jiàn guān jiàn 差异chā yì chā yì
The claim addresses a critical disparity between the stated purpose of Australia's data retention law and its actual usage in enforcement.
CoalitionCoalition Coalition 政府zhèng fǔ zhèng fǔ 推出tuī chū tuī chū de de 20152015 2015 nián nián 电信diàn xìn diàn xìn 截取jié qǔ jié qǔ 访问fǎng wèn fǎng wèn 修正xiū zhèng xiū zhèng 数据shù jù shù jù 保留bǎo liú bǎo liú 要求yāo qiú yāo qiú 电信diàn xìn diàn xìn 互联网hù lián wǎng hù lián wǎng 服务提供商fú wù tí gōng shāng fú wù tí gōng shāng jiāng jiāng 客户kè hù kè hù yuán yuán 数据shù jù shù jù 保留bǎo liú bǎo liú 两年liǎng nián liǎng nián [[ [ 11 1 ]] ]
The Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, introduced by the Coalition government, requires telecommunications and internet service providers to retain customer metadata for two years [1].
根据gēn jù gēn jù 内政部nèi zhèng bù nèi zhèng bù 引用yǐn yòng yǐn yòng de de 19791979 1979 nián nián 电信diàn xìn diàn xìn 截取jié qǔ jié qǔ 访问fǎng wèn fǎng wèn 截至jié zhì jié zhì 20182018 2018 nián nián 66 6 yuè yuè 3030 30 年度报告nián dù bào gào nián dù bào gào zhōng zhōng 引用yǐn yòng yǐn yòng de de 官方guān fāng guān fāng 数据shù jù shù jù 执法zhí fǎ zhí fǎ 机构jī gòu jī gòu 对元duì yuán duì yuán 数据shù jù shù jù de de 实际shí jì shí jì 使用shǐ yòng shǐ yòng statedstated stated justificationjustification justification 存在cún zài cún zài 显著xiǎn zhù xiǎn zhù 差异chā yì chā yì [[ [ 22 2 ]] ]
According to official Department of Home Affairs data cited in the Telecommunications (Interception and Access) Act 1979 Annual Report for the year ending 30 June 2018, the actual usage of metadata by law enforcement agencies differs significantly from the stated justification [2].
zài zài gāi gāi 年度nián dù nián dù 301301 301 ,, , 113113 113 项元xiàng yuán xiàng yuán 数据shù jù shù jù 请求qǐng qiú qǐng qiú 总数zǒng shù zǒng shù zhōng zhōng 295295 295 ,, , 779779 779 xiàng xiàng 用于yòng yú yòng yú 刑事xíng shì xíng shì 执法zhí fǎ zhí fǎ 目的mù dì mù dì
Out of 301,113 total metadata requests made that year, 295,779 were for criminal law enforcement purposes.
毒品dú pǐn dú pǐn 犯罪构成fàn zuì gòu chéng fàn zuì gòu chéng 最大zuì dà zuì dà 类别lèi bié lèi bié yǒu yǒu 6767 67 ,, , 600600 600 xiàng xiàng 授权shòu quán shòu quán yuē yuē zhàn zhàn 所有suǒ yǒu suǒ yǒu yuán yuán 数据shù jù shù jù 请求qǐng qiú qǐng qiú de de 22.5%22.5% 22.5% [[ [ 22 2 ]] ]
Drug offences constituted the largest category, with 67,600 authorizations, representing approximately 22.5% of all metadata requests [2].
相比之下xiāng bǐ zhī xià xiāng bǐ zhī xià 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 相关xiāng guān xiāng guān de de 请求qǐng qiú qǐng qiú zài zài 主要zhǔ yào zhǔ yào 执法zhí fǎ zhí fǎ 优先yōu xiān yōu xiān 事项shì xiàng shì xiàng zhōng zhōng 明显míng xiǎn míng xiǎn 缺失quē shī quē shī 凶杀xiōng shā xiōng shā 3333 33 ,, , 000000 000 欺诈qī zhà qī zhà 杂项zá xiàng zá xiàng 犯罪行为fàn zuì xíng wèi fàn zuì xíng wèi 抢劫qiǎng jié qiǎng jié 绑架bǎng jià bǎng jià pái pái zài zài 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì 之后zhī hòu zhī hòu [[ [ 22 2 ]] ]
In contrast, terrorism-related requests were notably absent from the top enforcement priorities, with homicide (33,000), fraud, miscellaneous criminal acts, robbery, and abduction following drug offences [2].
这些zhè xiē zhè xiē 数据shù jù shù jù 直接zhí jiē zhí jiē 支持zhī chí zhī chí yuán yuán 数据shù jù shù jù "" " 主要zhǔ yào zhǔ yào 用于yòng yú yòng yú 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì "" " ér ér fēi fēi 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì de de 主张zhǔ zhāng zhǔ zhāng [[ [ 22 2 ]] ]
This data directly supports the claim that metadata is "used mostly for drug offences" rather than terrorism [2].
报告bào gào bào gào hái hái 指出zhǐ chū zhǐ chū 执法zhí fǎ zhí fǎ 机构jī gòu jī gòu jǐn jǐn 收回shōu huí shōu huí 33 3 ,, , 900900 900 万澳元wàn ào yuán wàn ào yuán ér ér 电信公司diàn xìn gōng sī diàn xìn gōng sī de de 累计lěi jì lěi jì 成本chéng běn chéng běn 超过chāo guò chāo guò 2.112.11 2.11 亿澳元yì ào yuán yì ào yuán 表明biǎo míng biǎo míng 这一zhè yī zhè yī 工具gōng jù gōng jù 主要zhǔ yào zhǔ yào 用于yòng yú yòng yú 常规cháng guī cháng guī 刑事xíng shì xíng shì 调查diào chá diào chá ér ér fēi fēi 反恐fǎn kǒng fǎn kǒng què què 耗费hào fèi hào fèi le le 大量dà liàng dà liàng 公共gōng gòng gōng gòng 资金zī jīn zī jīn [[ [ 11 1 ]] ]
The report also noted that law enforcement agencies had only recuperated AU$39 million against cumulative costs of over AU$211 million to telecommunications companies, indicating significant public expense for a tool primarily used for conventional criminal investigations rather than counterterrorism [1].

缺失背景

然而rán ér rán ér gāi gāi 主张zhǔ zhāng zhǔ zhāng 需要xū yào xū yào 重要zhòng yào zhòng yào 背景bèi jǐng bèi jǐng 信息xìn xī xìn xī
However, the claim requires important context.
虽然suī rán suī rán 数据shù jù shù jù 清楚qīng chǔ qīng chǔ 显示xiǎn shì xiǎn shì 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì 主导zhǔ dǎo zhǔ dǎo yuán yuán 数据shù jù shù jù 使用shǐ yòng shǐ yòng dàn dàn 该法gāi fǎ gāi fǎ de de originaloriginal original purposepurpose purpose justificationjustification justification 确实què shí què shí 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì gèng gèng 广泛guǎng fàn guǎng fàn hái hái 明确míng què míng què 包括bāo kuò bāo kuò 儿童ér tóng ér tóng 虐待nüè dài nüè dài 其他qí tā qí tā 严重yán zhòng yán zhòng 犯罪fàn zuì fàn zuì
While the data clearly shows that drug offences dominate metadata usage, the original purpose justification for the law was indeed broader than just terrorism—it also explicitly included child abuse and other serious crimes.
gāi gāi 主张zhǔ zhāng zhǔ zhāng jiāng jiāng 政府zhèng fǔ zhèng fǔ "" " 声称shēng chēng shēng chēng "" " 该法gāi fǎ gāi fǎ "" " jiāng jiāng 主要zhǔ yào zhǔ yào 用于yòng yú yòng yú 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 儿童ér tóng ér tóng 虐待nüè dài nüè dài 案件àn jiàn àn jiàn "" " de de 框架kuāng jià kuāng jià 需要xū yào xū yào 审视shěn shì shěn shì 政府zhèng fǔ zhèng fǔ CoalitionCoalition Coalition 代表dài biǎo dài biǎo zài zài 立法lì fǎ lì fǎ 过程guò chéng guò chéng zhōng zhōng de de 实际shí jì shí jì 言论yán lùn yán lùn
The claim's framing that the government "claimed" the law "would be used mostly for terrorism and child abuse cases" requires examining what government and Coalition representatives actually said during the legislative process.
该法gāi fǎ gāi fǎ shì shì zài zài 澳大利亚ào dà lì yà ào dà lì yà 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 关切guān qiè guān qiè 加剧jiā jù jiā jù de de 时期shí qī shí qī 推出tuī chū tuī chū de de
The law was introduced during a period of heightened terrorism concerns in Australia.
虽然suī rán suī rán 反恐fǎn kǒng fǎn kǒng 确实què shí què shí shì shì 立法lì fǎ lì fǎ de de 主要zhǔ yào zhǔ yào 理据lǐ jù lǐ jù 之一zhī yī zhī yī dàn dàn 政府zhèng fǔ zhèng fǔ hái hái 引用yǐn yòng yǐn yòng le le 保护bǎo hù bǎo hù 儿童ér tóng ér tóng 安全ān quán ān quán 协助xié zhù xié zhù 各种gè zhǒng gè zhǒng 严重yán zhòng yán zhòng 犯罪fàn zuì fàn zuì 调查diào chá diào chá [[ [ 33 3 ]] ]
While counterterrorism was certainly presented as a key justification for the legislation, the government also cited protecting child safety and assisting with various serious crime investigations [3].
statedstated stated purposespurposes purposes 实际shí jì shí jì 使用shǐ yòng shǐ yòng 之间zhī jiān zhī jiān de de 差距chā jù chā jù 反映fǎn yìng fǎn yìng le le gèng gèng 广泛guǎng fàn guǎng fàn de de 模式mó shì mó shì 监视jiān shì jiān shì 工具gōng jù gōng jù 通常tōng cháng tōng cháng 高调gāo diào gāo diào de de 严重yán zhòng yán zhòng 犯罪fàn zuì fàn zuì 情景qíng jǐng qíng jǐng 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 儿童ér tóng ér tóng 虐待nüè dài nüè dài 为理据wèi lǐ jù wèi lǐ jù dàn dàn 在实践中zài shí jiàn zhōng zài shí jiàn zhōng zuì zuì 广泛guǎng fàn guǎng fàn 用于yòng yú yòng yú 警察jǐng chá jǐng chá 资源zī yuán zī yuán 集中jí zhōng jí zhōng de de 高容量gāo róng liàng gāo róng liàng 严重yán zhòng yán zhòng 程度chéng dù chéng dù de de 犯罪fàn zuì fàn zuì [[ [ 44 4 ]] ]
The gap between these stated purposes and actual usage reflects a broader pattern: surveillance tools are typically justified with high-profile, serious crime scenarios (terrorism, child abuse) but in practice are deployed most extensively for high-volume, lower-severity offences where police resources are concentrated [4].
此外cǐ wài cǐ wài 6767 67 ,, , 600600 600 xiàng xiàng 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì 授权代表shòu quán dài biǎo shòu quán dài biǎo le le 重大zhòng dà zhòng dà de de 执法zhí fǎ zhí fǎ 活动huó dòng huó dòng
Additionally, the 67,600 drug offence authorizations represent significant law enforcement activity.
zhè zhè 是否shì fǒu shì fǒu 构成gòu chéng gòu chéng duì duì 法律fǎ lǜ fǎ lǜ de de "" " 滥用làn yòng làn yòng "" " huò huò 合法hé fǎ hé fǎ 使用shǐ yòng shǐ yòng 取决于qǔ jué yú qǔ jué yú 一个yí gè yí gè rén rén de de 视角shì jiǎo shì jiǎo cóng cóng 执法zhí fǎ zhí fǎ 角度看jiǎo dù kàn jiǎo dù kàn 代表dài biǎo dài biǎo le le 调查diào chá diào chá 大规模dà guī mó dà guī mó 犯罪活动fàn zuì huó dòng fàn zuì huó dòng de de 有用yǒu yòng yǒu yòng 工具gōng jù gōng jù cóng cóng 隐私yǐn sī yǐn sī 倡导者chàng dǎo zhě chàng dǎo zhě 角度看jiǎo dù kàn jiǎo dù kàn 代表dài biǎo dài biǎo le le 超出chāo chū chāo chū statedstated stated justificationjustification justification de de 范围fàn wéi fàn wéi 蔓延màn yán màn yán [[ [ 55 5 ]] ]
The question of whether this is an "abuse" of the law or a legitimate use depends on one's perspective: from law enforcement's view, it represents a useful tool for investigating large-scale criminal activity; from privacy advocates' view, it represents scope creep beyond the stated justification [5].

来源可信度评估

提供tí gōng tí gōng de de 原始yuán shǐ yuán shǐ 来源lái yuán lái yuán ZDNetZDNet ZDNet shì shì 一家yī jiā yī jiā 主流zhǔ liú zhǔ liú 技术jì shù jì shù 出版物chū bǎn wù chū bǎn wù zài zài 技术jì shù jì shù 安全ān quán ān quán 报道bào dào bào dào 方面fāng miàn fāng miàn 具有jù yǒu jù yǒu 相当xiāng dāng xiāng dāng 可信kě xìn kě xìn de de 记录jì lù jì lù [[ [ 11 1 ]] ]
The original source provided (ZDNet) is a mainstream technology publication with a generally credible track record for technology and security reporting [1].
文章wén zhāng wén zhāng 本身běn shēn běn shēn 引用yǐn yòng yǐn yòng le le 内政部nèi zhèng bù nèi zhèng bù 年度报告nián dù bào gào nián dù bào gào zhōng zhōng de de 官方guān fāng guān fāng 政府zhèng fǔ zhèng fǔ 数据shù jù shù jù 这是zhè shì zhè shì 主要zhǔ yào zhǔ yào 来源lái yuán lái yuán 具有jù yǒu jù yǒu 高度gāo dù gāo dù 权威性quán wēi xìng quán wēi xìng [[ [ 22 2 ]] ]
The article itself cites official government data from the Department of Home Affairs annual report, which is the primary source and is highly authoritative [2].
ZDNetZDNet ZDNet zài zài 监视jiān shì jiān shì 问题wèn tí wèn tí shàng shàng de de 编辑biān jí biān jí 立场lì chǎng lì chǎng 倾向qīng xiàng qīng xiàng duì duì 数据shù jù shù jù 保留bǎo liú bǎo liú 计划jì huà jì huà chí chí 怀疑huái yí huái yí 态度tài dù tài dù zhè zhè 反映fǎn yìng fǎn yìng zài zài 文章wén zhāng wén zhāng 标题biāo tí biāo tí "" " 数据shù jù shù jù 保留bǎo liú bǎo liú 迄今已qì jīn yǐ qì jīn yǐ ràng ràng 澳大利亚ào dà lì yà ào dà lì yà 电信公司diàn xìn gōng sī diàn xìn gōng sī 花费huā fèi huā fèi 超过chāo guò chāo guò 2.12.1 2.1 亿澳元yì ào yuán yì ào yuán "" " zhōng zhōng dàn dàn suǒ suǒ 呈现chéng xiàn chéng xiàn de de 统计数据tǒng jì shù jù tǒng jì shù jù 直接zhí jiē zhí jiē 来自lái zì lái zì 官方guān fāng guān fāng 政府zhèng fǔ zhèng fǔ 报告bào gào bào gào [[ [ 11 1 ]] ]
ZDNet's editorial stance on surveillance tends toward skepticism of data retention schemes, as reflected in the article's headline ("Data retention costs Australian telcos upwards of AU$210 million to date"), but the statistical data presented comes directly from official government reporting [1].
框架kuāng jià kuāng jià 有些yǒu xiē yǒu xiē 批判性pī pàn xìng pī pàn xìng dàn dàn 基本jī běn jī běn 事实shì shí shì shí 准确zhǔn què zhǔn què cóng cóng 官方guān fāng guān fāng 来源lái yuán lái yuán 报告bào gào bào gào
The framing is somewhat critical but the underlying facts are accurately reported from official sources.
⚖️

工党对比

** * ** * LaborLabor Labor 是否shì fǒu shì fǒu 追求zhuī qiú zhuī qiú 类似lèi sì lèi sì de de 监视jiān shì jiān shì 权力quán lì quán lì huò huò 夸大kuā dà kuā dà de de 目的mù dì mù dì wèi wèi 法律fǎ lǜ fǎ lǜ 辩护biàn hù biàn hù
**Did Labor pursue similar surveillance powers or justify laws with overstated purposes?** Search conducted: "Labor government data retention metadata surveillance laws justification" Australia's data retention framework did not exist before 2015, so there is no direct Labor precedent for this specific law.
** * ** *
However, Labor governments have historically supported expanded surveillance powers for counterterrorism purposes.
进行jìn xíng jìn xíng de de 搜索sōu suǒ sōu suǒ "" " LaborLabor Labor 政府zhèng fǔ zhèng fǔ 数据shù jù shù jù 保留bǎo liú bǎo liú yuán yuán 数据shù jù shù jù 监视jiān shì jiān shì 法律fǎ lǜ fǎ lǜ 辩护biàn hù biàn hù "" "
When the data retention laws passed in 2014-2015, they did so with bipartisan support, indicating Labor also backed the legislation at that time [6].
澳大利亚ào dà lì yà ào dà lì yà de de 数据shù jù shù jù 保留bǎo liú bǎo liú 框架kuāng jià kuāng jià zài zài 20152015 2015 nián nián 之前zhī qián zhī qián 存在cún zài cún zài 因此yīn cǐ yīn cǐ 没有méi yǒu méi yǒu 直接zhí jiē zhí jiē de de LaborLabor Labor 先例xiān lì xiān lì gōng gōng 比较bǐ jiào bǐ jiào
The Law Council of Australia, which critics of Labor often cite for left-leaning positions, called for additional safeguards (warrants and crime thresholds) but did not oppose the fundamental framework [7].
然而rán ér rán ér LaborLabor Labor 政府zhèng fǔ zhèng fǔ 历史lì shǐ lì shǐ shàng shàng 一直yì zhí yì zhí 支持zhī chí zhī chí 扩大kuò dà kuò dà 监视jiān shì jiān shì 权力quán lì quán lì 用于yòng yú yòng yú 反恐fǎn kǒng fǎn kǒng 目的mù dì mù dì
More broadly, Labor supported other major surveillance expansions.
dāng dāng 数据shù jù shù jù 保留bǎo liú bǎo liú 法在fǎ zài fǎ zài 20142014 2014 -- - 20152015 2015 nián nián 通过tōng guò tōng guò shí shí 它们tā men tā men 获得huò dé huò dé le le 两党liǎng dǎng liǎng dǎng 支持zhī chí zhī chí 表明biǎo míng biǎo míng LaborLabor Labor 当时dāng shí dāng shí 支持zhī chí zhī chí gāi gāi 立法lì fǎ lì fǎ [[ [ 66 6 ]] ]
The 2014 Telecommunications Act amendments that preceded the data retention scheme had Labor support, and Labor's own national security positions have consistently emphasized counterterrorism and child safety protection—the same justifications used for data retention [8].
澳大利亚ào dà lì yà ào dà lì yà 法律委员会fǎ lǜ wěi yuán huì fǎ lǜ wěi yuán huì 批评者pī píng zhě pī píng zhě cháng cháng 引用yǐn yòng yǐn yòng 左翼zuǒ yì zuǒ yì 立场lì chǎng lì chǎng 呼吁hū yù hū yù 增加zēng jiā zēng jiā 保障bǎo zhàng bǎo zhàng 措施cuò shī cuò shī 逮捕令dài bǔ lìng dài bǔ lìng 犯罪fàn zuì fàn zuì 门槛mén kǎn mén kǎn dàn dàn 并未bìng wèi bìng wèi 反对fǎn duì fǎn duì 基本jī běn jī běn 框架kuāng jià kuāng jià [[ [ 77 7 ]] ]
The broader context is that bipartisan support exists for expanded surveillance in the name of national security across Australian politics, with disagreement occurring more over specific safeguards and oversight rather than fundamental principles [9].
gèng gèng 广泛guǎng fàn guǎng fàn 地说dì shuō dì shuō LaborLabor Labor 支持zhī chí zhī chí 其他qí tā qí tā 重大zhòng dà zhòng dà 监视jiān shì jiān shì 扩张kuò zhāng kuò zhāng
20142014 2014 nián nián 先于xiān yú xiān yú 数据shù jù shù jù 保留bǎo liú bǎo liú 计划jì huà jì huà de de 电信法diàn xìn fǎ diàn xìn fǎ 修正案xiū zhèng àn xiū zhèng àn 获得huò dé huò dé le le LaborLabor Labor 支持zhī chí zhī chí LaborLabor Labor 自身zì shēn zì shēn de de 国家guó jiā guó jiā 安全ān quán ān quán 立场lì chǎng lì chǎng 始终shǐ zhōng shǐ zhōng 强调qiáng diào qiáng diào 反恐fǎn kǒng fǎn kǒng 保护bǎo hù bǎo hù 儿童ér tóng ér tóng 安全ān quán ān quán zhè zhè 数据shù jù shù jù 保留bǎo liú bǎo liú 使用shǐ yòng shǐ yòng de de 理据lǐ jù lǐ jù 相同xiāng tóng xiāng tóng [[ [ 88 8 ]] ]
gèng gèng 广泛guǎng fàn guǎng fàn de de 背景bèi jǐng bèi jǐng shì shì 澳大利亚ào dà lì yà ào dà lì yà 政治zhèng zhì zhèng zhì zhōng zhōng 两党liǎng dǎng liǎng dǎng dōu dōu 支持zhī chí zhī chí 国家guó jiā guó jiā 安全ān quán ān quán 名义míng yì míng yì 扩大kuò dà kuò dà 监视jiān shì jiān shì 分歧fēn qí fēn qí gèng gèng duō duō 发生fā shēng fā shēng zài zài 具体jù tǐ jù tǐ 保障bǎo zhàng bǎo zhàng 措施cuò shī cuò shī 监督jiān dū jiān dū shàng shàng ér ér fēi fēi 基本jī běn jī běn 原则yuán zé yuán zé [[ [ 99 9 ]] ]
🌐

平衡视角

虽然suī rán suī rán gāi gāi 主张zhǔ zhāng zhǔ zhāng zài zài 实际shí jì shí jì 使用shǐ yòng shǐ yòng 统计tǒng jì tǒng jì 方面fāng miàn fāng miàn 事实上shì shí shàng shì shí shàng 准确zhǔn què zhǔn què dàn dàn 叙述xù shù xù shù 需要xū yào xū yào gèng gèng 完整wán zhěng wán zhěng de de 说明shuō míng shuō míng
While the claim is factually accurate regarding the actual usage statistics, the narrative requires a more complete accounting.
CoalitionCoalition Coalition 政府zhèng fǔ zhèng fǔ zài zài 推出tuī chū tuī chū 该法时gāi fǎ shí gāi fǎ shí 确实què shí què shí 强调qiáng diào qiáng diào 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 儿童ér tóng ér tóng 虐待nüè dài nüè dài wèi wèi 主要zhǔ yào zhǔ yào 理据lǐ jù lǐ jù dàn dàn 并未bìng wèi bìng wèi 声称shēng chēng shēng chēng 这些zhè xiē zhè xiē jiāng jiāng shì shì 唯一wéi yī wéi yī 用途yòng tú yòng tú [[ [ 33 3 ]] ]
The Coalition government certainly emphasized terrorism and child abuse as major justifications when introducing the law, but did not make exclusive claims that these would be the only uses [3].
gāi gāi 立法lì fǎ lì fǎ 明确míng què míng què 起草qǐ cǎo qǐ cǎo wèi wèi 适用shì yòng shì yòng 广泛guǎng fàn guǎng fàn de de "" " 联邦lián bāng lián bāng 犯罪fàn zuì fàn zuì "" " 任何rèn hé rèn hé 澳大利亚联邦ào dà lì yà lián bāng ào dà lì yà lián bāng 警察jǐng chá jǐng chá huò huò 其他qí tā qí tā 指定zhǐ dìng zhǐ dìng 机构jī gòu jī gòu yǒu yǒu 管辖权guǎn xiá quán guǎn xiá quán de de 犯罪fàn zuì fàn zuì [[ [ 1010 10 ]] ]
The legislation was explicitly drafted to apply broadly to "federal offences"—any crime where the Australian Federal Police or other specified agencies had jurisdiction [10].
cóng cóng 执法zhí fǎ zhí fǎ 角度看jiǎo dù kàn jiǎo dù kàn yuán yuán 数据shù jù shù jù 工具gōng jù gōng jù zài zài 毒品dú pǐn dú pǐn 调查diào chá diào chá zhōng zhōng de de 有效性yǒu xiào xìng yǒu xiào xìng 反映fǎn yìng fǎn yìng le le 运营yùn yíng yùn yíng 现实xiàn shí xiàn shí 毒品dú pǐn dú pǐn 贩运fàn yùn fàn yùn shì shì yǒu yǒu 组织zǔ zhī zǔ zhī 犯罪fàn zuì fàn zuì 执法zhí fǎ zhí fǎ 机构jī gòu jī gòu 投入tóu rù tóu rù 大量dà liàng dà liàng 资源zī yuán zī yuán 进行jìn xíng jìn xíng 调查diào chá diào chá yuán yuán 数据shù jù shù jù 可以kě yǐ kě yǐ 协助xié zhù xié zhù 识别shí bié shí bié 网络wǎng luò wǎng luò 通信tōng xìn tōng xìn 模式mó shì mó shì [[ [ 1111 11 ]] ]
From law enforcement's perspective, the metadata tool's effectiveness for drug investigations reflects operational reality: drug trafficking is an organized crime that law enforcement invests heavily in investigating, and metadata can assist in identifying networks and communication patterns [11].
警方jǐng fāng jǐng fāng 认为rèn wéi rèn wéi zhè zhè 代表dài biǎo dài biǎo le le 可用kě yòng kě yòng 工具gōng jù gōng jù de de 合法hé fǎ hé fǎ 使用shǐ yòng shǐ yòng ér ér fēi fēi 使命shǐ mìng shǐ mìng 偏离piān lí piān lí [[ [ 1212 12 ]] ]
Police argue this represents a legitimate use of an available tool, not mission creep [12].
然而rán ér rán ér cóng cóng 隐私yǐn sī yǐn sī 公民自由gōng mín zì yóu gōng mín zì yóu 倡导者chàng dǎo zhě chàng dǎo zhě de de 角度看jiǎo dù kàn jiǎo dù kàn 存在cún zài cún zài duì duì 范围fàn wéi fàn wéi 蔓延màn yán màn yán de de 真正zhēn zhèng zhēn zhèng 担忧dān yōu dān yōu 一种yī zhǒng yī zhǒng 主要zhǔ yào zhǔ yào 作为zuò wéi zuò wéi 反恐fǎn kǒng fǎn kǒng 儿童ér tóng ér tóng 保护措施bǎo hù cuò shī bǎo hù cuò shī 引入yǐn rù yǐn rù de de 工具gōng jù gōng jù 成为chéng wéi chéng wéi 主要zhǔ yào zhǔ yào 用于yòng yú yòng yú 毒品dú pǐn dú pǐn 执法zhí fǎ zhí fǎ de de 工具gōng jù gōng jù ér ér 毒品dú pǐn dú pǐn běn běn 可以kě yǐ kě yǐ 通过tōng guò tōng guò 其他qí tā qí tā 方式fāng shì fāng shì 调查diào chá diào chá [[ [ 1313 13 ]] ]
From privacy and civil liberties advocates' perspective, however, there is genuine concern about scope creep: a tool introduced primarily as counterterrorism and child protection measure became predominantly used for drug enforcement, which could have been investigated through other means [13].
zhè zhè 引发yǐn fā yǐn fā le le extraordinaryextraordinary extraordinary justificationjustification justification 国家guó jiā guó jiā 安全ān quán ān quán 儿童ér tóng ér tóng 安全ān quán ān quán 是否shì fǒu shì fǒu actualactual actual useuse use casecase case 常规cháng guī cháng guī 毒品dú pǐn dú pǐn 调查diào chá diào chá 适当shì dàng shì dàng 匹配pǐ pèi pǐ pèi de de 问题wèn tí wèn tí [[ [ 1313 13 ]] ]
This raises the question of whether the extraordinary justification (national security, child safety) was appropriately matched to the actual use case (conventional drug investigations) [13].
数据shù jù shù jù 显示xiǎn shì xiǎn shì 实际shí jì shí jì 使用shǐ yòng shǐ yòng 非常fēi cháng fēi cháng 清晰qīng xī qīng xī 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì zhàn zhàn 主导zhǔ dǎo zhǔ dǎo 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì zài zài 统计tǒng jì tǒng jì zhōng zhōng 几乎jī hū jī hū 可见kě jiàn kě jiàn 执法zhí fǎ zhí fǎ 机构jī gòu jī gòu 发现fā xiàn fā xiàn gāi gāi 工具gōng jù gōng jù duì duì 高容量gāo róng liàng gāo róng liàng 刑事xíng shì xíng shì 调查diào chá diào chá yǒu yǒu 价值jià zhí jià zhí
The data shows remarkable clarity on actual usage: drug offences dominate, terrorism is nearly invisible in the statistics, and law enforcement has found the tool valuable for high-volume criminal investigation.
zhè zhè 是否shì fǒu shì fǒu 构成gòu chéng gòu chéng statedstated stated purposespurposes purposes de de "" " 失败shī bài shī bài "" " huò huò 不同bù tóng bù tóng 应用yìng yòng yìng yòng de de "" " 成功chéng gōng chéng gōng "" " 完全wán quán wán quán 取决于qǔ jué yú qǔ jué yú 一个yí gè yí gè rén rén zài zài 监视jiān shì jiān shì 隐私yǐn sī yǐn sī 问题wèn tí wèn tí shàng shàng de de 立场lì chǎng lì chǎng [[ [ 1414 14 ]] ]
Whether this constitutes "failure" to deliver on stated purposes or "success" at a different application depends entirely on one's stance on surveillance and privacy [14].
值得注意zhí de zhù yì zhí de zhù yì de de shì shì 数据shù jù shù jù 保留bǎo liú bǎo liú 制度zhì dù zhì dù hái hái 扩展kuò zhǎn kuò zhǎn dào dào 执法zhí fǎ zhí fǎ 之外zhī wài zhī wài 包括bāo kuò bāo kuò 至少zhì shǎo zhì shǎo 2727 27 其他qí tā qí tā 机构jī gòu jī gòu 包括bāo kuò bāo kuò 清洁qīng jié qīng jié 能源néng yuán néng yuán 监管jiān guǎn jiān guǎn 机构jī gòu jī gòu 西澳xī ào xī ào 矿业kuàng yè kuàng yè 兽医shòu yī shòu yī 委员会wěi yuán huì wěi yuán huì 试图shì tú shì tú 访问fǎng wèn fǎng wèn yuán yuán 数据shù jù shù jù 这种zhè zhǒng zhè zhǒng 扩展kuò zhǎn kuò zhǎn 水平shuǐ píng shuǐ píng 可能kě néng kě néng 超出chāo chū chāo chū le le 立法者lì fǎ zhě lì fǎ zhě de de 设想shè xiǎng shè xiǎng [[ [ 1515 15 ]] ]
Notably, the data retention regime has also expanded beyond law enforcement to include at least 27 other agencies (including the Clean Energy Regulator, WA Mines Department, and Vet Surgeons Board) attempting to access metadata—a level of expansion that may exceed what legislators contemplated [15].

属实

8.0

/ 10

gāi gāi 主张zhǔ zhāng zhǔ zhāng zài zài 事实上shì shí shàng shì shí shàng 准确zhǔn què zhǔn què
The claim is factually accurate.
内政部nèi zhèng bù nèi zhèng bù 20172017 2017 -- - 1818 18 财年cái nián cái nián de de 官方guān fāng guān fāng 政府zhèng fǔ zhèng fǔ 数据shù jù shù jù 明确míng què míng què 显示xiǎn shì xiǎn shì 毒品dú pǐn dú pǐn 犯罪fàn zuì fàn zuì 6767 67 ,, , 600600 600 xiàng xiàng 授权shòu quán shòu quán 占元zhàn yuán zhàn yuán 数据shù jù shù jù 使用shǐ yòng shǐ yòng de de 最大zuì dà zuì dà 单一dān yī dān yī 类别lèi bié lèi bié 远超yuǎn chāo yuǎn chāo 文件wén jiàn wén jiàn 记录jì lù jì lù de de 执法zhí fǎ zhí fǎ 活动huó dòng huó dòng zhōng zhōng de de 恐怖主义kǒng bù zhǔ yì kǒng bù zhǔ yì 调查diào chá diào chá [[ [ 22 2 ]] ]
Official government data from the Department of Home Affairs for the 2017-18 financial year conclusively shows that drug offences (67,600 authorizations) account for the largest single category of metadata usage, far exceeding terrorism investigations in documented enforcement activity [2].
CoalitionCoalition Coalition zài zài 引入yǐn rù yǐn rù 立法lì fǎ lì fǎ shí shí 确实què shí què shí 引用yǐn yòng yǐn yòng le le 反恐fǎn kǒng fǎn kǒng 预防yù fáng yù fáng 儿童ér tóng ér tóng 保护bǎo hù bǎo hù 作为zuò wéi zuò wéi 主要zhǔ yào zhǔ yào 理据lǐ jù lǐ jù [[ [ 33 3 ]] ] ér ér 实际shí jì shí jì 使用shǐ yòng shǐ yòng 显示xiǎn shì xiǎn shì 这些zhè xiē zhè xiē statedstated stated purposespurposes purposes 存在cún zài cún zài 显著xiǎn zhù xiǎn zhù 差异chā yì chā yì [[ [ 22 2 ]] ]
The Coalition did invoke terrorism prevention and child protection as primary justifications when introducing the legislation [3], and the actual usage demonstrates a significant divergence from those stated purposes [2].
zhè zhè 代表dài biǎo dài biǎo le le claimedclaimed claimed purposepurpose purpose demonstrateddemonstrated demonstrated utilityutility utility 之间zhī jiān zhī jiān de de 真正zhēn zhèng zhēn zhèng 差异chā yì chā yì
This represents a genuine discrepancy between claimed purpose and demonstrated utility.

📚 来源与引用 (10)

  1. 1
    Data retention costs Australian telcos upwards of AU$210 million to date

    Data retention costs Australian telcos upwards of AU$210 million to date

    Law enforcement agencies have stumped up only AU$39 million to poke around in Australia's metadata.

    ZDNET
  2. 2
    PDF

    Telecommunications (Interception and Access) Act 1979 – Annual Report for the year ending 30 June 2018

    Homeaffairs Gov • PDF Document
  3. 3
    aph.gov.au

    Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 - Parliamentary explanatory memorandum

    Aph Gov

    Original link no longer available
  4. 4
    piperalderman.com.au

    The new data retention laws - what should you be aware of?

    Piperalderman Com

  5. 5
    Law Council wants warrants and crime threshold for metadata retention scheme

    Law Council wants warrants and crime threshold for metadata retention scheme

    Agencies that are allowed to view metadata should be spelled out in legislation, Law Council of Australia states.

    ZDNET
  6. 6
    parlinfo.aph.gov.au

    Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 - Bipartisan parliamentary passage

    Parlinfo Aph Gov

  7. 7
    PDF

    Australian Human Rights Commission - Submission on mandatory data retention regime

    Humanrights Gov • PDF Document
  8. 8
    PJCIS Review of the mandatory data retention regime

    PJCIS Review of the mandatory data retention regime

    IntroductionUnder section 29 of the Intelligence Services Act 2001 (IS Act), the Parliamentary Joint Committee on Intelligence and Security’s (PJCIS) first function is to review the administration and expenditure of six intelligence agencies in Australia that comprise the majorit

    Introduction
  9. 9
    Clean Energy Regulator, WA Mines Department, and Vet Surgeons Board trying to access metadata: Comms Alliance

    Clean Energy Regulator, WA Mines Department, and Vet Surgeons Board trying to access metadata: Comms Alliance

    The Communications Alliance has listed 27 other agencies that have tried to access metadata following the introduction of Australia's data retention regime.

    ZDNET
  10. 10
    Government acts to finally reform metadata regime

    Government acts to finally reform metadata regime

    A loophole meant more organisations could access your metadata.

    Information Age

评分方法

1-3: 不实

事实错误或恶意捏造。

4-6: 部分属实

有一定真实性,但缺乏背景或有所偏颇。

7-9: 基本属实

仅有微小的技术性或措辞问题。

10: 准确

完全经过验证且客观公正。

方法论: 评分通过交叉参照政府官方记录、独立事实核查机构和原始文件确定。