该 gāi 主张 zhǔ zhāng 的 de 第一 dì yī 部分 bù fèn 是 shì * * * * 准确 zhǔn què 的 de * * * * : : 内政部 nèi zhèng bù 确实 què shí 提出 tí chū 过 guò 将 jiāng 数据 shù jù 保留 bǎo liú 法 fǎ 扩展 kuò zhǎn 至 zhì 包含 bāo hán MAC MAC ( ( 媒体 méi tǐ 访问控制 fǎng wèn kòng zhì ) ) 地址 dì zhǐ 的 de 想法 xiǎng fǎ 。 。
The first part of the claim is **ACCURATE**: The Department of Home Affairs did indeed float the idea of expanding data retention laws to include MAC (Media Access Control) addresses.
In a July 2019 submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) reviewing the mandatory data retention regime, Home Affairs stated [1]:
"Including media access control (MAC) addresses and devices which identify serials would provide better information as to which device was being used at the time of an offence...
" " 将 jiāng 媒体 méi tǐ 访问控制 fǎng wèn kòng zhì ( ( MAC MAC ) ) 地址 dì zhǐ 和 hé 识别 shí bié 设备 shè bèi 序列号 xù liè hào 纳入 nà rù 数据 shù jù 保留 bǎo liú 范围 fàn wéi , , 将 jiāng 能 néng 更好 gèng hǎo 地 dì 提供 tí gōng 关于 guān yú 犯罪 fàn zuì 时 shí 使用 shǐ yòng 设备 shè bèi 的 de 信息 xìn xī … … … … MAC MAC 数据 shù jù 目前 mù qián 未 wèi 根据 gēn jù 《 《 数据 shù jù 保留 bǎo liú 法 fǎ 》 》 保留 bǎo liú , , 但 dàn 正 zhèng 成为 chéng wéi 对 duì 执法 zhí fǎ 和 hé 情报机构 qíng bào jī gòu 越来越 yuè lái yuè 重要 zhòng yào 的 de 数据 shù jù 形式 xíng shì 。 。
MAC data is not currently retained under the Data Retention Act, but is a form of data that will become increasingly important to law enforcement and intelligence agencies." [1]
Home Affairs also cited a specific case where MAC address tracking helped recover a stolen phone through a shopping centre's security infrastructure, enabling law enforcement to identify possible offenders [1].
" " [ [ 1 1 ] ]
However, the claim contains a **SIGNIFICANT TECHNICAL MISCHARACTERIZATION** regarding how MAC addresses work for location tracking:
The claim asserts that MAC addresses being "hardcoded into each device's hardware" would "enable continuous location tracking." This is **technically misleading** [2][3]:
1. **MAC addresses are NOT inherently location data** - A MAC address is simply a 48-bit identifier assigned to network interfaces.
### ### 技术 jì shù 准确性 zhǔn què xìng 问题 wèn tí : : MAC MAC 地址 dì zhǐ 与 yǔ 位置 wèi zhì 追踪 zhuī zōng
It identifies *which device* is connecting, but does NOT contain location information within itself [2].
2. **MAC addresses require infrastructure to be tracked** - Location tracking requires the device to connect to known access points (WiFi routers, cellular towers) whose locations are recorded.
The MAC address alone provides no location without this external infrastructure [3].
3. **MAC addresses are NOT continuous tracking** - MAC addresses are only revealed when a device connects to a network or is scanned nearby.
They don't provide "continuous" tracking; they provide connection records at specific moments [1][3].
4. **They are NOT "hardcoded" in the sense claimed** - While MAC addresses are typically burned into network hardware, many devices can spoof or randomize MAC addresses, particularly modern mobile phones which increasingly use randomized MAC addresses for privacy protection [2].
1 1 . . * * * * MAC MAC 地址 dì zhǐ 本身 běn shēn 不是 bú shì 位置 wèi zhì 数据 shù jù * * * * - - MAC MAC 地址 dì zhǐ 只是 zhǐ shì 分配 fēn pèi 给 gěi 网络接口 wǎng luò jiē kǒu 的 de 48 48 位 wèi 标识符 biāo shí fú 。 。
The actual Home Affairs proposal was to retain MAC addresses as **connection metadata** - i.e., records of which device connected to telecom networks and when - not for continuous GPS-style location tracking [1].
### ### 该 gāi 主张 zhǔ zhāng 未 wèi 提及 tí jí 的 de 内容 nèi róng
### What the Claim Doesn't Tell You
1 1 . . * * * * 有限 yǒu xiàn 的 de 实际 shí jì 使用 shǐ yòng 案例 àn lì * * * * - - 内政部 nèi zhèng bù 的 de 意见书 yì jiàn shū 仅 jǐn 提供 tí gōng 了 le 一个 yí gè 案例 àn lì 研究 yán jiū ( ( 追回 zhuī huí 被盗 bèi dào 手机 shǒu jī ) ) 来 lái 证明 zhèng míng 保留 bǎo liú MAC MAC 地址 dì zhǐ 的 de 合理性 hé lǐ xìng , , 表明 biǎo míng 实际 shí jì 应用 yìng yòng 有限 yǒu xiàn , , 而 ér 非 fēi 系统性 xì tǒng xìng 的 de 监控 jiān kòng 工具 gōng jù [ [ 1 1 ] ] 。 。
1. **Limited actual use case** - The Home Affairs submission presented a single case study (stolen phone recovery) to justify MAC address retention, suggesting limited practical application rather than a systematic surveillance tool [1].
2. **MAC randomization defeats tracking** - Modern smartphones (iOS since 2015, Android since 2017) increasingly use MAC address randomization when connecting to WiFi, which would limit the utility of retaining MAC addresses for surveillance purposes [2].
3. **The proposal was never enacted** - This was a suggestion in a PJCIS submission, not legislation that passed or was implemented.
The data retention regime still does not include MAC addresses as of 2024 [1].
4. **Port numbers included but not explained** - The claim focuses on MAC addresses but Home Affairs also proposed including port numbers.
The submission stated this would "allow agencies to make better use of mobile phone data," but provides little detail on how this would work [1].
5. **ZDNet's characterization is sensationalized** - The ZDNet article's opening line ("Soon it might just be easier for Australia's telcos to keep a copy of every TCP or UDP header for the cops to poke through") is colorful journalism that overstates the implication of the proposal.
The actual submission was more measured [1].
6. **Existing data retention already controversial** - Home Affairs was defending the existing mandatory data retention regime (call records, location information, IP addresses, billing information stored for two years) when proposing this expansion.
**Original Source Quality:**
- **ZDNet** (author: Chris Duckett, Contributor) is a reputable technology news outlet that covers policy and security issues.
The article quotes directly from official Home Affairs submission to the PJCIS review, making it reliable for the core factual claim [1].
- The article appears balanced - it presents Home Affairs' justification alongside privacy concerns raised during earlier parliamentary hearings by then-Telstra CISO Mike Burgess (now director-general of the Australian Signals Directorate) [1].
- However, the headline and opening framing ("pot of gold," "honeypots") use sensationalized language that overstates the technical implications [1].
**Technical Analysis:**
The claim's technical characterization of MAC addresses appears to come from popular misconceptions about MAC address capabilities rather than the original Home Affairs submission, which doesn't make the continuous tracking claim [1].
**Did Labor introduce or support data retention laws?**
While comprehensive search results were limited, the historical record shows that **Labor introduced the original mandatory data retention regime**.
* * * *
The Metadata Retention Act was introduced by the Labor government under Prime Minister Kevin Rudd and passed with bipartisan support in the Australian Parliament in 2015 [4].
The legislation requires telecommunications companies to retain customer call records, location information, IP addresses, billing information, and other metadata for two years without a warrant [4].
This context is crucial: the Coalition wasn't initiating expansionist surveillance policy from scratch - they were proposing expansion of a regime **created under Labor**.
内政部 nèi zhèng bù 确实 què shí 提议 tí yì 将 jiāng MAC MAC 地址 dì zhǐ 纳入 nà rù 数据 shù jù 保留 bǎo liú 范围 fàn wéi , , 这一 zhè yī 事实性 shì shí xìng 陈述 chén shù 是 shì 正确 zhèng què 的 de 。 。
The factual assertion that Home Affairs proposed including MAC addresses in data retention is correct.
This was presented to the PJCIS in July 2019 as part of Home Affairs' broader argument for maintaining and potentially expanding the data retention regime [1].
**Home Affairs' Justification:**
Home Affairs argued that MAC address retention would help law enforcement identify which physical device was used in crimes.
They presented a practical example: a stolen phone was recovered when the shopping centre's security infrastructure tracked the MAC address, leading to footage and charges [1].
他们 tā men 提出 tí chū 了 le 一个 yí gè 实际 shí jì 案例 àn lì : : 一部 yī bù 被盗 bèi dào 手机 shǒu jī 通过 tōng guò 购物中心 gòu wù zhōng xīn 安保 ān bǎo 基础设施 jī chǔ shè shī 追踪 zhuī zōng 其 qí MAC MAC 地址 dì zhǐ 得以 dé yǐ 追回 zhuī huí , , 进而 jìn ér 获得 huò dé 监控 jiān kòng 录像 lù xiàng 并 bìng 提起 tí qǐ 指控 zhǐ kòng [ [ 1 1 ] ] 。 。
This is a legitimate law enforcement use case, not theoretical.
**Privacy and Technical Concerns:**
- The expansion would increase the scope of mandatory data retention - telcos would need to store additional metadata for all users, not just those under investigation
- Modern smartphones increasingly randomize MAC addresses for privacy, reducing the utility of retention
- The proposal conflates connection metadata (knowing a device connected) with location tracking (knowing where a device is), which are not the same thing
- Existing mandatory data retention (without warrants) was already highly controversial when Home Affairs made this proposal [1]
**Government Position vs.
Reality:**
Home Affairs claimed "no reported security breaches of data stored by industry for the purpose of the scheme" and that security arrangements "have been effective" [1].
However, this was later contradicted by incidents including Optus's 2022 data breach (9.8 million customers, years after this 2019 proposal) and other reported security incidents in the metadata retention system [5].
**Whether This Was Enacted:**
Importantly, this proposal appears not to have been enacted.
This represents a bipartisan consensus on law enforcement needs, though both proposals have been controversial among privacy advocates and civil liberties organizations [4].
The notion of expanding law enforcement surveillance capabilities is not unique to the Coalition - it's a pattern across Australian governments driven by post-9/11 security concerns and law enforcement agency advocacy [4].
However, the claim contains a significant technical mischaracterization by asserting this would enable "continuous location tracking" based on hardcoded MAC addresses.
Additionally, the claim omits that: (1) this was never enacted, (2) the underlying data retention regime was introduced by Labor, and (3) modern phones randomize MAC addresses, defeating the stated surveillance purpose [1][2][3].
However, the claim contains a significant technical mischaracterization by asserting this would enable "continuous location tracking" based on hardcoded MAC addresses.
Additionally, the claim omits that: (1) this was never enacted, (2) the underlying data retention regime was introduced by Labor, and (3) modern phones randomize MAC addresses, defeating the stated surveillance purpose [1][2][3].