部分真實

評分: 6.0/10

Coalition
C0055

主張

“Introduced new police powers to spy on and hack innocent Aussies, without a warrant, even if they're not suspected of committing any crime. Powers include snooping, modifying, deleting data and account takeover. The legislation was voted on only hours after giving it to the crossbenchers to review. The legislation was reviewed by intelligence groups, but no public interest privacy advocates. The legislation went against the government's own review into hacking powers. The government rejected a proposal to have a public interest advocate argue on behalf of the hacked person to balance privacy against safety. The argument is that if you've done nothing wrong, you've got nothing to hide. Powers include removing two factor authentication on accounts, thereby making it easier for unrelated criminals to hack those Australians.”
原始來源: Matthew Davis
分析日期: 29 Jan 2026

原始來源

事實查核

TheThe The SurveillanceSurveillance Surveillance LegislationLegislation Legislation AmendmentAmendment Amendment (( ( IdentifyIdentify Identify andand and DisruptDisrupt Disrupt )) ) ActAct Act 20212021 2021 waswas was passedpassed passed byby by ParliamentParliament Parliament onon on 2525 25 AugustAugust August 20212021 2021 andand and receivedreceived received RoyalRoyal Royal AssentAssent Assent onon on 33 3 SeptemberSeptember September 20212021 2021 [[ [ 11 1 ]] ] .. . TheThe The corecore core claimclaim claim thatthat that thethe the legislationlegislation legislation introducesintroduces introduces newnew new policepolice police powerspowers powers isis is factuallyfactually factually accurateaccurate accurate .. .
The Surveillance Legislation Amendment (Identify and Disrupt) Act 2021 was passed by Parliament on 25 August 2021 and received Royal Assent on 3 September 2021 [1].
** * ** * TheThe The ThreeThree Three NewNew New PowersPowers Powers :: : ** * ** *
The core claim that the legislation introduces new police powers is factually accurate. **The Three New Powers:** The Act introduced three new warrant types for the Australian Federal Police (AFP) and Australian Criminal Intelligence Commission (ACIC) [1]: - **Data disruption warrants**: Allow police to access devices and "modify, add, copy, or delete data" [2] - **Network activity warrants**: Allow law enforcement to surveil online activity of suspects [2] - **Account takeover warrants**: Allow police to take control of online accounts [2] **The "Without Warrant" Claim - MISLEADING:** The claim states police can act "without a warrant, even if they're not suspected of committing any crime." This is partially misleading: - All three powers require warrants under normal circumstances, issued by a judicial officer [3] - However, "emergency authorisation" does allow police to act WITHOUT a warrant in urgent situations if they reasonably suspect "imminent serious violence or damage to property" and believe it's not practicable to apply for a warrant [3] - These emergency measures must be retrospectively approved by a judicial officer [3] - The requirement is "reasonable suspicion" of a "serious crime" (defined as any offence with penalty >3 years), not actual proof of criminal activity [3] The "reasonable suspicion" threshold is notably low and broad, but warrants are technically required in normal circumstances. **Legislation Voted on "Only Hours" After Crossbench Review - TRUE:** The bill was "blitzed through both Federal Houses of Parliament in under 24 hours" and passed on 25 August 2021 [4].
TheThe The ActAct Act introducedintroduced introduced threethree three newnew new warrantwarrant warrant typestypes types forfor for thethe the AustralianAustralian Australian FederalFederal Federal PolicePolice Police (( ( AFPAFP AFP )) ) andand and AustralianAustralian Australian CriminalCriminal Criminal IntelligenceIntelligence Intelligence CommissionCommission Commission (( ( ACICACIC ACIC )) ) [[ [ 11 1 ]] ] :: :
This is confirmed across multiple sources [2], [3].
-- - ** * ** * DataData Data disruptiondisruption disruption warrantswarrants warrants ** * ** * :: : AllowAllow Allow policepolice police toto to accessaccess access devicesdevices devices andand and "" " modifymodify modify ,, , addadd add ,, , copycopy copy ,, , oror or deletedelete delete datadata data "" " [[ [ 22 2 ]] ]
The brief review period is accurate. **Review by Intelligence Groups But Not Privacy Advocates - PARTIALLY TRUE BUT INCOMPLETE:** The Parliamentary Joint Committee on Human Rights did issue a report flagging serious concerns [3].
-- - ** * ** * NetworkNetwork Network activityactivity activity warrantswarrants warrants ** * ** * :: : AllowAllow Allow lawlaw law enforcementenforcement enforcement toto to surveilsurveil surveil onlineonline online activityactivity activity ofof of suspectssuspects suspects [[ [ 22 2 ]] ]
While the claim is correct that privacy advocates were not part of the formal review process, the Parliamentary Joint Committee on Human Rights represents parliamentary scrutiny for human rights impacts.
-- - ** * ** * AccountAccount Account takeovertakeover takeover warrantswarrants warrants ** * ** * :: : AllowAllow Allow policepolice police toto to taketake take controlcontrol control ofof of onlineonline online accountsaccounts accounts [[ [ 22 2 ]] ]
However, independent civil liberty and digital rights organisations submitted extensive submissions raising concerns that were not formally incorporated into the legislation [3], [4]. **Data Disruption Powers and Two-Factor Authentication - TRUE:** The legislation does allow police to "modify, add, copy, or delete data" [2], [3], which would technically enable removing two-factor authentication from accounts.
** * ** * TheThe The "" " WithoutWithout Without WarrantWarrant Warrant "" " ClaimClaim Claim -- - MISLEADINGMISLEADING MISLEADING :: : ** * ** *
This is a legitimate concern raised by security experts and legal analysts [3]. **"Against the Government's Own Review" - UNVERIFIED:** The claim references the government's own review into hacking powers.
TheThe The claimclaim claim statesstates states policepolice police cancan can actact act "" " withoutwithout without aa a warrantwarrant warrant ,, , eveneven even ifif if theythey they '' ' rere re notnot not suspectedsuspected suspected ofof of committingcommitting committing anyany any crimecrime crime .. . "" " ThisThis This isis is partiallypartially partially misleadingmisleading misleading :: :
A recent statutory review by the Independent National Security Legislation Monitor (INSLM) found serious problems with the Act's implementation, determining that "hacking powers handed out without safeguard" and identifying that warrants were being issued by untrained individuals [5].
-- - AllAll All threethree three powerspowers powers requirerequire require warrantswarrants warrants underunder under normalnormal normal circumstancescircumstances circumstances ,, , issuedissued issued byby by aa a judicialjudicial judicial officerofficer officer [[ [ 33 3 ]] ]
However, this review occurred in 2024-2025, AFTER the legislation was passed, not before.
-- - HoweverHowever However ,, , "" " emergencyemergency emergency authorisationauthorisation authorisation "" " doesdoes does allowallow allow policepolice police toto to actact act WITHOUTWITHOUT WITHOUT aa a warrantwarrant warrant inin in urgenturgent urgent situationssituations situations ifif if theythey they reasonablyreasonably reasonably suspectsuspect suspect "" " imminentimminent imminent seriousserious serious violenceviolence violence oror or damagedamage damage toto to propertyproperty property "" " andand and believebelieve believe itit it '' ' ss s notnot not practicablepracticable practicable toto to applyapply apply forfor for aa a warrantwarrant warrant [[ [ 33 3 ]] ]
I cannot verify a pre-legislation government review that opposed the bill.
-- - TheseThese These emergencyemergency emergency measuresmeasures measures mustmust must bebe be retrospectivelyretrospectively retrospectively approvedapproved approved byby by aa a judicialjudicial judicial officerofficer officer [[ [ 33 3 ]] ]
-- - TheThe The requirementrequirement requirement isis is "" " reasonablereasonable reasonable suspicionsuspicion suspicion "" " ofof of aa a "" " seriousserious serious crimecrime crime "" " (( ( defineddefined defined asas as anyany any offenceoffence offence withwith with penaltypenalty penalty >> > 33 3 yearsyears years )) ) ,, , notnot not actualactual actual proofproof proof ofof of criminalcriminal criminal activityactivity activity [[ [ 33 3 ]] ]
TheThe The "" " reasonablereasonable reasonable suspicionsuspicion suspicion "" " thresholdthreshold threshold isis is notablynotably notably lowlow low andand and broadbroad broad ,, , butbut but warrantswarrants warrants areare are technicallytechnically technically requiredrequired required inin in normalnormal normal circumstancescircumstances circumstances .. .
** * ** * LegislationLegislation Legislation VotedVoted Voted onon on "" " OnlyOnly Only HoursHours Hours "" " AfterAfter After CrossbenchCrossbench Crossbench ReviewReview Review -- - TRUETRUE TRUE :: : ** * ** *
TheThe The billbill bill waswas was "" " blitzedblitzed blitzed throughthrough through bothboth both FederalFederal Federal HousesHouses Houses ofof of ParliamentParliament Parliament inin in underunder under 2424 24 hourshours hours "" " andand and passedpassed passed onon on 2525 25 AugustAugust August 20212021 2021 [[ [ 44 4 ]] ] .. . ThisThis This isis is confirmedconfirmed confirmed acrossacross across multiplemultiple multiple sourcessources sources [[ [ 22 2 ]] ] ,, , [[ [ 33 3 ]] ] .. . TheThe The briefbrief brief reviewreview review periodperiod period isis is accurateaccurate accurate .. .
** * ** * ReviewReview Review byby by IntelligenceIntelligence Intelligence GroupsGroups Groups ButBut But NotNot Not PrivacyPrivacy Privacy AdvocatesAdvocates Advocates -- - PARTIALLYPARTIALLY PARTIALLY TRUETRUE TRUE BUTBUT BUT INCOMPLETEINCOMPLETE INCOMPLETE :: : ** * ** *
TheThe The ParliamentaryParliamentary Parliamentary JointJoint Joint CommitteeCommittee Committee onon on HumanHuman Human RightsRights Rights diddid did issueissue issue aa a reportreport report flaggingflagging flagging seriousserious serious concernsconcerns concerns [[ [ 33 3 ]] ] .. . WhileWhile While thethe the claimclaim claim isis is correctcorrect correct thatthat that privacyprivacy privacy advocatesadvocates advocates werewere were notnot not partpart part ofof of thethe the formalformal formal reviewreview review processprocess process ,, , thethe the ParliamentaryParliamentary Parliamentary JointJoint Joint CommitteeCommittee Committee onon on HumanHuman Human RightsRights Rights representsrepresents represents parliamentaryparliamentary parliamentary scrutinyscrutiny scrutiny forfor for humanhuman human rightsrights rights impactsimpacts impacts .. . HoweverHowever However ,, , independentindependent independent civilcivil civil libertyliberty liberty andand and digitaldigital digital rightsrights rights organisationsorganisations organisations submittedsubmitted submitted extensiveextensive extensive submissionssubmissions submissions raisingraising raising concernsconcerns concerns thatthat that werewere were notnot not formallyformally formally incorporatedincorporated incorporated intointo into thethe the legislationlegislation legislation [[ [ 33 3 ]] ] ,, , [[ [ 44 4 ]] ] .. .
** * ** * DataData Data DisruptionDisruption Disruption PowersPowers Powers andand and TwoTwo Two -- - FactorFactor Factor AuthenticationAuthentication Authentication -- - TRUETRUE TRUE :: : ** * ** *
TheThe The legislationlegislation legislation doesdoes does allowallow allow policepolice police toto to "" " modifymodify modify ,, , addadd add ,, , copycopy copy ,, , oror or deletedelete delete datadata data "" " [[ [ 22 2 ]] ] ,, , [[ [ 33 3 ]] ] ,, , whichwhich which wouldwould would technicallytechnically technically enableenable enable removingremoving removing twotwo two -- - factorfactor factor authenticationauthentication authentication fromfrom from accountsaccounts accounts .. . ThisThis This isis is aa a legitimatelegitimate legitimate concernconcern concern raisedraised raised byby by securitysecurity security expertsexperts experts andand and legallegal legal analystsanalysts analysts [[ [ 33 3 ]] ] .. .
** * ** * "" " AgainstAgainst Against thethe the GovernmentGovernment Government '' ' ss s OwnOwn Own ReviewReview Review "" " -- - UNVERIFIEDUNVERIFIED UNVERIFIED :: : ** * ** *
TheThe The claimclaim claim referencesreferences references thethe the governmentgovernment government '' ' ss s ownown own reviewreview review intointo into hackinghacking hacking powerspowers powers .. . AA A recentrecent recent statutorystatutory statutory reviewreview review byby by thethe the IndependentIndependent Independent NationalNational National SecuritySecurity Security LegislationLegislation Legislation MonitorMonitor Monitor (( ( INSLMINSLM INSLM )) ) foundfound found seriousserious serious problemsproblems problems withwith with thethe the ActAct Act '' ' ss s implementationimplementation implementation ,, , determiningdetermining determining thatthat that "" " hackinghacking hacking powerspowers powers handedhanded handed outout out withoutwithout without safeguardsafeguard safeguard "" " andand and identifyingidentifying identifying thatthat that warrantswarrants warrants werewere were beingbeing being issuedissued issued byby by untraineduntrained untrained individualsindividuals individuals [[ [ 55 5 ]] ] .. . HoweverHowever However ,, , thisthis this reviewreview review occurredoccurred occurred inin in 20242024 2024 -- - 20252025 2025 ,, , AFTERAFTER AFTER thethe the legislationlegislation legislation waswas was passedpassed passed ,, , notnot not beforebefore before .. . II I cannotcannot cannot verifyverify verify aa a prepre pre -- - legislationlegislation legislation governmentgovernment government reviewreview review thatthat that opposedopposed opposed thethe the billbill bill .. .

缺失的脈絡

** * ** * 11 1 .. . WarrantWarrant Warrant RequirementsRequirements Requirements andand and JudicialJudicial Judicial OversightOversight Oversight :: : ** * ** *
**1.
WhileWhile While thethe the claimclaim claim emphasizesemphasizes emphasizes warrantlesswarrantless warrantless surveillancesurveillance surveillance possibilitiespossibilities possibilities ,, , itit it omitsomits omits thatthat that judicialjudicial judicial officersofficers officers mustmust must approveapprove approve warrantswarrants warrants underunder under normalnormal normal circumstancescircumstances circumstances [[ [ 11 1 ]] ] .. . TheThe The ActAct Act includesincludes includes "" " strongstrong strong safeguardssafeguards safeguards ,, , includingincluding including oversightoversight oversight andand and controlscontrols controls "" " accordingaccording according toto to governmentgovernment government statementsstatements statements [[ [ 11 1 ]] ] ,, , thoughthough though criticscritics critics disputedispute dispute whetherwhether whether thesethese these safeguardssafeguards safeguards areare are adequateadequate adequate .. .
Warrant Requirements and Judicial Oversight:** While the claim emphasizes warrantless surveillance possibilities, it omits that judicial officers must approve warrants under normal circumstances [1].
** * ** * 22 2 .. . TheThe The DefinitionDefinition Definition ofof of "" " SeriousSerious Serious CrimeCrime Crime "" " isis is BroaderBroader Broader ThanThan Than ImpliedImplied Implied :: : ** * ** *
The Act includes "strong safeguards, including oversight and controls" according to government statements [1], though critics dispute whether these safeguards are adequate. **2.
TheThe The claimclaim claim framesframes frames thisthis this asas as targetingtargeting targeting seriousserious serious criminalscriminals criminals ,, , butbut but "" " seriousserious serious crimecrime crime "" " isis is defineddefined defined asas as anyany any offenceoffence offence withwith with penaltypenalty penalty >> > 33 3 yearsyears years ,, , whichwhich which includesincludes includes taxtax tax evasionevasion evasion ,, , certaincertain certain whistleblowingwhistleblowing whistleblowing activitiesactivities activities ,, , forgingforging forging postagepostage postage stampsstamps stamps ,, , andand and polygamypolygamy polygamy [[ [ 33 3 ]] ] .. . ThisThis This dramaticallydramatically dramatically expandsexpands expands thethe the scopescope scope ofof of whowho who couldcould could bebe be targetedtargeted targeted .. .
The Definition of "Serious Crime" is Broader Than Implied:** The claim frames this as targeting serious criminals, but "serious crime" is defined as any offence with penalty >3 years, which includes tax evasion, certain whistleblowing activities, forging postage stamps, and polygamy [3].
** * ** * 33 3 .. . ParliamentaryParliamentary Parliamentary ScrutinyScrutiny Scrutiny DidDid Did OccurOccur Occur :: : ** * ** *
This dramatically expands the scope of who could be targeted. **3.
TheThe The StandingStanding Standing CommitteeCommittee Committee forfor for thethe the ScrutinyScrutiny Scrutiny ofof of BillsBills Bills raisedraised raised concernsconcerns concerns aboutabout about potentialpotential potential "" " undulyunduly unduly trepasstrepass trepass onon on personalpersonal personal rightsrights rights andand and libertiesliberties liberties "" " inin in FebruaryFebruary February 20212021 2021 [[ [ 44 4 ]] ] .. . TheThe The ParliamentaryParliamentary Parliamentary JointJoint Joint CommitteeCommittee Committee onon on HumanHuman Human RightsRights Rights issuedissued issued aa a detaileddetailed detailed humanhuman human rightsrights rights scrutinyscrutiny scrutiny reportreport report [[ [ 33 3 ]] ] .. . SomeSome Some amendmentsamendments amendments werewere were mademade made inin in responseresponse response toto to HouseHouse House ofof of RepresentativesRepresentatives Representatives concernsconcerns concerns [[ [ 44 4 ]] ] .. .
Parliamentary Scrutiny Did Occur:** The Standing Committee for the Scrutiny of Bills raised concerns about potential "unduly trepass on personal rights and liberties" in February 2021 [4].
** * ** * 44 4 .. . LaborLabor Labor VotedVoted Voted forfor for thethe the LegislationLegislation Legislation :: : ** * ** *
The Parliamentary Joint Committee on Human Rights issued a detailed human rights scrutiny report [3].
AA A criticalcritical critical omissionomission omission fromfrom from thethe the mdavismdavis mdavis .. . xyzxyz xyz sourcesource source isis is thatthat that LaborLabor Labor supportedsupported supported thethe the billbill bill .. . AsAs As CrikeyCrikey Crikey reportedreported reported :: : "" " TheThe The CoalitionCoalition Coalition andand and LaborLabor Labor havehave have wavedwaved waved throughthrough through aa a lawlaw law thatthat that willwill will givegive give policepolice police aa a newnew new setset set ofof of powerspowers powers "" " andand and "" " bothboth both thethe the governmentgovernment government andand and LaborLabor Labor votedvoted voted toto to passpass pass aa a controversialcontroversial controversial billbill bill "" " [[ [ 22 2 ]] ] .. . LaborLabor Labor providedprovided provided bipartisanbipartisan bipartisan supportsupport support ,, , whichwhich which isis is significantsignificant significant contextcontext context forfor for evaluatingevaluating evaluating partisanpartisan partisan criticismcriticism criticism .. .
Some amendments were made in response to House of Representatives concerns [4]. **4.
** * ** * 55 5 .. . StatutoryStatutory Statutory ReviewReview Review FoundFound Found SeriousSerious Serious ImplementationImplementation Implementation ProblemsProblems Problems :: : ** * ** *
Labor Voted for the Legislation:** A critical omission from the mdavis.xyz source is that Labor supported the bill.
AA A 20242024 2024 -- - 20252025 2025 reviewreview review byby by thethe the IndependentIndependent Independent NationalNational National SecuritySecurity Security LegislationLegislation Legislation MonitorMonitor Monitor foundfound found thatthat that thethe the mainmain main safeguardsafeguard safeguard (( ( warrantwarrant warrant approvalapproval approval processprocess process )) ) waswas was nevernever never effectivelyeffectively effectively implementedimplemented implemented [[ [ 55 5 ]] ] .. . HoweverHowever However ,, , thisthis this confirmsconfirms confirms exex ex -- - postpost post factofacto facto thatthat that thethe the concernsconcerns concerns werewere were justifiedjustified justified ,, , ratherrather rather thanthan than representingrepresenting representing aa a prepre pre -- - existingexisting existing governmentgovernment government reviewreview review .. .
As Crikey reported: "The Coalition and Labor have waved through a law that will give police a new set of powers" and "both the government and Labor voted to pass a controversial bill" [2].
** * ** * 66 6 .. . PrivacyPrivacy Privacy AdvocatesAdvocates Advocates WereWere Were NotNot Not CompletelyCompletely Completely ExcludedExcluded Excluded :: : ** * ** *
Labor provided bipartisan support, which is significant context for evaluating partisan criticism. **5.
CivilCivil Civil libertiesliberties liberties groupsgroups groups likelike like thethe the HumanHuman Human RightsRights Rights LawLaw Law CentreCentre Centre ,, , DigitalDigital Digital RightsRights Rights WatchWatch Watch ,, , andand and thethe the InternetInternet Internet AssociationAssociation Association ofof of AustraliaAustralia Australia mademade made detaileddetailed detailed submissionssubmissions submissions toto to parliamentaryparliamentary parliamentary inquiriesinquiries inquiries [[ [ 33 3 ]] ] .. . TheyThey They werewere were notnot not partpart part ofof of thethe the formalformal formal legislativelegislative legislative reviewreview review processprocess process ,, , butbut but theirtheir their inputinput input waswas was availableavailable available toto to decisiondecision decision -- - makersmakers makers .. .
Statutory Review Found Serious Implementation Problems:** A 2024-2025 review by the Independent National Security Legislation Monitor found that the main safeguard (warrant approval process) was never effectively implemented [5].

來源可信度評估

** * ** * OriginalOriginal Original SourcesSources Sources ProvidedProvided Provided :: : ** * ** *
**Original Sources Provided:** - **Infosecurity Magazine**: Mainstream cybersecurity/tech publication [1] - **The Guardian Australia**: Reputable mainstream news outlet [2] - **ACS (Australian Computer Society)**: Professional association, credible technology source [3] - **Digital Rights Watch**: Advocacy organisation focused on digital rights; likely to emphasize privacy concerns but generally factual [4] - **Sydney Criminal Lawyers**: Legal practitioners' perspective; has commercial interest in security law issues but provides substantive legal analysis [5] These sources range from mainstream news to advocacy organisations.
-- - ** * ** * InfosecurityInfosecurity Infosecurity MagazineMagazine Magazine ** * ** * :: : MainstreamMainstream Mainstream cybersecuritycybersecurity cybersecurity // / techtech tech publicationpublication publication [[ [ 11 1 ]] ]
Digital Rights Watch and Sydney Criminal Lawyers have clear perspectives on civil liberties, but their factual claims about the legislation are supported by parliamentary records and government documents. **mdavis.xyz Source Assessment:** The original claim comes from a Labor-aligned source critical of Coalition government.
-- - ** * ** * TheThe The GuardianGuardian Guardian AustraliaAustralia Australia ** * ** * :: : ReputableReputable Reputable mainstreammainstream mainstream newsnews news outletoutlet outlet [[ [ 22 2 ]] ]
The criticism is substantively based on documented legislative provisions and is shared by many legal experts and civil rights organisations.
-- - ** * ** * ACSACS ACS (( ( AustralianAustralian Australian ComputerComputer Computer SocietySociety Society )) ) ** * ** * :: : ProfessionalProfessional Professional associationassociation association ,, , crediblecredible credible technologytechnology technology sourcesource source [[ [ 33 3 ]] ]
However, the frame presents the legislation as exclusively a Coalition problem without acknowledging Labor's bipartisan support.
-- - ** * ** * DigitalDigital Digital RightsRights Rights WatchWatch Watch ** * ** * :: : AdvocacyAdvocacy Advocacy organisationorganisation organisation focusedfocused focused onon on digitaldigital digital rightsrights rights ;; ; likelylikely likely toto to emphasizeemphasize emphasize privacyprivacy privacy concernsconcerns concerns butbut but generallygenerally generally factualfactual factual [[ [ 44 4 ]] ]
-- - ** * ** * SydneySydney Sydney CriminalCriminal Criminal LawyersLawyers Lawyers ** * ** * :: : LegalLegal Legal practitionerspractitioners practitioners '' ' perspectiveperspective perspective ;; ; hashas has commercialcommercial commercial interestinterest interest inin in securitysecurity security lawlaw law issuesissues issues butbut but providesprovides provides substantivesubstantive substantive legallegal legal analysisanalysis analysis [[ [ 55 5 ]] ]
TheseThese These sourcessources sources rangerange range fromfrom from mainstreammainstream mainstream newsnews news toto to advocacyadvocacy advocacy organisationsorganisations organisations .. . DigitalDigital Digital RightsRights Rights WatchWatch Watch andand and SydneySydney Sydney CriminalCriminal Criminal LawyersLawyers Lawyers havehave have clearclear clear perspectivesperspectives perspectives onon on civilcivil civil libertiesliberties liberties ,, , butbut but theirtheir their factualfactual factual claimsclaims claims aboutabout about thethe the legislationlegislation legislation areare are supportedsupported supported byby by parliamentaryparliamentary parliamentary recordsrecords records andand and governmentgovernment government documentsdocuments documents .. .
** * ** * mdavismdavis mdavis .. . xyzxyz xyz SourceSource Source AssessmentAssessment Assessment :: : ** * ** *
TheThe The originaloriginal original claimclaim claim comescomes comes fromfrom from aa a LaborLabor Labor -- - alignedaligned aligned sourcesource source criticalcritical critical ofof of CoalitionCoalition Coalition governmentgovernment government .. . TheThe The criticismcriticism criticism isis is substantivelysubstantively substantively basedbased based onon on documenteddocumented documented legislativelegislative legislative provisionsprovisions provisions andand and isis is sharedshared shared byby by manymany many legallegal legal expertsexperts experts andand and civilcivil civil rightsrights rights organisationsorganisations organisations .. . HoweverHowever However ,, , thethe the frameframe frame presentspresents presents thethe the legislationlegislation legislation asas as exclusivelyexclusively exclusively aa a CoalitionCoalition Coalition problemproblem problem withoutwithout without acknowledgingacknowledging acknowledging LaborLabor Labor '' ' ss s bipartisanbipartisan bipartisan supportsupport support .. .
⚖️

Labor 比較

** * ** * DidDid Did LaborLabor Labor SupportSupport Support ThisThis This LegislationLegislation Legislation ?? ? ** * ** *
**Did Labor Support This Legislation?** Yes.
YesYes Yes .. . TheThe The CrikeyCrikey Crikey articlearticle article explicitlyexplicitly explicitly statesstates states :: : "" " TheThe The CoalitionCoalition Coalition andand and LaborLabor Labor havehave have wavedwaved waved throughthrough through aa a lawlaw law thatthat that willwill will givegive give policepolice police aa a newnew new setset set ofof of powerspowers powers toto to surveilsurveil surveil andand and taketake take actionaction action againstagainst against AustraliansAustralians Australians suspectedsuspected suspected ofof of committingcommitting committing crimescrimes crimes "" " [[ [ 22 2 ]] ] .. . LaborLabor Labor oppositionopposition opposition leaderleader leader AnthonyAnthony Anthony AlbaneseAlbanese Albanese andand and thethe the LaborLabor Labor partyparty party votedvoted voted forfor for thethe the legislationlegislation legislation ,, , providingproviding providing crucialcrucial crucial bipartisanbipartisan bipartisan supportsupport support thatthat that enabledenabled enabled passagepassage passage withwith with crossbenchcrossbench crossbench oppositionopposition opposition [[ [ 22 2 ]] ] .. .
The Crikey article explicitly states: "The Coalition and Labor have waved through a law that will give police a new set of powers to surveil and take action against Australians suspected of committing crimes" [2].
** * ** * LaborLabor Labor '' ' ss s SurveillanceSurveillance Surveillance LegislationLegislation Legislation HistoryHistory History :: : ** * ** *
Labor opposition leader Anthony Albanese and the Labor party voted for the legislation, providing crucial bipartisan support that enabled passage with crossbench opposition [2]. **Labor's Surveillance Legislation History:** The Labor government (2007-2013) under Rudd and Gillard did NOT introduce broad hacking powers equivalent to the Identify and Disrupt Act.
TheThe The LaborLabor Labor governmentgovernment government (( ( 20072007 2007 -- - 20132013 2013 )) ) underunder under RuddRudd Rudd andand and GillardGillard Gillard diddid did NOTNOT NOT introduceintroduce introduce broadbroad broad hackinghacking hacking powerspowers powers equivalentequivalent equivalent toto to thethe the IdentifyIdentify Identify andand and DisruptDisrupt Disrupt ActAct Act .. . HoweverHowever However ,, , thethe the broaderbroader broader contextcontext context ofof of governmentgovernment government surveillancesurveillance surveillance expansionexpansion expansion showsshows shows thisthis this isis is notnot not uniqueunique unique toto to thethe the CoalitionCoalition Coalition :: :
However, the broader context of government surveillance expansion shows this is not unique to the Coalition: - In 2015, the Abbott Coalition government introduced data retention legislation (Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015) which also received bipartisan support from Labor after amendments were made [6] - The surveillance debate in Australia has been bipartisan over decades, with both major parties supporting incremental expansions of law enforcement powers - Labor opposition to the Identify and Disrupt Act was not categorical - they supported it while requesting amendments [2] **Key Distinction:** This legislation appears to represent a genuine advancement in police hacking powers compared to previous legislation.
-- - InIn In 20152015 2015 ,, , thethe the AbbottAbbott Abbott CoalitionCoalition Coalition governmentgovernment government introducedintroduced introduced datadata data retentionretention retention legislationlegislation legislation (( ( TelecommunicationsTelecommunications Telecommunications (( ( InterceptionInterception Interception andand and AccessAccess Access )) ) AmendmentAmendment Amendment (( ( DataData Data RetentionRetention Retention )) ) ActAct Act 20152015 2015 )) ) whichwhich which alsoalso also receivedreceived received bipartisanbipartisan bipartisan supportsupport support fromfrom from LaborLabor Labor afterafter after amendmentsamendments amendments werewere were mademade made [[ [ 66 6 ]] ]
The data disruption (modification/deletion) and account takeover capabilities are more intrusive than previous powers [3].
-- - TheThe The surveillancesurveillance surveillance debatedebate debate inin in AustraliaAustralia Australia hashas has beenbeen been bipartisanbipartisan bipartisan overover over decadesdecades decades ,, , withwith with bothboth both majormajor major partiesparties parties supportingsupporting supporting incrementalincremental incremental expansionsexpansions expansions ofof of lawlaw law enforcementenforcement enforcement powerspowers powers
However, the legislation's passage with bipartisan support suggests broad government acceptance of surveillance expansion, not uniquely Coalition policy.
-- - LaborLabor Labor oppositionopposition opposition toto to thethe the IdentifyIdentify Identify andand and DisruptDisrupt Disrupt ActAct Act waswas was notnot not categoricalcategorical categorical -- - theythey they supportedsupported supported itit it whilewhile while requestingrequesting requesting amendmentsamendments amendments [[ [ 22 2 ]] ]
** * ** * KeyKey Key DistinctionDistinction Distinction :: : ** * ** *
ThisThis This legislationlegislation legislation appearsappears appears toto to representrepresent represent aa a genuinegenuine genuine advancementadvancement advancement inin in policepolice police hackinghacking hacking powerspowers powers comparedcompared compared toto to previousprevious previous legislationlegislation legislation .. . TheThe The datadata data disruptiondisruption disruption (( ( modificationmodification modification // / deletiondeletion deletion )) ) andand and accountaccount account takeovertakeover takeover capabilitiescapabilities capabilities areare are moremore more intrusiveintrusive intrusive thanthan than previousprevious previous powerspowers powers [[ [ 33 3 ]] ] .. . HoweverHowever However ,, , thethe the legislationlegislation legislation '' ' ss s passagepassage passage withwith with bipartisanbipartisan bipartisan supportsupport support suggestssuggests suggests broadbroad broad governmentgovernment government acceptanceacceptance acceptance ofof of surveillancesurveillance surveillance expansionexpansion expansion ,, , notnot not uniquelyuniquely uniquely CoalitionCoalition Coalition policypolicy policy .. .
🌐

平衡觀點

** * ** * ValidValid Valid CriticismsCriticisms Criticisms :: : ** * ** *
**Valid Criticisms:** 1. **Warrant Safeguards Were Inadequate**: The 2024-2025 INSLM review found that the main safeguard (warrant approval process) was never properly implemented and warrants were being issued by untrained individuals [5].
11 1 .. . ** * ** * WarrantWarrant Warrant SafeguardsSafeguards Safeguards WereWere Were InadequateInadequate Inadequate ** * ** * :: : TheThe The 20242024 2024 -- - 20252025 2025 INSLMINSLM INSLM reviewreview review foundfound found thatthat that thethe the mainmain main safeguardsafeguard safeguard (( ( warrantwarrant warrant approvalapproval approval processprocess process )) ) waswas was nevernever never properlyproperly properly implementedimplemented implemented andand and warrantswarrants warrants werewere were beingbeing being issuedissued issued byby by untraineduntrained untrained individualsindividuals individuals [[ [ 55 5 ]] ] .. . ThisThis This validatesvalidates validates earlyearly early concernsconcerns concerns aboutabout about insufficientinsufficient insufficient safeguardssafeguards safeguards .. .
This validates early concerns about insufficient safeguards. 2. **Broad Scope of "Serious Crime"**: The definition includes minor offences unrelated to cyber-crime, meaning the powers could be used for investigation of tax evasion, whistleblowing, or financial crimes [3]. 3. **Limited Redress for Wrongful Access**: There is no power for judicial officers to order destruction of wrongfully obtained data [3], and subjects of warrants are not informed they were targeted [3]. 4. **Data Modification Enables Framing**: The ability to modify or delete data before investigation raises evidentiary concerns, including potential for planting or destroying evidence [3]. **Government/Law Enforcement Justifications:** 1. **Addressing Modern Cybercrime**: The government argued the legislation was necessary to combat "serious cyber-enabled crime" including dark web criminal activity [4].
22 2 .. . ** * ** * BroadBroad Broad ScopeScope Scope ofof of "" " SeriousSerious Serious CrimeCrime Crime "" " ** * ** * :: : TheThe The definitiondefinition definition includesincludes includes minorminor minor offencesoffences offences unrelatedunrelated unrelated toto to cybercyber cyber -- - crimecrime crime ,, , meaningmeaning meaning thethe the powerspowers powers couldcould could bebe be usedused used forfor for investigationinvestigation investigation ofof of taxtax tax evasionevasion evasion ,, , whistleblowingwhistleblowing whistleblowing ,, , oror or financialfinancial financial crimescrimes crimes [[ [ 33 3 ]] ] .. .
Law enforcement faced genuine challenges with criminals using anonymising technologies. 2. **Warrant Requirements Exist**: While thresholds are low, warrants still require judicial approval in normal circumstances [1].
33 3 .. . ** * ** * LimitedLimited Limited RedressRedress Redress forfor for WrongfulWrongful Wrongful AccessAccess Access ** * ** * :: : ThereThere There isis is nono no powerpower power forfor for judicialjudicial judicial officersofficers officers toto to orderorder order destructiondestruction destruction ofof of wrongfullywrongfully wrongfully obtainedobtained obtained datadata data [[ [ 33 3 ]] ] ,, , andand and subjectssubjects subjects ofof of warrantswarrants warrants areare are notnot not informedinformed informed theythey they werewere were targetedtargeted targeted [[ [ 33 3 ]] ] .. .
Emergency authorisation without warrants requires urgent circumstances (imminent violence/damage) [3]. 3. **Oversight Mechanisms**: The legislation includes requirements for oversight by authorising officers and retrospective judicial review of emergency authorisations [3]. 4. **Targeted at Serious Offences**: While the definition is broad, the stated purpose is targeting terrorism, drug trafficking, human trafficking, and child sexual abuse [4]. **Comparable International Context:** Similar hacking/data disruption powers have been introduced in other democracies: - The UK's Investigatory Powers Act 2016 ("Snoopers' Charter") provides law enforcement with extensive surveillance powers [comparable legislation] - The US has similar capabilities under various federal statutes, though with different oversight mechanisms **Critical Finding on Labor's Role:** The claim presentation suggests this is a "Coalition" problem, but Labor's bipartisan support is material.
44 4 .. . ** * ** * DataData Data ModificationModification Modification EnablesEnables Enables FramingFraming Framing ** * ** * :: : TheThe The abilityability ability toto to modifymodify modify oror or deletedelete delete datadata data beforebefore before investigationinvestigation investigation raisesraises raises evidentiaryevidentiary evidentiary concernsconcerns concerns ,, , includingincluding including potentialpotential potential forfor for plantingplanting planting oror or destroyingdestroying destroying evidenceevidence evidence [[ [ 33 3 ]] ] .. .
Labor requested amendments and received some, then voted with the government to pass the legislation.
** * ** * GovernmentGovernment Government // / LawLaw Law EnforcementEnforcement Enforcement JustificationsJustifications Justifications :: : ** * ** *
This makes it a cross-party policy failure (if one views it as problematic) rather than exclusively a Coalition initiative.
11 1 .. . ** * ** * AddressingAddressing Addressing ModernModern Modern CybercrimeCybercrime Cybercrime ** * ** * :: : TheThe The governmentgovernment government arguedargued argued thethe the legislationlegislation legislation waswas was necessarynecessary necessary toto to combatcombat combat "" " seriousserious serious cybercyber cyber -- - enabledenabled enabled crimecrime crime "" " includingincluding including darkdark dark webweb web criminalcriminal criminal activityactivity activity [[ [ 44 4 ]] ] .. . LawLaw Law enforcementenforcement enforcement facedfaced faced genuinegenuine genuine challengeschallenges challenges withwith with criminalscriminals criminals usingusing using anonymisinganonymising anonymising technologiestechnologies technologies .. .
The claim's framing obscures Labor's responsibility.
22 2 .. . ** * ** * WarrantWarrant Warrant RequirementsRequirements Requirements ExistExist Exist ** * ** * :: : WhileWhile While thresholdsthresholds thresholds areare are lowlow low ,, , warrantswarrants warrants stillstill still requirerequire require judicialjudicial judicial approvalapproval approval inin in normalnormal normal circumstancescircumstances circumstances [[ [ 11 1 ]] ] .. . EmergencyEmergency Emergency authorisationauthorisation authorisation withoutwithout without warrantswarrants warrants requiresrequires requires urgenturgent urgent circumstancescircumstances circumstances (( ( imminentimminent imminent violenceviolence violence // / damagedamage damage )) ) [[ [ 33 3 ]] ] .. .
33 3 .. . ** * ** * OversightOversight Oversight MechanismsMechanisms Mechanisms ** * ** * :: : TheThe The legislationlegislation legislation includesincludes includes requirementsrequirements requirements forfor for oversightoversight oversight byby by authorisingauthorising authorising officersofficers officers andand and retrospectiveretrospective retrospective judicialjudicial judicial reviewreview review ofof of emergencyemergency emergency authorisationsauthorisations authorisations [[ [ 33 3 ]] ] .. .
44 4 .. . ** * ** * TargetedTargeted Targeted atat at SeriousSerious Serious OffencesOffences Offences ** * ** * :: : WhileWhile While thethe the definitiondefinition definition isis is broadbroad broad ,, , thethe the statedstated stated purposepurpose purpose isis is targetingtargeting targeting terrorismterrorism terrorism ,, , drugdrug drug traffickingtrafficking trafficking ,, , humanhuman human traffickingtrafficking trafficking ,, , andand and childchild child sexualsexual sexual abuseabuse abuse [[ [ 44 4 ]] ] .. .
** * ** * ComparableComparable Comparable InternationalInternational International ContextContext Context :: : ** * ** *
SimilarSimilar Similar hackinghacking hacking // / datadata data disruptiondisruption disruption powerspowers powers havehave have beenbeen been introducedintroduced introduced inin in otherother other democraciesdemocracies democracies :: :
-- - TheThe The UKUK UK '' ' ss s InvestigatoryInvestigatory Investigatory PowersPowers Powers ActAct Act 20162016 2016 (( ( "" " SnoopersSnoopers Snoopers '' ' CharterCharter Charter "" " )) ) providesprovides provides lawlaw law enforcementenforcement enforcement withwith with extensiveextensive extensive surveillancesurveillance surveillance powerspowers powers [[ [ comparablecomparable comparable legislationlegislation legislation ]] ]
-- - TheThe The USUS US hashas has similarsimilar similar capabilitiescapabilities capabilities underunder under variousvarious various federalfederal federal statutesstatutes statutes ,, , thoughthough though withwith with differentdifferent different oversightoversight oversight mechanismsmechanisms mechanisms
** * ** * CriticalCritical Critical FindingFinding Finding onon on LaborLabor Labor '' ' ss s RoleRole Role :: : ** * ** *
TheThe The claimclaim claim presentationpresentation presentation suggestssuggests suggests thisthis this isis is aa a "" " CoalitionCoalition Coalition "" " problemproblem problem ,, , butbut but LaborLabor Labor '' ' ss s bipartisanbipartisan bipartisan supportsupport support isis is materialmaterial material .. . LaborLabor Labor requestedrequested requested amendmentsamendments amendments andand and receivedreceived received somesome some ,, , thenthen then votedvoted voted withwith with thethe the governmentgovernment government toto to passpass pass thethe the legislationlegislation legislation .. . ThisThis This makesmakes makes itit it aa a crosscross cross -- - partyparty party policypolicy policy failurefailure failure (( ( ifif if oneone one viewsviews views itit it asas as problematicproblematic problematic )) ) ratherrather rather thanthan than exclusivelyexclusively exclusively aa a CoalitionCoalition Coalition initiativeinitiative initiative .. . TheThe The claimclaim claim '' ' ss s framingframing framing obscuresobscures obscures LaborLabor Labor '' ' ss s responsibilityresponsibility responsibility .. .

部分真實

6.0

/ 10

TheThe The legislationlegislation legislation doesdoes does introduceintroduce introduce newnew new policepolice police powerspowers powers toto to accessaccess access ,, , modifymodify modify ,, , andand and deletedelete delete datadata data onon on devicesdevices devices andand and taketake take overover over accountsaccounts accounts .. . HoweverHowever However ,, , thethe the claimclaim claim makesmakes makes severalseveral several misleadingmisleading misleading statementsstatements statements :: :
The legislation does introduce new police powers to access, modify, and delete data on devices and take over accounts.
11 1 .. . ** * ** * "" " WithoutWithout Without aa a warrantwarrant warrant "" " ** * ** * -- - MisleadingMisleading Misleading .. . WarrantsWarrants Warrants areare are normallynormally normally requiredrequired required ,, , issuedissued issued byby by judicialjudicial judicial officersofficers officers ,, , thoughthough though thethe the thresholdthreshold threshold (( ( "" " reasonablereasonable reasonable suspicionsuspicion suspicion "" " )) ) isis is lowlow low .. . OnlyOnly Only emergencyemergency emergency authorisationauthorisation authorisation (( ( imminentimminent imminent violenceviolence violence // / damagedamage damage )) ) cancan can occuroccur occur withoutwithout without aa a warrantwarrant warrant .. .
However, the claim makes several misleading statements: 1. **"Without a warrant"** - Misleading.
22 2 .. . ** * ** * "" " NoNo No warrantwarrant warrant eveneven even ifif if notnot not suspectedsuspected suspected ofof of crimecrime crime "" " ** * ** * -- - MisleadingMisleading Misleading .. . WhileWhile While thethe the powerpower power appliesapplies applies broadlybroadly broadly viavia via looseloose loose definitionsdefinitions definitions ofof of "" " seriousserious serious crimecrime crime ,, , "" " youyou you mustmust must stillstill still bebe be subjectsubject subject toto to reasonablereasonable reasonable suspicionsuspicion suspicion ,, , notnot not zerozero zero suspicionsuspicion suspicion .. .
Warrants are normally required, issued by judicial officers, though the threshold ("reasonable suspicion") is low.
33 3 .. . ** * ** * "" " ReviewedReviewed Reviewed byby by intelligenceintelligence intelligence groupsgroups groups butbut but nono no privacyprivacy privacy advocatesadvocates advocates "" " ** * ** * -- - IncompleteIncomplete Incomplete .. . ParliamentaryParliamentary Parliamentary committeescommittees committees (( ( withwith with humanhuman human rightsrights rights scrutinyscrutiny scrutiny )) ) reviewedreviewed reviewed itit it ,, , andand and civilcivil civil societysociety society organisationsorganisations organisations mademade made submissionssubmissions submissions .. . TheThe The claimclaim claim omitsomits omits thisthis this .. .
Only emergency authorisation (imminent violence/damage) can occur without a warrant. 2. **"No warrant even if not suspected of crime"** - Misleading.
44 4 .. . ** * ** * "" " GovernmentGovernment Government '' ' ss s ownown own reviewreview review intointo into hackinghacking hacking powerspowers powers "" " ** * ** * -- - UnverifiedUnverified Unverified .. . TheThe The INSLMINSLM INSLM reviewreview review thatthat that foundfound found problemsproblems problems occurredoccurred occurred afterafter after passagepassage passage inin in 20242024 2024 -- - 20252025 2025 ,, , notnot not beforebefore before .. . II I cannotcannot cannot findfind find evidenceevidence evidence ofof of aa a prepre pre -- - legislationlegislation legislation governmentgovernment government reviewreview review thatthat that opposedopposed opposed thethe the billbill bill .. .
While the power applies broadly via loose definitions of "serious crime," you must still be subject to reasonable suspicion, not zero suspicion. 3. **"Reviewed by intelligence groups but no privacy advocates"** - Incomplete.
55 5 .. . ** * ** * OmitsOmits Omits LaborLabor Labor SupportSupport Support ** * ** * -- - CriticalCritical Critical omissionomission omission .. . LaborLabor Labor votedvoted voted forfor for thethe the legislationlegislation legislation ,, , providingproviding providing bipartisanbipartisan bipartisan supportsupport support .. . TheThe The claimclaim claim framesframes frames thisthis this asas as purelypurely purely CoalitionCoalition Coalition responsibilityresponsibility responsibility .. .
Parliamentary committees (with human rights scrutiny) reviewed it, and civil society organisations made submissions.
TheThe The corecore core powerspowers powers describeddescribed described (( ( datadata data disruptiondisruption disruption ,, , accountaccount account takeovertakeover takeover ,, , networknetwork network activityactivity activity surveillancesurveillance surveillance )) ) areare are realreal real andand and werewere were substantivelysubstantively substantively concerningconcerning concerning toto to legallegal legal expertsexperts experts andand and civilcivil civil rightsrights rights organisationsorganisations organisations .. . TheThe The implementationimplementation implementation problemsproblems problems identifiedidentified identified byby by thethe the INSLMINSLM INSLM reviewreview review inin in 20242024 2024 -- - 20252025 2025 validatevalidate validate earlyearly early concernsconcerns concerns .. . HoweverHowever However ,, , thethe the specificspecific specific claimsclaims claims aboutabout about warrantlesswarrantless warrantless surveillancesurveillance surveillance "" " withoutwithout without suspicionsuspicion suspicion "" " areare are overstatedoverstated overstated ,, , andand and thethe the omissionomission omission ofof of LaborLabor Labor '' ' ss s bipartisanbipartisan bipartisan supportsupport support isis is aa a significantsignificant significant framingframing framing problemproblem problem .. .
The claim omits this. 4. **"Government's own review into hacking powers"** - Unverified.

📚 來源與引用 (10)

  1. 1
    Surveillance Legislation Amendment (Identify and Disrupt) Act 2021

    Surveillance Legislation Amendment (Identify and Disrupt) Act 2021

    Home Affairs brings together Australia's federal law enforcement, national and transport security, criminal justice, emergency management, multicultural affairs, settlement services and immigration and border-related functions, working together to keep Australia safe.

    Department of Home Affairs Website
  2. 2
    Tick and flick: Coalition and Labor give police even more hacking powers

    Tick and flick: Coalition and Labor give police even more hacking powers

    A law giving police new powers to surveil and take action against Australians suspected of committing crimes has been waved through.

    Crikey
  3. 3
    Australian Federal Government introduces "absurd" police powers

    Australian Federal Government introduces "absurd" police powers

    Over the last couple of weeks, you may have noticed a swarm of articles discussing the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2021, which blitzed through both Federal Houses of Parliament in under 24 hours and was passed on 25 August 2021. It received Royal Assent on 3 Septem

    Voice Lawyers
  4. 4
    mals.au

    Identify and Disrupt Act - Melbourne Activist Legal Support

    Mals

  5. 5
    innovationaus.com

    Hacking powers handed out without safeguard, review finds

    Innovationaus

  6. 6
    inslm.gov.au

    Identify, takeover and disrupt - special powers of the AFP and ACIC

    Inslm Gov

  7. 7
    digitalrightswatch.org.au

    Australia's new mass surveillance mandate

    Digitalrightswatch Org

  8. 8
    PDF

    Data_retention_PLBIR_final

    Austlii Edu • PDF Document
  9. 9
    New laws extend police power to hack suspects' personal computers

    New laws extend police power to hack suspects' personal computers

    Police power has been extended, allowing the AFP and ACIC to take control of a person’s online accounts and add, copy, delete or alter data.

    Stacks Law Firm
  10. 10
    Surveillance state incoming with Australia's "hacking" bill

    Surveillance state incoming with Australia's "hacking" bill

    Australia’s new “hacking” bill violates privacy and security, and is bound to have global implications.

    Access Now

評分量表方法論

1-3: 虛假

事實不正確或惡意捏造。

4-6: 部分

有部分真實性,但缺乏或扭曲了背景。

7-9: 大致屬實

微小的技術性問題或措辭問題。

10: 準確

完美驗證且在情境上公正。

方法論: 評分通過交叉比對官方政府記錄、獨立事實查核組織和原始來源文件來確定。