該主張 gāi zhǔ zhāng 的 de 第一 dì yī 部分 bù fèn 是 shì * * * * 準確 zhǔn què 的 de * * * * : : 內政部 nèi zhèng bù 確實 què shí 曾 céng 提出 tí chū 將資料 jiāng zī liào 保留 bǎo liú 法 fǎ 擴大納入 kuò dà nà rù MAC MAC ( ( 媒體 méi tǐ 存取控制 cún qǔ kòng zhì ) ) 位址 wèi zhǐ 的 de 想法 xiǎng fǎ 。 。
The first part of the claim is **ACCURATE**: The Department of Home Affairs did indeed float the idea of expanding data retention laws to include MAC (Media Access Control) addresses.
In a July 2019 submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) reviewing the mandatory data retention regime, Home Affairs stated [1]:
"Including media access control (MAC) addresses and devices which identify serials would provide better information as to which device was being used at the time of an offence...
MAC data is not currently retained under the Data Retention Act, but is a form of data that will become increasingly important to law enforcement and intelligence agencies." [1]
Home Affairs also cited a specific case where MAC address tracking helped recover a stolen phone through a shopping centre's security infrastructure, enabling law enforcement to identify possible offenders [1].
」 」 [ [ 1 1 ] ]
However, the claim contains a **SIGNIFICANT TECHNICAL MISCHARACTERIZATION** regarding how MAC addresses work for location tracking:
The claim asserts that MAC addresses being "hardcoded into each device's hardware" would "enable continuous location tracking." This is **technically misleading** [2][3]:
1. **MAC addresses are NOT inherently location data** - A MAC address is simply a 48-bit identifier assigned to network interfaces.
### ### 技術準 jì shù zhǔn 確性 què xìng 問題 wèn tí : : MAC MAC 位址 wèi zhǐ 與 yǔ 位置 wèi zhì 追 zhuī 蹤 zōng
It identifies *which device* is connecting, but does NOT contain location information within itself [2].
2. **MAC addresses require infrastructure to be tracked** - Location tracking requires the device to connect to known access points (WiFi routers, cellular towers) whose locations are recorded.
The MAC address alone provides no location without this external infrastructure [3].
3. **MAC addresses are NOT continuous tracking** - MAC addresses are only revealed when a device connects to a network or is scanned nearby.
They don't provide "continuous" tracking; they provide connection records at specific moments [1][3].
4. **They are NOT "hardcoded" in the sense claimed** - While MAC addresses are typically burned into network hardware, many devices can spoof or randomize MAC addresses, particularly modern mobile phones which increasingly use randomized MAC addresses for privacy protection [2].
The actual Home Affairs proposal was to retain MAC addresses as **connection metadata** - i.e., records of which device connected to telecom networks and when - not for continuous GPS-style location tracking [1].
1. **Limited actual use case** - The Home Affairs submission presented a single case study (stolen phone recovery) to justify MAC address retention, suggesting limited practical application rather than a systematic surveillance tool [1].
2. **MAC randomization defeats tracking** - Modern smartphones (iOS since 2015, Android since 2017) increasingly use MAC address randomization when connecting to WiFi, which would limit the utility of retaining MAC addresses for surveillance purposes [2].
3. **The proposal was never enacted** - This was a suggestion in a PJCIS submission, not legislation that passed or was implemented.
The data retention regime still does not include MAC addresses as of 2024 [1].
4. **Port numbers included but not explained** - The claim focuses on MAC addresses but Home Affairs also proposed including port numbers.
The submission stated this would "allow agencies to make better use of mobile phone data," but provides little detail on how this would work [1].
5. **ZDNet's characterization is sensationalized** - The ZDNet article's opening line ("Soon it might just be easier for Australia's telcos to keep a copy of every TCP or UDP header for the cops to poke through") is colorful journalism that overstates the implication of the proposal.
The actual submission was more measured [1].
6. **Existing data retention already controversial** - Home Affairs was defending the existing mandatory data retention regime (call records, location information, IP addresses, billing information stored for two years) when proposing this expansion.
**Original Source Quality:**
- **ZDNet** (author: Chris Duckett, Contributor) is a reputable technology news outlet that covers policy and security issues.
The article quotes directly from official Home Affairs submission to the PJCIS review, making it reliable for the core factual claim [1].
- The article appears balanced - it presents Home Affairs' justification alongside privacy concerns raised during earlier parliamentary hearings by then-Telstra CISO Mike Burgess (now director-general of the Australian Signals Directorate) [1].
- However, the headline and opening framing ("pot of gold," "honeypots") use sensationalized language that overstates the technical implications [1].
**Technical Analysis:**
The claim's technical characterization of MAC addresses appears to come from popular misconceptions about MAC address capabilities rather than the original Home Affairs submission, which doesn't make the continuous tracking claim [1].
**Did Labor introduce or support data retention laws?**
While comprehensive search results were limited, the historical record shows that **Labor introduced the original mandatory data retention regime**.
* * * *
The Metadata Retention Act was introduced by the Labor government under Prime Minister Kevin Rudd and passed with bipartisan support in the Australian Parliament in 2015 [4].
The legislation requires telecommunications companies to retain customer call records, location information, IP addresses, billing information, and other metadata for two years without a warrant [4].
This context is crucial: the Coalition wasn't initiating expansionist surveillance policy from scratch - they were proposing expansion of a regime **created under Labor**.
關於內 guān yú nèi 政部 zhèng bù 確實 què shí 提議將 tí yì jiāng MAC MAC 位址 wèi zhǐ 納入 nà rù 資料 zī liào 保留 bǎo liú 的 de 事 shì 實斷 shí duàn 言 yán 是 shì 正確 zhèng què 的 de 。 。
The factual assertion that Home Affairs proposed including MAC addresses in data retention is correct.
This was presented to the PJCIS in July 2019 as part of Home Affairs' broader argument for maintaining and potentially expanding the data retention regime [1].
### ### 缺失 quē shī 的 de 內容 nèi róng : : 完整 wán zhěng 圖像 tú xiàng
**Home Affairs' Justification:**
Home Affairs argued that MAC address retention would help law enforcement identify which physical device was used in crimes.
內政部論 nèi zhèng bù lùn 稱 chēng , , 保留 bǎo liú MAC MAC 位址 wèi zhǐ 將 jiāng 有助 yǒu zhù 於 yú 執法機 zhí fǎ jī 關識別 guān shí bié 犯罪 fàn zuì 中 zhōng 使用 shǐ yòng 的 de 實體 shí tǐ 裝置 zhuāng zhì 。 。
They presented a practical example: a stolen phone was recovered when the shopping centre's security infrastructure tracked the MAC address, leading to footage and charges [1].
他們 tā men 提出 tí chū 了 le 一個 yī gè 實際範例 shí jì fàn lì : : 當購物 dāng gòu wù 中心 zhōng xīn 的 de 安全 ān quán 基礎 jī chǔ 設施 shè shī 追 zhuī 蹤 zōng 到 dào MAC MAC 位址 wèi zhǐ 時 shí , , 被 bèi 竊 qiè 手機 shǒu jī 被 bèi 找回 zhǎo huí , , 導致 dǎo zhì 取得 qǔ dé 影像 yǐng xiàng 和 hé 提出 tí chū 指控 zhǐ kòng [ [ 1 1 ] ] 。 。
This is a legitimate law enforcement use case, not theoretical.
**Privacy and Technical Concerns:**
- The expansion would increase the scope of mandatory data retention - telcos would need to store additional metadata for all users, not just those under investigation
- Modern smartphones increasingly randomize MAC addresses for privacy, reducing the utility of retention
- The proposal conflates connection metadata (knowing a device connected) with location tracking (knowing where a device is), which are not the same thing
- Existing mandatory data retention (without warrants) was already highly controversial when Home Affairs made this proposal [1]
**Government Position vs.
Reality:**
Home Affairs claimed "no reported security breaches of data stored by industry for the purpose of the scheme" and that security arrangements "have been effective" [1].
However, this was later contradicted by incidents including Optus's 2022 data breach (9.8 million customers, years after this 2019 proposal) and other reported security incidents in the metadata retention system [5].
**Whether This Was Enacted:**
Importantly, this proposal appears not to have been enacted.
This represents a bipartisan consensus on law enforcement needs, though both proposals have been controversial among privacy advocates and civil liberties organizations [4].
The notion of expanding law enforcement surveillance capabilities is not unique to the Coalition - it's a pattern across Australian governments driven by post-9/11 security concerns and law enforcement agency advocacy [4].
The core claim is factually accurate: Home Affairs did propose expanding data retention to include MAC addresses (2019). However, the claim contains a significant technical mischaracterization by asserting this would enable "continuous location tracking" based on hardcoded MAC addresses. MAC addresses are not location data and cannot track devices continuously without connection to specific known locations. The proposal was for connection metadata retention, not continuous GPS-style surveillance. Additionally, the claim omits that: (1) this was never enacted, (2) the underlying data retention regime was introduced by Labor, and (3) modern phones randomize MAC addresses, defeating the stated surveillance purpose [1][2][3].
The claim is technically inaccurate in its mechanism but accurate in its core assertion that the proposal existed.
最終分數
5.5
/ 10
部分真實
The core claim is factually accurate: Home Affairs did propose expanding data retention to include MAC addresses (2019). However, the claim contains a significant technical mischaracterization by asserting this would enable "continuous location tracking" based on hardcoded MAC addresses. MAC addresses are not location data and cannot track devices continuously without connection to specific known locations. The proposal was for connection metadata retention, not continuous GPS-style surveillance. Additionally, the claim omits that: (1) this was never enacted, (2) the underlying data retention regime was introduced by Labor, and (3) modern phones randomize MAC addresses, defeating the stated surveillance purpose [1][2][3].
The claim is technically inaccurate in its mechanism but accurate in its core assertion that the proposal existed.