The core claim is **TRUE** - the Department of Home Affairs did receive an exemption from Commonwealth procurement rules requiring disclosure of the facial recognition vendor.
In a May 2, 2018 parliamentary hearing before the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Assistant Secretary of Identity Security Andrew Rice explicitly confirmed: "We received an exemption under the Commonwealth procurement rules to not publish the identity, the name of the vendor that's providing the facial recognition service" [1].
The FIS enlivens significantly a threat to assumed identities, so that's security and law enforcement covert operatives and witnesses under protection" [1].
He explained that since different facial recognition vendors use different algorithms, naming the vendor could provide attackers with information to exploit vulnerabilities in that specific system [1].
Senator Jenny McAllister at the parliamentary hearing explicitly raised this concern, stating "the government is required to make public figures of accuracy, as one example" [1].
The Department of Home Affairs' response was carefully qualified: "There may be mechanisms for the government to ensure itself of that without it necessarily being made public" [1].
The Face Identification Service (FIS) is a probabilistic matching system (not artificial intelligence-driven absolute identification) that produces probability scores (e.g., 98 percent certainty matches) [1].
The system was designed to supplement, not replace, manual verification by trained facial recognition specialists [1].
缺失的脈絡
該主張 gāi zhǔ zhāng 遺漏 yí lòu 了 le 若干 ruò gān 重要 zhòng yào 的 de 背景 bèi jǐng 因素 yīn sù : :
The claim omits several important contextual factors:
1. **Existing facial recognition infrastructure**: Facial recognition systems had already existed within Australia's government for over a decade.
The new system was primarily consolidating and automating processes that were already happening manually.
2. **Legitimate security rationale**: The exemption was not arbitrary.
The government noted that "covert operatives and witnesses under protection" could be identified or endangered if the vendor's system vulnerabilities were known [1].
This is a recognized cybersecurity principle - protecting sensitive infrastructure from disclosure.
3. **Comparative context - Labor government support**: Critically, this was **not a uniquely Coalition policy**.
Victorian Labor Premier Daniel Andrews (heading a Labor government) told COAG in October 2017: "State and territory motor vehicle and driver's licensing agencies have been manually providing this information for a very long time.
In my judgement, it would be unforgiveable to not make changes like that when the technology is available, the competence, the know-how, and safeguards are available to effect that change" [2].
Labor states unanimously approved this system at COAG.
4. **Parliamentary oversight structure**: While vendor secrecy was maintained, the system included parliamentary oversight mechanisms.
Consultation with the Information Commissioner and Human Rights Commissioner was also required [3].
5. **Data minimization principles**: The system only stores transaction audit data, not facial images.
工黨 gōng dǎng 執政 zhí zhèng 的 de 各州 gè zhōu 在 zài COAG COAG 一致 yí zhì 批准 pī zhǔn 了 le 此系統 cǐ xì tǒng 。 。
Images are stored separately in federated databases (passports, visas, driver licenses) controlled by different agencies [1].
The "hub" system does not store personal information - it only routes matching requests [3].
6. **Public concern**: A Roy Morgan poll conducted in October 2017 found 67.5 percent of Australians were unconcerned by the proposed facial recognition system, with younger respondents showing the most concern (but still not a majority within any age bracket) [3].
This is a credible source [1][2][3].
**The claim's secondary reference to "security through obscurity"** (Wikipedia link) is philosophically relevant but not a primary factual source.
Security through obscurity is a recognized infosecurity concept meaning that keeping system details secret should not substitute for genuine security hardening.
However, the government's position here involves both obscurity (vendor secrecy) AND substantive security architecture (federated storage, hub-and-spoke model, no centralized data storage) [1].
**Did Labor do something similar?**
The facial recognition system was **jointly approved by Coalition and Labor governments**.
* * * *
At the October 2017 COAG meeting, all state and territory leaders (both Labor and Coalition-governed states) **unanimously approved** the proposal [2].
Specifically, Labor Premier Daniel Andrews of Victoria was one of the strongest advocates, telling COAG: "In my judgement, it would be unforgiveable to not make changes like that when the technology is available" [2].
Under Labor governments since 2022 (after this system was deployed during Coalition governance), the facial recognition system has continued to operate without major changes or legislative reversals, indicating acceptance of the basic framework.
**The government's position**: The Department of Home Affairs argued that vendor non-disclosure was a legitimate security measure - similar to not publicly disclosing cybersecurity vulnerabilities in critical infrastructure.
They presented this as protecting law enforcement operations, not as "security through obscurity" in the pejorative sense.
政府 zhèng fǔ 實施 shí shī 了 le 額外 é wài 的 de 保障 bǎo zhàng 措施 cuò shī , , 包括 bāo kuò 議會 yì huì 監督 jiān dū 、 、 資訊 zī xùn 專員諮詢 zhuān yuán zī xún , , 以及 yǐ jí 聯邦式 lián bāng shì 而 ér 非 fēi 集中式 jí zhōng shì 的 de 資料 zī liào 儲存 chǔ cún [ [ 1 1 ] ] 。 。
The government implemented additional safeguards including parliamentary oversight, Information Commissioner consultation, and federated rather than centralized data storage [1].
**Legitimate criticisms**: Senator Jenny McAllister raised valid privacy concerns at the parliamentary hearing, specifically about the lack of public accuracy reporting.
* * * * 合理 hé lǐ 的 de 批評 pī píng * * * * : : 參議員 cān yì yuán Jenny Jenny McAllister McAllister 在 zài 議會 yì huì 聽 tīng 證會 zhèng huì 上 shàng 提出 tí chū 了 le 合理 hé lǐ 的 de 隱私 yǐn sī 疑慮 yí lǜ , , 特別 tè bié 是關 shì guān 於 yú 缺乏 quē fá 公開準 gōng kāi zhǔn 確度 què dù 報告 bào gào 的 de 問題 wèn tí 。 。
The claim that accuracy figures are not published is factually accurate [1].
關於準 guān yú zhǔn 確度 què dù 數據 shù jù 未公開 wèi gōng kāi 的 de 主張 zhǔ zhāng 屬事實 shǔ shì shí 準確 zhǔn què [ [ 1 1 ] ] 。 。
There is a genuine tension between operational security (protecting system design from adversaries) and democratic transparency (allowing public scrutiny of system performance).
**The "security through obscurity" framing**: The term "security through obscurity" carries a negative connotation in cybersecurity, suggesting reliance on secrecy instead of genuine security measures.
However, in this case, the system combined obscurity (vendor secrecy) with multiple security layers:
- Hub-and-spoke architecture (no centralized data storage) [1]
- Federated queries to existing agency databases [1]
- Probabilistic matching requiring human verification [1]
- Annual parliamentary reporting [3]
- Information Commissioner consultation [3]
This differs from pure security-through-obscurity approaches that lack substantive technical safeguards.
**Accuracy reporting gap**: The genuine issue here is that accuracy metrics were not disclosed publicly.
The COAG unanimous approval indicates this was not a controversial partisan matter at the time, but rather a consensus view among law enforcement and security agencies across Australia that facial recognition capabilities could modernize identity verification while maintaining appropriate safeguards.
However, the characterization as primarily a "corruption" or "security through obscurity" issue significantly misrepresents the policy context.
該系統 gāi xì tǒng 的 de 基礎 jī chǔ 包括 bāo kuò : :
The system was based on:
- Legitimate law enforcement modernization needs (automating 7+ day manual processes)
- Bipartisan support from Labor and Coalition governments
- Substantive security architecture beyond just "obscurity"
- Parliamentary oversight mechanisms
The valid criticism is the lack of public accuracy reporting, which represents an accountability gap.
However, the characterization as primarily a "corruption" or "security through obscurity" issue significantly misrepresents the policy context.
該系統 gāi xì tǒng 的 de 基礎 jī chǔ 包括 bāo kuò : :
The system was based on:
- Legitimate law enforcement modernization needs (automating 7+ day manual processes)
- Bipartisan support from Labor and Coalition governments
- Substantive security architecture beyond just "obscurity"
- Parliamentary oversight mechanisms
The valid criticism is the lack of public accuracy reporting, which represents an accountability gap.