Repression of Lafarge factory sabotage

2022 - ?
Contents

On June 5, 2023, about fifteen people were raided and arrested in France, accused of participating in the December 2022 sabotage of a factory of the French industrial company Lafarge[1]. The sabotage, which took place during the day and involved between 100 and 200 activists[2], caused around 6 million euros of damage.

On June 20, 2023, about eighteen more people were raided and arrested in France, some of them in connection with the Lafarge sabotage[3].

Techniques used

NameDescription
House raid

Among the initial house raids, one was particularly thorough: cops searched under mattresses, behind sofa covers and in every drawer of every piece of furniture, inspected every book, notebook and piece of clothing as well as the dishes, and emptied packages of pasta and sealed jars[1].

Open-source intelligence

Investigators collected metadata from photos of the action posted online, including the name and serial number of a camera[4]. This helped them identify a person they accused of taking the photos.

Service provider collaboration

Investigators gave the serial number of a camera to the camera manufacturer, and the manufacturer gave them the name of the store where the camera was sold[4]. This helped investigators identify a person they accused of taking photos with the camera.

Targeted digital surveillance
Authentication bypass

Investigators recovered several encrypted smartphones in the raids and attempted to access their encrypted data, with varying results depending on the phone[4]:

  • For the iPhones that were recovered turned on, they exploited the security vulnerabilities that exist when they are turned on to bypass their encryption and access the encrypted data.
  • For all Android phones (whether recovered on or off) and one iPhone recovered off, they extracted the phones' encrypted partitions and attempted to brute force them from a computer.
Malware

According to the case files, investigators made five requests to remotely install spyware[4]. Of these, one installation was successful (on an iPhone SE 2020) and provided access to a Signal group conversation.

Forensics
DNA

In one of the initial raids, police insisted that those arrested wear surgical masks to protect against Covid: the masks were later taken for DNA collection[5]. One person who refused to wear a mask had their underwear confiscated while in police custody, presumably for DNA collection[4].

Mass surveillance
Video surveillance

Immediately after the action, investigators requested CCTV footage from public transportation (buses, train stations, etc.), businesses, home surveillance systems, and municipal cameras, all within an extended perimeter of the action site[4]. In particular, footage of the interiors of buses appears to have helped identify people traveling to and from the action site[5]. Investigators also requested footage from highway toll booths, presumably to identify the occupants of known cars traveling on highways to or from the action site.