Loading...

(Just one moment)

Threat Library: Case against Louna, France

On the night of May 4 to May 5, 2024, an excavator was set on fire at the construction site of a highway project.[1] On October 12, 2024, Louna was arrested and accused of setting the excavator on fire. Several other people were arrested and released soon after.

CCTV footage from the arson site showed two people setting fire to the excavator, and one of them burning themselves accidentally. In the hours following the arson, Louna was brought by car to a nearby hospital, where she was admitted for burns allegedly compatible with those visibly suffered by the person who burned themselves in the footage.

After her arrest, Louna was detained in isolation for four months — she was in isolation because she was in a men’s prison despite being a (trans) woman.[2] After her arrest, she claimed responsibility for the degradations against the excavator. She is currently under judicial supervision pending trial.

Techniques used

NameDescription
OtherInvestigators used the collaboration of the hospital to: Learn that a person (Louna) was hospitalized for burns.[3] Obtain Louna’s medical file. Seize Louna’s clothing while she was hospitalized.[1] Obtain the phone number of someone close to Louna that Louna had given to the hospital. Obtain CCTV footage from the hospital. Obtain information from the hospital’s parking payment system. Learn the time and place of an appointment Louna had at the hospital a few days after the arson. Investigators also used the collaboration of several State institutions: The Agence nationale des titres sécurisés (ANTS, National agency for secured documents) provided scans of identity documents and applications for renewal of identity documents. Health insurance organizations provided the personal information of people under investigation and their partners. The tax authorities provided the purchase and sale files of houses of Louna’s parents and grandparents. Investigators used the collaboration of several companies: Banks provided: Bank information of several people, including many members of Louna’s family. IP addresses used to make online bank transfers. Locations where people had withdrawn cash. An insurance company provided a person’s address and list of roommates. The highway operator Vinci provided CCTV footage of highway toll booths. The French national railway company (SNCF) provided information about people who had booked seats next to people under investigation, including their photos and bank information. The carpooling service BlaBlaCar provided information about people who had used the service, including their photos, bank information, and the trips they had taken. The car manufacturer Stellantis provided the IMSI[5] and IMEI[6] numbers of a car’s embedded location system. However, investigators were unable to locate the car because, for some unknown reason, it did not transmit its location. Investigators asked a social housing landlord and a real estate agency to provide them with access cards to apartment buildings.

1.https://soutienlouna.noblogs.org/post/2025/01/23/free-louna-des-nouvelles-de-laffaire-de-louna-meuf-trans-anar-incarceree-dans-le-cadre-de-la-lutte-contre-la69

2.https://soutienlouna.noblogs.org/post/2025/02/17/louna-est-sortie-de-prison-mais-nest-toujours-pas-libre

3.Private source.

4.https://en.wikipedia.org/wiki/Gas_detector

5.An International Mobile Subscriber Identity (IMSI) number is a number that uniquely identifies a SIM card.

6.An International Mobile Equipment Identity (IMEI) number is a number that uniquely identifies a phone.

Found on: Act for Freedom Now!

From Threat Library – Repressive Operations