PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Luxembourg secret service using Hacking Team spyware – Prime Minister

Posted on July 8, 2015June 26, 2025 by Dissent

Add Luxembourg to the list of governments now facing questions from the press and citizenry about its use of Hacking Team products.  The Luxemburger Wort reports:

…. However, while the documents made available online by hackers showed the Luxembourg tax authority as a customer, Bettel said that it was the secret service that had made the purchase under the previous government.

Documents obtained by the “Luxemburger Wort” list a Remote Control System with the name Falcon, bought for 190,000 euros, with annual maintenance bills of 38,000 euros. The latest bill was for the period from June 1, 2014 until the end of May this year.

Contacted by the “Luxemburger Wort”, the Prime Minister’s office said that the tool was still being used by the SREL, but not “permanently” and only in selected and individual cases.

They’re probably not too happy that Hacking Team reportedly did not contact them to notify them about the hack and data leak:

The Luxembourg secret service has contacted Hacking Team after the company failed to inform the government about the hacker attack and the subsequent data leaks.

The government did not comment on the possibility to claim damages.

Read more on Luxemburger Wort. A Hacking Team spokesperson had said that the firm had sent out a blast to all customers advising them to stop using their products, so it’s not clear to me what the secret service is claiming about the lack of notification. Did the Hacking Team notify them or did they notify the tax authority, which they show as their client?

And what does it mean that the RCS “Falcon” system records leaked online indicated it was purchased by the tax authority when it was being used by the secret service? Did Hacking Team know that about that use? Did they vet that use as per their ethics policy?

No related posts.

Category: BreachesNon-U.S.Surveillance

Post navigation

← FBI seized child porn website with 215,000 users – court filing
Quinlan revisited: employees who steal personnel records may not necessarily be fired, but at least they may be prosecuted →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.

RSS Recent Posts at DataBreaches.net

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
©2025 PogoWasRight.org. All rights reserved.