On March 30, 2012, the owner of a 2006 Nissan pickup truck contacted the Woodland Police Department to report the vehicle stolen. Woodland Police completed a stolen vehicle report and had the Nissan’s information entered into the state and federal crime computers. This routine police action automatically activated the LoJack transponder concealed within the pickup

Read More

The owners of a 1999 Ford Explorer discovered their vehicle had been stolen and immediately contacted the Los Angeles Police Department’s Newton Division. The responding officer completed a stolen vehicle report had the Ford’s information entered into the California and federal crime computer systems. This police action automatically and seamlessly activated the LoJack transponder concealed

Read More

The owner of a 2002 Subaru Impreza contacted the Arapahoe County Sheriff’s Office to report their vehicle stolen. The responding officer completed a vehicle theft report and had all of the Subaru’s information entered into the state and federal police computer systems. This routine action automatically activated the LoJack transponder concealed in the vehicle. During

Read More

On March 27, 2012, the owner of a 2002 Chevrolet Silverado pickup truck reported his vehicle stolen to the Round Rock Police Department. The responding officer prepared a stolen vehicle report and had the Chevrolet’s information entered into the state and federal crime computer systems – a routine police action that automatically activated the LoJack

Read More

On February 24, 2012, an automotive dealership in Alexandria, Virginia discovered that one of their customers paid for a 2008 Maserati Gran Turismo with a fraudulent check and identification.  Unfortunately, the dealership didn’t realize the fraudulent activity until after the vehicle was transported to California at the request of the “customer.”  They reported this incident

Read More

After law enforcement was notified that a 2007 Multiquip Light Tower was stolen from its owner, they entered the theft into the National Crime Information Center (NCIC) computers.  This routine action automatically activated the LoJack System covertly installed on the Light Tower.  Just 15 minutes after the Light Tower was reported stolen and entered into

Read More