On March 22, 2012, the owner of a 1997 Chevrolet Silverado pickup truck contacted the Fresno Police Department to report the vehicle stolen. The responding officer prepared a stolen vehicle report and had the Chevrolet’s information entered into the federal and state crime computers. This routine police procedure automatically activated the LoJack transponder concealed in

Read More

On March 22, 2012, the owner of a 1997 Chevrolet Silverado pickup truck contacted the Fresno Police Department to report the vehicle stolen. The responding officer prepared a stolen vehicle report and had the Chevrolet’s information entered into the federal and state crime computers. This routine police procedure automatically activated the LoJack transponder concealed in

Read More

On February 27, 2012, the parents of a 14-year old reported to the Gwinnett County Police Department that their son had run away from home and had taken their Tahoe from the garage without permission. At the time of the theft report, the owners were unaware that a LoJack unit had been installed in the

Read More

On February 27, 2012, the parents of a 14-year old reported to the Gwinnett County Police Department that their son had run away from home and had taken their Tahoe from the garage without permission. At the time of the theft report, the owners were unaware that a LoJack unit had been installed in the

Read More

When the owners of a 1998 Honda Civic discovered that their vehicle had been stolen on January 17, 2012, they immediately reported the theft to the San Diego Police Department.  It was the police department’s routine entry of the Civic’s information into the nationwide law enforcement stolen vehicle computer system that automatically activated the LoJack

Read More

On the morning of January 22, 2012, the owners of a 2008 Nissan Altima discovered their vehicle missing and immediately contacted the Clifton Police Department to repor the theft. The reporting officer prepared a stolen vehicle report and had the stolen Nissan’s information entered into the state and federal crime computers. This routine police action

Read More