A dealership sold a 2016 Toyota Corolla to an individual and after the sale discovered the information provided by the customer and the down payment supplied for the purchase were fictitious. The dealership eventually contacted the Alameda County Auto Theft Task Force (ACRATT) to report that their Toyota was stolen. The ACRATT verified the theft

Read More

The owners of a 2015 Toyota Tundra contacted the Tracy Police Department to report that their vehicle was stolen. The victim stated that when he went out to go to work he discovered unknown suspects had stolen his Toyota sometime during the night. The Toyota had been parked in his driveway. The Tracy PD verified

Read More

The owners of a local car dealership conducted an inventory and discovered five new vehicles had been stolen off of the lot. The dealership contacted the Lodi Police Department to report that the vehicles had been stolen. The Lodi PD verified the theft and entered the vehicle information into the state and federal crime computers

Read More

The LoJack® System, working in conjunction with your local police department, is a great way to protect your personal vehicle from a thief, but cars, trucks and motorcycles are not the only things LoJack protects. There are also LoJack devices that protect commercial vehicles and construction equipment, as illustrated in the following example. On April

Read More

On the evening of January 24, 2013, the victim discovered her 2012 Honda was stolen and reported the theft to the Stockton Police Department. The vehicle information was entered into the California Stolen Vehicle System as well as the national system, NCIC. This routine police action automatically activated the LoJack transponder concealed in the vehicle. 

Read More

On the afternoon of May 16, 2012, a woman contacted the Stockton Police Department to report that unknown suspects had stolen her 2002 Ford Mustang, which was parked in front of her residence. Stockton Police completed a theft report and had the Mustang’s information entered into the state and federal crime computer systems. This routine

Read More