On the afternoon of February 24, 2012, the owner of a 2005 Cadillac Escalade contacted the Selma Police Department to report the vehicle stolen. Selma Police gathered the information required to complete a stolen vehicle report and had this information entered into the California state and federal crime databases. This routine police action automatically activated

Read More

On the morning of January 19, 2012, the owner of a 2008 Toyota RAV-4 Sport contacted the Fresno County Sheriff’s Department to report the vehicle stolen. Fresno deputies completed a stolen vehicle report and had information about the RAV-4 entered into the state and federal crime computers. This routine police action automatically activated the LoJack

Read More

When the owners of a 1998 Honda Civic discovered that their vehicle had been stolen on January 17, 2012, they immediately reported the theft to the San Diego Police Department.  It was the police department’s routine entry of the Civic’s information into the nationwide law enforcement stolen vehicle computer system that automatically activated the LoJack

Read More

On the morning of January 22, 2012, the owners of a 2008 Nissan Altima discovered their vehicle missing and immediately contacted the Clifton Police Department to repor the theft. The reporting officer prepared a stolen vehicle report and had the stolen Nissan’s information entered into the state and federal crime computers. This routine police action

Read More

The owner of a 2005 Honda Civic last saw the vehicel parked near his home in the 8800 block of Promised Land, Las Vegas, during the early evening hours of January 9, 2012. A  short while later, the owner discovered the car missing and immediately contacted the Las Vegas Metropolitan Police Department to report the

Read More

On January 15, 2012, a car dealership contacted the Arroyo Grande Police Department to report that a 2004 Pontiac Grand Am had been stolen from their business. Arroyo Grande Police responded to the scene, prepared a stolen vehicle report and had the stolen Pontiac’s information entered into the state and federal crime computers. This routine

Read More