On June 26, 2012, the owner of a 2003 Acura RSX contacted Los Angeles Sheriffs’  Department to report their vehicle stolen. LASD East LA officers verified the theft and entered the vehicle’s information into the state and federal crime computers, which automatically activated the LoJack transponder concealed in the Acura. Within hours, Los Angeles Sheriff

Read More

On May 3, 2012 the owner of a 2003 Ford Ranger reported her vehicle stolen to the Memphis Police Department. A stolen vehicle report was filed and the vehicle information was entered into the state and federal crime computers. This routine police action automatically activated the LoJack transponder concealed in the Ford, prompting it to

Read More

On May 6, 2012, an Anaheim Police Department’s canine officer was on patrol with his Canine “RECON” when he began to receive a silent LoJack signal on the LoJack Police Tracking Computer (PTC) installed in his patrol vehicle. After querying the LoJack Reply Code appearing on the computer display against the police computer database, he

Read More

When the owners of a 2004 Dodge Ram 1500 pickup truck discovered that the truck had been stolen, they reported the theft to the Dacono Police Department.  It was the police department’s routine entry of the Ram’s information into the nationwide law enforcement stolen vehicle computer system that automatically activated the LoJack transponder concealed in

Read More

On the evening of April 21, 2012, the owner of a 2006 Honda CBR1000 motorcycle stored his bike in his garage with the keys in the ignition. During the night, someone broke into his garage and stole the Honda. When the owner discovered the theft the following morning, he contacted the Johnson County Sheriff’s Department

Read More

On April 18, 2012, the owners of a 2008 Can-Am Spyder reported their three-wheeler stolen to the Los Angeles Police Department’s 77th Division officers. The victim named a possible suspect, and the responding LAPD officer completed a stolen vehicle report and had the vehicle’s information entered into the state and federal crime computer systems. This

Read More