SlideShare a Scribd company logo
1 of 1
Download to read offline
Recovery of stolen laptop leads police to homicide suspect.
CASE NUMBER: 8F6Z9
Theft Date November 27, 2012
Location
Virginia, USA
Details
House Burglary
Model
Laptop

Recovery Date
Location
Absolute Investigator
Criminal Charges

March 13, 2013
Virginia, USA
H. Reaves
Breaking & Entering

REPORT: A laptop, installed with LoJack for Laptops, was stolen from a home during a residential
burglary. A few months later, the tracked laptop was discovered being actively used and the
information was passed along to the local Police Department. A warrant was issued by police, who
arrested the suspect and recovered the computer. As a result of the arrest for burglary, the thief was
also linked as a suspect in a homicide at the same location. The suspect was charged with Breaking and
Entering of a dwelling with additional charges pending.
The suspect in this case will be facing multiple charges and was easily found with the help of LoJack
for Laptops.
About the Company:
Absolute Software helps businesses and consumers track, manage, secure and recover mobile
computers and devices using our patented persistence technology. We license the name "LoJack" from
the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops,
and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000
devices in over 100 countries around the world.
©2013 Absolute Software Corporation. All rights reserved.

More Related Content

What's hot

FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentationPaul Wilson
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...Trustwave
 
Business computer support specialist and services
Business computer support specialist and services Business computer support specialist and services
Business computer support specialist and services Raquel Jo
 

What's hot (7)

Dark web
Dark webDark web
Dark web
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
 
Business computer support specialist and services
Business computer support specialist and services Business computer support specialist and services
Business computer support specialist and services
 

Viewers also liked

Articles 106223 archivo
Articles 106223 archivoArticles 106223 archivo
Articles 106223 archivoFalmer
 
Ebd ozias
Ebd oziasEbd ozias
Ebd oziassaizos
 
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...SLBdiensten
 
вода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лизавода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лизаMetOb
 
Empresa a l'aula Avaluació 14-12-15
 Empresa a l'aula Avaluació 14-12-15 Empresa a l'aula Avaluació 14-12-15
Empresa a l'aula Avaluació 14-12-15Sisapardo
 
Top modifications for ute cars
Top modifications for ute carsTop modifications for ute cars
Top modifications for ute carsaccessoryworld
 
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!Sean McMillin
 
Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:Tomas J. Aragon
 
Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)Phillip J. Blanks
 

Viewers also liked (15)

Ajackson 2015
Ajackson 2015Ajackson 2015
Ajackson 2015
 
Estación 5
Estación 5Estación 5
Estación 5
 
Articles 106223 archivo
Articles 106223 archivoArticles 106223 archivo
Articles 106223 archivo
 
Ebd ozias
Ebd oziasEbd ozias
Ebd ozias
 
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
 
вода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лизавода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лиза
 
Digital flat plan
Digital flat planDigital flat plan
Digital flat plan
 
Empresa a l'aula Avaluació 14-12-15
 Empresa a l'aula Avaluació 14-12-15 Empresa a l'aula Avaluació 14-12-15
Empresa a l'aula Avaluació 14-12-15
 
Top modifications for ute cars
Top modifications for ute carsTop modifications for ute cars
Top modifications for ute cars
 
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
 
Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)
 
Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:
 
Laboratorio 1
Laboratorio 1Laboratorio 1
Laboratorio 1
 
Comedy
ComedyComedy
Comedy
 
Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9

Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Absolute LoJack
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Absolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Absolute LoJack
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyFrances Coronel
 
Android forensics
Android forensicsAndroid forensics
Android forensicsInfosys
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9 (9)

Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9

  • 1. Recovery of stolen laptop leads police to homicide suspect. CASE NUMBER: 8F6Z9 Theft Date November 27, 2012 Location Virginia, USA Details House Burglary Model Laptop Recovery Date Location Absolute Investigator Criminal Charges March 13, 2013 Virginia, USA H. Reaves Breaking & Entering REPORT: A laptop, installed with LoJack for Laptops, was stolen from a home during a residential burglary. A few months later, the tracked laptop was discovered being actively used and the information was passed along to the local Police Department. A warrant was issued by police, who arrested the suspect and recovered the computer. As a result of the arrest for burglary, the thief was also linked as a suspect in a homicide at the same location. The suspect was charged with Breaking and Entering of a dwelling with additional charges pending. The suspect in this case will be facing multiple charges and was easily found with the help of LoJack for Laptops. About the Company: Absolute Software helps businesses and consumers track, manage, secure and recover mobile computers and devices using our patented persistence technology. We license the name "LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops, and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000 devices in over 100 countries around the world. ©2013 Absolute Software Corporation. All rights reserved.