SlideShare a Scribd company logo
1 of 1
Download to read offline
Multiple laptops stolen from a school are recovered thanks to Absolute Software
CASE NUMBER: 8E6A3, 8E6A7, 8E6A9, 8E6B1, 8E6B2, 8E6B3, 8E6A5
Theft Date
October 21, 2012
Recovery Date
Location
California, USA
Location
Details
Elementary School Burglary
Absolute Investigator
Model
29 Mac Books
Criminal Charges

Various
Various
J. Nixon
Multiple charges including
possession of stolen
property, possession for
the sale of narcotics

REPORT: An elementary school was the target of a well-planned burglary where 29 laptops were stolen
from a locked cart. Of the 29 laptops stolen, 15 of them were equipped with Absolute Software’s Theft
Recovery Software. All 15 laptops started tracking unauthorized user access and led the Investigations
and Recovery Team to identify several suspects. Working with numerous members of the local Police
Department, search warrants were executed which resulted in 15 computers and 8 pounds of drugs
being recovered. Arrests were made for possession of stolen property as well as possession for the sale
of narcotics. Police also stopped an additional suspect’s vehicle that was seen checking out another
school, potentially saving that school from a devastating computer theft.
Through three search warrants and two probation searches, Absolute Software helped police recover
over $20,200 in laptops and $34,000 is narcotics.
About The Company:
Absolute Software (@Absolutecorp) helps businesses and consumers track, manage, secure and recover
mobile computers and devices using our patented persistence technology. We license the name
"LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack
for Laptops (@LoJackforLaptop), and their stolen vehicle recovery service. Currently Absolute Software
has recovered over 30,000 devices in over 100 countries around the world.
©2013 Absolute Software Corporation. All rights reserved.

More Related Content

More from Absolute LoJack

Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Absolute LoJack
 

More from Absolute LoJack (6)

Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Multiple Macbooks Theft Recovery Case from Absolute Software – Case Number 8E6A3

  • 1. Multiple laptops stolen from a school are recovered thanks to Absolute Software CASE NUMBER: 8E6A3, 8E6A7, 8E6A9, 8E6B1, 8E6B2, 8E6B3, 8E6A5 Theft Date October 21, 2012 Recovery Date Location California, USA Location Details Elementary School Burglary Absolute Investigator Model 29 Mac Books Criminal Charges Various Various J. Nixon Multiple charges including possession of stolen property, possession for the sale of narcotics REPORT: An elementary school was the target of a well-planned burglary where 29 laptops were stolen from a locked cart. Of the 29 laptops stolen, 15 of them were equipped with Absolute Software’s Theft Recovery Software. All 15 laptops started tracking unauthorized user access and led the Investigations and Recovery Team to identify several suspects. Working with numerous members of the local Police Department, search warrants were executed which resulted in 15 computers and 8 pounds of drugs being recovered. Arrests were made for possession of stolen property as well as possession for the sale of narcotics. Police also stopped an additional suspect’s vehicle that was seen checking out another school, potentially saving that school from a devastating computer theft. Through three search warrants and two probation searches, Absolute Software helped police recover over $20,200 in laptops and $34,000 is narcotics. About The Company: Absolute Software (@Absolutecorp) helps businesses and consumers track, manage, secure and recover mobile computers and devices using our patented persistence technology. We license the name "LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops (@LoJackforLaptop), and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000 devices in over 100 countries around the world. ©2013 Absolute Software Corporation. All rights reserved.