SlideShare a Scribd company logo
Recovery of stolen laptop leads police to homicide suspect.
CASE NUMBER: 8F6Z9
Theft Date November 27, 2012
Location
Virginia, USA
Details
House Burglary
Model
Laptop

Recovery Date
Location
Absolute Investigator
Criminal Charges

March 13, 2013
Virginia, USA
H. Reaves
Breaking & Entering

REPORT: A laptop, installed with LoJack for Laptops, was stolen from a home during a residential
burglary. A few months later, the tracked laptop was discovered being actively used and the
information was passed along to the local Police Department. A warrant was issued by police, who
arrested the suspect and recovered the computer. As a result of the arrest for burglary, the thief was
also linked as a suspect in a homicide at the same location. The suspect was charged with Breaking and
Entering of a dwelling with additional charges pending.
The suspect in this case will be facing multiple charges and was easily found with the help of LoJack
for Laptops.
About the Company:
Absolute Software helps businesses and consumers track, manage, secure and recover mobile
computers and devices using our patented persistence technology. We license the name "LoJack" from
the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops,
and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000
devices in over 100 countries around the world.
©2013 Absolute Software Corporation. All rights reserved.

More Related Content

What's hot

Dark web
Dark webDark web
Dark web
Nikki Noveno
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
forensicsnation
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
Paul Wilson
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
John Liu
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
Trustwave
 
Business computer support specialist and services
Business computer support specialist and services Business computer support specialist and services
Business computer support specialist and services
Raquel Jo
 

What's hot (7)

Dark web
Dark webDark web
Dark web
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
 
Business computer support specialist and services
Business computer support specialist and services Business computer support specialist and services
Business computer support specialist and services
 

Viewers also liked

Ajackson 2015
Ajackson 2015Ajackson 2015
Ajackson 2015
Andrew Jackson
 
Estación 5
Estación 5Estación 5
Articles 106223 archivo
Articles 106223 archivoArticles 106223 archivo
Articles 106223 archivo
Falmer
 
Ebd ozias
Ebd oziasEbd ozias
Ebd ozias
saizos
 
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
SLBdiensten
 
вода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лизавода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лиза
MetOb
 
Digital flat plan
Digital flat planDigital flat plan
Digital flat plan
TheJellehKed
 
Empresa a l'aula Avaluació 14-12-15
 Empresa a l'aula Avaluació 14-12-15 Empresa a l'aula Avaluació 14-12-15
Empresa a l'aula Avaluació 14-12-15
Sisapardo
 
Top modifications for ute cars
Top modifications for ute carsTop modifications for ute cars
Top modifications for ute cars
accessoryworld
 
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Sean McMillin
 
Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)
Sundarapandiyan Mohan
 
Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:
Tomas J. Aragon
 
Laboratorio 1
Laboratorio 1Laboratorio 1
Laboratorio 1
Rita Morice Gómez
 
Comedy
ComedyComedy
Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)
Phillip J. Blanks
 

Viewers also liked (15)

Ajackson 2015
Ajackson 2015Ajackson 2015
Ajackson 2015
 
Estación 5
Estación 5Estación 5
Estación 5
 
Articles 106223 archivo
Articles 106223 archivoArticles 106223 archivo
Articles 106223 archivo
 
Ebd ozias
Ebd oziasEbd ozias
Ebd ozias
 
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
Presentatie vanbuurt ICT, Microsoft Office Specialist bijeenkomst 10 december...
 
вода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лизавода и её свойства презентация морозова лиза
вода и её свойства презентация морозова лиза
 
Digital flat plan
Digital flat planDigital flat plan
Digital flat plan
 
Empresa a l'aula Avaluació 14-12-15
 Empresa a l'aula Avaluació 14-12-15 Empresa a l'aula Avaluació 14-12-15
Empresa a l'aula Avaluació 14-12-15
 
Top modifications for ute cars
Top modifications for ute carsTop modifications for ute cars
Top modifications for ute cars
 
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!Bay Insulation Supply is now stocking Sikaflex 1A tubes!
Bay Insulation Supply is now stocking Sikaflex 1A tubes!
 
Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)Sundarapandiyan Updated Profile (1)
Sundarapandiyan Updated Profile (1)
 
Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:Toxic Stress! Childhood Roots of Health Inequities:
Toxic Stress! Childhood Roots of Health Inequities:
 
Laboratorio 1
Laboratorio 1Laboratorio 1
Laboratorio 1
 
Comedy
ComedyComedy
Comedy
 
Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)Del Cerro – Neighborhood Report (05.15)
Del Cerro – Neighborhood Report (05.15)
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9

Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Absolute LoJack
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Absolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Absolute LoJack
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
Frances Coronel
 
Android forensics
Android forensicsAndroid forensics
Android forensics
Infosys
 

Similar to Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9 (9)

Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 

Recently uploaded

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 

Recently uploaded (20)

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 

Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9

  • 1. Recovery of stolen laptop leads police to homicide suspect. CASE NUMBER: 8F6Z9 Theft Date November 27, 2012 Location Virginia, USA Details House Burglary Model Laptop Recovery Date Location Absolute Investigator Criminal Charges March 13, 2013 Virginia, USA H. Reaves Breaking & Entering REPORT: A laptop, installed with LoJack for Laptops, was stolen from a home during a residential burglary. A few months later, the tracked laptop was discovered being actively used and the information was passed along to the local Police Department. A warrant was issued by police, who arrested the suspect and recovered the computer. As a result of the arrest for burglary, the thief was also linked as a suspect in a homicide at the same location. The suspect was charged with Breaking and Entering of a dwelling with additional charges pending. The suspect in this case will be facing multiple charges and was easily found with the help of LoJack for Laptops. About the Company: Absolute Software helps businesses and consumers track, manage, secure and recover mobile computers and devices using our patented persistence technology. We license the name "LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops, and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000 devices in over 100 countries around the world. ©2013 Absolute Software Corporation. All rights reserved.