Unhelpful to the OP, but just FYI, my son's Macbook had Lojack fro Laptops installed on it (software version, not embedded within the firmware like in a pre-order Dell machine).
It was stolen from his bag this past June, and that evening, the thief installed a new OS on the machine (an upgrade to Lion OS on the Mac). When I logged onto LoJack's website (Computrace) the next day (he waited until the next day to tell me), before even calling them to initiate an attempt to recover it, I found that the Laptop was registering on their network, with an IP address and several locations where it had been used (approximate locations), but most useful was that the thief, when installing a new OS, put in their real name as the "Owner" of the machine. So when I logged into Computrace, it told me that it was connecting to "Barbara Smith's MacBook Pro". I let LoJack and the local police know that someone named "Barbara Smith" may indeed be the thief who stole my son's computer....and as it turned out, there was a new employee at my son's school named "Barbara Smith"......and the rest is history.
And from what I gathered, when you have LoJack installed, they can take time to accumulate information from the computer to build a case against whoever stole it, and to help them find the computer -- for example, I'm pretty sure they can see screen shots from the laptop once it has been reported stolen (if it actually connects to LoJack's servers), so that they can wait until you order something online, for example, or write a paper for school with your name on it, etc....