A cell phone is tracked by finding the overlap of all the cell towers that can communicate with it at once, and that process is described as "triangulation", but it isn't. Triangulation requires knowing the positions of 2 stations, and the angles (or lines of bearing) from each one to a target. The point where those lines intersect is the 3rd point of the triangle, and the location of the target. Using cell towers does not give a bearing or a location; only an area where the towers' cells overlap, and the process works with any number of towers communicating with the phone.
Transponder keys are explained as being programmed to communicate with a car. They actually communicate regardless of programming, but the car must be programmed to accept each key's signal as being authorized to start the engine.
It is explained that a GPS receiver uses triangulation (measuring the angles between the satellites and the receiver) to determine its position. A GPS receiver actually uses a method called trilateration (calculating the distances between the receiver and the satellites using very accurate timing methods).
In his first appearance in the last segment, EJ's microphone isn't working, so the audio comes from a set microphone in the background.
A 2-mode vault sensor is claimed to automatically disregard a single detection as a false alarm. But then the narration says the thieves went to the trouble of defeating each sensor mode. With one mode defeated, there would have been no need to defeat the other.