Earlier this week, Privacy Law 360 ran my most comprehensive analysis on the warrantless cell tower data debate, to date.  My piece featured expert technical details on precisely how cell tower data can be used to triangulate the approximate location of a device from Scott Johnson, a current manager of the computer forensics and e-discovery practice of the CohnReznick Advisory Group, and a former liutenant with the New Jersey State Police that retired as the Deputy Director of the New Jersey Regional Computer Forensics Laboratory.  The full text of the article, entitled, "11th Circ. Puts Spotlight On Warrantless Cellphone Search," is located here.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.