In Depth Analysis Of Warrantless Cell Tower Data Debate On Privacy Law 360

Earlier this week, Privacy Law 360 ran my most comprehensive analysis on the warrantless cell tower data debate, to date.
United States Litigation, Mediation & Arbitration
To print this article, all you need is to be registered or login on Mondaq.com.

Earlier this week, Privacy Law 360 ran my most comprehensive analysis on the warrantless cell tower data debate, to date.  My piece featured expert technical details on precisely how cell tower data can be used to triangulate the approximate location of a device from Scott Johnson, a current manager of the computer forensics and e-discovery practice of the CohnReznick Advisory Group, and a former liutenant with the New Jersey State Police that retired as the Deputy Director of the New Jersey Regional Computer Forensics Laboratory.  The full text of the article, entitled, "11th Circ. Puts Spotlight On Warrantless Cellphone Search," is located here.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More