In less than a year, evil, bad hackers could be tapping into your cell phone or reading your ... revealing a heatmap with the probable locations of cell towers highlighted in red.
along with the cell towers used for each interaction. For investigators, these records serve as the source of CSLI, providing the foundation for analyzing a phone’s historical locations.