When LE requests cell tower data they are given a text file of comma separated variables.
If they can threaten/coerce social media companies to alter data, they can get cell companies to do the same. Easy edits with a word processor and they can claim your cell phone was anywhere they like.