I'm saying that it's not possible to just "triangulate the location of a phone" like you would see in the movies. So to ask a question like this is impossible to answer, because there's no specificity. If you had a question about a specific type of attack, or a specific type of malware, I would be happy to find the answer for you. But the types of questions you ask above contain far too many variables to be able to accurately address
Out of curiosity, what makes you think a phone cannot be triangulated?