Nah, any smartphone will have a cache of recent approximate locations. The locations of nearby cell towers, actually, used to triangulate your position for use with assisted GPS. For the iPhone, these are stored in a standard sqlite database in /private/var/root/Library/Caches/locationd/consolidated.db. The recent fiasco was due to the database growing too large, thereby storing too many locations, and it was also part of the computer backup. The 4.3 update fixed that, so the locations aren't backed up to the computer anymore, and the size of the cache was reduced. It'll still be on the phone, though, and will have recent locations (well, locations of the nearest cell towers to you, anyway).
Here is a guide to visualizing the locations once you have the consolidated.db file. The only problem is grabbing it off the smashed-up phone. Since she's dead, will they really need permission? I'm not sure. Anyway, if the flash drive is still intact, it would be a matter of grabbing the file off the flash drive. Since you need to jailbreak an intact iPhone to browse its filesystem, I'm not sure how that would work if you just have the drive, but I doubt it would be difficult for a forensics team working with the investigator. If the investigator himself is tech savvy enough, he could take the drive, open up a working iPhone, and put it in, but that would be pretty difficult for your average person with the way they're constructed. If the drive itself is damaged, it may still be possible to get the data, but it would definitely require forensic tools. If she encrypted the phone with a 4-digit passcode, can break the encryption, but they'll have to purchase expensive software and it'll take a while. If she encrypted the phone with an alphanumeric passcode, they probably don't stand a chance.
The locations are only approximate, since they indicate the cell towers, not your actual location, so to get a more accurate idea of where she might have been, the forensics team could look at the time stamps of the various locations and for any that are close enough together in time, use them to triangulate her real position. However, the time stamps only indicate the most recent time when a certain cell tower was used, so if she went to the same place more than once, they'd have no way of knowing.
In addition, any photos taken will have been geotagged with her real location, so if she took any photos, the investigator can use those, too. As mentioned earlier, the carrier also stores all their own location info, which will always require legal legwork.