This case is a companion to
State v. Thompson,
The instant appeal raises four principal questions: (1) Do these codefendants have *483 standing to challenge the use of a pen register that generated information for probable cause to place the wiretap on Thompson’s telephone? (2) Did the wiretap comport with the requirements of Idaho’s electronic surveillance statutes? (3) Was the evidence presented at the preliminary hearing sufficient to hold defendants to answer in the district court? (4) Is it necessary to allege and to prove an overt act in order to obtain a conviction for conspiracy to violate the Uniform Controlled Substances Act? For reasons explained below, we uphold the district court’s rulings on these questions.
As explained in our Thompson decision, the codefendants here were charged with conspiring to violate the Uniform Controlled Substances Act, I.C. § 37-2732(f). The prosecutor’s information alleged that the defendants had conspired to deliver marijuаna to inmates at the ISCI. The evidence supporting this allegation was obtained largely from a wiretap on Judy Thompson’s telephone. The codefendants, consisting of four prisoners and two women who visited them, became implicated in the conspiracy when the wiretap intercepted their conversations with Thompson about drug trafficking. Following the arrests, officers who had recorded the incriminating conversations interviewed each of the defendants and positively matched their voices with the voices recorded. Subsequently, a seven-day preliminary hearing was held. The magistrate found probable cause to hold all defendants to answer in the district court. Before trial the defendants submitted their motion to suppress evidence and to dismiss the prosecutor’s information. The motion was denied, leading to this appeal.
I
The first issue is the appellants’ right to challenge a pen register installed prior to the wiretap on Thompson’s telephone. Our decision in Thompson contains a full statement of the facts framing this issue. They need not be reiterated here. It suffices to say that in Thompson we upheld the validity of the pen register under then-existing statutes, under the Fourth Amendment, and under the Idaho Supreme Court’s extant view of Article 1, § 17, of the Idaho Constitution. However, we invited our Supreme Court to reexamine the applicability of the state constitution. Unless the Supreme Court accepts this invitation, and does so in Thompson itself, the standing question in the present case will be moot. Nevertheless, in order to dispose completely of the appellants’ argument, we will address the standing issue on its merits.
At the outset, we observe that none of the information gathered from the pen register, and used to support the application for a wiretap, concerned any of these appellants. They were not parties to any of the calls dialed from Thompson’s phone and mentioned in the police affidavit for the wiretap. The only calls mentioned in the affidavit were made to Judy Thompson’s purported supplier in Twin Falls and to two other women who were suspected of visiting inmates at the prison. Thus, it appears that appellants’ argument boils down to a claim of vicarious standing. They wish to reach back and strike evidence obtained in a manner that arguably violated the constitutional rights of someone else — but which in no way implicated them in criminal activity. They argue that because the pen register data was a critical element in the cаlculus of probable cause for issuance of the wiretap order, and because the wiretap did produce incriminating evidence against them, they have standing to challenge the pen register. We disagree.
The Fourth Amendment, and its analogue in Article 1, § 17, of the Idaho Constitution, do not apply to all searches and seizures. The scope of protection is determined by the privacy interests at stake. In this respect the state and federal constitutional protections are coextensive. Consequently, our discussion of the Fourth Amendment applies equally to Article 1, § 17, on this point.
The traditional rules of standing no longer adequately frame the proper inquiry into whether an accused’s Fourth Amendment rights have been violated by a search. The modern approach allows a
*484
search to be challenged when a personal interest under the Fourth Amendment is asserted and a legitimate expectation of privacy is shown to exist in the area searched or the items seized.
State v. Holman,
Alderman v. United States,
We next consider the question of statutory standing. Alderman is consistent with Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. § 2518(10)(a), which allows only an “aggrieved person” to move to suppress the contents of communications intercepted in violation of the Act. A similar provision is contained in the Idaho electronic surveillance statutes, collectively known as the Communications Security Act and codified at I.C. §§ 18-6701 to -6725. The Idaho Act is derived directly from the federal statutory scheme. As we noted in Thompson, pen registers were not covered by the state and federal statutes in existence at times pertinent to this case. However, we believe that cаse law on the question of standing under the federal statute, and under similar statutes in other states, is instructive here.
Various federal and state courts have discussed the standing question under their respective electronic surveillance statutes. In cases analogous to the present situation, defendants implicated by a wiretap that was lawful as to them have attacked previous wiretaps that provided the information necessary to obtain authorization for the wiretaps that produced the incriminating information.
1
In these cases, none of the defendants seeking to suppress evidence obtained from the prior wiretaps had been intercepted by that initial surveillance. The courts addressing this situation have held with virtual uniformity that a person intercepted by a second or subsequent wiretap has no standing tо attack an earlier wiretap on grounds derived exclusively from alleged defects in the earlier wiretap as to which he was not an “aggrieved person.”
See, e.g., United States v. Civella,
Courts that have addressed standing in the specific context of pen registers have reached similar conclusions, regardless of whether the pen register has been covered by a jurisdiction’s particular electronic surveillance statute. Thus, the courts have held that only the caller, the person called and those with a possessory
*485
interest in the telephone have objectively reasonable expectations of privacy in information disclosed by a pen register.
Ellis v. State,
We agree with this reasoning. Accordingly, because none of the appellants here was a party to any of the pen register calls mentioned in the affidavit supporting the application for the wiretap order, and because none of the appellants alleged a possessory interest in the target telephone, they lacked standing to challenge the information gleaned from the pen register. 3 Thus, as regards these appellants, the pen register data was properly considered by the district court in determining that the wiretap was supported by probable cause.
II
Appellants next contend that the state failed to comply with certain requirements of the Communications Security Act. They argue that because the state violated various provisions of the Act, all оf the intercepted communications must be suppressed. See I.C. § 18-6705. Appellants press four claims under the statute. 4 We discuss each in turn.
A
Appellants first assert that the order authorizing the surveillance was not supported by probable cause under I.C. § 18-6708(3). The statute provides, in pertinent part, as follows:
(3) Upon such application the judge may enter an ex parte order, as requested or as modified, authorizing interception of wire or oral communications within the territorial jurisdiction of the court in which the judge is sitting if the judge determines on the basis of the facts submitted by the applicant that:
(a) There is probable cause for belief that an individual is committing, has committed, or is about to commit a particular offense enumerated in section 18-6706, Idaho Code;
(b) There is probable cause for belief that particular communications concerning that offense will be obtained through such interception;
(d) There is probable cause for belief that the facilities from which, or the place where, the wire or oral communications are to be intercepted are being used, or are about to be used, in connection with the commission of such offense, or are leased to, listed in the name of, or commonly used by such person.
The findings required by this statute must be based on the affidavit submitted by the police. In this case, the question before the district judge on the motion to suppress was simply whether the affidavit established a substantial basis to find probable cause that Judy Thompson was engaged in a drug trafficking conspiracy and that she was using her home telephone to communicate with coconspirators. The coconspirators, including the apрellants, were unknown when the application for the wiretap was made. Thus, their identity or their personal links to the conspiracy were not then at issue. Indeed, the express aim of the surveillance was to discover other unknown participants in the conspiracy.
In
Thompson,
we reviewed the affidavit presented to the issuing judge. It is
*486
unnecessary to reproduce that discussion here. Reading the affidavit in its entirety, we concluded there, and we again conclude here, that the judge issuing the wiretap warrant had a substantial basis for concluding that probable cause existed.
State v. Lang,
B
Appellants next claim that the police failed to comply with the minimization requirements of I.C. § 18-6708(6). Section 18-6708(6) provides that “[e]very [wiretap] order and extension thereof shall contain a provision that the authorization to intercept ... shall be сonducted in such a way as to minimize the interception of communications not otherwise subject to interception under this chapter.” The defendants have raised a veritable barrage of issues relating to this requirement. Reduced to their essentials, the defendants’ arguments are (1) that the officers were given excessive discretion to determine what minimization procedures to apply, and (2) that the officers failed to exercise their discretion in a manner adequate to satisfy the statute. The district judge rejected these arguments.
Like other provisions of Idaho’s electronic surveillance statutes, the minimization requirement is receiving its first scrutiny by an Idaho appellate court in this case. However, the language of I.C. § 18-6708(6) is virtually identical to that of its federal counterpart.
See
18 U.S.C. § 2518(5). Accordingly, we may look to numerous federal decisions for guidance. Our Supreme Court held that “[a] statute which is adopted from another jurisdiction will be presumed to be adopted with the prior construction placed upon it by the courts of such other jurisdiction.”
Nixon v. Triber,
The appellants first argue that the officers who conducted the surveillance in this case were given unfettered discretion to formulate and to apply minimization procedures. They argue that the order was defective on its face for failing to specify the procedures to be followed. They further assert that the officers were neither trained in the use of the equipment nor informed as to their minimization duties under the statute. However thе facts and the case law are contrary to the appellants’ position.
The federal courts have not required the issuing judge to specify the precise means by which minimization is to be accomplished.
See generally
J. CARR, ELECTRONIC SURVEILLANCE § 4.7(e)(2) (2d ed. 1986) (hereinafter CARR). Detailed instructions in the warrant itself would deprive the investigating officers of the flexibility required to conduct an effective investigation. C. FISHMAN, WIRETAPPING & EAVESDROPPING § 159, p. 232 n. 1 (1978).
Cf. United States v. Fino,
*487 The procedures followed in this case met the requirements of the statute. The order authorizing the wiretap included a minimization provision which closely tracked the language of the statute. Although there was no judicial supervision of minimization procedures, the prosecutor in charge of the investigation met with all participating officers, provided them with detailed written guidelines of procedures to be followed, and received daily progress reports from the officer in charge. He even provided the police with a home telephone number and encouraged them to contact him at any hour. We think the statute was satisfied.
In a closely related argument, the appellants contend that the minimization efforts actually undertaken by the police were inadequate. We disagree. The purpose of the minimization requirement is to prevent the improper invasion of a target’s privacy rights and to curtail the indiscriminate seizure of communications.
United States v.
Clemente,
Whether a minimization provision has been violated “turns on an objective assessment of the facts and circumstances confronting [the officers] at the time.”
Scott v. United States,
We believe the procedures actually followed in this case satisfied the statutory requirements. The officers had probable cause to believe that a broad criminal conspiracy involving drug trafficking was taking place. The identities of the conspirators, with the exception of Judy Thompson and her Twin Falls supplier, were unknown. The officers had information indicating that some kind of verbal code might be used — and this was confirmed in the course of the wiretap itself. The officers also had reason to suspect that Thompson’s social life and criminal activities were interwoven. Under these circumstances, effective minimization was difficult. Nevertheless, the record indicates that extensive minimization was conducted. Roughly 700 completed calls were made during the course of the wiretap. Nearly 400 of those calls were of less than two minutes’ durаtion. Of the 300 calls exceeding two minutes, the officers minimized in two-thirds of them. The minimization was accomplished by pressing a button which shut off both the audio monitor and the tape recorders. The officers then would spot-monitor. 6 *488 Upon this record we will not disturb the district court’s finding that the minimization efforts were reasonable and adequate in light of the circumstances.
C
Appellants next argue that the wiretap was authorized improperly because law enforcement officials did not adequately pursue other routine methods of investigation before resorting to the wiretap. This contention encompasses what is commonly known as the “necessity” requirement. Idaho Code § 18-6708(1)(c) requires that a wiretap application contain “[a] full and complete statement as to whether or not other investigative procеdures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous.” Similarly, section 18-6708(3)(c) permits the reviewing judge to issue the wiretap order if, among other things, he determines that “[njormal investigative procedures have been tried and failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous.” Because these provisions are essentially identical to their federal counterparts (18 U.S.C. § 2518(1)(c) and (3)(c)), we refer to federal cases for guidance.
The necessity requirement is not to be treated lightly. This statutory predicate to electronic surveillance has at least two policy origins. First, because wiretaps are unusually intrusive and clandestine types of searches, there must be a determinatiоn that the electronic surveillance will accomplish the specific objectives of the investigation. CARR § 4.4(d). Second, the necessity requirement limits the wiretap to the justification upon which it is based. This ensures a proportionality between the extent of the need for the information and the degree of intrusiveness.
Id.
The United States Supreme Court has commented that § 2518(l)(c) was “designed to assure that wiretapping is not resorted to in situations where traditional investigative techniques would suffice to expose the crime,”
United States v. Kahn,
Necessity must be readily apparent from the affidavit in support of the wiretap application. Of course, the affidavit need not demonstrate that every conceivable alternative has been exhausted.
United States v. Alonso,
in the particular investigation normal investigative techniques employing a normal amount of resources have failed to make the case within a reasonable period of time [, or wjhere such techniques have not been so employed ... under the particular circumstances of the case the employment of such techniques “reasonably appear [sic] unlikely to succeed if tried or to be too dangerous.”
United States v. Martinez,
Thus, as we recently noted in
State v. Martin,
The affidavit at issue here is fully described in our Thompson decision. It states that the police interviewed four different informants over an eighteen month period. Three of these persons were friends or acquaintances of Judy Thompson. One of them was a prison inmate. The fourth informant was anonymous. All four informants substantially corroborated each other. However, all informants indicated that they were no longer trusted by Judy Thompson and, therefore, could not infiltrate her organization.
The use of the pen register linked Thompson to the alleged source of supply in Twin Falls. The pen register also revealed that Thompson was contacting two women thought to be visiting ISCI. This was confirmed by prison officials. The affidavit further stated that Twin Falls police had conducted a two-year investigation of the suspected supplier. At least two attempts had been made to purchase narcotics from him, but hе backed out both times. However, surveillance confirmed that he frequented the house in Twin Falls that Judy Thompson was calling (as disclosed by the pen register). Finally, the affiant reported that Boise police had conducted an intensive six-day surveillance of Thompson herself. The surveillance revealed nothing incriminating. Following this last unsuccessful venture, the police concluded that normal investigative procedures had been tried and failed, and that further efforts short of a wiretap would not succeed.
Read as a whole, this affidavit presents a complete statement as to why regular investigative techniques, though minimally successful, had largely failed. The recitation of procedures tried and failed is extensive. The investigators did not attempt to employ wiretaps routinely or as an early step in their investigation. Thus, we find that the affidavit complies with the plain meaning of I.C. § 18-6708(l)(c), and that the facts set forth are adequate to support the issuing judge’s determination under I.C. § 18-6708(3)(c).
D
Appellants’ final statutory argument is that the wiretap authorization was improperly extended for an additional thirty days even though the objective of the authorization had been achieved during the initial thirty-day period. Idaho Code Section 18-6708(6) provides:
(6) No order entered under this section may authorize the interception of any wire or oral communication for any period longer than is necessary to achieve the objective of the authorization, nor in any event longer than thirty (30) days. Extensions of an order may be granted, but only upon application for an extension made in accordance with subsection (1) of this section and the court making thе findings required by subsection (3) of this section. The periods of extension shall be no longer than the authorizing court deems necessary to achieve the purposes for which it was granted and in no event for longer than thirty (30) days for each extension. Every order and extension thereof shall contain a provision that the authorization to intercept shall be executed as soon as practicable, shall be conducted in such a way as to minimize the interception of communications not otherwise subject to interception un *490 der this chapter, and must terminate upon attainment of the authorized objective, or in any event in thirty (30) days.
We now must determine whether the thirty-day extension here was excessive.
The first period of electronic surveillance ran from September 17 to October 17, 1984. At that time, the state applied for and received the extension. The extension was granted because the issuing judge determined that it would permit the investigators to discover “places of operation, times and dates of transactions” which would “permit the seizure of the controlled substances being distributed.” Nonetheless, appellants contend that the extension was improper because the investigators already had ascertained certain key information during the initial surveillance period. The officer in charge of the investigation admitted at the preliminary hearing that the suspected Twin Falls source had been identified before the wiretapping began and that Judy Thompson was specifically implicated after only two days of electronic surveillance. The officer also stated that each of the six aрpellants had been identified by the “middle” of October, though one of them had been temporarily misidentified.
All of this may be true and it may show that the appellants could have been prosecuted for conspiracy without an extended wiretap. But it does not demonstrate that the authorized objective of the wiretapping had been fully attained. The authorized objective was to seek information about actual places, dates and times of the drug transactions. The investigators sought this information in order to seize contraband as additional evidence. The officer in charge of the investigation stated during the preliminary hearing that such physical evidence had been lacking throughout the initial period of surveillance. His testimony is not controverted. Because the authorized objective had not beеn fully achieved prior to the expiration of the first wiretap, we conclude that the issuing judge acted appropriately in extending the wiretap for an additional thirty days.
III
Appellants next contend that the evidence adduced at the preliminary hearing was insufficient to bind them over to the district court. The bulk of the evidence presented to the magistrate consisted of the tapes of the surveillance itself. The state also adduced proof that all of the defendants’ voices had been positively matched to the voices on the tapes and that one of the defendants had been arrested outside ISCI in possession of marijuana.
Unfortunately, the appellants have failed to place any of the wiretap tapes in the record before us. Furthermore, although they raise this claim in the “Statement of Issues” in their brief, they fail to address it in the body of the brief. An appellant bears the burden of furnishing a record adequate to evaluate his claim of error.
State v. Torres,
IV
Finally, the appellants attack the prosecutor’s information, filed after the preliminary hearing. They argue that the information must be quashed because it fails to state an offense under I.C: § 37 — 2732(f), relating to conspiracy to violate the Uniform Controlled Substances Act. The appellants remind us that they stand accused only of conspiracy. No other substantive crimes have been alleged.
The appellants assert that the state must allege (and subsequently prove at trial) at least one overt act by a coconspirator in furtherance of the unlawful agreement. The trial judge held that proof of an overt act was unnecessary under I.C. § 37 — 2732(f). Accordingly, he denied the motion to dismiss. The state does not directly contest appellants’ argument about *491 the necessity of alleging an overt act. Indeed, twenty-seven acts are set forth in the prosecutor’s information, twenty-five of which are telephone calls. The state contends that these telephone conversations constitute overt acts. We will examine each side’s position in turn.
A
We first discuss the overt act requirement. At common law, conspiracy was defined as a combination between two or more persons formed for the purpose of doing an unlawful act or a lawful act by unlawful means.
Pettibone v. United States,
18 U.S.C. § 371, the general federal conspiracy statute, requires proof of an overt act. It provides in pertinent part:
If two or more persons conspire either to commit any offense against the United States, or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.
However, a conspiracy to violate the Comprehensive Drug Abuse Prevention and Control Act of 1970, 21 U.S.C. § 846, does not require such proof:
Any person who attempts or conspires to commit any offense defined in this title is punishable by imprisonment or fine or both which may not еxceed the maximum punishment prescribed for the offense, the commission of which was the object of the attempt or conspiracy.
See United States v. Bey,
Within months of the adoption by Congress of the federal Act, the National Conference of Commissioners on Uniform State Laws drafted the Uniform Controlled Substances Act. The Uniform Act, which has been adopted by most states (including Idaho in 1971), was intended
to achieve uniformity between the laws of the several States and those of the Federal government. It has been designed to complement the new Federal narcotic and dangerous drug legislation and provide an interlocking trellis of Federal and State law to enable government at all levels to control more effectively the drug abuse problem.
UNIF.CONT.SUB.ACT, Commissioner’s Prefatory Note, 9 U.L.A. 188 (1970).
As drafted, the Uniform Act contained no conspiracy section in its penalty provisions. Consequently, most states inserted conspiracy as a separate offense under their versions of the Act. In the Idaho Code, this is found in I.C. § 37-2732(f). In drafting this section, Idaho, like many other states, substantially tracked the language of the federal narcotics conspiracy statute. Section 37 — 2732(f) reads:
If two (2) or more persons conspire to commit any offense defined in this act, said persons shall be punishable by a fine or imprisonment, or both, which may not exceed the maximum punishment prescribed for the offense, the commission *492 of which was the object of the conspiracy.
Because of the parallel language, some state courts have construed their state statutes equivalently with their federal counterpart. Accordingly, these courts have held that no overt act is necessary to prove a consрiracy to violate the Uniform Act.
See, e.g., Apodaca v. State,
This question has not been confronted directly by the appellate courts of Idaho. The trial judge opted to follow federal authority. This would have been a sound choice but for an additional legislative development in Idaho conspiracy law. For more than ninety years, from a time before statehood to 1978, Idaho criminal statutes had not required proof of overt acts in prosecutions for conspiracy. See Rev.Stat. § 6540 (1887); Comp.State § 8204 (1919); I.C.A. § 17-1027 (1932); I.C. § 18-1701 (1947). However, in 1978, seven years after the adoption of the Uniform Controlled Substances Act, the Idaho Legislature repealed former I.C. § 18-1701 and created a new section with the same number, explicitly adding an overt acts requirement:
If two (2) or more persons combine or conspire to commit any crime or offense proscribed by the laws of the state of Idaho, and one (1) or more of such persons does any act tо effect the object of the combination or conspiracy, each shall be punishable upon conviction in the same manner and to the same extent as is provided under the laws of the state of Idaho for the punishment of the crime or offenses that each combined to commit. [Emphasis added.]
The language of the 1978 statute is clear. It applies to
all
crimes or offenses proscribed by the laws of this state.
See, e.g., State v. Gallatin,
We acknowledge that some commentators have argued against requiring overt acts in prosecutions for serious ongoing conspiracies, such as those involving drug trafficking.
See
MARCUS § 2.08[1] n. 17. But we find the criticism unpersuasive. There is no cogent reason to make drug trafficking conspiracies an exception to the general law of conspiracy in Idaho. Moreover, where conflicting statutes create an ambiguity concerning the reach of the criminal law, the conflict must be resolved in favor of lenity.
Simpson v. United States,
Our analysis is grounded not only in these canons of statutory construction but also in sound policy considerations. An overt act requirement gives would-be participants in a conspiracy a chance to back out before harm is done. As Justice Harlan once stated:
The function of the overt act in a conspiracy prosecution is simply to manifest “that the conspiracy is at work, ...” and is neither a project still resting solely in the minds of the conspirators nor a fully completed operation no longer in existence.
Yates v. United States,
B
We now must determine whether the overt acts set forth in the state’s information in this case are sufficient. As noted, the information sets forth twenty-seven overt acts. Twenty-five are telephone calls. The remaining two acts include a visit to the prison by one of the conspirators and the possession of marijuana by one of the other conspirators outside the prison.
All authorities agree that the overt act requirement is satisfied by slight evidence. MARCUS § 2.08[3]. The act in furtherance of the conspiracy need not itself be criminal.
Hyde v. United States,
Many courts have concluded that telephone calls can constitute overt acts under certain circumstances.
See, e.g., United States v. Strickland,
It is self-evident, as a matter of law, that not all telephone calls automatically qualify as overt acts. Some may relate solely to expression of the agreement. However, even calls so limited may impart meaning to other acts. Here, we believe the telephone calls give meaning to the other acts of visiting the prison and possessing marijuana. The prosecutor’s information, taken as a whole, contains sufficient allegations to satisfy the pleading requirement of an overt act. Accordingly, we uphold the district judge’s refusal to dismiss the information, albeit for reasons different from those he stated.
In summary, the district court’s order, denying the appellants’ motion to suppress the wiretap evidence and to dismiss the information, is affirmed. The case is remanded for proceedings consistent with this opinion.
Notes
. The parallel to this case is complete if the challenged pen register in this case is equated with an earlier wiretap. Each is a prior, arguably illegal electronic search that gathers information used by the state in its showing of probable cause in a subsequent wiretap application.
. We note that our research has disclosed one case which holds to the contrary and allows indirect or vicarious standing.
See People v. Amsden,
. Because we conclude that none of the appellants possessed standing, we need not broach the thornier question of what legitimate privacy interests prison inmates may have in the telephone calls they make.
. As to each claim the appellants are "aggrieved persons” within the meaning of the Act. All of them were parties, at one time or another, to the conversations intercepted by wiretap. Therefore, they have standing to challenge the wiretap evidence under I.C. § 18-6708(10)(a).
. Our analysis also applies to the affidavit in support of the application for a thirty-day extension of the wiretap. That affidavit contained information gleaned from the initial surveillance as well as information presented in the original affidavit.
. The guidelines provided by the prosecutor allowed officers to spot-monitor every fifteen seconds. However, our review of the DNR tapes prepared during the course of the wiretap— which recorded the minimization process down to the second — indicates that the officers did not *488 spot-monitor that frequently. Therefore, we need not decide whether fifteen seconds is an appropriate interval for spot-monitoring.
. These state statutes are generally similar to I.C. § 37 — 2732(f). For example, the Oklahoma statute, Okla.Stat.Ann. tit. 63, § 2-408 (West 1984), prоvides:
Any person who attempts, endeavors, or conspires to commit any offense defined in this act shall be subject to the penalty prescribed for the offense, the commission of which was the object of the endeavor or conspiracy.
New Jersey has gone farther, codifying the overt acts requirement under its general conspiracy statute with reference to the Uniform Controlled Substances Act:
No person may be convicted of conspiracy to commit a crime other than a crime of the first or second degree or distribution or possession with intent to distribute a controlled dangerous substance as defined under the “New Jersey Controlled Dangerous Substances Act,” P.L. 1970, c. 226 (C. 24:21-1 et seq.), unless an overt act in pursuance of such conspiracy is proved to have been done by him or by a person with whom he conspired.
N.J.Stat.Ann. § 2C:5-2(d) (1982).
