*233 OPINION
The defendants Barry R. McGoff and David W. Haddad were convicted in a jury-waived trial of possession with intent to deliver cocaine and of conspiracy to possess with intent to deliver cocaine. Each was sentenced to the Adult Correctional Institutions for twenty years, twelve years suspended; placed on probation for twelve years and fined $20,000. The defendants appeal the denial of their pretrial joint motions to suppress evidence and to have a hearing on the veracity of affidavits that were submitted to support the application for a wiretap.
In the fall of 1983 State Police Detective Brian R. Andrews began a drug investigation of the activities of defendants and others. The investigation initiated with information provided by a confidential informant and with routine police inquiry. It continued for well over a year.
Between December 7, 1983 and May 30, 1984, three subpoenas duces tecum were served on New England Telephone (the telephone company) requesting toll-record information of the telephone number for the Newport County residence of defendant McGoff. Though McGoff lived alone, the telephone at his residence was listed under the name of Joyce McGuire. The telephone company complied with the subpoenas and sent the toll records to Detective Andrews.
On June 28, 1984, Detective Andrews submitted an application and supporting affidavit for an order authorizing the installation of a pen-register device on the telephone at McGoff’s residence. A pen register is a device used to determine the telephone numbers dialed from the telephone to which the device is attached. It does not intercept or record the content of telephone conversations. The application, based on information Detective Andrews had received from the informant, his investigation, and the subpoenas, was allowed and the order implemented.
On August 24,1984, the Attorney General submitted an application to intercept wire communications (wiretap) supported by two affidavits of Detective Andrews which included information that had been continuously supplied by the informant through August 13, 1984, information obtained through investigation and surveillance, and information derived from the use of the pen register. The application was allowed and the order implemented.
Information obtained from the wiretap was used to prepare an affidavit in support of an application for conventional search warrants. The warrants were authorized and executed September 2, 1984, and various vehicles, residences and places of business in Newport County were searched. Evidence seized was used to convict defendants at trial.
I
THE GRAND JURY SUBPOENAS DUCES TECUM
The defendants first contend that the grand jury subpoenas duces tecum, requiring the telephone company to turn over to the state records of toll calls made from McGoff’s residence, were unauthorized by the grand jury, or, alternatively, were improperly issued by the grand jury. Thus, defendants’ reasonable privacy interests in the telephone records were violated.
Because the toll-record information derived from these subpoenas was used by the state to support its request to install a pen-register device — information derived from which was then used to secure an order to place a wiretap on the McGoff-resi-dence telephone — and because evidence derived from the wiretap was later introduced at trial against them, defendants claim the trial court erred in not granting their joint motion to suppress this evidence as being tainted “fruit of the poisonous tree” under
Wong Sun v. United States,
The trial court denied defendants’ motion to suppress any product of the sub *234 poenas on the ground that defendants lacked standing to contest subpoenas duces tecum issued to the telephone company and requiring it to turn over ordinary business records, without first showing that such records were recognized as confidential under the law. Absent such a showing, the court ruled, defendants had no reasonable expectation of privacy in the telephone company’s business records and thus could not protest their transfer. We agree.
The exclusionary rule protects the individual’s reasonable expectation of privacy by prohibiting the use, at trial, of evidence obtained in violation of a person’s constitutional rights.
State v. Timms,
In determining whether a defendant has standing to invoke the exclusionary rule, we must engage the substantive question of whether the challenged search or seizure violated the constitutional rights of that defendant.
Rawlings v. Kentucky,
In
Rawlings,
the defendant moved to suppress controlled substances retrieved from a purse owned by and in the possession of another during the search of a house the defendant was visiting. The Court held that since the (lefendant had no reasonable expectation of privacy in a purse belonging to another, the defendant could not challenge the legality of the purse’s search even though he claimed ownership of the drugs found therein.
1
Id.
at 106,
In
United States v. Miller,
As for subpoenas issued to the telephone company, this case is governed by the same general rule. 2
*235 II
THE PEN REGISTER
The defendants next contend that the installation of a pen register must be preceded by judicial authorization supported by probable cause. Since the application for the pen register fell short of establishing probable cause, say defendants, the information derived from the pen register should not have been used to support the later application for the wiretap.
The trial court did find that Detective Andrews’s affidavit supporting the application for the pen register fell short of establishing probable cause, but ruled that no warrant was needed to install the pen register because defendants had no reasonable expectation of privacy in the numbers dialed from the telephone at McGoff s residence.
The defendants concede that the Federal Constitution does not require that the installation of a pen register be preceded by a showing of probable cause. In
Smith v. Maryland,
This court has the power and the right to provide Rhode Island citizens with stricter safeguards against governmental intrusions than are provided generally under the Fourth Amendment.
State v. Benoit,
In this case we need not reach the question of whether the Rhode Island Constitution provides stricter safeguards against the use of pen registers. Any information acquired through the use of the pen register and included in Detective Andrews’s affidavits in support of the application for the wiretap was mere surplusage and was not needed to establish probable cause. The trial court, in reviewing the affidavit at the motion hearing, struck out all references to any information derived from the use of the pen register (as well as striking out everything else the defense complained of) and still found, on the basis of the information provided by the confidential informant, that there was sufficient information to support the order for the wiretap. We agree.
Probable cause is statutorily and constitutionally required for a wiretap order to issue. Statutorily, G.L.1956 (1981 Reenactment) § 12-5.1-4 requires a judicial determination of probable cause before a wiretap order can issue. Section 12-5.1-2(d) states that applications for such an order may be based, in whole or in part, on the statements of persons other than the applicant, as long as the source of the information is described and the application “containfs] facts establishing the existence and reliability of the informant, or the reliability of the information supplied by him. The application must also state, so far as possible, the basis of the informant’s knowledge or belief.”
Constitutionally, in
Illinois v. Gates,
In the present case, counsel for defendants conceded at oral argument that the reliability of the informant in Detective Andrews’s affidavits was not contested. The affidavits clearly set forth that the informant had always provided accurate information in the past and that such information had led to the arrests of eight individuals, three of whom were convicted, and to the seizure of 1,355 pounds of marijuana. Hence, the reliability requirement of § 12-5.1-2(d) is satisfied.
The basis of the informant’s knowledge was also set forth in the affidavits. After giving Detective Andrews both defendants’ names, as well as McGoff’s address, marital status, and telephone number, the informant said that he regularly purchased cocaine and marijuana from McGoff by telephoning him and then picking up the drugs from McGoff’s residence or mailbox. The informant directed Andrews to McGoff’s secluded residence and pointed it out. He provided Andrews with descriptions of McGoff’s vehicles, with names of those with whom McGoff dealt drugs, and with names of businesses owned by both defendants. Detective Andrews then began to independently investigate the defendants’ illegal activities. Among other things, the investigation included checks with the Division of Motor Vehicles and other agencies, as well as surveillance of one of defendants’ businesses where McGoff was, on separate occasions, observed by the police exchanging a paper bag for money and overheard telling an unknown male that he had a “sample” with him, that it was “good stuff,” and that if the male liked what he saw, McGoff could provide “large amounts of the same quality.” (The informant later told Andrews that McGoff sold ounces of cocaine for $1,900.) Andrews learned that several of the persons with whom the informant said McGoff dealt had prior drug-arrest records, and that defendant Haddad had served time for conspiracy to sell cocaine.
In light of the foregoing, we agree with the trial court that there was a substantial basis, independent of the information derived from the use of the pen register, for the issuing justice to determine from the affidavits that there was a “fair probability” that illegal drug transactions would be discussed over the McGoff-residence telephone. And because the informant’s reliability was established, the basis of his knowledge stated in the affidavits, and an independent, corroborating investigation conducted, the requirements of § 12-5.1-4 and of Gates are satisfied. The trial court properly denied defendants’ motion to suppress.
Ill
THE FRANKS HEARING
The defendants’ last contention is that the trial court erred in not granting them a hearing, under
Franks v. Delaware,
In
Franks
the Court said that affidavits supporting search warrants are to be presumed valid.
Id.
at 171,
Here, defendants did allege that Detective Andrews deliberately or recklessly provided false information in his affidavit. Their only offer of proof, however, was an affidavit submitted by defendant McGoff which denies that some of the events related by the informant to Detective Andrews ever happened. At best it indicates that the informant may have provided Andrews with misinformation. Nowhere is there any proof that Andrews himself deliberately falsified information or that he should have presumed the informant, who had always been reliable in the past, to have been lying.
Because defendants’ offer of proof was simply self-serving, and because it does not appear to have been supported by anything more than a desire to cross-examine Detective Andrews, it was within the discretion of the trial court not to grant defendants’ motion.
The defendants’ other contentions are without merit.
For these reasons, the defendants’ appeal is denied and dismissed, the judgment of the trial court is affirmed, and the papers are remanded to the Superior Court.
Notes
. Here, not only were the subpoenaed records in the possession of the telephone company, the telephone itself was listed to neither defendant but rather to one Joyce McGuire. This is not to say that had the telephone been listed under defendants’ names their case would necessarily be stronger, for ‘‘[w]hile property ownership is clearly a factor to be considered in determining whether an individual’s Fourth Amendment rights have been violated, [it is] neither the beginning nor the end of [the] inquiry.”
United States v. Salvucci,
. We need not address the question of whether art. I, sec. 6, of the Rhode Island Constitution provides greater protection (than does the Fourth Amendment) for an individual’s privacy interest in toll records belonging to the phone company. As is discussed infra, Detective Andrews’s affidavits supporting the request for the wiretap were sufficient, outside of any information derived from the subpoenas or the pen register, in providing probable cause to issue the wiretap.
. McGoff is the only one of the two defendants who could conceivably have standing to address this issue. Haddad obviously has no reasonable expectation of privacy in numbers dialed from the McGoff-residence telephone.
