Lead Opinion
These consolidated appeals follow convictions of the three defendants on a total of seventeen charges under the controlled drug act, RSA chapter 318-B, including possession of large quantities of cocaine with intent to sell. The defendants claim that the Superior Court (Wyman, J.) erred in authorizing the interception of the contents of communications transmitted over defendant Stephen Young’s telephone lines on the basis, in part, of information obtained by the use of pen registers, previously installed on the same lines under a federal court’s order unsupported by probable cause; that Gray, J., committed error in refusing to conduct a hearing under State v. Spero,
In 1983, during the course of an investigation into the illegal sale and distribution of controlled drugs, the New Hampshire State Police obtained an unlisted telephone number assigned to the defendant Young, toll call records for his two telephones, and an authorization to install a pen register on each of his two telephone lines. A pen register is a mechanical device to detect outgoing signals produced On a telephone line when a number is dialed. It decodes the signals, prints the number, records the date and time, and indicates whether the call is answered. See RSA 570-A:l, XII (Supp. 1986). The pen register model used by the State police can also be used to record the presence of an incoming call signal and to indicate whether the receiving telephone was removed from the hook in response, and by the addition of supplementary mechanisms the police could intercept and record the content of an oral communication over the line. There is, however, no indication in this case that the police used the device to detect incoming signals, or to intercept the content of any communication over Young’s lines to or from any other telephone.
Prior to January 1, 1987, the effective date of RSA 570-A:9-a (Supp. 1986), the New Hampshire wiretapping statute contained no express reference to pen registers as such. Although the State police assumed that the superior court’s authority to order the interception of communications over a telephone line under RSA chapter 570-A was broad enough to authorize the installation of a pen register, the statute did not appear to include the operation of a pen register within the scope of “intercept,” for which the statute required judicial authorization. See RSA 570-A:l, III and :7. Given this uncertainty, the police did not wish to follow the State statutory process, because RSA 570-A:9, V would have limited any authorization to a period of ten days, subject to renewals for like periods. Since the police wished to monitor calls on Young’s two lines for a longer period, they asked federal agents to act on their behalf in obtaining pen register authorizations from the United States District Court for the District of New Hampshire under Federal Rule of Criminal Procedure 57(b) and the All Writs Act, 28 U.S.C. § 1651(a). The federal court authorized the installation of the pen registers for thirty days, and later renewed the order, upon finding that the application was made in good faith for the purpose of furthering a pending investigation, and with reason to believe that the telephone lines in question were and would be used to further criminal activity. The court directed the telephone company to
On January 5,1984, Sergeant Henry Carpenito of the State police prepared an affidavit that combined data provided by the pen registers about calls made from Young’s telephones, records of toll calls made from those same telephones and from telephones assigned to the defendants Benjamin Valenzuela and Antimo DiMatteo, and information about the three defendants obtained from police records, investigators, and informers. On this basis he obtained a superior court wiretap order under RSA 570-A:9 for an interception of the contents of communications during completed calls over the same telephone lines assigned to Young that the pen registers had previously monitored for numbers dialed in outgoing calls. These interceptions provided information on the basis of which the police, in turn, obtainеd warrants on January 15, 1984, to search the houses of all three defendants. The ensuing searches yielded, inter alia, 65 pounds of cocaine, nearly a ton of marijuana, LSD tablets, jewels, over $200,000 in cash, ledgers and other documentary evidence of drug traffic, and an assortment of pistols, revolvers, and ammunition.
After unsuccessfully litigating motions to suppress the State’s evidence, the defendants waived jury trial and submitted their cases to the superior court on the basis of the existing records and certain stipulations. The Trial Court (Gray, J.) returned guilty verdicts on the seventeen charges and proceeded to sentence Valenzuela and DiMatteo to prison terms of 15 to 40 years, and Young to a term of 25 to 70 years. These appeals followed.
As our statement of facts indicates, the accumulation of evidence upon which the search warrants ultimately rested began with the acquisition of Young’s one unlisted number, followed by the disclosures of toll records for his telephones (as well as for the telephones assigned to DiMatteo and Valenzuela), and the production by the pen registers of lists of numbers called on each of Young’s lines. The defendants maintain that the State acquired all of this information in violation of part I, article 19 of the Cоnstitution of New Hampshire. In this appeal, however, the defendants address their specific arguments solely to the acquisition of telephone numbers by use of the pen registers, apparently on the assumption that all of their claims will stand or fall together. We will limit our decision accordingly, to the constitutional significance of using a pen register to record and disclose numbers dialed to make outgoing calls from a defendant’s telephone. (In view of our conclusion about the requirements of article 19 on the theory
Article 19 prohibits unreasonable searches and seizures of an individual’s “person, his houses, his papers, and all his possessions.” The defendants argue the State was thereby barred from access to evidentiary information about numbers dialed on Young’s telephones without first obtaining a warrant or comparable process, supported by a showing of probable cause to believe that the information sought would include evidence of a crime. Because the State made no such demonstration, the defendants submit that the information and all subsequent evidence obtained through its use should be suppressed.
The State concedes that the orders authorizing installation of the pen registers did not rest on any findings by the federal judge that probable cause existed to believe that the telephone lines would be used to make outgoing calls for criminal purposes or that such purposes would be revealed by examination of numbers called on the lines. The State takes the position that it had no obligation to demonstrate such probable cause, because the use of a pen register to record the number dialed to make an outgoing call on the line to which the register is attached is not a search of the person or property of the subscriber to whom the line is assigned, so as to be subject to the restrictions imposed by article 19. (That, we infer, is also the assumption underlying the recently enacted statute regulating the use of pen registers, RSA 570-A:9-a (Supp. 1986), which imposes no probablе cause requirement. See id., subparagraph III.)
Ironically, the parties purport to rest their differing conclusions on a common assumption, that the scope of article 19 protection should be judged by reference to the concept of privacy adopted by the Supreme Court of the United States in Katz v. United States,
On the Katz analysis, protection against unreasonable searches and seizures is not limited by references to private physical premises, or to persons or to tangible evidence. While the fourth amendment, like article 19, speaks in terms of security against unreasonable searches and seizures of a person, his houses, papers, and effects (or possessions), Katz held that the intangible contents of a defendant’s statement may be subject to fourth amendment protection from discovery, without reference to physical invasions of constitutionally protected areas. Katz,
Katz did not, of course, hold that its theory of privacy circumscribed the extent of protection against unreasonable searches and seizures. Id. at 350. But when the government’s effort to obtain evidence does not take the form of a physical search of or for a
Such an understanding is not easily gained, however. Katz held that a person making a telephone call may reasonably expect privacy as against the government’s warrantless use of an electronic eavesdropping device to overhear the statements he utters within а public telephone booth. Katz, supra at 353. Although this holding might have invited broad conceptualization, the Katz majority were plain to say that they had no intention of engrafting a general theory of privacy protection onto the trunk of the fourth amendment. See Katz, supra at 350.
Katz does not leave its readers without further guidance, however, since the majority opinion did describe one means of the government’s access to evidentiary information that would not violate any legitimate expectation of privacy, and would not, therefore, involve a regulated “search.” The majority opinion approvingly cited Lewis v. United States,
The citation to Lewis thus defines constitutionally protected privacy, at least in the negative sense of limiting its scope, and it must therefore be seen as integral to the Katz decision and to an understanding of what Katz does and does not recognize under the rubric of protected privacy. In Lewis, the court rejected a claim that the fourth amendment bars admission of tangible evidence and information revealed by a defendant in his own house to a witness who had deceptively concealed his role as a government agent. Lewis, supra at 210-11. Lewis was decided on the same day as Hoffa v. United States,
The significance of these cases for an understanding of constitutionally protected privacy has not waned in the years since Katz was decided. They were affirmed as undisturbed by Katz in United States v. White,
This understanding of the agent-informer cases illuminates the State’s position that the uses of the pen registers in the instant case did not infringe any protected privacy under Katz and therefore should not be treated as constitutionally regulated searches. The pen registers, installed on the telephone company’s lines, received coded signals sent from Young’s telephones to the company for the purpose of enabling it tо connect Young’s telephones with those he sought to call. In making a record of the decoded signals, the registers did no more than record voluntary communications from the defendant to the telephone company. (Such communications to the company are to be distinguished from the contents of communications transmitted over the company’s lines and addressed not to the company but to the recipients of completed calls. The latter, of course, would be subject to protection under Katz and under RSA chapter 570-A.) It is obvious, and is indeed undisputed, that no constitutionally protected privacy would have been infringed, and no search conducted, if the telephone company had informed the government of numbers orally communicated by Young to an operator. The company and its operator would have been doing nothing different from what the agent or informer might do, and Katz would erect no constitutional hurdle to the government’s evidentiary use of what the company or the operator disclosed. The same conclusion should follow by analogy when a pen register installed on the company’s wire informs the government of the decoded messages communicated to the comрany through the use of the company’s dialing and switching equipment. The only distinction between the two cases is the use of mechanical rather than human receptors of the message intended to inform the company of the caller’s desired connection, and such a distinction should make no difference for constitutional purposes.
It is of course ordinarily true today, as it is in this case, that the company becomes an informer only in response to a court order requiring installation of the pen register on one of its lines. But this fact does not affect the soundness of the analogy, since the
The Supreme Court accepted this logic in Smith v. Maryland,
The defendants have been quick to point out, however, that Smith has not escaped controversy. While some State constitutional analyses have reached the same result, see, e.g., People v. Guerra,
The defendants have proceeded to marshal some of the principal criticisms of Smith expressed in the authorities cited, to which we will respond by indicating why we believe that the State’s position, and Smith’s result, are sound in the light of Katz. At the outset, however, it is well to mention two respects in which we decline to rest our own application of Katz on the discussion contained in Smith. First, the Smith opinion spent some time considering the defendant’s subjective expectation of privacy in the dialed numbers, concluding that he probably entertained no such expectation because he presumably knew that the company sometimes recorded numbers dialed, in order to bill for toll calls and commercial service, and to trace obscene communications. Smith, supra at 742. Whatever mаy be the merits of this ostensibly factual conclusion, it is in the last analysis unnecessary if the Court was also correct, as we believe it was, in holding that any such expectation of privacy would have been unreasonable in the light of Katz. We will not, therefore, address the defendants’ arguments that Young did in fact expect to preserve the privacy of his activity in dialing numbers. We will, indeed, assume with Justice Batchelder, who dissents from this opinion, that Young entertained just such an expectation. See United States v. Jacobsen,
Second, the Smith Court referred to the defendant’s assumption of the risk that the information dialed would be passed on to the government. Smith,
The first of these points is easily restated: there should be no category distinction between a governmental effort to obtain evidence and a search for purposes of constitutional protection. The government is seeking evidence whether it examines the contents of a desk, listens to an intercepted wire communication, or installs a pen register on telephone company equipment to obtain the numbers that a defendant dials on his telephone. So efficient, indeed, is this last mechanism, and so general and comprehensive is its searching capability, that the defendants discern an especially insistent call for constitutional scrutiny.
The response to this argument may be stated just as readily, however. To maintain the position that any effort to gather evidence should be treated as a search regulated in law is, ultimately, to reject the reasoning of the agent-informer cases. This is apparent in Justice Marshall’s dissent in Smith, which begins with citations to his earlier dissents in cases like United States v. White,
Accepting their position would, on the contrary, be a constitutional volte-face. The implication of a rule requiring warrants for pen registers installed on company equipment to record the numbers that a defendant dials would also require a warrant before the government could utilize evidence that might be communicated to an agent or even to an informer, except to the extent that the latter might volunteer information spontaneously. Such a requirement would curtail, if not effectively eliminate, the use of agents, which has been described as an “essential” law enforcement practice, Sorrells v. United States,
The revolutionary implication of the defendants’ position is not limited, however, to its call to deny the persuasive authority of federal cases from Lopez to White, or to overrule our own decision in Kilgus. For if we followed the defendants’ lead, we would have to redefine the very concept of privacy established by Katz, upon which the defendants claim to rely. The defendants fail to face the fact that the privacy held reasonably expectable under Katz is not an immunity to the use of evidence that a defendant has disclosed to an agent or informer who is willing to reveal it. If the defendants will have us apply Katz, they will have to take Lopez, Lewis, Hoffa, White, and Kilgus along with it. They cannot have it both ways. Katz is no support for the defendants’ position, and Kilgus already bars their argument.
The defendants’ second objection to the State’s position starts from the undoubted fact that a telephone subscriber who willingly provides the telephone company with information, consisting of a number dialed, does not thereby intend to provide that information to the government. Other critics of Smith have stressed this same fact, see, e.g., Smith v. Maryland,
Once again, however, the defendants’ view is at odds with Katz. The claim that there are degrees of privacy and that the result in Smith v. Maryland fails to account for them rests on a conception of privacy that is different from the conception of constitutional privacy that Katz recognized. At one level, the degrees-of-privacy critique describes a subjective intent or expectation: the subscriber who dials does not mean to provide information to the government.
Even if we attempt to elevate expectations of degrees of privacy above the purely subjective level, however, Katz still stands in the defendants’ way. We cannot simultaneously recognize the defendants’ asserted limitations on waivers of privacy as against the government and continue to adhere to the rationale of the agent-informer cases, for if a defendant should be entitled to limit his waiver of privacy as against the use of the pen register’s report of what he dialed to the company, he should be able to limit any waiver as against the government’s testimony of what he said to the agent. Since Katz accepted the agent-informer cases, the defendants can not assert a constitutional theory of limited waiver without partially repudiating Katz, upon which they claim to rely. The defendants’ position would redefine Katz’s privacy by converting it from a defendant’s right to be secure against certain means of non-consensual access to his communications and possessions, into a defendant’s right to control the use of evidence without regard to how the defendant may have disclosed that evidence to another. It would empower a defendant to enforce a kind of evidentiary copyright, by precluding the government’s use of information for a purpose that the defendant did not intend when he communicated with another. Suffice it to say that we could not accept the defendants’ position without a wholesale overruling of the agent-informer cases including Kilgus, which stand together as an integral limit to Katz’s concept of privacy.
In summary, we reject the defendants’ arguments, both because they would entail our repudiation of the agent-informer cases, and because they are inconsistent with the holding of Katz, to which the agent-informer cases are an express and essential limitation. Under Katz and the agent-informer cases, there is no violation of constitutional privacy when the telephone operator acts as a government informer by communicating what a defendant has addressed to the operator, and we therefore find no violation when the “hearer” is not an operator, but a machine receiving functionally equivalent information communicated by a defendant and
Because we therefore conclude that the Katz conception of protected privacy, if applied through article 19, would not limit the use of a pen register to obtain the numbers that a defendant dials on his telephone, it is not significant that the federal order authorizing the installation of the devices in issue here was unsupported by probable cause. Accordingly, the defendants have supplied no reason to argue that the superior court should have rejected the information provided by the registers when it determined whether the State had established the probable cause required by RSA 570-A:9, III for the subsequent order authorizing the interception of communications over Young’s two telephone lines.
The defendants argue that the fruits of the interceptions were subject to suppression nevertheless, because of various intentional or reckless misrepresentations allegedly made by Sergeant Carpenito in the affidavit he submitted to the superior court with the application for the interception order. When the defendants raised this issue prior to trial, the superior court first determined that the alleged misrepresentations, taken together, were not material, in the sense of being necessary for a finding of probable cause. Having so determined, the court refused to hold a hearing to receive evidence of the intentional or reckless falsity claimed, and denied any relief predicated on misrepresentation.
The defendants concede that the superior court’s action is consistent with the federal standard for dealing with alleged misrepresentations in warrant applications, as established by Franks v. Delaware,
“[W]hen a defendant makes a preliminary showing that an affidavit in support of a warrant contains misstatements which contribute to the finding of probable cause, the defendant is entitled to a hearing to determine whether the affiant made such misrepresentations intentionally or recklessly; if so, the warrant must be quashed and any evidence derived from its execution must be suppressed.”
This statement is wrong in two significant respects.
First, it erroneously assumes that under State law a defendant is entitled to be heard in challenging a facially valid warrant if he makes a preliminary showing that misstatements by the police merely “contributed” to the demonstration of probable cause. On the contrary, the defendant is not entitled to a hearing unless the statements subject to the preliminary showing of falsity were material, to the degree that there would have been no demonstration of probable cause without them. See State v. Grimshaw,
This first substantial error in the defendant’s quoted statement leads to the second, the assumption that a defendant would be entitled to relief by suppression of evidence upon demonstrating that any false statement contributing to probable cause was made knowingly or with reckless disregard for its truth
In summary, the rule under article 19 is that a defendant is entitled to be heard in attacking a facially valid warrant only after a preliminary showing that in demonstrating probable cause for issuing the warrant, the police made knowing or reckless misstatements that were material in the sense of being necessary for the finding of probable cause. Thereafter, such a defendant is entitled to relief only upon demonstrating that the police in fact knowingly or recklessly made misstatements rising to that material level. In substance, then, the New Hampshire rule established by Spero is identical to the later federal rule announced in Franks, notwithstanding any suggestion to the contrary in State v. Renfrew,
The defendants next attack the interception order on the ground that the information supplied by affidavit in support of the State’s application was stale, and for that reason was insufficient to
The defendants reveal the central weakness of their staleness claim when they state in their brief that the superior court “relied upon stale information” in reaching the probable cause determination. The quotation reflects a confusion between stale probable cause and stale information. See State v. Andrews,
There is not, however, any dispositive significance in the mere fact that some information offered to demonstrate probable cause may be called stale, in the sense that it concerns events that occurred well before the date of the application for the warrant. If such past fact contributes to an inference that probable cause exists at the time of the application, its age is no taint.
The various vintages of the facts stated in the affidavit under consideration herе illustrate this point, by demonstrating how the old and the new can combine to demonstrate current probable cause. The affidavit begins with a recitation of the items in Young’s criminal record: 1965, New York, a charge of first degree grand larceny, but without record of court disposition; 1967, Illinois, petty theft trespass to auto, guilty; 1969, Illinois, sale of LSD, nol prossed; 1970, Wisconsin, sale of dangerous drugs, guilty; 1973, Arizona, possession of marijuana for sale, and transportation of marijuana, dismissed; 1974, Massachusetts, possession of marijuana with intent to sell, and conspiracy to violate the Massachusetts Controlled Drug Act, guilty.
The affidavit proceeds from circumstantial to direct evidence, as it relates information supplied by two informers about Young and his activities. One of the informers described his association with Young and DiMatteo in the sale and distribution of drugs between 1979 and 1981, and the other gave information about a like association in 1981 and 1982. Each confirmed the other’s story that DiMatteo acted as Young’s distributor or sales agent, while the first informer identified Valenzuela as the one who procured the drugs to be sold. One informer described the presence of cocaine and marijuana at DiMatteo’s house as late as 1982, and admitted that he himself purchased cocaine from DiMatteo during that year. The other informer described cocaine and scales at DiMatteo’s house in 1979 through 1981, and a cocaine sale there in 1983.
This evidence of drug sales extending into 1983 was confirmed, and its implications were brought forward, by information obtained from toll records for Young’s telephones covering the months of January through September, 1983, and by the notations supplied by the pen registers used from October 16, through December 10, 1983. Among the calls recorded, 180 were to six individuals with records of drug convictions over the periоd from 1973 to 1981. According to the affidavit, there were calls to business premises frequented by George T. Kattar, whom an informer identified as a financier of drug transactions, and 66 calls to an individual whose car had been driven to a meeting observed by the police in November 1983, where Young’s wife and another woman traded briefcases under circumstances typical of an exchange of drugs and money.
The affiant supplemented these facts with his own opinion, based on his experience in drug investigation, that the telephones were being used in a manner typical of illicit drug transactions. The superior court could reasonably consider this conclusion as
Before leaving the point we note that the foregoing summary omits any alleged misrepresentations, but does refer to three items of information that the defendants claimed to be inaccurate, not because they were misstated, but because the following, related information was omitted: Young was pardoned by the Commonwealth of Massachusetts following his 1974 drug conviction; the charges against his wife were dismissed for failure to prove her knowledge that the package she received contained drugs; and in the apparent drug deal, the individuals exchanged suitcases, not briefcases. These omissions do not, however, affect our result, for their inclusion would not have eliminated probable cause.
The remaining issues arise from the denial of motions to suppress evidence seized under the warrants to search the defendants’ houses. To the extent that those motions rested derivatively on challenges to the legality of the telephone interceptions, the foregoing discussion supports the trial court’s rulings. The suppression motions raise further questions, however, going to the character of the issuing magistrate and to the manner in which the police conducted the search of Young’s house.
First, the defendants argue that Gage, J., who issued the warrants as Justice of the Exeter District Court, was disqualified to act, because he lacked the neutrality and detachment required of issuing magistrates by the fourth amendment of the Constitution
As against this claim, the superior court justice who heard the suppression motion found that Justice Gage’s
“comments to the police played no part in the preparation of the affidavits and indeed the defendants did not show whether the Judge even knew that the matter he discussed with Lt. Brown, and the matters dealt with in the affidavits were in any way related.
* * ❖ *
There is nothing to even suggest that the magistrate was improperly influenced or prejudiced by his prior contact and conversation with the police. The magistrate in this case bore no relationship whatsoever to the prosecution and was in no way, improperly influenced.”
These findings are dispositive on the outcome of the issue, although we should add a further word about it, with an eye to the future. Legal advice to police officers ought to come from city or county attorneys, or from the attorney general’s office, not from judges. “Whatever else neutrality and detachment might entail, it is clear that they require severance and disengagement from activities of law enforcement.” Shadwick v. City of Tampa,
The argument may be answered shortly. The traditional reason for requiring explicit authorization for searches in the night is a sensitivity to what Judge Friendly described as “the peculiar abrasiveness of official intrusions” at that time. United States v. Ravich,
Young raises his final evidentiary challenge in claiming that the police flagrantly disregarded the warrant’s limitations on the objects of search and seizure, and thus proceeded from an initially lawful entry to a general search so unreasonable as to call for suppression of all items seized. See United States v. Heldt,
We address this claim, as the trial judge did, under the standard suggested in Heldt, which candidly confronted the difficulty of regulating the execution of warrants to search for documentary evidence of crimes. The court recognized that when the search under such a warrant is so poorly disciplined as to amount to “flagrant disregard” of the warrant’s terms, the only appropriate remedy may be plenary suppression of all evidence seized. Heldt, supra at 1259. The specific issue here is whether the trial court could reasonably find that police error in executing the warrant did not rise to the level of flagrant disregard. On the persuasive authority of United States v. Whitten,
The instant case, like Whitten, involved a search for papers. In each, the police officers responsible for executing the warrant instructed their people on what to search for; in this case, they also told the searching officers to get advice from more experienced superiors when in doubt about the legality of taking any given item. In each case, however, the officers in charge stopped short of giving copies of the warrant to the officers who would make the actual search, and in each case, the latter improperly seized and removed voluminous papers for later examination into possible evidentiary value.
The facts did not result in a finding of flagrant disregard in Whitten, supra at 1010, and they do not compel one here. The instructions given to the officers were inadequate, but the trial court was entitled to make its finding that the dominant concern of the officers was to find the evidence they were authorized to seize. Nor was his finding that there was tpo much zeal and too little study inconsistent with his conclusion that execution of the
Affirmed.
Dissenting Opinion
dissenting: I agree with the majority that the defendant has asked us to determine the scope of the protections under part I, article 19 of the New Hampshire Constitution by employing the reasonable expectation of privacy analysis in Katz v. United States,
Part I, article 19 of the New Hampshire Constitution reads, in relevant part, that every person has “a right to be seсure from all unreasonable searches and seizures of his person, his houses, his papers, and all his possessions.” This court has recognized that article 19 protects a citizen’s right of privacy in his home. State v. Chaisson,
The United States Supreme Court has already decided, in a much criticized opinion, that under the Katz analysis the use of a pen register does not constitute a search so as to give rise to the protectiоns of the fourth amendment. Smith v. Maryland,
The majority here recognizes the weaknesses in the subjective expectation of privacy inquiry in Smith, as well as the problematic assumption-of-the-risk analysis. The majority, however, does not abandon the notion, critical to Smith, that the defendant voluntarily disclosed the data to the telephone company. Relying on the so-called agent-informer cases, the majority concludes that disclosing telephone number data to the telephone company is equivalent to divulging criminal secrets to an untrustworthy, albeit law-abiding, confidant. I disagree that when one dials a telephone there is a voluntary disclosure of a magnitude similar to that in the agent-informer situation. It can be argued that the majority cannot avoid the assumption-of-the-risk analysis, but rely on the agent-infоrmer cases — the very cases that establish the assumption-of-the-risk approach. See United States v. White,
It is clear that a person has little choice about whether the telephone company will have access to the numbers he dials and the frequency with which he dials them. Commonwealth v. Beauford,
Although the foregoing provides support under the Katz analysis for requiring the use of a pen register to be based on probable cause, I believe the clear import of the language of article 19 mandates the same result. Article 19 protects a person’s “papers” from all unreasonable searches and seizures. “Papers” as tangible objects, however, have little or no intrinsic value. The value of “papers” rests in the content of the information contained in them. The mere advance in technology from paper as the medium for the flow of information to, for example, telephonic communications should not alter the protective force of article 19. Similarly, article 19 should not be limited to protections against the intrusive capabilities of the government at the time of the adoption of article 19. Rather, thе areas of protected privacy must be examined and determined on a case by case basis in light of the technology available to the government at any given time. The protected rights, of necessity, become more sharply defined as science and technology broaden the scope of governmental power. In the end, I see no functional difference between government officials searching for and seizing a person’s papers, in the course of an investigation without the benefit of a warrant based on probable cause, and their monitoring the communicative activities of a citizen without the burden of similar requirements.
I would note finally that since the development of this case, the New Hampshire Legislature has amended RSA chapter 570-A specifically to authorize the installation and use of a pen register upon the satisfaction of certain procedural and evidentiary requirements. RSA 570-A:9-a (Supp. 1986). Although the statute permits a superior court judge to authorize such a use upon a showing of something seemingly less than probable cause, see RSA 570-A:9-a, II (judge must find that installation and use of pen register device is “reasonably calculated to further the investigation . . . .”), it is clear that the legislаture has sought to provide further protection for the citizens of this State in the maintenance of the “proper balance between the State’s duty to protect the public and the individual’s right to privacy and free expression.” State v. Lee,
I would hold, therefore, that a person does possess a reasonable expectation of privacy in the telephone numbers he dials, and that the use of a pen register to record such information is a search within the meaning of article 19. Accordingly, judicial authorization of the use of a pen register must be based upon a finding of probable cause. In this case, the defendants were entitled to have the information obtained through the use of the pen register and the fruits thereof excised from the supporting affidavits, and to have the probable cause determination based only on the remaining information.
