In 1967, the United States Supreme Court struck down New York State’s eavesdropping statute as unconstitutional (Berger v New York, 388 US 41 [1967]). More than adumbrating what it would do only months later when it issued its decision in Katz v United States (389 US 347 [1967]) overruling Olmstead v United States (277 US 438 [1928]), the Berger Court held that electronic eavesdropping constituted a search within the meaning of the Fourth Amendment (Berger, 388 US at 52-53) and, accordingly, that when the government sought to listen to the private conversations of its citizenry it was obliged first to obtain a warrant from a neutral magistrate issued upon probable cause supported by oath or affirmation, and particularly describing the object of the contemplated intrusion. It followed as well that fruits of unauthorized eavesdropping were subject to the exclusionary rule, which by the time of Berger had been applied to the states (id. at 53, citing Mapp v Ohio, 367 US 643, 655 [1961]).
The New York statute challenged in Berger was deemed facially deficient on numerous grounds, but principally for its failure to meet the Fourth Amendment’s requirement of particularity and for the open-ended authority it conferred upon a successful eavesdropping applicant (388 US at 58-59). These inadequacies were specially troubling given eavesdropping’s “inherent dangers” (id. at 60). The practice, the Court noted, had been historically disfavored and, indeed, universally outlawed, except for law enforcement purposes (id. at 45-49), in which context it remained highly problematic by reason of its unusually intrusive, indiscriminate and insidious capacities. While acknowledging the representations of numerous highly respected prosecutors as to the utility of electronic eavesdropping, particularly in the investigation of organized crime (id. at 60-62), the Court responded,
“we cannot forgive the requirements of the Fourth Amendment in the name of law enforcement. This is no formality that we require today but a fundamental *156rule that has long been recognized as basic to the privacy of every home in America. While ‘(t)he requirements of the Fourth Amendment are not inflexible, or obtusely unyielding to the legitimate needs of law enforcement,’ Lopez v. United States, supra, at 464 (dissenting opinion of BRENNAN, J.), it is not asking too much that officers be required to comply with the basic command of the Fourth Amendment before the innermost secrets of one’s home or office are invaded. Few threats to liberty exist which are greater than that posed by the use of eavesdropping devices. Some may claim that without the use of such devices crime detection in certain areas may suffer some delays since eavesdropping is quicker, easier, and more certain. However, techniques and practices may well be developed that will operate just as speedily and certainly and—what is more important—without attending illegality” (id. at 62-63 [emphasis added]).
Responding to Berger’s constitutionally based concerns and holding, Congress in 1968 enacted title III of the Omnibus Crime Control and Safe Streets Act (codified at 18 USC § 2510 et seq.), setting forth baseline standards governing the issuance of eavesdropping warrants (18 USC § 2518) and making those standards applicable to the states (18 USC § 2516 [2]) while permitting them to enact still more restrictive provisions (id.). To the extent, then, that the New York Legislature one year later, in enacting New York’s conforming electronic eavesdropping statute (subsequently codified as CPL article 700) engaged in any balancing of the relevant competing interests, the exercise was largely academic; the essential balancing had already been performed by the Supreme Court and Congress. The State Legislature, as noted, had the option of being more protective of personal privacy than Congress had been, but it retained no power to alter the balance struck at the federal level in the opposite direction. It is suggested that New York’s eavesdropping statute was motivated by some policy to make eavesdropping more readily available in the investigation of organized crime. But the thrust of Berger was in precisely the opposite direction, and, in fact, the ensuing federal enactment, to the extent here relevant, contained no special dispensation for organized crime investigations. Rather, that enactment and its New York analogue, in undoubted recognition of the “inherent *157dangers” of electronic eavesdropping (see Berger, 388 US at 60, 62) insufficiently appreciated in New York’s former eavesdropping statute, contain what to all appearances are uniformly applicable presumptions against resort to eavesdropping that can be overcome only when the proponent of electronic surveillance proffers “a full and complete statement” of facts establishing either that normal, less intrusive investigative techniques have been tried and have failed, or that they reasonably appear unlikely to succeed in uncovering the sought evidence (18 USC § 2518 [1] [c]; CPL 700.15 [4]; 700.20 [2] [d]).1 The question now presented is whether the affidavit offered in support of the application for the subject eavesdropping warrant, issued March 31, 2005, met this condition with respect to defendant Rabb.2
Permission to tap the cell phone subsequently found to have been used by defendant Rabb was sought after a long pending and then still ongoing investigation of a minority labor coalition known as Akbar’s Community Services (Akbar) and its principals Derrick Walker and Frederick Rasberry, involving witness interviews, document review, visual surveillance, undercover work, search warrant execution and, finally, electronic eavesdropping, disclosed that a cell phone in the name of one Carol Rabb was being used by an individual then identified only as “Divine” to communicate respecting racketeering related activities in which the user was evidently involved. It was thought based on information obtained in the course of the Akbar investigation, most notably phone records and conversations intercepted under eavesdropping warrants pertaining to the cell phones used by Walker and Rasberry,3 that “Divine” was a leader of P&D Construction Workers (P&D). Although little was actually known about P&D, it appeared that it was a fledgling minority labor coalition in competition with the better established *158Akbar and that it was to some unascertained extent involved in corrupt practices.4
Authorization to eavesdrop on the “Divine” cell phone, used under an account in the name of Carol Rabb, was first sought in March 2005 in the context of an application seeking to extend the previously issued Walker and Rasberry eavesdropping warrants. The applicant’s supporting affidavit, dated March 31, 2005, contains extensive analysis of phone records and lengthy excerpts of conversations intercepted on the Walker and Rasberry cell phones purporting to demonstrate in accordance with the requirements of CPL 700.15 (2) and (3) that there was probable cause to believe that the investigation’s targets were committing specified crimes and that particular communications respecting the suspected crimes would be captured through the sought eavesdropping. The sufficiency of these probable cause allegations is not the issue before us; it is, rather, the adequacy of the immediately following allegations purporting to demonstrate the need for eavesdropping. Those allegations, under the heading “THE NEED FOR EAVESDROPPING,” occupying only 372 of the affidavit’s 64 pages, are notably general and conclusory, and make virtually no attempt to differentiate between the long-standing Akbar investigation and its corporeal targets and the practically nascent investigation into P&D and its supposed leader “Divine.” They are, in fact, barely distinguishable from those comprising “THE NEED FOR EAVESDROPPING” section of the affidavit filed in support of the March 1, 2005 eavesdropping extension application, which targeted only the Walker and Rasberry cell phones; the relevant paragraphs of the March 31, 2005 application differ from those of the March 1 application only in their occasional, unelaborated references to “Divine” or “P&D.”
Apart from noting “a number” of attempts during the preceding month at identifying “Divine” through visual surveillance of meetings between Walker and Rasberry and their associates, the affidavit does not trouble to show in accordance with the first prong of CPL 700.15 (4) that, with respect to P&D and “Divine,” “normal investigative procedures [had] *159been tried and [had] failed.”5 The affidavit instead appears to address itself to the statute’s alternative prong under which the requisite showing of need can be premised on a demonstration that “normal investigative procedures . . . reasonably appear to be unlikely to succeed if tried.” In this connection, the affiant alleges as he had previously, almost completely without particular reference, that although physical surveillance might establish “some useful facts” it would be inadequate to achieve the investigation’s goals and might risk the investigation’s secrecy as investigators attempted to draw near to the targets of their scrutiny; that eavesdropping is necessary because the targeted corrupt activities are widespread and involve numerous participants, and because victims of those activities would likely be afraid to testify; that, although the affiant in an undercover capacity had succeeded in transacting illicit business with Rasberry, additional undercover efforts would be impracticable because the members of “this group” had long time associations and family connections precluding the insertion of a government agent; that a grand jury investigation would be futile because witnesses would be afraid to testify and, if they did, would have to be granted immunity; that grand jury subpoenas would tip off the investigation’s targets, foreclosing other conventional avenues of inquiry; and, that the execution of search warrants would be “premature” and would likely result in the destruction of valuable evidence. The relevant portion of the affidavit concludes that evidence necessary for the successful investigation of “this case,” meeting the goals of “this investigation,” can only be obtained through electronic surveillance.
The sought warrant was granted by a Justice of the Appellate Division, Second Department, and thereafter upheld by Supreme Court and the Appellate Division, First Department, over claims by both appellants that the need for eavesdropping on their cell phones had not been made out in accordance with the requirements of CPL 700.15 (4) and 700.20 (2) (d) by the March 31, 2005 warrant applicant. This Court now affirms upon *160the ground that there is record support for the conclusions of those courts. Supreme Court, however, never found that there had been an individualized showing that ordinary investigative techniques would likely be unavailing with respect to “Divine” and P&D. In denying defendant Rabb’s suppression motion, it found instead that such a showing was unnecessary because the futility of ordinary investigative measures had been shown with respect to Walker and Rasberry, and “Divine” was allegedly engaged in the same type of criminal activity.6 The Appellate Division affirmed without making any additional factual findings. It refined the rationale of Supreme Court only to the extent of theorizing that “[t]he affiant’s reliance on experience obtained in a closely related investigation into similar activities by other suspects [Walker and Rasberry] was proper, because the affidavit was sufficiently specific in showing the connection between the two investigations” (66 AD3d 487, 488 [2009]). To the extent, then, that this Court now affirms upon the ground that there were findings specific to Rabb and P&D to support the conclusion that normal investigative methods would likely be futile as to them, it acts as a factfinder in excess of its jurisdiction; no court has to this point upheld the challenged warrant upon such grounds.
The reason for this is that the warrant application simply does not state, much less state “fully and completely,” why normal investigative techniques would not likely be useful in obtaining evidence implicating the “Divine” cell phone user and P&D in corrupt labor practices. What it does do is reiterate, practically verbatim, a summary explanation of why normal investigative methods would not be productive with respect to Akbar and its principals—an explanation whose sufficiency did not rest upon the affidavit’s assemblage of generic assertions *161respecting “THE NEED FOR EAVESDROPPING,” but upon the elsewhere documented 30-month history of the Akbar investigation, in which ordinary investigative methods had been extensively used. There, of course, was no remotely comparable history to recount with respect to the newly commenced investigation of “Divine” and P&D, and in its absence the affidavit’s pat recitation of difficulties endemic to organized crime probes was patently insufficient to explain why ordinary investigative means would likely be fruitless with respect to “Divine” and P&D.
In view of the circumstance that the baseline standard for a showing of necessity in justification of electronic eavesdropping is federal, it is clear that the decisions of the federal courts applying that standard are of special relevance to our inquiry, which, minimally, must be whether there is evidence to permit the inference that the federally compelled standard has been satisfied. The People agree that this is so and list in a decontextualized way numerous bromides to demonstrate that necessity is not a rigorous requirement, but merely one that may be met by a showing that electronic surveillance is not being “routinely employed as the initial step in criminal investigation” (United States v Giordano, 416 US 505, 515 [1974]). We are in this vein reminded that resort to traditional investigative methods need not be exhaustive (see United States v Robledo, 254 Fed Appx 850 [2d Cir 2007]), or entirely useless (see United States v Maxwell, 25 F3d 1389, 1394 [8th Cir 1994]), before a wiretap may be deemed necessary, and that an investigator’s prior experience may have relevance to a judgment that less intrusive investigative techniques would not be efficacious (see United States v Ashley, 876 F2d 1069, 1072 [1st Cir 1989]). It is in addition impressed upon us that the federal cases employ a “common sense approach” in evaluating the government’s assessment of the utility of alternative investigative methods (see United States v Blackmon, 273 F3d 1204, 1207 [2001]). But none of these maxims have actually been applied as the People essentially contend they should be here, effectively to relieve a warrant applicant of the burden of specifying why less intrusive alternatives to eavesdropping would be unavailing in advancing the investigation of a particular target. That electronic surveillance is not the very first step in an investigation is not license for it to be the second or third step; such a literal-minded *162application of Giordano’s dictum to effectively supplant the statutory requirement was never intended.7
It is true that the applicant need not show that alternative methods have actually been tried and have failed, but in lieu of demonstrating necessity by that means, there must, if the necessity requirement is not to be rendered practically nugatory, be some equivalently “full and complete” explanation under the statutory second prong as to why the use of traditional methods would be ineffective to meet reasonably defined investigational objectives. What is required is a factually detailed statement “establishing” (CPL 700.20 [2] [d]) that the evidence sought through a particular wiretap, or its probative equivalent, is not reasonably likely to be acquired through “normal” means. This was never provided as to “Divine” and P&D, and until now was never found to have been. Rather, what was found was that necessity had been shown to justify the Walker and Rasberry wiretaps and that because Akbar and P&D were similar, or because their investigations were connected, the necessity predicate as to the Akbar principals could be transferred to justify the tapping of the cell phones of P&D principals. The legal issue before us is the propriety of that predicate transfer. This is not a mixed question of law and fact, but entirely one of law as to which federal cases have spoken with great clarity.
In United States v Santora (600 F2d 1317 [9th Cir 1979]), the court reviewed eavesdropping warrants issued in connection with an investigation into a numerously populated conspiracy to traffic in stolen airline tickets. Although upholding the electronic surveillance warrants initially issued in the investigation, the court found that the need for certain additional wiretaps subsequently authorized within the same investigation had not been sufficiently made out. It noted that the validity of the prior wiretap authorizations did not entitle the government *163to “dispense with the required showing when applying to tap the telephones of other conspirators” and quoted United States v Abascal (564 F2d 821, 826 [9th Cir 1977]) for the proposition that “[i]t is not enough that the agents believe the telephone subscribers they wish to tap are all part of one conspiracy Less intrusive investigative procedures may succeed with one putative participant while they may not succeed with another” (600 F2d at 1321). Similarly, in United States v Gonzalez, Inc. (412 F3d 1102 [9th Cir 2005]), the validity of prior eavesdropping warrants issued in connection with an investigation into an immigration smuggling ring, permitting the tapping of certain phones at a bus terminal, was held insufficient to demonstrate the necessity of subsequent wiretaps placed on phones at a different location:
“[the government] attempted to shoe-horn the significant investigatory work the government conducted before applying for the Terminal wiretap into its application for the Blake Avenue wiretap. But the government is not free to transfer a statutory showing of necessity from one application to another—even within the same investigation. This court has held that an issuing judge may not examine various wiretap applications together when deciding whether a new application meets the statutory necessity requirement. Each wiretap application must separately satisfy the necessity requirement” (id. at 1115 [emphasis added]).
Here, while we deal with what in the investigator’s eyes was one investigation into the corrupt practices of minority labor coalitions, the investigation, objectively, had numerous distinct targets. P&D and Akbar were separate, indeed by the People’s description, rival, entities. While they may have shared similar goals for their respective memberships and leaders, and there was some evidence that they occasionally colluded, there was no basis to suppose that they were part of a single overarching criminal conspiracy or enterprise. Moreover, even if there had been, it is clear from Santora and Gonzalez that the showing of necessity made in justification of the Akbar wiretaps was not transferrable to support the P&D wiretaps. Indeed, the showing of necessity made with respect to Walker and Rasberry would not even have been transferrable to justify eavesdropping on the phones of other Akbar principals.
That normal means had, after extensive and often useful application, reached a point of diminishing returns in the Akbar *164investigation, did not “establish” that such means were unlikely to be productive in the relatively recently commenced investigation of P&D and its principals. If the two entities were comparable as the People contend, the early success of the Akbar investigation using ordinary means of inquiry, would seem to suggest that such means would have been similarly efficacious in the early stages of the P&D investigation. If, on the other hand, the entities were, as defendants contend, quite different, there would appear to be no ground to suppose that the experience in investigating Akbar had much predictive value in assessing the utility of “normal” techniques in the investigation of P&D. It is, in any case, not consistent with the constitutionally grounded statutory presumption against electronic eavesdropping that there should be a proliferation of wiretaps based upon necessity findings turning on the mere relatedness or similarity of investigations or their targets. If that were permitted, wiretapping would, in a broad range of situations defying judicial containment, routinely become among the first investigative means employed, rather than a necessary supplement to ordinary, less intrusive measures.
It does not seem to me wise to avoid this squarely presented problem, and particularly to do so by denominating the legal issue before us as a “mixed question.” Today’s decision, while perhaps narrowly intended, will, given its factual underpinning, be taken as granting broad permission to dispense with the necessity requirement in a wide range of circumstances based simply upon the supposed similarity of targets or the connectedness of investigations. These theories undeniably have their attraction; it may well seem a foregone conclusion borne out by an investigator’s experience in probing other apparently similar criminal enterprises that the entity with which he or she is now confronted will not be amenable to penetration by ordinary means and that the investigation’s ultimate objective—the complete extirpation of the criminal organism’s many roots and tendrils—will not be achievable except with the aid of electronic surveillance. But it is in this context a court’s obligation under the law to check the impulse toward the expedient use of wiretaps and remind those in the often competitive business of ferreting out crime that the
“fact ‘that traditional investigation methods do not reveal all [is a] generic problem[ ] of police investigation [and that its] generic nature does not dissipate *165simply because the government claims a vast investigative purpose . . . The government may not cast its investigative net so far and wide as to manufacture necessity in all circumstances’ ” (United States v Gonzalez, Inc., 412 F3d at 1114-1115, quoting United States v Blackmon, 273 F3d at 1211).
Because I believe that the tack now taken by this Court affords government a net far more capacious than the law permits, either in its federal or conforming state iteration, I would reverse, grant the motions for suppression of communications obtained by means of the wiretaps authorized in reliance upon the March 31, 2005 warrant, and remit the matters for further proceedings.
Judges Graffeo, Read and Smith concur with Judge Pigott; Chief Judge Lippman dissents and votes to reverse in a separate opinion in which Judges Ciparick and Jones concur.
In each case: Order affirmed.
. The presumption may also be overcome by a showing that “normal” investigation would be too dangerous, but that ground is not here raised.
. In the course of the electronic surveillance conducted pursuant to the March 31, 2005 warrant’s authority investigators became aware of the cell phone whose use was eventually traced to defendant Mason. Permission to eavesdrop on the Mason phone was sought in subsequent warrant applications. Inasmuch, however, as those subsequent warrants were premised upon information obtained pursuant to the March 2005 warrant authorizing the tap of the “Divine” cell phone, the crucial predicate for the disposition of each appellant’s suppression motion was that set forth in the supporting March 31, 2005 affidavit.
. The validity of these warrants is not here at issue.
. The majority takes considerable liberty when it attributes to the People at the time of the warrant application knowledge of “how P&D operated its business” (majority op at 154). Virtually nothing was known about P&D’s structure or operations at that time.
. While the majority finds relevant the additional circumstance that a “Divine” business card had, during the Akbar investigation, been obtained from a contractor who claimed that it had been left with her by a P&D agent who demanded that community workers be employed at her work site, the affiant apparently did not deem this transaction pertinent to his explanation of the need for eavesdropping. This is understandable since the receipt of the business card and its ensuing use in identifying P&D as an investigative target in no way showed that eavesdropping was necessary.
. Supreme Court stated:
“The People did not have to conduct a preliminary investigation of defendant as a prerequisite to establishing that normal investigative procedures could not be utilized to investigate defendant’s alleged criminal conduct. The People had already shown that such measures had been tried and failed or that they reasonably appeared to be unlikely to succeed if employed against Walker and [Rasberry], Defendant allegedly engaged in the same type of criminal enterprise and criminal activity as that allegedly engaged in by defendants Walker and [Rasberry], Under those circumstances, the People were not required to make a more individualized showing that such measures would be unlikely to succeed against defendant or that such measures had been attempted and failed.”
. This is clear when the quotation is read in context:
“Congress legislated in considerable detail in providing for applications and orders authorizing wiretapping and evinced the clear intent to make doubly sure that the statutory authority be used with restraint and only where the circumstances warrant the surreptitious interception of wire and oral communications. These procedures were not to be routinely employed as the initial step in criminal investigation. Rather, the applicant must state and the court must find that normal investigative procedures have been tried and failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous” (416 US at 515 [emphasis added]).