. . . "But this does no more than identify the person whose constitutionally protected area is to be invaded rather than particularly describing the communications, conversations, or discussions to be seized." .