United States v. Edward Soybel ( 2021 )


Menu:
  •                               In the
    United States Court of Appeals
    For the Seventh Circuit
    ____________________
    No. 19-1936
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    v.
    EDWARD SOYBEL,
    Defendant-Appellant.
    ____________________
    Appeal from the United States District Court for the
    Northern District of Illinois, Eastern Division.
    No. 17 CR 796 — Matthew F. Kennelly, Judge.
    ____________________
    ARGUED JUNE 3, 2020 — DECIDED SEPTEMBER 8, 2021
    ____________________
    Before SYKES, Chief Judge, and BAUER and ST. EVE, Circuit
    Judges.
    SYKES,     Chief  Judge.   Industrial-supply    company
    W.W. Grainger was the victim of a series of cyberattacks
    against its computer systems in 2016. Grainger isolated the
    source of the intrusions to a single internet protocol (“IP”)
    2                                                             No. 19-1936
    address, which came from a high-rise apartment building
    where disgruntled former employee Edward Soybel lived.1
    Grainger reported the attacks to the FBI. To confirm the
    source, the government sought and received a court order
    under the Pen Register Act, 18 U.S.C. §§ 3121 et seq., author-
    izing the installation of pen registers and “trap and trace”
    devices to monitor internet traffic in and out of the building
    generally and Soybel’s unit specifically. 2 Among the data
    collected, the pen registers recorded the IP addresses of the
    websites visited by internet users within Soybel’s apartment.
    The IP pen registers were instrumental in confirming that
    Soybel unlawfully accessed Grainger’s system. The district
    court denied Soybel’s motion to suppress the pen-register
    evidence and its fruits, and a jury convicted him of 12 counts
    of violating the Computer Fraud and Abuse Act.
    This appeal presents a constitutional issue of first im-
    pression for our circuit: whether the use of a pen register to
    identify IP addresses visited by a criminal suspect is a
    Fourth Amendment “search” that requires a warrant. We
    hold that it is not. IP pen registers are analogous in all
    material respects to the telephone pen registers that the
    Supreme Court upheld against a Fourth Amendment chal-
    1 Every device connected to the internet has a unique IP address,
    typically consisting of a sequence of numbers. See United States v. Caira,
    
    833 F.3d 803
    , 805 (7th Cir. 2016). An IP address “is used to route infor-
    mation between devices, for example, between two computers.” United
    States v. Ulbricht, 
    858 F.3d 71
    , 84 (2d Cir. 2017) (quotation marks omitted).
    2 A pen register records certain outgoing electronic signals, whereas a
    trap-and-trace device records incoming ones. See 18 U.S.C. § 3127(3)–(4).
    For the sake of simplicity, we use the term “pen register” to refer to both
    devices.
    No. 19-1936                                                   3
    lenge in Smith v. Maryland, 
    442 U.S. 735
     (1979). The connec-
    tion between Soybel’s IP address and external IP addresses
    was routed through a third party—here, an internet-service
    provider. Soybel has no expectation of privacy in the cap-
    tured routing information, any more than the numbers he
    might dial from a landline telephone.
    Soybel insists that this case is governed not by Smith but
    by Carpenter v. United States, 
    138 S. Ct. 2206
     (2018). We
    disagree. Carpenter concerned historical cell-site location
    information (“CSLI”). The warrantless acquisition of that
    type of data implicates unique privacy interests that are
    absent here. Historical CSLI provides a detailed record of a
    person’s past movements, which is made possible so long as
    he carries a cell phone. In contrast, the IP pen register had no
    ability to track Soybel’s past movements. And Carpenter is
    also distinguishable based on the extent to which a person
    voluntarily conveys IP-address information to third parties.
    Accordingly, though our reasoning differs from the district
    judge’s, we hold that the suppression motion was properly
    denied.
    Soybel also challenges the sufficiency of the evidence on
    one of the 12 counts. We reject this argument and affirm the
    judgment in all respects.
    I. Background
    Edward Soybel worked as an IT contractor for Grainger’s
    KeepStock business unit from November 2014 until he was
    fired in February 2016. KeepStock provides Grainger cus-
    tomers with proprietary software and industrial equipment-
    dispensing machines to optimize their inventory manage-
    ment. Dispensing machines at customer sites across the
    4                                                No. 19-1936
    country connect to computer servers at Grainger’s Niles,
    Illinois facility, which also serves as the home base for the
    KeepStock IT helpdesk where Soybel worked.
    KeepStock stores information about its dispensing ma-
    chines and its customers’ log-in credentials in large “data-
    base tables.” Helpdesk staff have their own KeepStock
    usernames and passwords, and when logged in to the
    KeepStock system, they could add and delete information in
    the tables. Performing the same functions remotely (outside
    the Grainger firewall) required access to the KeepStock
    “desktop client”—an application downloaded to a comput-
    er.
    In July 2016 Grainger discovered that over the course of a
    week, someone with Grainger log-in credentials had ac-
    cessed KeepStock and deleted millions of records from the
    database tables. As a result, KeepStock was effectively shut
    down for Grainger employees and customers alike until IT
    personnel could restore the data. An internal investigation
    revealed that the culprit had deleted the records via the
    desktop client using the log-ins of several current KeepStock
    employees, including Soybel’s former supervisor. Further
    investigation led Grainger to believe that the intrusions all
    came from the same IP address outside of Grainger’s net-
    work. Grainger reported the IP address to the FBI, which
    then determined that the address came from a large apart-
    ment building in Chicago where Soybel lived with his
    mother.
    However, the FBI could not yet confirm that Soybel was
    responsible. The identified IP address came not from an
    individual unit but from the building’s “master router” that
    distributed internet service throughout the building. The
    No. 19-1936                                                          5
    master router was, in effect, the middleman between the
    individual units and the rest of the internet. Each unit in the
    building had its own unique private IP address, but when an
    individual user accessed a website, only the master router’s
    IP address would be visible to that website’s servers. At the
    same time, the master router knew to which private IP
    address it should relay that website’s traffic. The upshot is
    that when an internet user in the building connected to
    Grainger’s servers, only the master router could confirm the
    private IP address—and thus the specific apartment unit—
    that was responsible for the KeepStock attacks.
    To confirm its suspicions about Soybel, the government
    applied for an order under the Pen Register Act to install
    IP pen registers for the master router and Soybel’s unit for
    60 days. The data to be recorded was highly technical. 3 For
    our purposes it’s enough to note that the government sought
    to collect (1) connections between the master router’s and
    the unit’s IP addresses on the one hand, and external
    IP addresses on the other; and (2) the time that the connec-
    tions occurred. That is, the information from the pen regis-
    ters would help the government determine whether and
    when Soybel tried to access KeepStock.
    At the same time, the government’s application specified
    that the pen registers would not record the content of any
    communications between IP addresses, an express limitation
    3 The pen registers could “record and decode dialing, routing, address-
    ing, and signaling information (including IP addresses, [Media Access
    Control] addresses, port numbers, packet headers, and packet size) for
    all electronic communications transmitted to or from the [target IP
    addresses], and [could] record the date, time, and duration of such
    transmissions.”
    6                                                         No. 19-1936
    in the Pen Register Act. See 18 U.S.C. §§ 3121(c), 3127(3)–(4).
    The data the government would collect might show, for
    instance, that an internet user connected to a Google IP
    address. 4 But it could not reveal the specific Google website
    accessed (i.e., YouTube or Gmail), let alone what the user
    was doing within that website.
    A district judge granted the application in September
    2016. The order was not based on a finding of probable
    cause. Instead, as required by the Act, the judge found that
    the government had included the requisite certification that
    the information to be obtained was “relevant to an ongoing
    criminal investigation” into computer crimes. Id. § 3122(b)(2)
    (including the certification among the required contents for a
    Pen/Trap application); id. § 3123(a)(1) (specifying this find-
    ing as a prerequisite for the order).
    The building’s internet-service provider then installed
    the pen registers in the building’s mechanical room without
    entering Soybel’s unit. While the master router’s pen register
    captured only internet connections to and from KeepStock’s
    IP addresses, Soybel’s pen register recorded all internet
    connections that came from that unit. Put differently, the pen
    register associated with his apartment recorded connections
    between his private IP address and the IP addresses of those
    websites that internet users in the apartment had visited.
    The pen registers revealed that Soybel’s private IP address—
    and only Soybel’s private IP address—attempted to connect
    to KeepStock 790 times between September and November
    4 TheIP addresses for some servers are publicly available. Some websites
    permit users to input a given IP address and obtain certain identifying
    information about its source, much like a virtual phonebook.
    No. 19-1936                                                  7
    2016. Grainger confirmed that these attempts came at the
    same time that the master router’s IP address tried to breach
    the KeepStock firewall.
    One of the recorded intrusions is particularly relevant for
    this appeal. In September 2016 Soybel changed the
    KeepStock password for Grainger business analyst Dan
    Hoehne in the middle of the night. Soybel clicked on a
    forgotten password option for Hoehne’s username and used
    his own Gmail account as the recovery email. He then
    changed Hoehne’s password to “1234” and temporarily
    locked Hoehne out of KeepStock. Though by this time
    Grainger had blocked the master router’s IP address from
    accessing its system, forensic examination of Soybel’s laptop
    later showed that he was able to change Hoehne’s password
    using the IP address of a nearby apartment building.
    A grand jury charged Soybel with 12 counts of violating
    the Computer Fraud and Abuse Act. See 18 U.S.C. § 1030.
    Count 10 related to the act of changing Hoehne’s password
    and alleged that Soybel knowingly caused “the transmission
    of a program, information, code, or command” to “inten-
    tionally cause[] damage without authorization[] to a protect-
    ed computer.” Id. § 1030(a)(5)(A).
    Following Soybel’s indictment, the Supreme Court issued
    its decision in Carpenter, holding that the government must
    generally obtain a search warrant to access historical CSLI.
    
    138 S. Ct. at 2220
    . The Court concluded that a court order
    under the Stored Communications Act is insufficient be-
    cause it requires less than probable cause. 
    Id.
     Soybel moved
    to suppress all evidence obtained as a result of the Pen/Trap
    order, arguing that Carpenter had broader Fourth Amend-
    ment implications beyond the CSLI context.
    8                                                 No. 19-1936
    The judge denied the suppression motion. Though the
    judge was skeptical that Carpenter has any effect on pen
    registers, he declined to decide whether their use violates the
    Fourth Amendment. He instead denied Soybel’s motion
    based on the good-faith exception to the exclusionary rule.
    The judge held that suppression was inappropriate because
    the officers relied in good faith on a pre-Carpenter under-
    standing of the Pen Register Act in seeking the order. In
    other words, regardless of whether the Pen/Trap order
    violated Soybel’s Fourth Amendment right to be free from
    unreasonable searches, the judge concluded that a reasona-
    ble officer could believe that compliance with the Act’s
    requirements was sufficient for a lawful order.
    Data obtained from the pen registers was front and cen-
    ter at Soybel’s trial. The government also presented forensic
    evidence from Soybel’s laptop, which showed—among other
    things—that Soybel had downloaded the KeepStock desktop
    client each time before he accessed the KeepStock system. As
    to Count 10, testimony showed that Hoehne was unable to
    access KeepStock until his password could be reset. And in
    closing argument the government emphasized that as a
    result of the breach, Hoehne could not provide necessary
    customer service.
    A jury convicted Soybel on all 12 counts and further
    found that the offenses caused either a loss to Grainger
    during a one-year period aggregating at least $5,000 or
    damage affecting ten or more protected computers during a
    one-year period. The judge denied Soybel’s motions for a
    judgment of acquittal and for a new trial, and Soybel ap-
    pealed.
    No. 19-1936                                                   9
    II. Discussion
    Soybel contends that the use of the pen registers violated
    his Fourth Amendment right to be free from unreasonable
    searches. He also argues that insufficient evidence supported
    his conviction under Count 10.
    A. Fourth Amendment Challenge
    Soybel first argues that based on Carpenter, the judge
    should have excluded the IP pen-register evidence. We
    review this issue de novo, see United States v. Mojica, 
    863 F.3d 727
    , 731 (7th Cir. 2017), and conclude that the judge properly
    denied the suppression motion. Though the good-faith
    exception barred suppression here, we affirm because there
    was no Fourth Amendment violation in the first place. See
    United States v. Reaves, 
    796 F.3d 738
    , 741–42 (7th Cir. 2015)
    (explaining that we may affirm the denial of a motion to
    suppress “on any ground supported in the record”).
    The Fourth Amendment protects “[t]he right of the peo-
    ple to be secure in their persons, houses, papers, and effects,
    against unreasonable searches and seizures,” and provides
    that “no Warrants shall issue, but upon probable cause,
    supported by Oath or affirmation, and particularly describ-
    ing the place to be searched, and the persons or things to be
    seized.” U.S. CONST. amend. IV. To conduct a “search”
    under the Fourth Amendment, an officer generally must
    obtain a warrant supported by probable cause. See Katz v.
    United States, 
    389 U.S. 347
    , 359 (1967). But not all investiga-
    tive actions are “searches” subject to Fourth Amendment
    scrutiny. Under the privacy-based framework relevant here,
    a “Fourth Amendment search does not occur … unless the
    individual manifested a subjective expectation of privacy in
    10                                                        No. 19-1936
    the object of the challenged search[] and society [is] willing
    to recognize that expectation as reasonable.” 5 Kyllo v. United
    States, 
    533 U.S. 27
    , 33 (2001) (quotation marks omitted)
    (alteration in original).
    The government installed the pen registers not based on
    a finding of probable cause but rather under a court order
    supported by a lesser showing of relevance as provided in
    the Pen Register Act. See §§ 3122(b)(2), 3123(a)(1). Soybel
    argues that the Fourth Amendment demands more. The
    government, on the other hand, maintains that the Fourth
    Amendment provides no protection because the pen regis-
    ters did not entail a “search.”
    This issue turns on the application of the third-party doc-
    trine. A core principle of Katz is that “[w]hat a person know-
    ingly exposes to the public, even in his own home or office,
    is not a subject of Fourth Amendment protection.” 
    389 U.S. at 351
    . A person generally “has no legitimate expectation of
    privacy in information he voluntarily turns over to third
    parties,” subjective expectations notwithstanding. Smith,
    
    442 U.S. at 743
    –44 (collecting cases); see also United States v.
    Miller, 
    425 U.S. 435
    , 442 (1976) (finding no “legitimate expec-
    tation of privacy concerning the information kept in bank
    records” that a person “voluntarily convey[s] to [a] bank[]
    and expose[s] to [his] employees in the ordinary course of
    business”). Where the third-party doctrine applies, “the
    [g]overnment is typically free to obtain such information
    from the recipient without triggering Fourth Amendment
    protections.” Carpenter, 
    138 S. Ct. at 2216
    .
    5Soybel does not suggest that the pen register intruded on any property-
    based interests.
    No. 19-1936                                                  11
    Smith is the foundational case for the use of pen registers.
    At the request of the police, a telephone company installed a
    pen register at its central office that recorded outgoing
    phone numbers dialed on the defendant’s landline phone.
    Smith, 
    442 U.S. at 745
    –46. The defendant moved to suppress
    the pen-register evidence because officers had not obtained a
    search warrant prior to the installation. 
    Id. at 737
    . The
    Supreme Court held that no warrant was necessary because
    the officers had not conducted a Fourth Amendment search.
    
    Id. at 745
    –46. Critically, the pen register had only “limited
    capabilities,” capturing the numbers dialed but not the
    identity of the caller, any sound, or even whether the call
    had been completed. 
    Id. at 741
    –42. The case was thus distin-
    guishable from Katz, where officers overheard the substance
    of the conversation via a listening device attached to a phone
    booth. 
    389 U.S. at 349
    –50.
    The dialed phone numbers in Smith fit squarely within
    the emerging third-party doctrine. When a subscriber placed
    a call, the phone company’s “switching equipment” routed
    the call and the phone company could make a permanent
    record of the number a subscriber dialed. 
    442 U.S. at 742
    .
    The Court noted that Smith “voluntarily conveyed numeri-
    cal information to the telephone company and ‘exposed’ that
    information to its equipment in the ordinary course of
    business” and thus “assumed the risk that the company
    would reveal to police the numbers he dialed.” 
    Id. at 744
    . So
    Smith had no reasonable expectation of privacy “in the
    phone numbers he dialed” even though he dialed them from
    his home. 
    Id. at 745
    –46.
    The IP pen registers in this investigation are a new breed
    of pen registers compared to the one at issue in Smith. When
    12                                                    No. 19-1936
    Soybel’s IP address contacted Grainger’s IP addresses (by
    way of the third-party internet-service provider and the
    master router), the pen registers recorded the fact and time
    of the connections. But technological differences don’t
    necessarily beget constitutional ones. Before Carpenter the
    Second Circuit considered the use of an IP pen register
    under the Pen Register Act and held that under the logic of
    Smith, no search warrant is necessary. See United States v.
    Ulbricht, 
    858 F.3d 71
    , 97 (2d Cir. 2017) (“The recording of IP
    address information and similar routing data, which reveal
    the existence of connections between communications
    devices without disclosing the content of the communica-
    tions, are precisely analogous to the capture of telephone
    numbers at issue in Smith.”). And more generally, the cir-
    cuits to have considered the question pre-Carpenter were in
    accord that the third-party doctrine extends to an individu-
    al’s own IP address or the IP addresses of the websites he
    visits. See, e.g., 
    id.
     (destination IP addresses); United States v.
    Wheelock, 
    772 F.3d 825
    , 829 (8th Cir. 2014) (own IP address);
    United States v. Christie, 
    624 F.3d 558
    , 574 (3d Cir. 2010) (own
    IP address); United States v. Forrester, 
    512 F.3d 500
    , 510 (9th
    Cir. 2008) (destination IP addresses).
    Soybel responds that Carpenter changed the Fourth
    Amendment calculus. Carpenter refined the third-party
    doctrine for a specific type of digital data: historical location
    information as revealed by CSLI. See 
    138 S. Ct. at 2211
    –12
    (explaining that “[e]ach time [a] phone connects to a cell site,
    it generates a time-stamped record” stored by a wireless
    carrier). The officers in Carpenter obtained historical CSLI
    based on an order under the Stored Communications Act.
    Similar to the Pen Register Act, an order under the Stored
    Communications Act may be issued based on less than
    No. 19-1936                                                  13
    probable cause; the government need only “offer[] specific
    and articulable facts showing that there are reasonable
    grounds to believe” that the records sought “are relevant
    and material to an ongoing criminal investigation.” 18 U.S.C.
    § 2703(d). The Court held that this lesser showing is not
    enough; the officers had “invaded Carpenter’s reasonable
    expectation of privacy in the whole of his physical move-
    ments” by obtaining historical CSLI without a warrant
    supported by probable cause. Carpenter, 
    138 S. Ct. at 2219
    .
    Soybel contends that after Carpenter he has a reasonable
    expectation of privacy in his “personal [i]nternet traffic
    data.” We disagree. As three of our sister circuits have
    recognized, Carpenter has no bearing on the government’s
    collection of IP-address data from a suspect’s internet traffic.
    See United States v. Trader, 
    981 F.3d 961
    , 967–69 (11th Cir.
    2020); United States v. Hood, 
    920 F.3d 87
    , 92 (1st Cir. 2019);
    United States v. Contreras, 
    905 F.3d 853
    , 857 (5th Cir. 2018).
    For starters, the Court in Carpenter stressed that its decision
    was a “narrow one.” 
    138 S. Ct. at 2220
    . Carpenter thus was
    not a wholesale repudiation of Smith or the third-party
    doctrine generally. To the contrary, the Court emphasized
    that it did not “disturb the application of Smith and Miller or
    call into question conventional surveillance techniques and
    tools.” 
    Id.
     Instead, the Court merely “decline[d] to extend
    Smith and Miller to cover the[] novel circumstances” pre-
    sented by historical CSLI. 
    Id. at 2217
    .
    On this point Carpenter was “novel” both as to the in-
    strumentality of the search and in the information captured.
    Given the extent to which people “compulsively carry cell
    phones with them all the time,” a cell phone has become
    “almost a feature of human anatomy.” 
    Id. at 2218
     (quotation
    14                                                 No. 19-1936
    marks omitted). And because a cell phone “faithfully follows
    its owner” wherever he goes, the location information
    “provides an all-encompassing record of the holder’s where-
    abouts,” including his entry into “private residences, doc-
    tor’s offices, political headquarters, and other potentially
    revealing locales.” 
    Id. at 2217
    –18. When the phone is pow-
    ered on, the result is “near perfect surveillance.” 
    Id. at 2218
    .
    The Court explained that the privacy concern is magni-
    fied by the data’s “retrospective quality” because historical
    CSLI gives “police access to a category of information oth-
    erwise unknowable.” 
    Id.
     Obtaining historical CSLI without a
    warrant would allow the government to effectively “travel
    back in time to retrace a person’s whereabouts, subject only
    to the retention polices of the wireless carriers.” 
    Id.
     The
    “detailed chronicle of a person’s physical presence compiled
    every day, every moment, over several years,” the Court
    held, “implicates privacy concerns far beyond those consid-
    ered in Smith and Miller.” 
    Id. at 2220
    .
    The unique features of historical CSLI are absent for
    IP-address data. The pen register was stationary and could
    not capture the whole of Soybel’s physical movements. Cf.
    Hood, 920 F.3d at 92 (explaining that whereas CSLI captures
    the approximate “location of the cell phone user who gener-
    ates that data simply by possessing the phone,” IP-address
    data “is merely a string of numbers associated with a device
    that had, at one time, accessed a wireless network”). As was
    true in Smith, a recorded connection at most incidentally
    revealed when Soybel may have been in his apartment. But
    even that’s not a given because the data was impersonal. A
    recording of “the existence of connections between commu-
    nications devices” shows only that someone in Soybel’s unit
    No. 19-1936                                                 15
    was using the internet. Ulbricht, 858 F.3d at 97. It could not
    reveal the identity of the user—whether it be Soybel, his
    mother, or an unidentified guest. Cf. Carpenter, 
    138 S. Ct. at 2219
     (noting that the “telephone call logs [in Smith] reveal
    little in the way of ‘identifying information’”). The same
    cannot be said for CSLI, unless the cell phone’s owner takes
    the unusual step of giving it to someone else.
    Moreover, routing information obtained via a pen regis-
    ter isn’t retrospective. The government could not effectively
    “travel back in time” by using an IP pen register. A pen
    register is only forward-looking; its usefulness extends only
    so far as it is installed and no further. And here, the govern-
    ment would have had to seek a renewal of the 60-day order
    if it needed data beyond that point. CSLI, in contrast, is
    continuously collected and available for the government’s
    ready use so long as the cell carrier retains the records,
    which could be up to five years. 
    Id. at 2218
     (noting that a
    suspect would be “effectively … tailed every moment of
    every day for five years”).
    Perhaps recognizing that the IP-address information did
    not reveal much about his physical movements, Soybel
    contends that it provided an unwanted glimpse into his
    mind. He notes that the pen registers captured visits to
    Credit Karma and Match.com, so he argues that the pen
    register might provide an “intimate window” into his “fa-
    milial, political, professional, religious, and sexual associa-
    tions.” 
    Id. at 2217
     (quotation marks omitted). But the same is
    true for telephone pen registers like the one the Court ap-
    proved in Smith; by obtaining the numbers that a suspect
    dials, law enforcement could likewise determine whether he
    had called a bank, a political headquarters, a church, or a
    16                                                No. 19-1936
    romantic partner. And for each type of pen register, any
    intrusion on these interests is minimized by the fact that the
    government did not—and under the Pen Register Act, could
    not—intercept the content of the communications. See
    §§ 3121(c), 3127(3)–(4).
    Differences in the data collected aside, Carpenter is also
    distinguishable on the extent to which Soybel assumed the
    risk by voluntarily communicating with third parties. The
    Court explained in Carpenter that CSLI “is not truly ‘shared’
    as one normally understands the term” because “carrying [a
    cell phone] is indispensable to participation in modern
    society” and a cell-phone user opens himself up to tracking
    “without any affirmative act on the part of the user beyond
    powering up.” 
    138 S. Ct. at 2220
    . We do not discount the
    importance of the internet in 2021. But it’s not the case that
    Soybel created the data “without any affirmative act …
    beyond powering up.” 
    Id.
     An internet user creates connec-
    tion data by “making the affirmative decision to access a
    website,” just as the user of a landline generates a telephone-
    number record solely by choosing to dial it. Hood, 920 F.3d at
    92 (explaining that “an [i]nternet user generates the IP
    address data … only by making the affirmative decision to
    access a website or application”). And here, Soybel took the
    affirmative step of downloading the desktop client and con-
    necting to Grainger’s servers remotely.
    In short, this case bears the hallmarks of Smith, not
    Carpenter. And under Smith Soybel has no reasonable expec-
    tation of privacy in the routing information collected by the
    pen registers. Accordingly, we hold that an IP pen register is
    analogous in all material respects to a traditional telephone
    pen register. An IP address operates much like a phone
    No. 19-1936                                                 17
    number, and “[l]ike telephone companies, internet service
    providers require that identifying information be disclosed
    in order to make communication among electronic devices
    possible.” Ulbrecht, 858 F.3d at 97. Though a person does not
    “dial” another’s IP address in the ordinary sense, infor-
    mation was routed through a third party to complete the
    connection between the computer in Soybel’s unit and the
    destination IP addresses. See id. at 96. In this respect, the
    master router—which directed internet traffic to and from
    Soybel’s own IP address—is not unlike the telephone
    switchboard in Smith. And Soybel assumed the risk that by
    connecting to Grainger servers, the fact of the connection
    would be revealed to law enforcement. Soybel therefore has
    no reasonable expectation of privacy in this data.
    Because the government did not conduct a Fourth
    Amendment search in this case, it need not have done more
    than obtain an order under the Pen Register Act. Even were
    we to hold to the contrary, suppression is unwarranted
    under the good-faith exception to the exclusionary rule.
    Under one variant of the good-faith exception, suppression
    is not the proper remedy for “evidence seized pursuant to a
    statute subsequently declared unconstitutional.” Illinois v.
    Krull, 
    480 U.S. 340
    , 352–53. (1987). The “sole purpose” of the
    exclusionary rule, after all, “is to deter future Fourth
    Amendment violations.” Davis v. United States, 
    564 U.S. 229
    ,
    236–37 (2011).
    We have applied the Krull principle to permit the admis-
    sion of CSLI evidence obtained based on a pre-Carpenter
    understanding of the Stored Communications Act. See
    United States v. Curtis, 
    901 F.3d 846
    , 849 (7th Cir. 2018). The
    same conclusion follows for a pre-Carpenter understanding
    18                                                No. 19-1936
    of the Pen Register Act, for which no court of appeals has
    suggested that the absence of probable cause is constitution-
    ally suspect. “Penalizing [an] officer for the [legislature’s
    alleged] error, rather than his own, cannot logically contrib-
    ute to the deterrence of Fourth Amendment violations.”
    Krull, 
    480 U.S. at 350
     (quotation marks omitted). For this
    additional reason, suppression was properly denied.
    B. Sufficiency of the Evidence for Count 10
    Finally, Soybel contends that insufficient evidence sup-
    ports his conviction for changing Hoehne’s password.
    Count 10 charged Soybel with violating § 1030(a)(5)(A),
    which requires that the government prove that he “know-
    ingly cause[d] the transmission of a program, information,
    code, or command, and as a result of such conduct, inten-
    tionally cause[d] damage without authorization[] to a pro-
    tected computer.” Soybel does not contest that he issued a
    command to change Hoehne’s password. Nor does he
    challenge the special-verdict findings regarding the number
    of computers affected by the intrusion over a one-year
    period. He does dispute, however, that he caused “damage”
    when he changed Hoehne’s password.
    We review de novo the denial of a motion for judgment
    of acquittal and consider the evidence in the light most
    favorable to the jury’s verdict. United States v. Kelerchian,
    
    937 F.3d 895
    , 907 (7th Cir. 2019). We overturn a conviction
    only if the record contains no evidence from which a reason-
    able jury could determine guilt beyond a reasonable doubt.
    United States v. Durham, 
    645 F.3d 883
    , 892 (7th Cir. 2011).
    Soybel has not overcome this high bar. Consistent with
    the statutory definition, the judge instructed the jury that
    No. 19-1936                                                 19
    “damage” means “any impairment to the integrity or availa-
    bility of data, a program, a system, or information.”
    18 U.S.C. § 1030(e)(8) (emphasis added). Soybel did not
    argue below, nor does he claim on appeal, that the judge
    should have done more to guide the jury.
    Instructed this way, a reasonable jury could find that the
    password reset caused “damage” as the terms in the defini-
    tion are ordinarily understood. To “impair” is to “damage or
    make worse … by diminishing in some material aspect.”
    Impair, MERRIAM-WEBSTER’S COLLEGIATE DICTIONARY (11th
    ed. 2003). And to be “available” is to be “present or ready for
    immediate use.” Available, id. The government presented
    evidence that the password reset locked Hoehne out of
    KeepStock and temporarily prevented him from servicing
    his customers. At the very least, a reasonable jury could find
    that Soybel’s actions “impair[ed] … the … availability of …
    [the] system” by temporarily diminishing its readiness for
    Hoehne’s immediate use.
    Soybel counters that his actions caused no data loss and
    that KeepStock remained functional for other users. And he
    emphasizes that Grainger was able to quickly rectify the
    issue. Neither point is relevant under § 1030(e)(8). The broad
    definition of “damage” covers any impairment. It makes no
    difference that the problem was a quick fix on Grainger’s
    end, nor does it matter that Soybel did not dismantle all or
    part of KeepStock more broadly. The evidence was sufficient
    to convict Soybel on Count 10.
    AFFIRMED