United States v. Christopher Oates

619 F. App'x 955
CourtCourt of Appeals for the Eleventh Circuit
DecidedSeptember 16, 2015
Docket14-15397
StatusUnpublished

This text of 619 F. App'x 955 (United States v. Christopher Oates) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Christopher Oates, 619 F. App'x 955 (11th Cir. 2015).

Opinion

PER CURIAM:

Christopher Oates appeals his conviction for possession of child pornography, in violation of 18 U.S.C. §§ 2252(a)(4)(B) and 2252(b)(2), on the ground that the district court erred in denying his motion to suppress evidence found on a computer seized from his mother’s home where he lived. After careful review, and for the reasons below, we affirm.

I.

Special Agent Jeffrey White, Department of Homeland Security Investigations, downloaded child pornography on the Ares peer-to-peer file sharing program (“Ares”) from an IP address that was traced back to Exie Oates in an apartment in Columbus, Georgia. Agent White determined that, as an approximately 60 year old woman with no criminal history, Ms. Oates was an unlikely offender. Approximately six months later, 1 Agent White, along with another agent and two local police officers, traveled to Ms. Oates’s apartment to conduct a “knock and talk.” 2 When Agent White knocked on the door, an adult male, Mr. Oates, answered the door. The law enforcement agents and officers asked to speak with Ms. Oates, whom he identified as his mother. Law enforcement entered the apartment, although the parties disagree about the circumstances under which they did so. Once inside the apartment,- which was occupied by Ms. Oates, Mr. Oates, and Mr. Oates’s sister, Agent White observed a computer to the left of the front door that was actively running the Ares software. The officers asked Mr. Oates to step outside so that he would not have to discuss child pornography in front of his mother. The government claims that in this conversation Mr. Oates admitted he had downloaded child pornography on the computer. Mr. Oates agreed to go down to the police station to answer questions in private. He was not taken into custody. When law enforcement left the apartment to take Mr. Oates to the police station, they seized the computer. Agent White later obtained a search warrant for the hard drive’s contents.

Mr. Oates filed a motion to suppress the child pornography files retrieved from the computer, which he argued was seized illegally. The district court denied the motion to suppress at a pretrial evidentiary hearing. The court made a factual finding that the law enforcement agents “at some point [ ] stepped into the home and were not prohibited from doing so by Mr. Oates; and upon entering the home [] saw a computer which they had probable cause to believe had illegal contraband on it.” *957 Pretrial Conference Tr. 57, Doc. No. 30. The district court also found' that “exigent circumstances existed for them to seize the computer” because “there was a legitimate concern that ... evidence on the computer or the computer itself could be damaged or removed in some way” if left at the home. Id.

A jury found Mr. Oates guilty as to count two of the indictment, and the district court sentenced him to 120 months’ imprisonment, life on supervised release, and $100 in special assessments. This appeal followed.

II.

A district court’s ruling on a motion to suppress involves mixed questions of fact and law. United States v. Smith, 741 F.3d 1211, 1218 (11th Cir.2013). We review the district court’s factual findings for clear error and its application of the law to the facts de novo. Id. (internal citation omitted). “[W]e will construe all facts in the light most favorable to the prevailing party,” which here is the government. Id. “[W]e may affirm for any reason supported by the record, even if not relied upon by the district court.” United States v. Chitwood, 676 F.3d 971, 975 (11th Cir.2012) (internal quotation marks omitted).

III.

Mr. Oates contends that seizure of the computer violated his Fourth Amendment rights. Under the Fourth Amendment, searches and seizures “inside a home without a warrant are presumptively unreasonable.” Payton v. New York, 445 U.S. 573, 586, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980). An object in “plain view” may be subject to warrantless seizure if (1) the law enforcement officer “did not violate the Fourth Amendment in arriving at the place from which the evidence could be plainly viewed,” (2) the officer has “a lawful right of access to the object itself,” and (3) the object’s “incriminating character [is] immediately apparent.” Horton v. California, 496 U.S. 128, 136-3, 110 S.Ct. 2301, 110 L.Ed.2d 112 (1990) (internal quotation omitted). Where officers lawfully enter a house, which may be through valid consent, and “they come across some item in plain view and seize it, no invasion of personal privacy has occurred.” Soldal v. Cook Cnty., 506 U.S. 56, 65-66, 113 S.Ct. 538, 121 L.Ed.2d 450 (1992). In the context of a consensual search, “[t]he government bears the burden of proving both the existence of consent and that the consent was not a function of acquiescence to a claim of lawful authority but rather was given freely and voluntarily.” United States v. Yeary, 740 F.3d 569, 582 (11th Cir.2014).

First, we conclude that the agents and officers lawfully arrived at the place where the computer could be observed. Agent White’s investigation led him to a precise IP address that guided him to Ms. Oates’s Columbus, Georgia address. His authority to conduct the “knock and talk” to further the investigation is beyond dispute. See United States v. Taylor, 458 F.3d 1201, 1204 (11th Cir.2006) (“[0]fficers are allowed to knock on a residence’s door or otherwise approach the residence seeking to speak to the inhabitants just as any private citizen may.” (internal quotation marks omitted)). The parties disagree about whether Mr. Oates consented to law enforcement’s entry into the house following the “knock and talk,” but Agent White testified that when he knocked on the door and Mr. Oates answered, he said he wanted to speak with Ms. Oates and Mr. Oates allowed him to enter the house. In denying the motion to suppress, the district court credited Agent White’s testimony regarding consent. We must defer to the district court’s credibility determination *958 unless the testimony is “unbelievable,” which it is not. See United States v. Ramirez-Chilel 289 F.3d 744, 749 (11th Cir.2002) (deferring to the magistrate judge’s determinations crediting the officers’ that the defendant answered the door and voluntarily consented to a search over the defendants’ conflicting testimony).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Carlos Enrique Ramirez-Chilel
289 F.3d 744 (Eleventh Circuit, 2002)
United States v. Warren J. Taylor
458 F.3d 1201 (Eleventh Circuit, 2006)
Payton v. New York
445 U.S. 573 (Supreme Court, 1980)
United States v. Place
462 U.S. 696 (Supreme Court, 1983)
Horton v. California
496 U.S. 128 (Supreme Court, 1990)
Soldal v. Cook County
506 U.S. 56 (Supreme Court, 1992)
Kentucky v. King
131 S. Ct. 1849 (Supreme Court, 2011)
United States v. Bradley
644 F.3d 1213 (Eleventh Circuit, 2011)
United States v. Chitwood
676 F.3d 971 (Eleventh Circuit, 2012)
United States v. Michael Talton Williams
731 F.3d 1222 (Eleventh Circuit, 2013)
United States v. Erick D. Smith
741 F.3d 1211 (Eleventh Circuit, 2013)
United States v. Brian Micko Yeary
740 F.3d 569 (Eleventh Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
619 F. App'x 955, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-christopher-oates-ca11-2015.