Elawyers Elawyers
Ohio| Change

United States v. Christopher Oates, 14-15397 (2015)

Court: Court of Appeals for the Eleventh Circuit Number: 14-15397 Visitors: 19
Filed: Sep. 16, 2015
Latest Update: Mar. 02, 2020
Summary: Case: 14-15397 Date Filed: 09/16/2015 Page: 1 of 10 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 14-15397 Non-Argument Calendar _ D.C. Docket No. 4:14-cr-00011-CDL-MSH-1 UNITED STATES OF AMERICA, Plaintiff - Appellee, versus CHRISTOPHER OATES, Defendant - Appellant. _ Appeal from the United States District Court for the Middle District of Georgia _ (September 16, 2015) Before WILLIAM PRYOR, JULIE CARNES and JILL PRYOR, Circuit Judges. PER CURIAM: Case:
More
           Case: 14-15397   Date Filed: 09/16/2015   Page: 1 of 10


                                                         [DO NOT PUBLISH]



            IN THE UNITED STATES COURT OF APPEALS

                     FOR THE ELEVENTH CIRCUIT
                       ________________________

                             No. 14-15397
                         Non-Argument Calendar
                       ________________________

               D.C. Docket No. 4:14-cr-00011-CDL-MSH-1



UNITED STATES OF AMERICA,

                                              Plaintiff - Appellee,

versus

CHRISTOPHER OATES,

                                              Defendant - Appellant.

                       ________________________

                Appeal from the United States District Court
                    for the Middle District of Georgia
                      ________________________

                            (September 16, 2015)

Before WILLIAM PRYOR, JULIE CARNES and JILL PRYOR, Circuit Judges.

PER CURIAM:
                Case: 14-15397       Date Filed: 09/16/2015       Page: 2 of 10


       Christopher Oates appeals his conviction for possession of child

pornography, in violation of 18 U.S.C. §§ 2252(a)(4)(B) and 2252(b)(2), on the

ground that the district court erred in denying his motion to suppress evidence

found on a computer seized from his mother’s home where he lived. After careful

review, and for the reasons below, we affirm.

                                                 I.

       Special Agent Jeffrey White, Department of Homeland Security

Investigations, downloaded child pornography on the Ares peer-to-peer file sharing

program (“Ares”) from an IP address that was traced back to Exie Oates in an

apartment in Columbus, Georgia. Agent White determined that, as an

approximately 60 year old woman with no criminal history, Ms. Oates was an

unlikely offender. Approximately six months later, 1 Agent White, along with

another agent and two local police officers, traveled to Ms. Oates’s apartment to

conduct a “knock and talk.”2 When Agent White knocked on the door, an adult

male, Mr. Oates, answered the door. The law enforcement agents and officers

asked to speak with Ms. Oates, whom he identified as his mother. Law

enforcement entered the apartment, although the parties disagree about the


       1
          Agent White explained that the time lapse occurred because all three federal agents in
his office were assigned to another investigation that lasted until February 2013.
       2
         Agent White described a “knock and talk” as “when we go somewhere, either a
residence or a business, and we knock on the door and we ask to speak to the occupants to
conduct an interview.” Pretrial Conference Tr. 15, Doc. No. 30.
                                                2
              Case: 14-15397    Date Filed: 09/16/2015   Page: 3 of 10


circumstances under which they did so. Once inside the apartment, which was

occupied by Ms. Oates, Mr. Oates, and Mr. Oates’s sister, Agent White observed a

computer to the left of the front door that was actively running the Ares software.

The officers asked Mr. Oates to step outside so that he would not have to discuss

child pornography in front of his mother. The government claims that in this

conversation Mr. Oates admitted he had downloaded child pornography on the

computer. Mr. Oates agreed to go down to the police station to answer questions

in private. He was not taken into custody. When law enforcement left the

apartment to take Mr. Oates to the police station, they seized the computer. Agent

White later obtained a search warrant for the hard drive’s contents.

      Mr. Oates filed a motion to suppress the child pornography files retrieved

from the computer, which he argued was seized illegally. The district court denied

the motion to suppress at a pretrial evidentiary hearing. The court made a factual

finding that the law enforcement agents “at some point [] stepped into the home

and were not prohibited from doing so by Mr. Oates; and upon entering the home

[] saw a computer which they had probable cause to believe had illegal contraband

on it.” Pretrial Conference Tr. 57, Doc. No. 30. The district court also found that

“exigent circumstances existed for them to seize the computer” because “there was

a legitimate concern that . . . evidence on the computer or the computer itself could

be damaged or removed in some way” if left at the home. 
Id. 3 Case:
14-15397      Date Filed: 09/16/2015    Page: 4 of 10


      A jury found Mr. Oates guilty as to count two of the indictment, and the

district court sentenced him to 120 months’ imprisonment, life on supervised

release, and $100 in special assessments. This appeal followed.

                                           II.

      A district court’s ruling on a motion to suppress involves mixed questions of

fact and law. United States v. Smith, 
741 F.3d 1211
, 1218 (11th Cir. 2013). We

review the district court’s factual findings for clear error and its application of the

law to the facts de novo. 
Id. (internal citation
omitted). “[W]e will construe all

facts in the light most favorable to the prevailing party,” which here is the

government. 
Id. “[W]e may
affirm for any reason supported by the record, even if

not relied upon by the district court.” United States v. Chitwood, 
676 F.3d 971
,

975 (11th Cir. 2012) (internal quotation marks omitted).

                                          III.

      Mr. Oates contends that seizure of the computer violated his Fourth

Amendment rights. Under the Fourth Amendment, searches and seizures “inside a

home without a warrant are presumptively unreasonable.” Payton v. New York,

445 U.S. 573
, 586 (1980). An object in “plain view” may be subject to warrantless

seizure if (1) the law enforcement officer “did not violate the Fourth Amendment

in arriving at the place from which the evidence could be plainly viewed,” (2) the

officer has “a lawful right of access to the object itself,” and (3) the object’s


                                            4
              Case: 14-15397    Date Filed: 09/16/2015   Page: 5 of 10


“incriminating character [is] immediately apparent.” Horton v. California, 
496 U.S. 128
, 136-3 (1990) (internal quotation omitted). Where officers lawfully enter

a house, which may be through valid consent, and “they come across some item in

plain view and seize it, no invasion of personal privacy has occurred.” Soldal v.

Cook Cnty., 
506 U.S. 56
, 65-66 (1992). In the context of a consensual search,

“[t]he government bears the burden of proving both the existence of consent and

that the consent was not a function of acquiescence to a claim of lawful authority

but rather was given freely and voluntarily.” United States v. Yeary, 
740 F.3d 569
,

582 (11th Cir. 2014).

      First, we conclude that the agents and officers lawfully arrived at the place

where the computer could be observed. Agent White’s investigation led him to a

precise IP address that guided him to Ms. Oates’s Columbus, Georgia address. His

authority to conduct the “knock and talk” to further the investigation is beyond

dispute. See United States v. Taylor, 
458 F.3d 1201
, 1204 (11th Cir. 2006)

(“[O]fficers are allowed to knock on a residence’s door or otherwise approach the

residence seeking to speak to the inhabitants just as any private citizen may.”

(internal quotation marks omitted)). The parties disagree about whether Mr. Oates

consented to law enforcement’s entry into the house following the “knock and

talk,” but Agent White testified that when he knocked on the door and Mr. Oates

answered, he said he wanted to speak with Ms. Oates and Mr. Oates allowed him


                                          5
              Case: 14-15397     Date Filed: 09/16/2015    Page: 6 of 10


to enter the house. In denying the motion to suppress, the district court credited

Agent White’s testimony regarding consent. We must defer to the district court’s

credibility determination unless the testimony is “unbelievable,” which it is not.

See United States v. Ramirez-Chilel, 
289 F.3d 744
, 749 (11th Cir. 2002) (deferring

to the magistrate judge’s determinations crediting the officers’ testimony that the

defendant answered the door and voluntarily consented to a search over the

defendants’ conflicting testimony). Construing the facts to which Agent White

testified in the light most favorable to the government, as we must, we conclude

that the district court did not reversibly err in finding that Mr. Oates consented to

law enforcements’ entry into the apartment. See 
Smith, 741 F.3d at 1218
. Because

Mr. Oates consented to law enforcements’ entry, the agents and officers did not

violate the Fourth Amendment in arriving inside the house. See 
Soldal, 506 U.S. at 65-66
.

      Second, once the agents and officers entered the apartment, the computer

was in plain view. Upon entering, Agent White looked to the left of the door and

saw a computer screen displaying an Ares peer-to-peer downloading file.

Moreover, given Agent White’s prior investigation and resulting evidence that a

computer at that address was downloading child pornography from an IP address




                                           6
               Case: 14-15397       Date Filed: 09/16/2015      Page: 7 of 10


belonging to Ms. Oates at the apartment’s location,3 the computer’s incriminating

character was “immediately apparent.” See 
Horton, 496 U.S. at 136
. Because

while standing in the apartment to which he had lawful access Agent White easily

recognized the Ares program that previously had been used to download child

pornography at the same IP address, under Horton he was permitted to seize the

computer. Id.; United States v. Willis, 
759 F.2d 1486
, 1498 (11th Cir. 1985)

(permitting seizure of cap encountered in plain view after officer obtained

voluntary consent to enter motel room).

        Even if we were unconvinced that law enforcement lawfully seized the

computer under the plain view doctrine, exigent circumstances existed to seize it.

Mr. Oates argues that the district court erred in holding that exigent circumstances

supported an exception to the Fourth Amendment’s search warrant requirement,

and that to the extent any exigent circumstances existed, they were impermissibly

created by the agents. Under the Fourth Amendment, law enforcement authorities

with “probable cause to believe that a container holds contraband or evidence of a

crime, but have not secured a warrant . . . [may] seiz[e] the property, pending

issuance of a warrant to examine its contents, if the exigencies of the

circumstances demand it or some other recognized exception to the warrant

requirement is present.” United States v. Place, 
462 U.S. 696
, 701 (1983).

       3
          Agent White obtained this information from a subpoena directed to Knology, the
internet service provider.
                                               7
              Case: 14-15397     Date Filed: 09/16/2015     Page: 8 of 10


Although the “presence of contraband without more does not give rise to exigent

circumstances,” exigent circumstances may arise “when there is danger that the

evidence will be destroyed or removed.” United States v. Tobin, 
923 F.2d 1506
,

1510 (11th Cir. 1991) (en banc) (internal quotation marks omitted). “The

appropriate inquiry is whether the facts would lead a reasonable, experienced agent

to believe that evidence might be destroyed before a warrant could be secured.”

Id. Mr. Oates
contends that Agent White and his supporting officers created any

exigent circumstances by entering the house without a warrant, thereby creating a

possibility that he or Ms. Oates would have reason and opportunity to destroy any

evidence stored on the computer. But law enforcement did not “create the

exigency by engaging or threatening to engage in conduct that violates the Fourth

Amendment” because, as discussed above, Agent White’s testimony supports a

finding that he and the other officers were not acting or threatening to act in

violation of Mr. Oates’s rights. Kentucky v. King, 563 U.S. ___, 
131 S. Ct. 1849
,

1858 (2011). Moreover, we do not, in circumstances such as these, “fault[] the

police for failing to apply for a search warrant at the earliest possible time after

obtaining probable cause.” 
Id. at 1861.
It was reasonable for the agents and

officers to perform a “knock and talk,” rather than immediately seek a warrant,

given their skepticism regarding whether a 60 year old woman would be


                                           8
              Case: 14-15397     Date Filed: 09/16/2015   Page: 9 of 10


downloading child pornography. See United States v. Williams, 
731 F.3d 1222
,

1231 (11th Cir. 2013) (describing initial encounter as a “knock and talk” done for

legitimate investigative purposes after learning of criminal activity occurring at the

house). And, as we discussed above, we will not disturb the district court’s finding

that the agents and officers’ entry into the apartment was based on consent. Thus,

we disagree with Mr. Oates that Agent White and his team created any exigent

circumstances. 
King, 131 S. Ct. at 1858
.

      Instead, we conclude that the district court did not err in finding that exigent

circumstances justified an exception to the warrant requirement because there was

a danger that the evidence on the computer could have been destroyed or removed.

See 
Tobin, 923 F.3d at 1510
. Agent White testified that Mr. Oates admitted to

downloading child pornography on the computer at issue once they stepped

outside, which gave the agents probable cause. Agent White also testified that the

computer had to be unplugged because if the computer were shut down, the data on

the computer could be compromised. So, he testified, even if Ms. Oates and her

daughter did not know the reason behind Mr. Oates’s questioning, the officers still

ran the risk that the evidence would be destroyed before they could obtain a

warrant because someone might simply shut down the computer. See United

States v. Bradley, 
644 F.3d 1213
, 1262 (11th Cir. 2011) (accepting the district

court’s finding that exigent circumstances existed where agents shut down a


                                           9
             Case: 14-15397     Date Filed: 09/16/2015   Page: 10 of 10


company’s servers due to “fear that data might be lost” because employees had the

“ability and incentive to, after learning of the rain, destroy damning information

contained on the computer servers”). In any event, Agent White testified, it was

possible that Ms. Oates or her daughter would tamper with the computer before he

could secure a warrant. The district court credited this testimony in concluding

that the risk of tampering constituted exigent circumstances justifying the seizure

of the computer without a warrant. We accept this credibility determination and

conclude that the facts to which Agent White testified could lead a “reasonable,

experienced agent to believe” that evidence of child pornography might be

destroyed before they obtained a warrant. See 
Tobin, 923 F.3d at 1510
. The

district court therefore did not err in deciding there were exigent circumstances that

would permit a warrantless seizure of the computer.

      For the foregoing reasons, we affirm Mr. Oates’s conviction.

      AFFIRMED.




                                         10

Source:  CourtListener

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer