Fields v. Twitter, Inc.

Filing 21

AMENDED COMPLAINT against Twitter, Inc.. Filed byTamara Fields, Heather Creach, J.C. (2), a minor, J.C. (1), a minor. (Fisher, Lawrence) (Filed on 3/24/2016)

Download PDF
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 1 of 20 1 2 3 4 5 6 7 8 9 BURSOR & FISHER, P.A. L. Timothy Fisher (State Bar No. 191626) Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 Walnut Creek, CA 94596 Telephone: (925) 300-4455 Facsimile: (925) 407-2700 E-Mail: ltfisher@bursor.com jluster@bursor.com BURSOR & FISHER, P.A. Scott A. Bursor (State Bar No. 276006) 888 Seventh Avenue New York, NY 10019 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 E-Mail: scott@bursor.com 10 11 UNITED STATES DISTRICT COURT 12 NORTHERN DISTRICT OF CALIFORNIA 13 14 15 16 17 TAMARA FIELDS, on behalf of herself and as a representative of the ESTATE OF LLOYD FIELDS, JR., HEATHER CREACH, on behalf of herself and as a representative of the ESTATE OF JAMES DAMON CREACH, J.C. (1), a minor, and J.C. (2), a minor, Plaintiffs, 18 19 20 v. TWITTER, INC., Defendant. 21 22 23 24 25 26 27 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO Case No. 3:16-cv-00213-WHO FIRST AMENDED COMPLAINT JURY TRIAL DEMANDED Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 2 of 20 1 2 Plaintiffs Tamara Fields, Heather Creach, J.C. (1) and J.C. (2) (“Plaintiffs”), by and through her attorneys, allege the following against Defendant Twitter, Inc. (“Twitter” or “Defendant”): 3 4 NATURE OF ACTION 1. For years, Twitter has knowingly permitted the terrorist group ISIS to use its social 5 network as a tool for spreading extremist propaganda, raising funds and attracting new recruits. 6 This material support has been instrumental to the rise of ISIS and has enabled it to carry out 7 numerous terrorist attacks, including the November 9, 2015 shooting attack in Amman, Jordan in 8 which Lloyd “Carl” Fields, Jr. and James Damon Creach were killed. 9 10 11 12 13 14 15 16 An Image Used by ISIS Supporters Combines the Twitter Logo with the ISIS Flag 17 18 19 20 21 22 23 24 25 26 27 28 2. Without Twitter, the explosive growth of ISIS over the last few years into the most- feared terrorist group in the world would not have been possible. According to the Brookings Institution, ISIS “has exploited social media, most notoriously Twitter, to send its propaganda and messaging out to the world and to draw in people vulnerable to radicalization.” Using Twitter, “ISIS has been able to exert an outsized impact on how the world perceives it, by disseminating images of graphic violence (including the beheading of Western journalists and aid workers) . . . while using social media to attract new recruits and inspire lone actor attacks.” According to FBI Director James Comey, ISIS has perfected its use of Twitter to inspire small-scale individual attacks, “to crowdsource terrorism” and “to sell murder.” 3. Since first appearing on Twitter in 2010, ISIS accounts on Twitter have grown at an astonishing rate and, until recently, ISIS maintained official accounts on Twitter unfettered. These FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 1 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 3 of 20 1 official accounts included media outlets, regional hubs and well-known ISIS members, some with 2 tens of thousands of followers. For example, Al-Furqan, ISIS’s official media wing responsible for 3 producing ISIS’s multimedia propaganda, maintained a dedicated Twitter page where it posted 4 messages from ISIS leadership as well as videos and images of beheadings and other brutal forms 5 of executions to 19,000 followers. 6 4. Likewise, Al-Hayat Media Center, ISIS’s official public relations group, maintained 7 at least a half dozen accounts, emphasizing the recruitment of Westerners. As of June 2014, Al- 8 Hayat had nearly 20,000 followers. 9 10 11 12 13 14 15 16 17 Tweet by Al-Hayat Media Center Account @alhayaten Promoting an ISIS Recruitment Video 18 5. 19 20 Another Twitter account, @ISIS_Media_Hub, had 8,954 followers as of September 2014. 21 22 23 24 25 26 27 28 ISIS Propaganda Posted on @ISIS_Media_Hub FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 2 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 4 of 20 6. 1 2 As of December 2014, ISIS had an estimated 70,000 Twitter accounts, at least 79 of which were “official,” and it posted at least 90 tweets every minute. 3 PARTIES 4 7. Plaintiff Tamara Fields is a citizen of the United States domiciled in the State of 5 Florida. She brings this lawsuit on behalf of herself and as a representative of the estate of her 6 husband Lloyd “Carl” Fields, Jr., also a U.S. citizen. 7 8. Plaintiff Heather Creach is a citizen of the United States domiciled in the State of 8 Virginia. She brings this lawsuit on behalf of herself and as a representative of the estate of her 9 husband James Damon Creach. 10 9. Plaintiff J.C. (1), a minor represented by his legal guardian Heather Creach, is a 11 citizen of the United States domiciled in the State of Virginia. He is the son of James Damon 12 Creach. 13 10. Plaintiff J.C. (2), a minor represented by his legal guardian Heather Creach, is a 14 citizen of the United States domiciled in the State of Virginia. He is the son of James Damon 15 Creach. 16 17 11. Defendant Twitter is a publicly traded U.S. company incorporated in Delaware, with its principal place of business at 1355 Market Street, Suite 900, San Francisco, California 94103. 18 JURISDICTION AND VENUE 19 12. This Court has subject matter jurisdiction over this action pursuant to 28 U.S.C. § 20 1331 and 18 U.S.C. § 2333(a) as a civil action brought by a citizen of the United States injured by 21 reason of an act of international terrorism and the estate, survivor, or heir of a United States citizen 22 injured by reason of an act of international terrorism. 23 13. Venue is proper in this district pursuant to 28 U.S.C. § 1391(b) because a substantial 24 part of the events giving rise to the claims in this action occurred in this district and Defendants are 25 headquartered in this district. 26 27 28 ALLEGATIONS I. The Islamic State of Iraq and Syria 14. ISIS, which stands for the Islamic State of Iraq and Syria, is also known as the FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 3 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 5 of 20 1 Islamic State of Iraq and the Levant (“ISIL”), the Islamic State (“IS”), ad-Dawlah al-Islāmiyah fīl- 2 ʿIrāq wash-Shām (“DAESH”) and al-Qaeda in Iraq (“AQI”). 3 15. Originally affiliated with al Qaeda, ISIS’s stated goal is the establishment of a 4 transnational Islamic caliphate, i.e. an Islamic state run under strict Sharia law. By February 2014, 5 however, ISIS’s tactics had become too extreme for even al Qaeda and the two organizations 6 separated. 7 16. Since its emergence in Iraq in the early 2000s when it was known as AQI, ISIS has 8 wielded increasing territorial power, applying brutal, terrifying violence to attain its military and 9 political goals, including summary executions, mass beheadings, amputations, shootings and 10 crucifixions, which it applies to anyone it considers an “unbeliever,” a “combatant” or a “prisoner 11 of war.” 12 17. The United Nations and international NGOs have condemned ISIS for war crimes 13 and ethnic cleansing, and more than 60 countries are currently fighting to defeat ISIS and prevent 14 its expansion. 15 18. On December 17, 2004, the United States designated ISIS as a Foreign Terrorist 16 Organization (“FTO”) under Section 219 of the Immigration and Nationality Act, as amended. 17 II. ISIS Relies on Twitter to Terrorize 18 A. ISIS Uses Twitter to Recruit New Terrorists 19 19. One of ISIS’s primary uses of Twitter is as a recruitment platform, particularly to 20 21 draw fighters from Western countries. 20. ISIS reaches potential recruits by maintaining accounts on Twitter so that 22 individuals across the globe may reach out to them directly. After first contact, potential recruits 23 and ISIS recruiters often communicate via Twitter’s Direct Messaging capabilities. As described 24 by Defendant, “Direct Messages are the private side of Twitter. . . . Communicate quickly and 25 privately with one person or many. Direct Messages support text, photos, links, emoji and Tweets, 26 so you can make your point however you please. . . . Have a private conversation with anyone on 27 Twitter, even a friend of a friend. Direct messages can only be seen between the people included.” 28 21. These Direct Messages are “extensively monitored by [ISIS’s] emirs and FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 4 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 6 of 20 1 supervisors of the recruiting unit.” According to FBI Director James Comey, “[o]ne of the 2 challenges in facing this hydra-headed monster is that if (ISIS) finds someone online, someone 3 who might be willing to travel or kill in place they will begin a twitter direct messaging contact.” 4 Indeed, according to the Brookings Institution, some ISIS members “use Twitter purely for private 5 messaging or covert signaling.” ISIS has also been known to use Twitter’s Direct Messaging 6 capabilities for fundraising and operational purposes. 7 8 9 10 11 12 13 14 15 16 17 18 19 22. Twitter’s Direct Messaging capabilities also permit ISIS operatives to receive private communications without ever issuing a single tweet. Through its Direct Messaging tool, Twitter enables ISIS members to receive private Direct Messages from potential recruits, terrorist financiers and other terrorists with operational and intelligence information. Giving ISIS the capability to send and receive Direct Messages in this manner is no different to handing it a satellite phone, walkie-talkies or the use of a mail drop, all of which terrorists use for private communications in order to further their extremist agendas. 20 21 22 23 24 25 26 27 28 23. In addition to individual recruitment, ISIS members use Twitter to post instructional guidelines and promotional videos, referred to as “mujatweets.” 24. For example, in June 2014, ISIS fighters tweeted guidelines in English targeting FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 5 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 7 of 20 1 2 Westerners and instructing them on how to travel to the Middle East to join its fight. 25. That same month, ISIS posted a recruitment video on various social media sites. 3 Although YouTube removed the video from its site, the link remained available for download from 4 Twitter. The video was further promoted through retweets by accounts associated with ISIS. 5 26. ISIS also posted its notorious promotional training video, “Flames of War,” narrated 6 in English, in September 2014. The video was widely distributed on Twitter through ISIS 7 sympathizers. 8 9 10 27. After joining ISIS, new recruits become propaganda tools themselves, using Twitter to advertise their membership and terrorist activities. 28. For example, in May 2013, a British citizen who publicly identified himself as an 11 ISIS supporter tweeted about his touch-down in Turkey before crossing the border into Syria to 12 join ISIS in the fight against the Syrian regime. And in December 2013, the first Saudi Arabian 13 female suicide bomber to join ISIS in Syria tweeted her intent to become a martyr for the ISIS 14 cause, as she embarked for Syria. 15 16 29. Through its use of Twitter, ISIS has recruited more than 30,000 foreign recruits over the last year, including some 4,500 Westerners and 250 Americans. 17 B. ISIS Uses Twitter to Fund Terrorism 18 30. ISIS also uses Twitter to raise funds for its terrorist activities. 19 31. According to David Cohen, the U.S. Treasury Department’s Under Secretary for 20 Terrorism and Financial Intelligence, “[y]ou see these appeals on Twitter in particular from, you 21 know, well-know[n] terrorist financiers . . . and they’re quite explicit that these are to be made to 22 ISIL for their military campaign.” 23 32. The Financial Action Task Force confirms that “individuals associated with ISIL 24 have called for donations via Twitter and have asked the donors to contact them.” These tweets 25 even promote “donation tiers.” One ISIS-linked cleric with the Twitter account @Jahd_bmalk, for 26 instance, sought donations for weapons with the slogan “Participate in Jihad with your Money.” 27 The account tweeted that “if 50 dinars is donated, equivalent to 50 sniper rounds, one will receive a 28 ‘silver status.’ Likewise, if 100 dinars is donated, which buys eight mortar rounds, the contributor FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 6 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 8 of 20 1 will earn the title of ‘gold status donor.’” According to various tweets from the account, over 2 26,000 Saudi Riyals (almost $7,000) were donated. 3 4 5 6 7 8 9 Fundraising Images from Twitter Accounts on ISIS 10 33. A similar Twitter campaign in the spring of 2014 asked followers to “support the 11 Mujahideen with financial contribution via the following reliable accounts,” and provided contact 12 information for how to make the requested donations. 13 34. In its other Twitter fundraising campaigns, ISIS has posted photographs of cash 14 gold bars and luxury cars that it received from donors, as well as weapons purchased with the 15 proceeds. 16 17 18 19 20 21 22 23 Donations to ISIS Publicized on Twitter 24 25 26 27 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 7 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 9 of 20 1 C. ISIS Uses Twitter to Spread Its Propaganda 2 35. ISIS also uses Twitter to spread propaganda and incite fear by posting graphic 3 4 5 6 7 8 9 10 11 12 13 photos and videos of its terrorist feats. 36. Through Twitter, ISIS disseminates its official media publications as well as posts about real-time atrocities and threats to its perceived enemies. 37. In October 2013, ISIS posted a video of a prison break at the Abu Ghraib prison in Iraq, and its subsequent execution of Iraqi army officers. 38. In November 2013, an ISIS-affiliated user reported on Twitter that ISIS had killed a man it mistakenly believed to be Shiite. Another post by an ISIS account purported to depict Abu Dahr, identified as the “suicide bomber that attacked the Iranian embassy.” 39. In December 2013, an ISIS-affiliated user tweeted pictures of what it described as the killing of an Iraqi cameraman. 40. In June 2014, ISIS tweeted a picture of an Iraqi police chief, sitting with his severed 14 head perched on his legs. The accompanying tweet read: “This is our ball . . . it has skin on it.” 15 ISIS then hashtagged the tweet with the handle #WorldCup so that the image popped up on the 16 feeds of millions following the soccer challenge in Brazil. 17 18 19 20 21 41. On July 25, 2014, ISIS members tweeted photos of the beheading of around 75 Syrian soldiers who had been captured during the Syrian conflict. 42. In August 2014, an Australian member of ISIS tweeted a photo of his seven-year- old son holding the decapitated head of a Syrian soldier. 43. Also in August 2014, ISIS member Abu Musaab Hafid al-Baghdadi posted photos 22 on his Twitter account showing an ISIS militant beheading a blindfolded captured Lebanese Army 23 Sergeant Ali al-Sayyed. 24 44. That same month, ISIS supporters tweeted over 14,000 tweets threatening 25 Americans under the hashtags #WaronWhites and #AMessagefromISIStoUS, including posting 26 gruesome photos of dead and seriously injured Allied soldiers. Some of the photos depicted U.S. 27 marines hung from bridges in Fallujah, human heads on spikes and the twin towers in flames 28 following the 9/11 attacks. Other messages included direct threats to attack U.S. embassies around FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 8 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 10 of 20 1 the world, and to kill all Americans “wherever you are.” 2 3 45. Various ISIS accounts have also tweeted pictures and videos of the beheadings of Americans James Foley, Steven Sotloff and Peter Kassig. 4 46. To keep its membership informed, in April 2014, ISIS created an Arabic-language 5 app called “The Dawn of Glad Tidings,” or “The Dawn,” which posts tweets to thousands of users’ 6 accounts, the content of which is controlled by ISIS’s social-media operation. The tweets include 7 hashtags, links, and images related to ISIS’s activities. By June 2014, the app reached a high of 8 40,000 tweets in one day as ISIS captured Mosul, Iraq. 9 47. ISIS has also used Twitter to coordinate hashtag campaigns, whereby it enlists 10 thousands of members to repetitively tweet hashtags at certain times of day so that they trend on 11 Twitter, meaning a wider number of users are exposed to the tweets. One such campaign, dubbed a 12 “Twitter storm,” took place on June 8, 2014, and led to a surge in followers. 13 III. Twitter Knowingly Permits ISIS to Use Its Social Network 14 A. The Use of Twitter by Terrorists Has Been Widely Reported 15 48. For years, the media has reported on the ISIS’s use of Twitter and Twitter’s refusal 16 17 to take any meaningful action to stop it. 49. In December 2011, the New York Times reported that the terrorist group al- 18 Shabaab, “best known for chopping off hands and starving their own people, just opened a Twitter 19 account and have been writing up a storm, bragging about recent attacks and taunting their 20 enemies.” 21 50. That same month, terrorism experts cautioned that “Twitter terrorism” was part of 22 “an emerging trend” and that several branches of al Qaeda were using Twitter to recruit 23 individuals, fundraise and distribute propaganda more efficiently. 24 51. On August 18, 2013, USA Today reported that “the Twitter feed of pro-Islamic 25 State of Iraq and the Levant (ISIS), a group of militant extremists linked to al-Qaeda, showed 26 posters, which said: ‘We are avenging our Sunni brothers . . . leave now or face death.’” 27 28 52. On October 14, 2013, the BBC issued a report on “The Sympatic,” “one of the most important spokesmen of the Islamic State of Iraq and the Levant on the social contact website FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 9 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 11 of 20 1 Twitter” who famously tweeted: “I swear by God that with us there are mujahideen who are not 2 more than 15 years old!! Where are the men of the [Arabian] Peninsula? By God, shame on you.” 3 53. On October 31, 2013, Agence France-Presse reported on an ISIS video depicting a 4 prison break at Abu Ghraib and the execution of Iraqi army officers that was “posted on jihadi 5 forums and Twitter.” 6 54. On June 19, 2014, CNN reported on ISIS’s use of Twitter to raise money for 7 weapons, food and operations. The next day, Seth Jones, Associate Director at International 8 Security and Defense Policy Center, stated in an interview on CNN that Twitter was widely used 9 by terrorist groups like ISIS to collect information, fundraise and recruit. “Social media is where 10 it’s at for these groups,” he added. 11 55. On August 21, 2014, after ISIS tweeted out the graphic video showing the 12 beheading of American James Foley, the Wall Street Journal warned that Twitter could no longer 13 afford to be the “Wild West” of social media. 14 56. In September 2014, Time Magazine quoted terrorism expert Rita Katz, who 15 observed that, “[f]or several years, ISIS followers have been hijacking Twitter to freely promote 16 their jihad with very little to no interference at all. . . . Twitter’s lack of action has resulted in a 17 strong, and massive pro-ISIS presence on their social media platform, consisting of campaigns to 18 mobilize, recruit and terrorize.” 19 B. Twitter Has Rebuffed Numerous Requests to Comply with U.S. Law 20 57. Throughout this period, both the U.S. government and the public at large have urged 21 Twitter to stop providing its services to terrorists. 22 58. In December 2011, an Israeli law group threatened to file suit against Twitter for 23 allowing terrorist groups like Hezbollah to use its social network in violation of U.S. anti-terrorism 24 laws. 25 59. In December 2012, several members of Congress wrote to FBI Director Robert 26 Mueller asking the Bureau to demand that the Twitter block the accounts of various terrorist 27 groups. 28 60. In a committee hearing held on August 2, 2012, Rep. Ted Poe, chair of the House FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 10 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 12 of 20 1 Foreign Affairs Subcommittee on Terrorism, lamented that “when it comes to a terrorist using 2 Twitter, Twitter has not shut down or suspended a single account.” “Terrorists are using Twitter,” 3 Rep. Poe added, and “[i]t seems like it’s a violation of the law.” In 2015, Rep. Poe again reported 4 that Twitter had consistently failed to respond sufficiently to pleas to shut down clear incitements 5 to violence by terrorists. 6 61. Recently, former Secretary of State Hillary Clinton has urged Twitter to become 7 more aggressive in preventing ISIS from using its network. “Resolve means depriving jihadists of 8 virtual territory, just as we work to deprive them of actual territory,” she told one audience. Later, 9 Secy. Clinton stated that Twitter and other companies “cannot permit the recruitment and the actual 10 direction of attacks or the celebration of violence by this sophisticated Internet user. They’re going 11 to have to help us take down these announcements and these appeals.” 12 62. On January 7, 2016, White House officials announced that they would hold high- 13 level discussions with Twitter and other social media companies to encourage them “to do more to 14 block terrorists” from using their services. “The primary purpose is for government officials to 15 press the biggest Internet firms to take a more proactive approach to countering terrorist messages 16 and recruitment online. . . . That issue has long vexed U.S. counterterrorism officials, as terror 17 groups use Twitter . . . to spread terrorist propaganda, cultivate followers and steer them toward 18 committing violence. But the companies have resisted some requests by law-enforcement leaders 19 to take action . . . .” 20 C. Twitter Has Refused to Prevent ISIS From Using Its Services 21 63. Despite these appeals, Twitter has refused to take meaningful action. 22 64. In a January 2011 blog post entitled “The tweets Must Flow,” Twitter co-founder 23 Biz Stone and Twitter General Counsel Alex Macgillivray wrote: “We don’t always agree with the 24 things people choose to tweet, but we keep the information flowing irrespective of any view we 25 may have about the content.” 26 65. On June 20, 2014, Twitter founder Biz Stone, responding to media questions about 27 ISIS’s use of Twitter to publicize its acts of terrorism, said, “[i]f you want to create a platform that 28 allows for the freedom of expression for hundreds of millions of people around the world, you FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 11 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 13 of 20 1 2 really have to take the good with the bad.” 66. In September 2014, Twitter spokesperson Nu Wexler reiterated Twitter’s hands-off 3 approach, telling the press, “Twitter users around the world send approximately 500 million tweets 4 each day, and we do not monitor them proactively.” “The Twitter Rules” reiterated that Twitter 5 “do[es] not actively monitor and will not censor user content, except in exceptional 6 circumstances.” In February 2015, Twitter confirmed that it does not proactively monitor content, 7 and that it reviews only that content which is reported by other users as violative of its rules. 8 67. Most technology experts agree that Twitter could and should be doing more to stop 9 ISIS from using its social network. “When Twitter says, ‘We can’t do this,’ I don’t believe that,” 10 said Hany Farid, chairman of the computer science department at Dartmouth College. Mr. Farid, 11 who co-developed a child pornography tracking system with Microsoft, says that the same 12 technology could be applied to terror content, so long as companies were motivated to do so. 13 “There’s no fundamental technology or engineering limitation,” he said. “This is a business or 14 policy decision. Unless the companies have decided that they just can’t be bothered.” 15 68. According to Rita Katz, the director of SITE Intelligence Group, “Twitter is not 16 doing enough. With the technology Twitter has, they can immediately stop these accounts, but 17 they have done nothing to stop the dissemination and recruitment of lone wolf terrorists.” 18 69. Even when Twitter shuts down an ISIS-linked account, it does nothing to stop it 19 from springing right back up. According to the New York Times, the Twitter account of the pro- 20 ISIS group Asawitiri Media has had 335 accounts. When its account @TurMedia333 was shut 21 down, it started @TurMedia334. When that was shut down, it started @TurMedia335. This 22 “naming convention — adding one digit to a new account after the last one is suspended — does 23 not seem as if it would require artificial intelligence to spot.” Each of these accounts also used the 24 same user photograph of a bearded man’s face over and over again. In the hours after the shooting 25 attack in San Bernardino, California on December 2, 2015, @TurMedia335 tweeted: “California, 26 we have already arrived with our soldiers. Decide how to be your end, with knife or bomb.” 27 28 70. Notably, while Twitter has now put in place a rule that supposedly prohibits “threats of violence . . . including threatening or promoting terrorism,” many ISIS-themed accounts are still FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 12 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 14 of 20 1 easily found on Twitter.com. To this day, Twitter also permits groups designated by the U.S. 2 government as Foreign Terrorist Organizations to maintain official accounts, including Hamas 3 (@hamasinfo and @HamasInfoEn) and Hizbollah (@almanarnews). 4 IV. 5 The November 9, 2015 Attack 71. Lloyd “Carl” Fields, Jr. travelled to Jordan on June 12, 2015 as a government 6 contractor through DynCorp International. His trip to Jordan was only supposed to last two weeks, 7 but problems with his Israeli work visa kept him there longer. 8 9 10 11 12 13 14 15 Lloyd “Carl” Fields, Jr. 16 72. James Damon Creach arrived in Jordan on October 15, 2015 where he was working 17 through the government contractor DECO, Inc. Mr. Creach was scheduled to return home to 18 Florida on December 5, 2015. 19 20 21 22 23 24 25 26 27 28 James Damon Creach and Family FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 13 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 15 of 20 1 73. While in Jordan, Carl and Damon were assigned to the International Police Training 2 Center (“IPTC”) in the Muwaqqar district of southeast Amman, Jordan—a facility run and funded 3 in part by the U.S. State Department. There, they both used their years of experience as police 4 officers to train law enforcement officers from Jordan, Iraq and the Palestinian Territories in basic 5 police and security skills. Carl had previously served as a Deputy Sheriff in Calcasieu Parish, 6 Louisiana, and as a police advisor in both Iraq and Afghanistan. Damon was a graduate of the 7 Virginia Beach Policy Academy, a former police officer in the Virginia Police Department and had 8 trained police officers in Afghanistan, Kenya and other locations. 9 10 11 12 13 14 15 16 Entrance to the International Police Training Center in Amman, Jordan 17 18 74. Carl and his wife Tamara considered his assignment to Jordan a safe one because 19 Jordan is a U.S. ally and it has not experienced the levels of terrorism and unrest that have spread 20 throughout the Middle East in recent years. Carl’s mission was so safe, in fact, that he was not 21 issued a weapon to carry with him. 22 75. Damon and his wife Heather also believed that his trip to Jordan did not involve any 23 great danger. On the day of the attack in which he was killed, Damon was not armed, he was not 24 wearing armor or protective gear and his vehicle was not armored. 25 76. 26 Anwar Abu Zaid. One of the men studying at the IPTC was 28-year old Jordanian police captain 27 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 14 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 16 of 20 1 2 3 4 5 6 7 Anwar Abu Zaid 8 9 77. In early November 2015, Abu Zaid sent a message to friends saying he was going 10 on a journey to “paradise or hell.” “When we prepare our luggage for a journey . . . we fear we 11 may forget something, however small, and the longer the journey, the stronger the concern that we 12 won’t forget anything,” sources quoted Abu Zaid as saying. At about that same time, Abu Zaid 13 resigned from the Jordanian police force, presumably to go work in Saudi Arabia. 14 78. Then, on November 9, 2015, Abu Zaid arrived at IPTC smuggling a Kalashnikov 15 assault rifle with 120 bullets and two handguns in his car. As an officer, he was not searched as he 16 entered. After the noontime prayer, Abu Zaid shot a truck that was moving through the facility, 17 killing Damon. Abu Zaid then entered the facilities cafeteria where he killed an additional four 18 people eating lunch, including Carl. 19 20 21 79. According to FBI investigators, Zaid did not know either Carl or Damon; he targeted them simply because they were Americans. 80. ISIS claimed responsibility for the attack in a statement issued through their al- 22 Battar Media Foundation: “Yes . . . we kill the Americans in Amman,” the terror group said, using 23 the words “lone wolf” to describe the attack. “Do not provoke the Muslims more than this, 24 especially recruited and supporters of the Islamic State. The more your aggression against the 25 Muslims, the more our determination and revenge . . . time will turn thousands of supporters of the 26 caliphate on Twitter and others to wolves.” 27 28 81. A few weeks later, ISIS reiterated this claim in its Dabiq Magazine, Issue 12: “And on ‘9 November 2015,’ Anwar Abu Zeid—after repenting from his former occupation—attacked FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 15 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 17 of 20 1 the American crusaders and their apostate allies, killing two American crusaders, two Jordanian 2 apostates, and one South African crusader. These are the deeds of those upon the methodology of 3 the revived Khilāfah. They will not let its enemies enjoy rest until enemy blood is spilled in 4 revenge for the religion and the Ummah.” 5 6 7 8 9 82. Following the attack, ISIS supporters roundly praised the shooting, with one user tweeting: “The killing shall continue and will not stop.” 83. The attack took place on the 10-year anniversary of ISIS’s coordinated bomb attacks on three hotels in Amman on November 9, 2005. 84. Abu Zaid’s brother Fadi told reporters that Abu Zaid had been very moved by 10 ISIS’s brutal execution of Jordanian pilot Maaz al-Kassasbeh in February 2015. After al- 11 Kassasbeh was captured, ISIS launched a campaign on Twitter with the Arabic hashtag 12 #SuggestAWayToKillTheJordanianPilotPig in order to crowd source ideas for his method of 13 execution. Proposals included feeding al-Kassasbeh to crocodiles, cutting him up with a chainsaw, 14 impalement and even disfigurement using acupuncture needles dipped in acid before having his 15 head cut off. A second hashtag labelled #WeAllWantToSlaughterMoaz and carrying more brutal 16 execution ideas and videos of children killed in coalition airstrikes, was retweeted over 11,000 17 times. Eventually, based on suggestions from its Twitter followers, ISIS burned al-Kassasbeh alive 18 in a cage before running him over with a bulldozer. ISIS tweeted out a 22-minute snuff film of the 19 killing in which al-Kassasbeh is engulfed in a massive ball of fire and his anguished screams can 20 be clearly heard. “The insurgents let him burn for several minutes, until his skin is charred black, 21 before an excavator dumps a load of concrete and sand on top of the cage to both extinguish the 22 fire and finish off the grisly killing.” The film, entitled “Healing the Believers’ Chests,” was 23 produced by ISIS’s official Al Furqan Media Foundation and distributed via a Twitter account 24 known as a source for IS propaganda. 25 85. On the day of the attack killing Carl and Damon, Tamara saw that she missed a call 26 from the U.S. embassy and she knew that something was wrong. Tamara called back and, when 27 she eventually got through, she was told that Carl had been killed. The murder of her husband Carl 28 by an ISIS operative has caused her severe mental anguish, extreme emotional pain and suffering, FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 16 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 18 of 20 1 2 and the loss of her husband’s society, companionship, comfort, advice and counsel. 86. That same day, Heather was notified by her husband’s company DECO that Damon 3 had been killed. She later received a call from the U.S. Embassy in Jordan confirming his death. 4 Heather was then tasked with telling her children that their father was dead. The murder of their 5 husband and father Damon by an ISIS operative has caused Heather, J.C. (1) and J.C. (2) severe 6 mental anguish, extreme emotional pain and suffering, and the loss of Damon’s society, 7 companionship, comfort, advice and counsel. 8 COUNT I CIVIL LIABILITY UNDER 18 U.S.C. § 2333(a) AGAINST ALL DEFENDANTS FOR VIOLATIONS OF 18 U.S.C. § 2339A CONSTITUTING ACTS OF INTERNATIONAL TERRORISM 9 10 11 12 13 87. Plaintiffs repeat and re-allege each and every allegation of the foregoing paragraphs as if fully set forth herein. 88. The services and support that Defendant purposefully, knowingly or with willful 14 blindness provided to ISIS constitute material support to the preparation and carrying out of acts of 15 international terrorism, including the attack in which Lloyd Fields, Jr. and James Damon Creach 16 were killed. 17 18 19 20 89. Defendant’s provision of material support to ISIS was a proximate cause of the injury inflicted on Plaintiffs. 90. By virtue of its violations of 18 U.S.C. § 2339A, Defendant is liable pursuant to 18 U.S.C. § 2333 for any and all damages that Plaintiffs have sustained. COUNT II CIVIL LIABILITY UNDER 18 U.S.C. § 2333(a) AGAINST ALL DEFENDANTS FOR VIOLATIONS OF 18 U.S.C. § 2339B CONSTITUTING ACTS OF INTERNATIONAL TERRORISM 21 22 23 91. Plaintiffs repeat and re-allege each and every allegation of the foregoing paragraphs 24 as if fully set forth herein. 25 92. The services and support that Defendant purposefully, knowingly or with willful 26 blindness provided to ISIS constitute material support to a Foreign Terrorist Organization (“FTO”) 27 in violation of 18 U.S.C. § 2339B. 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 17 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 19 of 20 1 2 3 4 93. Defendant’s provision of material support to ISIS was a proximate cause of the injury inflicted on Plaintiffs. 94. By virtue of its violations of 18 U.S.C. § 2339B, Defendant is liable pursuant to 18 U.S.C. § 2333 for any and all damages that Plaintiffs have sustained. 5 6 7 8 PRAYER FOR RELIEF WHEREFORE, Plaintiffs request that the Court: i. Accept jurisdiction over this action; ii. Enter judgment against Defendant and in favor of Plaintiffs for compensatory damages in an amount to be determined at trial; iii. Enter judgment against Defendant and in favor of Plaintiffs for treble damages pursuant to 18 U.S.C. § 2333; iv. Enter judgment against Defendant and in favor of Plaintiffs for any and all costs sustained in connection with the prosecution of this action, including attorneys’ fees, pursuant to 18 U.S.C. § 2333; v. Order any equitable relief to which Plaintiffs might be entitled; vi. Enter an Order declaring that Defendant has violated, and is continuing to violate, the Anti-Terrorism Act, 18 U.S.C. § 2331 et seq.; and vii. Grant such other and further relief as justice requires. 9 10 11 12 13 14 15 16 17 DEMAND FOR TRIAL BY JURY 18 19 20 Plaintiffs demand a trial by jury of all issues so triable. Dated: March 24, 2016 BURSOR & FISHER, P.A. 21 By: 22 23 /s/ L. Timothy Fisher L. Timothy Fisher L. Timothy Fisher (State Bar No. 191626) Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 Walnut Creek, CA 94596 Telephone: (925) 300-4455 Facsimile: (925) 407-2700 E-Mail: ltfisher@bursor.com jluster@bursor.com 24 25 26 27 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 18 Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 20 of 20 1 BURSOR & FISHER, P.A. Scott A. Bursor (State Bar No. 276006) 888 Seventh Avenue New York, NY 10019 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 E-Mail: scott@bursor.com 2 3 4 5 Attorneys for Plaintiffs 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 FIRST AMENDED COMPLAINT CASE NO. 3:16-CV-00213-WHO 19

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?