Fields v. Twitter, Inc.
Filing
21
AMENDED COMPLAINT against Twitter, Inc.. Filed byTamara Fields, Heather Creach, J.C. (2), a minor, J.C. (1), a minor. (Fisher, Lawrence) (Filed on 3/24/2016)
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 1 of 20
1
2
3
4
5
6
7
8
9
BURSOR & FISHER, P.A.
L. Timothy Fisher (State Bar No. 191626)
Julia A. Luster (State Bar No. 295031)
1990 North California Boulevard, Suite 940
Walnut Creek, CA 94596
Telephone: (925) 300-4455
Facsimile: (925) 407-2700
E-Mail: ltfisher@bursor.com
jluster@bursor.com
BURSOR & FISHER, P.A.
Scott A. Bursor (State Bar No. 276006)
888 Seventh Avenue
New York, NY 10019
Telephone: (212) 989-9113
Facsimile: (212) 989-9163
E-Mail: scott@bursor.com
10
11
UNITED STATES DISTRICT COURT
12
NORTHERN DISTRICT OF CALIFORNIA
13
14
15
16
17
TAMARA FIELDS, on behalf of herself and as
a representative of the ESTATE OF LLOYD
FIELDS, JR., HEATHER CREACH, on behalf
of herself and as a representative of the ESTATE
OF JAMES DAMON CREACH, J.C. (1), a
minor, and J.C. (2), a minor,
Plaintiffs,
18
19
20
v.
TWITTER, INC.,
Defendant.
21
22
23
24
25
26
27
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
Case No. 3:16-cv-00213-WHO
FIRST AMENDED COMPLAINT
JURY TRIAL DEMANDED
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 2 of 20
1
2
Plaintiffs Tamara Fields, Heather Creach, J.C. (1) and J.C. (2) (“Plaintiffs”), by and through
her attorneys, allege the following against Defendant Twitter, Inc. (“Twitter” or “Defendant”):
3
4
NATURE OF ACTION
1.
For years, Twitter has knowingly permitted the terrorist group ISIS to use its social
5
network as a tool for spreading extremist propaganda, raising funds and attracting new recruits.
6
This material support has been instrumental to the rise of ISIS and has enabled it to carry out
7
numerous terrorist attacks, including the November 9, 2015 shooting attack in Amman, Jordan in
8
which Lloyd “Carl” Fields, Jr. and James Damon Creach were killed.
9
10
11
12
13
14
15
16
An Image Used by ISIS Supporters Combines
the Twitter Logo with the ISIS Flag
17
18
19
20
21
22
23
24
25
26
27
28
2.
Without Twitter, the explosive growth of ISIS over the last few years into the most-
feared terrorist group in the world would not have been possible. According to the Brookings
Institution, ISIS “has exploited social media, most notoriously Twitter, to send its propaganda and
messaging out to the world and to draw in people vulnerable to radicalization.” Using Twitter,
“ISIS has been able to exert an outsized impact on how the world perceives it, by disseminating
images of graphic violence (including the beheading of Western journalists and aid workers) . . .
while using social media to attract new recruits and inspire lone actor attacks.” According to FBI
Director James Comey, ISIS has perfected its use of Twitter to inspire small-scale individual
attacks, “to crowdsource terrorism” and “to sell murder.”
3.
Since first appearing on Twitter in 2010, ISIS accounts on Twitter have grown at an
astonishing rate and, until recently, ISIS maintained official accounts on Twitter unfettered. These
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
1
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 3 of 20
1
official accounts included media outlets, regional hubs and well-known ISIS members, some with
2
tens of thousands of followers. For example, Al-Furqan, ISIS’s official media wing responsible for
3
producing ISIS’s multimedia propaganda, maintained a dedicated Twitter page where it posted
4
messages from ISIS leadership as well as videos and images of beheadings and other brutal forms
5
of executions to 19,000 followers.
6
4.
Likewise, Al-Hayat Media Center, ISIS’s official public relations group, maintained
7
at least a half dozen accounts, emphasizing the recruitment of Westerners. As of June 2014, Al-
8
Hayat had nearly 20,000 followers.
9
10
11
12
13
14
15
16
17
Tweet by Al-Hayat Media Center Account @alhayaten
Promoting an ISIS Recruitment Video
18
5.
19
20
Another Twitter account, @ISIS_Media_Hub, had 8,954 followers as of September
2014.
21
22
23
24
25
26
27
28
ISIS Propaganda Posted on @ISIS_Media_Hub
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
2
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 4 of 20
6.
1
2
As of December 2014, ISIS had an estimated 70,000 Twitter accounts, at least 79 of
which were “official,” and it posted at least 90 tweets every minute.
3
PARTIES
4
7.
Plaintiff Tamara Fields is a citizen of the United States domiciled in the State of
5
Florida. She brings this lawsuit on behalf of herself and as a representative of the estate of her
6
husband Lloyd “Carl” Fields, Jr., also a U.S. citizen.
7
8.
Plaintiff Heather Creach is a citizen of the United States domiciled in the State of
8
Virginia. She brings this lawsuit on behalf of herself and as a representative of the estate of her
9
husband James Damon Creach.
10
9.
Plaintiff J.C. (1), a minor represented by his legal guardian Heather Creach, is a
11
citizen of the United States domiciled in the State of Virginia. He is the son of James Damon
12
Creach.
13
10.
Plaintiff J.C. (2), a minor represented by his legal guardian Heather Creach, is a
14
citizen of the United States domiciled in the State of Virginia. He is the son of James Damon
15
Creach.
16
17
11.
Defendant Twitter is a publicly traded U.S. company incorporated in Delaware, with
its principal place of business at 1355 Market Street, Suite 900, San Francisco, California 94103.
18
JURISDICTION AND VENUE
19
12.
This Court has subject matter jurisdiction over this action pursuant to 28 U.S.C. §
20
1331 and 18 U.S.C. § 2333(a) as a civil action brought by a citizen of the United States injured by
21
reason of an act of international terrorism and the estate, survivor, or heir of a United States citizen
22
injured by reason of an act of international terrorism.
23
13.
Venue is proper in this district pursuant to 28 U.S.C. § 1391(b) because a substantial
24
part of the events giving rise to the claims in this action occurred in this district and Defendants are
25
headquartered in this district.
26
27
28
ALLEGATIONS
I.
The Islamic State of Iraq and Syria
14.
ISIS, which stands for the Islamic State of Iraq and Syria, is also known as the
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
3
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 5 of 20
1
Islamic State of Iraq and the Levant (“ISIL”), the Islamic State (“IS”), ad-Dawlah al-Islāmiyah fīl-
2
ʿIrāq wash-Shām (“DAESH”) and al-Qaeda in Iraq (“AQI”).
3
15.
Originally affiliated with al Qaeda, ISIS’s stated goal is the establishment of a
4
transnational Islamic caliphate, i.e. an Islamic state run under strict Sharia law. By February 2014,
5
however, ISIS’s tactics had become too extreme for even al Qaeda and the two organizations
6
separated.
7
16.
Since its emergence in Iraq in the early 2000s when it was known as AQI, ISIS has
8
wielded increasing territorial power, applying brutal, terrifying violence to attain its military and
9
political goals, including summary executions, mass beheadings, amputations, shootings and
10
crucifixions, which it applies to anyone it considers an “unbeliever,” a “combatant” or a “prisoner
11
of war.”
12
17.
The United Nations and international NGOs have condemned ISIS for war crimes
13
and ethnic cleansing, and more than 60 countries are currently fighting to defeat ISIS and prevent
14
its expansion.
15
18.
On December 17, 2004, the United States designated ISIS as a Foreign Terrorist
16
Organization (“FTO”) under Section 219 of the Immigration and Nationality Act, as amended.
17
II.
ISIS Relies on Twitter to Terrorize
18
A.
ISIS Uses Twitter to Recruit New Terrorists
19
19.
One of ISIS’s primary uses of Twitter is as a recruitment platform, particularly to
20
21
draw fighters from Western countries.
20.
ISIS reaches potential recruits by maintaining accounts on Twitter so that
22
individuals across the globe may reach out to them directly. After first contact, potential recruits
23
and ISIS recruiters often communicate via Twitter’s Direct Messaging capabilities. As described
24
by Defendant, “Direct Messages are the private side of Twitter. . . . Communicate quickly and
25
privately with one person or many. Direct Messages support text, photos, links, emoji and Tweets,
26
so you can make your point however you please. . . . Have a private conversation with anyone on
27
Twitter, even a friend of a friend. Direct messages can only be seen between the people included.”
28
21.
These Direct Messages are “extensively monitored by [ISIS’s] emirs and
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
4
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 6 of 20
1
supervisors of the recruiting unit.” According to FBI Director James Comey, “[o]ne of the
2
challenges in facing this hydra-headed monster is that if (ISIS) finds someone online, someone
3
who might be willing to travel or kill in place they will begin a twitter direct messaging contact.”
4
Indeed, according to the Brookings Institution, some ISIS members “use Twitter purely for private
5
messaging or covert signaling.” ISIS has also been known to use Twitter’s Direct Messaging
6
capabilities for fundraising and operational purposes.
7
8
9
10
11
12
13
14
15
16
17
18
19
22.
Twitter’s Direct Messaging capabilities also permit ISIS operatives to receive
private communications without ever issuing a single tweet. Through its Direct Messaging tool,
Twitter enables ISIS members to receive private Direct Messages from potential recruits, terrorist
financiers and other terrorists with operational and intelligence information. Giving ISIS the
capability to send and receive Direct Messages in this manner is no different to handing it a
satellite phone, walkie-talkies or the use of a mail drop, all of which terrorists use for private
communications in order to further their extremist agendas.
20
21
22
23
24
25
26
27
28
23.
In addition to individual recruitment, ISIS members use Twitter to post instructional
guidelines and promotional videos, referred to as “mujatweets.”
24.
For example, in June 2014, ISIS fighters tweeted guidelines in English targeting
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
5
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 7 of 20
1
2
Westerners and instructing them on how to travel to the Middle East to join its fight.
25.
That same month, ISIS posted a recruitment video on various social media sites.
3
Although YouTube removed the video from its site, the link remained available for download from
4
Twitter. The video was further promoted through retweets by accounts associated with ISIS.
5
26.
ISIS also posted its notorious promotional training video, “Flames of War,” narrated
6
in English, in September 2014. The video was widely distributed on Twitter through ISIS
7
sympathizers.
8
9
10
27.
After joining ISIS, new recruits become propaganda tools themselves, using Twitter
to advertise their membership and terrorist activities.
28.
For example, in May 2013, a British citizen who publicly identified himself as an
11
ISIS supporter tweeted about his touch-down in Turkey before crossing the border into Syria to
12
join ISIS in the fight against the Syrian regime. And in December 2013, the first Saudi Arabian
13
female suicide bomber to join ISIS in Syria tweeted her intent to become a martyr for the ISIS
14
cause, as she embarked for Syria.
15
16
29.
Through its use of Twitter, ISIS has recruited more than 30,000 foreign recruits over
the last year, including some 4,500 Westerners and 250 Americans.
17
B.
ISIS Uses Twitter to Fund Terrorism
18
30.
ISIS also uses Twitter to raise funds for its terrorist activities.
19
31.
According to David Cohen, the U.S. Treasury Department’s Under Secretary for
20
Terrorism and Financial Intelligence, “[y]ou see these appeals on Twitter in particular from, you
21
know, well-know[n] terrorist financiers . . . and they’re quite explicit that these are to be made to
22
ISIL for their military campaign.”
23
32.
The Financial Action Task Force confirms that “individuals associated with ISIL
24
have called for donations via Twitter and have asked the donors to contact them.” These tweets
25
even promote “donation tiers.” One ISIS-linked cleric with the Twitter account @Jahd_bmalk, for
26
instance, sought donations for weapons with the slogan “Participate in Jihad with your Money.”
27
The account tweeted that “if 50 dinars is donated, equivalent to 50 sniper rounds, one will receive a
28
‘silver status.’ Likewise, if 100 dinars is donated, which buys eight mortar rounds, the contributor
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
6
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 8 of 20
1
will earn the title of ‘gold status donor.’” According to various tweets from the account, over
2
26,000 Saudi Riyals (almost $7,000) were donated.
3
4
5
6
7
8
9
Fundraising Images from Twitter Accounts on ISIS
10
33.
A similar Twitter campaign in the spring of 2014 asked followers to “support the
11
Mujahideen with financial contribution via the following reliable accounts,” and provided contact
12
information for how to make the requested donations.
13
34.
In its other Twitter fundraising campaigns, ISIS has posted photographs of cash
14
gold bars and luxury cars that it received from donors, as well as weapons purchased with the
15
proceeds.
16
17
18
19
20
21
22
23
Donations to ISIS Publicized on Twitter
24
25
26
27
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
7
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 9 of 20
1
C.
ISIS Uses Twitter to Spread Its Propaganda
2
35.
ISIS also uses Twitter to spread propaganda and incite fear by posting graphic
3
4
5
6
7
8
9
10
11
12
13
photos and videos of its terrorist feats.
36.
Through Twitter, ISIS disseminates its official media publications as well as posts
about real-time atrocities and threats to its perceived enemies.
37.
In October 2013, ISIS posted a video of a prison break at the Abu Ghraib prison in
Iraq, and its subsequent execution of Iraqi army officers.
38.
In November 2013, an ISIS-affiliated user reported on Twitter that ISIS had killed a
man it mistakenly believed to be Shiite. Another post by an ISIS account purported to depict Abu
Dahr, identified as the “suicide bomber that attacked the Iranian embassy.”
39.
In December 2013, an ISIS-affiliated user tweeted pictures of what it described as
the killing of an Iraqi cameraman.
40.
In June 2014, ISIS tweeted a picture of an Iraqi police chief, sitting with his severed
14
head perched on his legs. The accompanying tweet read: “This is our ball . . . it has skin on it.”
15
ISIS then hashtagged the tweet with the handle #WorldCup so that the image popped up on the
16
feeds of millions following the soccer challenge in Brazil.
17
18
19
20
21
41.
On July 25, 2014, ISIS members tweeted photos of the beheading of around 75
Syrian soldiers who had been captured during the Syrian conflict.
42.
In August 2014, an Australian member of ISIS tweeted a photo of his seven-year-
old son holding the decapitated head of a Syrian soldier.
43.
Also in August 2014, ISIS member Abu Musaab Hafid al-Baghdadi posted photos
22
on his Twitter account showing an ISIS militant beheading a blindfolded captured Lebanese Army
23
Sergeant Ali al-Sayyed.
24
44.
That same month, ISIS supporters tweeted over 14,000 tweets threatening
25
Americans under the hashtags #WaronWhites and #AMessagefromISIStoUS, including posting
26
gruesome photos of dead and seriously injured Allied soldiers. Some of the photos depicted U.S.
27
marines hung from bridges in Fallujah, human heads on spikes and the twin towers in flames
28
following the 9/11 attacks. Other messages included direct threats to attack U.S. embassies around
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
8
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 10 of 20
1
the world, and to kill all Americans “wherever you are.”
2
3
45.
Various ISIS accounts have also tweeted pictures and videos of the beheadings of
Americans James Foley, Steven Sotloff and Peter Kassig.
4
46.
To keep its membership informed, in April 2014, ISIS created an Arabic-language
5
app called “The Dawn of Glad Tidings,” or “The Dawn,” which posts tweets to thousands of users’
6
accounts, the content of which is controlled by ISIS’s social-media operation. The tweets include
7
hashtags, links, and images related to ISIS’s activities. By June 2014, the app reached a high of
8
40,000 tweets in one day as ISIS captured Mosul, Iraq.
9
47.
ISIS has also used Twitter to coordinate hashtag campaigns, whereby it enlists
10
thousands of members to repetitively tweet hashtags at certain times of day so that they trend on
11
Twitter, meaning a wider number of users are exposed to the tweets. One such campaign, dubbed a
12
“Twitter storm,” took place on June 8, 2014, and led to a surge in followers.
13
III.
Twitter Knowingly Permits ISIS to Use Its Social Network
14
A.
The Use of Twitter by Terrorists Has Been Widely Reported
15
48.
For years, the media has reported on the ISIS’s use of Twitter and Twitter’s refusal
16
17
to take any meaningful action to stop it.
49.
In December 2011, the New York Times reported that the terrorist group al-
18
Shabaab, “best known for chopping off hands and starving their own people, just opened a Twitter
19
account and have been writing up a storm, bragging about recent attacks and taunting their
20
enemies.”
21
50.
That same month, terrorism experts cautioned that “Twitter terrorism” was part of
22
“an emerging trend” and that several branches of al Qaeda were using Twitter to recruit
23
individuals, fundraise and distribute propaganda more efficiently.
24
51.
On August 18, 2013, USA Today reported that “the Twitter feed of pro-Islamic
25
State of Iraq and the Levant (ISIS), a group of militant extremists linked to al-Qaeda, showed
26
posters, which said: ‘We are avenging our Sunni brothers . . . leave now or face death.’”
27
28
52.
On October 14, 2013, the BBC issued a report on “The Sympatic,” “one of the most
important spokesmen of the Islamic State of Iraq and the Levant on the social contact website
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
9
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 11 of 20
1
Twitter” who famously tweeted: “I swear by God that with us there are mujahideen who are not
2
more than 15 years old!! Where are the men of the [Arabian] Peninsula? By God, shame on you.”
3
53.
On October 31, 2013, Agence France-Presse reported on an ISIS video depicting a
4
prison break at Abu Ghraib and the execution of Iraqi army officers that was “posted on jihadi
5
forums and Twitter.”
6
54.
On June 19, 2014, CNN reported on ISIS’s use of Twitter to raise money for
7
weapons, food and operations. The next day, Seth Jones, Associate Director at International
8
Security and Defense Policy Center, stated in an interview on CNN that Twitter was widely used
9
by terrorist groups like ISIS to collect information, fundraise and recruit. “Social media is where
10
it’s at for these groups,” he added.
11
55.
On August 21, 2014, after ISIS tweeted out the graphic video showing the
12
beheading of American James Foley, the Wall Street Journal warned that Twitter could no longer
13
afford to be the “Wild West” of social media.
14
56.
In September 2014, Time Magazine quoted terrorism expert Rita Katz, who
15
observed that, “[f]or several years, ISIS followers have been hijacking Twitter to freely promote
16
their jihad with very little to no interference at all. . . . Twitter’s lack of action has resulted in a
17
strong, and massive pro-ISIS presence on their social media platform, consisting of campaigns to
18
mobilize, recruit and terrorize.”
19
B.
Twitter Has Rebuffed Numerous Requests to Comply with U.S. Law
20
57.
Throughout this period, both the U.S. government and the public at large have urged
21
Twitter to stop providing its services to terrorists.
22
58.
In December 2011, an Israeli law group threatened to file suit against Twitter for
23
allowing terrorist groups like Hezbollah to use its social network in violation of U.S. anti-terrorism
24
laws.
25
59.
In December 2012, several members of Congress wrote to FBI Director Robert
26
Mueller asking the Bureau to demand that the Twitter block the accounts of various terrorist
27
groups.
28
60.
In a committee hearing held on August 2, 2012, Rep. Ted Poe, chair of the House
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
10
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 12 of 20
1
Foreign Affairs Subcommittee on Terrorism, lamented that “when it comes to a terrorist using
2
Twitter, Twitter has not shut down or suspended a single account.” “Terrorists are using Twitter,”
3
Rep. Poe added, and “[i]t seems like it’s a violation of the law.” In 2015, Rep. Poe again reported
4
that Twitter had consistently failed to respond sufficiently to pleas to shut down clear incitements
5
to violence by terrorists.
6
61.
Recently, former Secretary of State Hillary Clinton has urged Twitter to become
7
more aggressive in preventing ISIS from using its network. “Resolve means depriving jihadists of
8
virtual territory, just as we work to deprive them of actual territory,” she told one audience. Later,
9
Secy. Clinton stated that Twitter and other companies “cannot permit the recruitment and the actual
10
direction of attacks or the celebration of violence by this sophisticated Internet user. They’re going
11
to have to help us take down these announcements and these appeals.”
12
62.
On January 7, 2016, White House officials announced that they would hold high-
13
level discussions with Twitter and other social media companies to encourage them “to do more to
14
block terrorists” from using their services. “The primary purpose is for government officials to
15
press the biggest Internet firms to take a more proactive approach to countering terrorist messages
16
and recruitment online. . . . That issue has long vexed U.S. counterterrorism officials, as terror
17
groups use Twitter . . . to spread terrorist propaganda, cultivate followers and steer them toward
18
committing violence. But the companies have resisted some requests by law-enforcement leaders
19
to take action . . . .”
20
C.
Twitter Has Refused to Prevent ISIS From Using Its Services
21
63.
Despite these appeals, Twitter has refused to take meaningful action.
22
64.
In a January 2011 blog post entitled “The tweets Must Flow,” Twitter co-founder
23
Biz Stone and Twitter General Counsel Alex Macgillivray wrote: “We don’t always agree with the
24
things people choose to tweet, but we keep the information flowing irrespective of any view we
25
may have about the content.”
26
65.
On June 20, 2014, Twitter founder Biz Stone, responding to media questions about
27
ISIS’s use of Twitter to publicize its acts of terrorism, said, “[i]f you want to create a platform that
28
allows for the freedom of expression for hundreds of millions of people around the world, you
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
11
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 13 of 20
1
2
really have to take the good with the bad.”
66.
In September 2014, Twitter spokesperson Nu Wexler reiterated Twitter’s hands-off
3
approach, telling the press, “Twitter users around the world send approximately 500 million tweets
4
each day, and we do not monitor them proactively.” “The Twitter Rules” reiterated that Twitter
5
“do[es] not actively monitor and will not censor user content, except in exceptional
6
circumstances.” In February 2015, Twitter confirmed that it does not proactively monitor content,
7
and that it reviews only that content which is reported by other users as violative of its rules.
8
67.
Most technology experts agree that Twitter could and should be doing more to stop
9
ISIS from using its social network. “When Twitter says, ‘We can’t do this,’ I don’t believe that,”
10
said Hany Farid, chairman of the computer science department at Dartmouth College. Mr. Farid,
11
who co-developed a child pornography tracking system with Microsoft, says that the same
12
technology could be applied to terror content, so long as companies were motivated to do so.
13
“There’s no fundamental technology or engineering limitation,” he said. “This is a business or
14
policy decision. Unless the companies have decided that they just can’t be bothered.”
15
68.
According to Rita Katz, the director of SITE Intelligence Group, “Twitter is not
16
doing enough. With the technology Twitter has, they can immediately stop these accounts, but
17
they have done nothing to stop the dissemination and recruitment of lone wolf terrorists.”
18
69.
Even when Twitter shuts down an ISIS-linked account, it does nothing to stop it
19
from springing right back up. According to the New York Times, the Twitter account of the pro-
20
ISIS group Asawitiri Media has had 335 accounts. When its account @TurMedia333 was shut
21
down, it started @TurMedia334. When that was shut down, it started @TurMedia335. This
22
“naming convention — adding one digit to a new account after the last one is suspended — does
23
not seem as if it would require artificial intelligence to spot.” Each of these accounts also used the
24
same user photograph of a bearded man’s face over and over again. In the hours after the shooting
25
attack in San Bernardino, California on December 2, 2015, @TurMedia335 tweeted: “California,
26
we have already arrived with our soldiers. Decide how to be your end, with knife or bomb.”
27
28
70.
Notably, while Twitter has now put in place a rule that supposedly prohibits “threats
of violence . . . including threatening or promoting terrorism,” many ISIS-themed accounts are still
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
12
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 14 of 20
1
easily found on Twitter.com. To this day, Twitter also permits groups designated by the U.S.
2
government as Foreign Terrorist Organizations to maintain official accounts, including Hamas
3
(@hamasinfo and @HamasInfoEn) and Hizbollah (@almanarnews).
4
IV.
5
The November 9, 2015 Attack
71.
Lloyd “Carl” Fields, Jr. travelled to Jordan on June 12, 2015 as a government
6
contractor through DynCorp International. His trip to Jordan was only supposed to last two weeks,
7
but problems with his Israeli work visa kept him there longer.
8
9
10
11
12
13
14
15
Lloyd “Carl” Fields, Jr.
16
72.
James Damon Creach arrived in Jordan on October 15, 2015 where he was working
17
through the government contractor DECO, Inc. Mr. Creach was scheduled to return home to
18
Florida on December 5, 2015.
19
20
21
22
23
24
25
26
27
28
James Damon Creach and Family
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
13
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 15 of 20
1
73.
While in Jordan, Carl and Damon were assigned to the International Police Training
2
Center (“IPTC”) in the Muwaqqar district of southeast Amman, Jordan—a facility run and funded
3
in part by the U.S. State Department. There, they both used their years of experience as police
4
officers to train law enforcement officers from Jordan, Iraq and the Palestinian Territories in basic
5
police and security skills. Carl had previously served as a Deputy Sheriff in Calcasieu Parish,
6
Louisiana, and as a police advisor in both Iraq and Afghanistan. Damon was a graduate of the
7
Virginia Beach Policy Academy, a former police officer in the Virginia Police Department and had
8
trained police officers in Afghanistan, Kenya and other locations.
9
10
11
12
13
14
15
16
Entrance to the International Police Training
Center in Amman, Jordan
17
18
74.
Carl and his wife Tamara considered his assignment to Jordan a safe one because
19
Jordan is a U.S. ally and it has not experienced the levels of terrorism and unrest that have spread
20
throughout the Middle East in recent years. Carl’s mission was so safe, in fact, that he was not
21
issued a weapon to carry with him.
22
75.
Damon and his wife Heather also believed that his trip to Jordan did not involve any
23
great danger. On the day of the attack in which he was killed, Damon was not armed, he was not
24
wearing armor or protective gear and his vehicle was not armored.
25
76.
26
Anwar Abu Zaid.
One of the men studying at the IPTC was 28-year old Jordanian police captain
27
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
14
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 16 of 20
1
2
3
4
5
6
7
Anwar Abu Zaid
8
9
77.
In early November 2015, Abu Zaid sent a message to friends saying he was going
10
on a journey to “paradise or hell.” “When we prepare our luggage for a journey . . . we fear we
11
may forget something, however small, and the longer the journey, the stronger the concern that we
12
won’t forget anything,” sources quoted Abu Zaid as saying. At about that same time, Abu Zaid
13
resigned from the Jordanian police force, presumably to go work in Saudi Arabia.
14
78.
Then, on November 9, 2015, Abu Zaid arrived at IPTC smuggling a Kalashnikov
15
assault rifle with 120 bullets and two handguns in his car. As an officer, he was not searched as he
16
entered. After the noontime prayer, Abu Zaid shot a truck that was moving through the facility,
17
killing Damon. Abu Zaid then entered the facilities cafeteria where he killed an additional four
18
people eating lunch, including Carl.
19
20
21
79.
According to FBI investigators, Zaid did not know either Carl or Damon; he
targeted them simply because they were Americans.
80.
ISIS claimed responsibility for the attack in a statement issued through their al-
22
Battar Media Foundation: “Yes . . . we kill the Americans in Amman,” the terror group said, using
23
the words “lone wolf” to describe the attack. “Do not provoke the Muslims more than this,
24
especially recruited and supporters of the Islamic State. The more your aggression against the
25
Muslims, the more our determination and revenge . . . time will turn thousands of supporters of the
26
caliphate on Twitter and others to wolves.”
27
28
81.
A few weeks later, ISIS reiterated this claim in its Dabiq Magazine, Issue 12: “And
on ‘9 November 2015,’ Anwar Abu Zeid—after repenting from his former occupation—attacked
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
15
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 17 of 20
1
the American crusaders and their apostate allies, killing two American crusaders, two Jordanian
2
apostates, and one South African crusader. These are the deeds of those upon the methodology of
3
the revived Khilāfah. They will not let its enemies enjoy rest until enemy blood is spilled in
4
revenge for the religion and the Ummah.”
5
6
7
8
9
82.
Following the attack, ISIS supporters roundly praised the shooting, with one user
tweeting: “The killing shall continue and will not stop.”
83.
The attack took place on the 10-year anniversary of ISIS’s coordinated bomb attacks
on three hotels in Amman on November 9, 2005.
84.
Abu Zaid’s brother Fadi told reporters that Abu Zaid had been very moved by
10
ISIS’s brutal execution of Jordanian pilot Maaz al-Kassasbeh in February 2015. After al-
11
Kassasbeh was captured, ISIS launched a campaign on Twitter with the Arabic hashtag
12
#SuggestAWayToKillTheJordanianPilotPig in order to crowd source ideas for his method of
13
execution. Proposals included feeding al-Kassasbeh to crocodiles, cutting him up with a chainsaw,
14
impalement and even disfigurement using acupuncture needles dipped in acid before having his
15
head cut off. A second hashtag labelled #WeAllWantToSlaughterMoaz and carrying more brutal
16
execution ideas and videos of children killed in coalition airstrikes, was retweeted over 11,000
17
times. Eventually, based on suggestions from its Twitter followers, ISIS burned al-Kassasbeh alive
18
in a cage before running him over with a bulldozer. ISIS tweeted out a 22-minute snuff film of the
19
killing in which al-Kassasbeh is engulfed in a massive ball of fire and his anguished screams can
20
be clearly heard. “The insurgents let him burn for several minutes, until his skin is charred black,
21
before an excavator dumps a load of concrete and sand on top of the cage to both extinguish the
22
fire and finish off the grisly killing.” The film, entitled “Healing the Believers’ Chests,” was
23
produced by ISIS’s official Al Furqan Media Foundation and distributed via a Twitter account
24
known as a source for IS propaganda.
25
85.
On the day of the attack killing Carl and Damon, Tamara saw that she missed a call
26
from the U.S. embassy and she knew that something was wrong. Tamara called back and, when
27
she eventually got through, she was told that Carl had been killed. The murder of her husband Carl
28
by an ISIS operative has caused her severe mental anguish, extreme emotional pain and suffering,
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
16
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 18 of 20
1
2
and the loss of her husband’s society, companionship, comfort, advice and counsel.
86.
That same day, Heather was notified by her husband’s company DECO that Damon
3
had been killed. She later received a call from the U.S. Embassy in Jordan confirming his death.
4
Heather was then tasked with telling her children that their father was dead. The murder of their
5
husband and father Damon by an ISIS operative has caused Heather, J.C. (1) and J.C. (2) severe
6
mental anguish, extreme emotional pain and suffering, and the loss of Damon’s society,
7
companionship, comfort, advice and counsel.
8
COUNT I
CIVIL LIABILITY UNDER 18 U.S.C. § 2333(a) AGAINST ALL
DEFENDANTS FOR VIOLATIONS OF 18 U.S.C. § 2339A
CONSTITUTING ACTS OF INTERNATIONAL TERRORISM
9
10
11
12
13
87.
Plaintiffs repeat and re-allege each and every allegation of the foregoing paragraphs
as if fully set forth herein.
88.
The services and support that Defendant purposefully, knowingly or with willful
14
blindness provided to ISIS constitute material support to the preparation and carrying out of acts of
15
international terrorism, including the attack in which Lloyd Fields, Jr. and James Damon Creach
16
were killed.
17
18
19
20
89.
Defendant’s provision of material support to ISIS was a proximate cause of the
injury inflicted on Plaintiffs.
90.
By virtue of its violations of 18 U.S.C. § 2339A, Defendant is liable pursuant to 18
U.S.C. § 2333 for any and all damages that Plaintiffs have sustained.
COUNT II
CIVIL LIABILITY UNDER 18 U.S.C. § 2333(a) AGAINST ALL
DEFENDANTS FOR VIOLATIONS OF 18 U.S.C. § 2339B
CONSTITUTING ACTS OF INTERNATIONAL TERRORISM
21
22
23
91.
Plaintiffs repeat and re-allege each and every allegation of the foregoing paragraphs
24
as if fully set forth herein.
25
92.
The services and support that Defendant purposefully, knowingly or with willful
26
blindness provided to ISIS constitute material support to a Foreign Terrorist Organization (“FTO”)
27
in violation of 18 U.S.C. § 2339B.
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
17
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 19 of 20
1
2
3
4
93.
Defendant’s provision of material support to ISIS was a proximate cause of the
injury inflicted on Plaintiffs.
94.
By virtue of its violations of 18 U.S.C. § 2339B, Defendant is liable pursuant to 18
U.S.C. § 2333 for any and all damages that Plaintiffs have sustained.
5
6
7
8
PRAYER FOR RELIEF
WHEREFORE, Plaintiffs request that the Court:
i.
Accept jurisdiction over this action;
ii.
Enter judgment against Defendant and in favor of Plaintiffs for
compensatory damages in an amount to be determined at trial;
iii.
Enter judgment against Defendant and in favor of Plaintiffs for treble
damages pursuant to 18 U.S.C. § 2333;
iv.
Enter judgment against Defendant and in favor of Plaintiffs for any and all
costs sustained in connection with the prosecution of this action, including
attorneys’ fees, pursuant to 18 U.S.C. § 2333;
v.
Order any equitable relief to which Plaintiffs might be entitled;
vi.
Enter an Order declaring that Defendant has violated, and is continuing to
violate, the Anti-Terrorism Act, 18 U.S.C. § 2331 et seq.; and
vii.
Grant such other and further relief as justice requires.
9
10
11
12
13
14
15
16
17
DEMAND FOR TRIAL BY JURY
18
19
20
Plaintiffs demand a trial by jury of all issues so triable.
Dated: March 24, 2016
BURSOR & FISHER, P.A.
21
By:
22
23
/s/ L. Timothy Fisher
L. Timothy Fisher
L. Timothy Fisher (State Bar No. 191626)
Julia A. Luster (State Bar No. 295031)
1990 North California Boulevard, Suite 940
Walnut Creek, CA 94596
Telephone: (925) 300-4455
Facsimile: (925) 407-2700
E-Mail: ltfisher@bursor.com
jluster@bursor.com
24
25
26
27
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
18
Case 3:16-cv-00213-WHO Document 21 Filed 03/24/16 Page 20 of 20
1
BURSOR & FISHER, P.A.
Scott A. Bursor (State Bar No. 276006)
888 Seventh Avenue
New York, NY 10019
Telephone: (212) 989-9113
Facsimile: (212) 989-9163
E-Mail: scott@bursor.com
2
3
4
5
Attorneys for Plaintiffs
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
FIRST AMENDED COMPLAINT
CASE NO. 3:16-CV-00213-WHO
19
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?