Fields v. Twitter, Inc.

Filing 31

RESPONSE (re 27 MOTION to Dismiss Plaintiffs' Amended Complaint ) filed byHeather Creach, Tamara Fields, J.C. (1), a minor, J.C. (2), a minor. (Bursor, Scott) (Filed on 5/4/2016)

Download PDF
Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 1 of 25 1 BURSOR & FISHER, P.A. L. Timothy Fisher (State Bar No. 191626) 2 Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 3 Walnut Creek, CA 94596 Telephone: (925) 300-4455 4 Facsimile: (925) 407-2700 E-Mail: ltfisher@bursor.com 5 jluster@bursor.com 6 BURSOR & FISHER, P.A. Scott A. Bursor (State Bar No. 276006) 7 888 Seventh Avenue New York, NY 10019 8 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 9 E-Mail: scott@bursor.com 10 Attorneys for Plaintiffs 11 12 UNITED STATES DISTRICT COURT 13 NORTHERN DISTRICT OF CALIFORNIA 14 15 TAMARA FIELDS, on behalf of herself and as a representative of the ESTATE OF LLOYD 16 FIELDS, JR., HEATHER CREACH, on behalf of herself and as a representative of the ESTATE 17 OF JAMES DAMON CREACH, J.C. (1), a 18 minor, and J.C. (2), a minor, Plaintiffs, 19 20 v. Case No. 3:16-cv-00213-WHO Hon. William H. Orrick PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS THE AMENDED COMPLAINT Date: June 15, 2016 Time: 2:00 p.m. Courtroom 2, 17th Floor 21 TWITTER, INC., 22 Defendant. 23 24 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 2 of 25 TABLE OF CONTENTS 1 PAGE(S) 2 3 I. INTRODUCTION ................................................................................................................. 1 4 II. PLAINTIFFS’ CLAIMS ARE NOT BARRED BY THE CDA............................................ 2 5 A. Providing Terrorists With Twitter Accounts Is Not Publishing ................................ 3 6 B. Direct Messages Are Not Published .......................................................................... 9 7 C. Barring Plaintiffs’ Claims Would Not Further The Goals Of The CDA ................. 11 8 III. PLAINTIFFS STATE CLAIMS UNDER THE ANTI-TERRORISM ACT ...................... 13 9 A. Plaintiffs Adequately Plead Proximate Causation ................................................... 13 10 B. Twitter Committed Acts of International Terrorism ................................................ 16 11 IV. CONCLUSION .................................................................................................................... 20 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO i Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 3 of 25 TABLE OF AUTHORITIES 1 PAGE(S) 2 CASES 3 4 Abecassis v. Wyatt, 7 F. Supp. 3d 668 (S.D. Tex. 2014) ................................................................................... 18, 19, 20 5 Al Shimari v. CACI Int’l, Inc., 679 F.3d 205 (4th Cir. 2012) ........................................................................................................... 3 6 Almog v. Arab Bank, PLC, 471 F. Supp. 2d 257 (E.D.N.Y. 2007) ........................................................................................... 20 7 8 Barnes v. Yahoo!, Inc., 570 F.3d 1096 (9th Cir. 2009) ................................................................................................ passim 9 Batzel v. Smith, 333 F.3d 1018 (9th Cir. 2003) ................................................................................................. 11, 12 10 11 Boim v. Holy Land Found. for Relief & Dev. ("Boim III"), 549 F.3d 685 (7th Cir. 2008) ............................................................................................. 14, 17, 19 12 Boim v. Quranic Literacy Inst. ("Boim I"), 291 F.3d 1000 (7th Cir. 2002) ....................................................................................................... 17 13 14 City of Chicago, Ill. v. StubHub!, Inc., 624 F.3d 363 (7th Cir. 2010) ........................................................................................................... 7 15 Diamond v. Diehr, 450 U.S. 175 (1981) ....................................................................................................................... 11 16 17 Doe No. 14 v. Internet Brands, Inc., 767 F.3d 894 (9th Cir. 2014) ....................................................................................................... 6, 7 18 Estates of Ungar ex rel. Strachman v. Palestinian Authority, 304 F. Supp. 2d 232 (D.R.I. 2004)................................................................................................... 2 19 20 F.T.C. v. Accusearch, Inc., 2007 WL 4356786 (D. Wyo. 2007) ........................................................................................... 7, 11 21 Gill v. Arab Bank, PLC ("Gill I"), 893 F. Supp. 2d 474 (E.D.N.Y. 2012) ............................................................................... 13, 14, 17 22 23 Goldberg v. UBS AG, 690 F. Supp. 2d 92 (E.D.N.Y. 2010) ............................................................................................. 17 24 Hare v. Richie, 2012 WL 3773116 (D. Md. Aug. 29, 2012) .................................................................................... 3 25 26 Holder v. Humanitarian Law Project, 561 U.S. 1 (2010) ............................................................................................................... 11, 14, 15 27 Holy Land Found. for Relief & Dev. v. Ashcroft, 333 F.3d 156 (D.C. Cir. 2003) ....................................................................................................... 12 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO ii Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 4 of 25 1 Hydro Investors, Inc. v. Trafalgar Power Inc., 227 F.3d 8 (2d Cir. 2000)............................................................................................................... 14 2 Keniston v. Roberts, 717 F.2d 1295 (9th Cir. 1983) ....................................................................................................... 20 3 4 Klayman v. Zuckerberg, 753 F.3d 1354 (D.C. Cir. 2014) ................................................................................................. 9, 11 5 Lansing v. Sw. Airlines Co., 980 N.E.2d 630 (Ill. App. Ct. 2012) ................................................................................................ 7 6 7 Lerner v. Fleet Bank, N.A., 318 F.3d 113 (2d Cir. 2003)........................................................................................................... 13 8 Licci ex rel. Licci v. Lebanese Canadian Bank, SAL, 673 F.3d 50 (2d Cir. 2012)............................................................................................................. 17 9 10 Linde v. Arab Bank, PLC, 97 F. Supp. 3d 287 (E.D.N.Y. 2015) ........................................................................... 13, 14, 17, 18 11 Maracich v. Spears, 133 S. Ct. 2191 (2013) ................................................................................................................... 13 12 13 Nitro-Lift Techs., L.L.C. v. Howard, 133 S. Ct. 500 (2012) ..................................................................................................................... 13 14 Peruta v. Cty. of San Diego, 742 F.3d 1144 (9th Cir. 2014) ....................................................................................................... 12 15 16 Pirozzi v. Apple Inc., 913 F. Supp. 2d 840 (N.D. Cal. 2012) ............................................................................................. 3 17 Rothstein v. UBS AG, 708 F.3d 82 (2d Cir. 2013)............................................................................................................. 13 18 19 Stansell v. BGP, Inc., 2011 WL 1296881 (M.D. Fla. Mar. 31, 2011) .............................................................................. 19 20 Stratton Oakmont, Inc. v. Prodigy Servs. Co., 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995)....................................................................... 8, 12 21 22 Strauss v. Credit Lyonnais, S.A., 2006 WL 2862704 (E.D.N.Y. Oct. 5, 2006) .................................................................................. 16 23 Strauss v. Credit Lyonnais, S.A., 925 F. Supp. 2d 414 (E.D.N.Y. 2013) ..................................................................................... 14, 17 24 25 Tamam v. Fransabank Sal, 677 F. Supp. 2d 720 (S.D.N.Y. 2010)............................................................................................ 16 26 Weiss v. Nat’l Westminster Bank PLC, 768 F.3d 202 (2d Cir. 2014)........................................................................................................... 17 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO iii Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 5 of 25 1 Wultz v. Islamic Republic of Iran, 755 F. Supp. 2d 1 (D.D.C. 2010) ................................................................................................... 19 2 STATUTES 3 18 U.S.C. § 2331 ....................................................................................................................... 1, 21, 22 4 18 U.S.C. § 2331(1)(B) ................................................................................................................. 20, 23 5 18 U.S.C. § 2333(a) ..................................................................................................................... passim 6 18 U.S.C. § 2339A ....................................................................................................................... passim 7 18 U.S.C. § 2339A(b)(1)............................................................................................................. 1, 5, 19 8 18 U.S.C. § 2339B ....................................................................................................................... passim 9 18 U.S.C. § 2339B(a)(1) ..................................................................................................................... 22 10 18 U.S.C. § 2339B(g)(4) ....................................................................................................................... 5 11 47 U.S.C. § 230 ..................................................................................................................................... 2 12 47 U.S.C. § 230(c)(1) ............................................................................................................................ 2 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO iv Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 6 of 25 1 I. INTRODUCTION 2 For years, Twitter has knowingly permitted ISIS to sign up for accounts on its social 3 network. ISIS has used these accounts as an essential resource to support its terrorist organization. 4 Through private Direct Messages, ISIS spreads extremist propaganda, raises funds and attracts new 5 recruits. The role of Twitter in the rise of ISIS cannot be overstated. Indeed, without Twitter, ISIS’s 6 dramatic emergence over the last few years into one of the most feared terrorist groups in the world 7 would not have been possible. Twitter was not an innocent bystander in all this. It has long known 8 that ISIS has been using its social network to terrorize, but has largely refused to act. 9 The Anti-Terrorism Act, 18 U.S.C. § 2331 et seq. (“ATA”) prohibits knowingly providing 10 terrorist organizations with precisely these kinds of services. Among other things, the ATA 11 prohibits providing any type of “material support or resources” to terrorists, including “any property, 12 tangible or intangible, or service” such as “communications equipment.” 18 U.S.C. §§ 2339A(b)(1); 13 2339B(g)(4). Congress purposefully defined “material support or resources” in a broad fashion 14 because providing any assistance to terrorists frees up resources that they can use for their criminal 15 and violent activities. Even the provision of seemingly benign services (like social network 16 accounts) bolsters a terrorist organization’s efficacy and strength in a community, thus undermining 17 this nation’s efforts to delegitimize and weaken these groups. 18 Anyone who violates the ATA’s criminal material support statutes may be held liable under 19 the ATA’s private right of action, which provides the following: 20 21 22 Any national of the United States injured in his or her person, property, or business by reason of an act of international terrorism, or his or her estate, survivors, or heirs, may sue therefor in any appropriate district court of the United States and shall recover threefold the damages he or she sustains and the cost of the suit, including attorney’s fees. 23 18 U.S.C. § 2333(a). The legislative history of the ATA’s civil remedy indicates that it “was to be 24 construed broadly,” and, in the words of Senator Grassley, the bill’s co-sponsor, “it empowers 25 victims with all the weapons available in civil litigation.” Estates of Ungar ex rel. Strachman v. 26 Palestinian Authority, 304 F. Supp. 2d 232, 265 (D.R.I. 2004) (original emphasis). 27 Defendant makes two arguments in its effort to dismiss this action. First, it argues that 28 Plaintiffs’ claims are barred by the Communications Decency Act of 1996, 47 U.S.C. § 230 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 1 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 7 of 25 1 (“CDA”). But the CDA’s protections do not apply to this case because Plaintiffs’ cause of action 2 does not seek to treat Defendant as a publisher or speaker of ISIS’s harmful messages, but rather as 3 the provider of the high-tech platform through which ISIS delivered those messages. Plaintiffs’ 4 theory of liability is thus not premised on the content of tweets and does not require that Twitter be 5 held responsible for content created by others, or that it otherwise be treated as a publisher or 6 speaker. Indeed, Twitter’s violation of the ATA occurred even before ISIS issued even a single 7 tweet. In addition, Plaintiffs seek to hold Defendant liable for providing ISIS with access to its 8 Direct Messaging capabilities. Twitter has permitted ISIS to use this tool to send private 9 communications in order to raise funds, recruit and otherwise further its extremist agenda. Because 10 these private messages are not published (i.e. not disseminated to the public), a lawsuit based on 11 their content is not barred by the CDA. Barring Plaintiffs’ claims would also contravene the CDA’s 12 policy goals of encouraging free speech on the Internet or Good Samaritan filtering of offensive 13 content. Second, Defendant argues that Plaintiffs fail to state a claim under the ATA because they do 14 15 not properly allege proximate causation or that Twitter committed an act of international terrorism. 16 But Defendant misstates the law on both fronts. Under the ATA, Plaintiffs are not required to allege 17 a “direct” link between Twitter’s provision of material support to ISIS and the deaths of Lloyd 18 Fields, Jr. or James Damon Creach. Rather, because the provision of any kind of material support to 19 terrorists helps them commit acts of terrorism, it is sufficient to allege that Defendant provided 20 material support to ISIS and that ISIS is responsible for the deaths of Mr. Fields and Mr. Creach. 21 That is what Plaintiffs have done. In addition, Plaintiffs adequately allege that Twitter committed an 22 act of international terrorism because they allege that Defendant violated the ATA’s material support 23 statutes, which are per se acts of international terrorism. For all of these reasons, and those set out below, Defendant’s motion to dismiss the 24 25 Amended Complaint should be denied in its entirety. 26 II. PLAINTIFFS’ CLAIMS ARE NOT BARRED BY THE CDA 27 Defendant argues that “Plaintiffs’ claims attempt to hold Twitter liable as the ‘publisher or 28 speaker’ of the content allegedly created by ISIS and its followers.” Mot. at 14. This is incorrect. PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 2 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 8 of 25 1 Plaintiffs’ claims are not premised on the contents of tweets, Twitter’s decision to publish or 2 withdraw any published content, or any other “publishing” decisions attributable to Twitter. Rather, 3 Defendant’s violation of the ATA stems from its provision of Twitter accounts to ISIS. Twitter also 4 violated the ATA by providing ISIS with Direct Messaging capabilities so that it could send private 5 communications outside the scope of the CDA. In addition, barring Plaintiff’s claims would conflict 6 with—and, indeed, detract from—the goals of the CDA. 1 7 A. Providing Terrorists With Twitter Accounts Is Not Publishing 8 Defendant argues that the CDA bars Plaintiffs’ claims because they are based on “content 9 allegedly created by ISIS and its followers.” Mot. at 14. But this case is not about the contents of 10 tweets, the issuing of tweets or the failure to remove tweets. It is about Defendant’s provision of 11 Twitter accounts to ISIS in the first place. In knowingly permitting ISIS to sign up for accounts on 12 its social network, Twitter provided ISIS with material support in violation of the ATA. This 13 violation is not based on the publishing of offensive content. Accordingly, Plaintiffs do not seek to 14 hold Twitter liable as a publisher or speaker and their claims are not barred by the CDA. The protections of the CDA apply only when a claim seeks to treat a defendant as a 15 16 “publisher or speaker.” 47 U.S.C. § 230(c)(1); Barnes v. Yahoo!, Inc., 570 F.3d 1096, 1101 (9th Cir. 17 2009) (Courts must determine whether “a plaintiff’s theory of liability would treat a defendant as a 18 publisher or speaker of third-party content.”). “To put it another way, courts must ask whether the 19 duty that the plaintiff alleges the defendant violated derives from the defendant’s status or conduct as 20 a ‘publisher or speaker.’” Id. at 1102. Under the CDA, “what matters is whether the cause of action 21 inherently requires the court to treat the defendant as the ‘publisher or speaker’ of content provided 22 23 24 25 26 27 28 1 At the very least, Defendant’s argument under the CDA is premature. Courts have not hesitated to decline ruling on such arguments at the pleadings stage when a more complete record would help evaluate arguments under the CDA. See, e.g., Pirozzi v. Apple Inc., 913 F. Supp. 2d 840, 849 (N.D. Cal. 2012) (“[B]ased on the scant record before the Court, it is premature to decide whether the CDA bars Plaintiff’s claims . . . . [T]he Court cannot make that determination based on the allegations in the CAC.”); Hare v. Richie, 2012 WL 3773116, at *19 (D. Md. Aug. 29, 2012) (“I am mindful of the Fourth Circuit’s admonition that § 230(c)(1) immunity should be resolved at an early opportunity. Nevertheless, ‘a court is entitled to have before it a proper record, sufficiently developed through discovery proceedings, to accurately assess any claim, including one of immunity. And even a party whose assertion of immunity ultimately proves worthy must submit to the burdens of litigation until a court becomes sufficiently informed to rule.’”) (quoting Al Shimari v. CACI Int’l, Inc., 679 F.3d 205, 220 (4th Cir. 2012) (en banc)). PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 3 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 9 of 25 1 by another.” Id. at 1102. A publisher is one who “reviews material submitted for publication, 2 perhaps edits it for style or technical fluency, and then decides whether to publish it.” Id. 3 Here, Plaintiffs’ claims are not premised on Defendant’s role as a publisher or speaker of 4 content, but rather its provision of Twitter accounts to ISIS in the first place. 18 U.S.C. § 2339A 5 prohibits providing material support or resources with the knowledge that they are to be used in 6 preparation for, or in carrying out, a violation of specific violent crimes. Likewise, 18 U.S.C. § 7 2339B prohibits knowingly providing material support or resources to a foreign terrorist 8 organization (“FTO”) such as ISIS. Both of these statutes broadly define “material support or 9 resources” as: any property, tangible or intangible, or service, including currency or monetary instruments or financial securities, financial services, lodging, training, expert advice or assistance, safehouses, false documentation or identification, communications equipment, facilities, weapons, lethal substances, explosives, personnel (1 or more individuals who may be or include oneself), and transportation, except medicine or religious materials 10 11 12 13 14 18 U.S.C. § 2339A(b)(1) (emphasis supplied); 18 U.S.C. § 2339B(g)(4). A Twitter account 15 constitutes “material support or resources” under this definition because it is tangible or intangible 16 property. Accordingly, Twitter violated the ATA’s material support statutes—and became liable 17 under the ATA’s civil remedies provision, 18 U.S.C. § 2333(a)—the moment it permitted ISIS to 18 create an account on its social network. Because the creation of a Twitter account necessarily occurs 19 before the issuing of tweets from that account, and separately from the creation of published content, 20 Defendant’s violations of the ATA cannot be accurately characterized as publishing activity, but 21 rather the provision of the means through which ISIS spreads its poison. 22 In this same vein, the Amended Complaint focuses on Defendant’s provision of Twitter 23 accounts to ISIS, not the contents of tweets: 24 • Since first appearing on Twitter in 2010, ISIS accounts on Twitter have grown at an astonishing rate and, until recently, ISIS maintained official accounts on Twitter unfettered. These official accounts included media outlets, regional hubs and well-known ISIS members, some with tens of thousands of followers. FAC ¶ 3. • Likewise, Al-Hayat Media Center, ISIS’s official public relations group, maintained at least a half dozen accounts, emphasizing the recruitment of Westerners. As of June 2014, Al-Hayat had nearly 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 4 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 10 of 25 1 2 3 20,000 followers. Id. ¶ 4. • Another Twitter account, @ISIS_Media_Hub, had 8,954 followers as of September 2014. Id. ¶ 5. • As of December 2014, ISIS had an estimated 70,000 Twitter accounts, at least 79 of which were “official,” and it posted at least 90 tweets every minute. Id. ¶ 6. • ISIS reaches potential recruits by maintaining accounts on Twitter so that individuals across the globe may reach out to them directly. Id. ¶ 20. • Even when Twitter shuts down an ISIS-linked account, it does nothing to stop it from springing right back up. According to the New York Times, the Twitter account of the pro-ISIS group Asawitiri Media has had 335 accounts. When its account @TurMedia333 was shut down, it started @TurMedia334. When that was shut down, it started @TurMedia335. This “naming convention—adding one digit to a new account after the last one is suspended—does not seem as if it would require artificial intelligence to spot.” Id. ¶ 69. • Notably, while Twitter has now put in place a rule that supposedly prohibits “threats of violence . . . including threatening or promoting terrorism,” many ISIS-themed accounts are still easily found on Twitter.com. To this day, Twitter also permits groups designated by the U.S. government as Foreign Terrorist Organizations to maintain official accounts, including Hamas (@hamasinfo and @HamasInfoEn) and Hizbollah (@almanarnews). Id. ¶ 70. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Where, as here, a plaintiff’s theory of liability is not dependent on a defendant’s role as a 18 publisher, courts do not hesitate to rule that the CDA does not apply. For example, in Barnes v. 19 Yahoo!, Inc., 570 F.3d 1096 (9th Cir. 2009), the plaintiff filed a promissory estoppel claim against 20 defendant Yahoo because she had relied on its promise that it would remove private information and 21 photographs that her ex-boyfriend had posted. Id. at 1098-99. The Ninth Circuit held that this claim 22 was not barred by the CDA because plaintiff did “not seek to hold Yahoo liable as a publisher or 23 speaker of third-party content, but rather as the counter-party to a contract, as a promisor who has 24 breached.” Id. at 1107. This “[c]ontract liability” did not arise from “Yahoo’s publishing conduct, 25 but from Yahoo’s manifest intention to be legally obligated to do something, which happens to be 26 removal of material from publication.” Id. 27 Similarly, in Doe No. 14 v. Internet Brands, Inc., 767 F.3d 894 (9th Cir. 2014), plaintiff 28 brought a negligent failure to warn claim based on her allegation that defendant knew rapists were PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 5 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 11 of 25 1 using its website to lure victims. 2 The court ruled that such a claim was not barred by the CDA 2 because it “ha[d] nothing to do with Internet Brands’ efforts, or lack thereof, to edit or remove user 3 generated content”: [T]hat Internet Brands was in some sense an “intermediary” between Jane Doe and the rapists does not mean that the failure to warn claim treats Internet Brands as the publisher or speaker of user content. . . . 4 5 6 2 This opinion was withdrawn, apparently because the panel effectively permitted plaintiff to amend her pleadings at oral argument on appeal. It is cited here for its persuasive reasoning, not its 7 precedential value. Nevertheless, at the rehearing held on April 8, 2015, the panel persisted in its 8 view that while the CDA bars claims that seek to hold a defendant liable as a publisher, it does not cover all claims that are somehow related to publishing activity. Judge Cogan, for instance, noted 9 the following: 10 11 12 13 14 15 16 17 18 19 But then what you’re saying is that everything related in any way to publication or speaking that your client does cannot give rise to liability. And if Congress wanted to give that kind of blanket immunity, why couldn’t it simply say the provider shall be immune for any act arising from, or relating to its publishing activity? They didn’t say that. There must be something that’s not covered. . . . [T]he Barnes case had a special fact, and the special fact was one of the employees of the provider made a promise; that’s not part of its publishing. Here, there’s a special fact also which is that the company came into knowledge of these particular abusers. That doesn’t happen all the time, and so I’m less worried about opening the flood gates than you are. This is a pretty strange fact pattern, it seems, to me. . . . That’s my difficulty with your position. It’s not just the publishing. It’s the fact that during an acquisition, lawyers did a review of a file, and they found in the file a particular fact. That’s not part of publication; that’s the due diligence that any company would do in acquiring another company. 20 Jane Doe No. 14 v. Internet Brands, Inc., Apr. 8, 2015 Unofficial Tr. at 21:10-23:24 (emphasis added). Judge Clifton likewise questioned whether the CDA was intended to cover knowing 21 violations of law: 22 23 24 25 And Congress intended to say and you don’t have to let anybody else know that you’ve got this knowledge that bad stuff’s going on out there? . . . In a provision labeled “Good Samaritan”? . . . I have trouble looking at the statute seeing how a provision that’s entitled . . . “Protection for a Good Samaritan blocking and screening offensive materials” gets turned into a hall pass, a get out of jail free card when it has something to do with the Internet. 26 Id. at 33:25-34:6; 39:19-40:2. Patrick Carome, counsel for Twitter in this matter, who was then acting as counsel for Amicus Curiae Computer and Communications Industry Association, likewise 27 admitted the limitations of the CDA: “It is not immunity, as we know from Barnes, when there’s an independent legal event – independently significant legal event like a contract, or the equivalent of a 28 contract that’s enforceable in law to be created.” Id. at 40:7-12. PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 6 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 12 of 25 1 2 3 4 We have already held that the CDA does not declare “a general immunity from liability deriving from third-party content.” Barnes, 570 F.3d at 1100. Congress has not provided an all purpose get-out-ofjail-free card for businesses that publish user content on the internet, though any claims might have a marginal chilling effect on internet publishing businesses. . . . Barring Jane Doe’s failure to warn claim would stretch the CDA beyond its narrow language and its purpose. 5 Id. at 899. See also Lansing v. Sw. Airlines Co., 980 N.E.2d 630, 639 (Ill. App. Ct. 2012) 6 (“Plaintiff’s negligent supervision cause of action does not require publishing or speaking as a 7 critical element, and holding defendant liable for its failure to supervise its employee after defendant 8 had received notice of the employee’s wrongful conduct does not treat defendant as if it were the 9 publisher or speaker of the alleged e-mails and texts.”); F.T.C. v. Accusearch, Inc., 2007 WL 10 4356786, at *5 (D. Wyo. 2007) (Claim for unfair trade practices did “not seek to ‘treat’ Defendants 11 as a publisher within the meaning of the CDA” because it arose out of the fact that defendant 12 “advertised the availability of phone records, solicited orders, purchased the records from third-party 13 sources for a fee, and then resold them to the end-consumers.”); City of Chicago, Ill. v. StubHub!, 14 Inc., 624 F.3d 363, 366 (7th Cir. 2010) (CDA did not apply because “Chicago’s amusement tax does 15 not depend on who ‘publishes’ any information or is a ‘speaker,’ . . . Section 230(c) is irrelevant.”) 16 Just like in these cases, Plaintiffs’ claim does not turn on Defendant’s role as a publisher or 17 speaker. Defendant’s liability does not arise out of its publishing conduct, but rather its separate 18 legal duty under the ATA not to provide terrorists with material support. Barnes, 570 F.3d at 1107. 19 Indeed, Plaintiffs’ claims “do[] not require publishing or speaking as a critical element.” Lansing, 20 980 N.E.2d at 639. In no sense was Defendant acting as a publisher when it permitted ISIS members 21 to sign up for and create these accounts. It was not reviewing, revising or editing content. Nor was 22 it deciding whether content should be publicly disseminated or withdrawn from the Internet. 23 Plaintiffs’ claims are not premised on a theory that any particular tweets from ISIS members should 24 have been altered or restricted in any way. Indeed, Plaintiffs’ claims under the ATA are not based 25 on offending content at all. They are based on Twitter’s provision of material support to ISIS, which 26 is separate and apart from—and antecedent to—the publication of any content. Even if ISIS had 27 never issued a single tweet, Defendant’s provision of material support to ISIS in the form of Twitter 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 7 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 13 of 25 1 accounts would constitute a violation of the ATA. 3 Plaintiffs’ claims are likewise not based on Defendant’s publishing activity because Twitter’s 2 3 duty not to provide material support to terrorists is not based on its role as a publisher, but rather its 4 knowledge that it was providing material support to ISIS—knowledge that it acquired independently 5 of its publishing activity. Twitter is liable under the ATA only because it knew that it was providing 6 material support to ISIS, but did so anyway. As set out in the Amended Complaint, the use of 7 Twitter by terrorists has been widely reported in the media. FAC ¶¶ 48-56. Since at least 2011, 8 major media outlets like the New York Times, USA Today, CNN and Time Magazine all wrote 9 articles on the use of Twitter by ISIS and other terrorist organizations. Id. The Amended Complaint 10 also includes allegations that politicians and other critics have long been urging Twitter to do more 11 to keep ISIS off of its social network. Id. ¶¶ 57-62. There have been committee hearings in 12 Congress about Twitter’s provision of material support to ISIS and even the White House and 13 former Secretary of State Hillary Clinton have urged Twitter to do more to block terrorists from 14 accessing its services. Id. Twitter has also made several statements over the years indicating that it 15 was aware that ISIS was using its social network but that it would decline to kick them off for 16 ideological reasons. Id. ¶¶ 63-70. Because Plaintiffs’ claims under the ATA are premised on 17 Twitter’s knowledge that it was providing material support to ISIS—knowledge that it derived from 18 outside of its own website and outside of its publishing activities—the CDA does not bar their 19 claims. 20 Klayman v. Zuckerberg, 753 F.3d 1354 (D.C. Cir. 2014) is inapposite. In that case, the 21 plaintiff brought claims against Facebook for intentional assault and negligence based on his 22 3 Plaintiffs’ allegations differ markedly from the typical case in which the CDA applies. “The cause 23 of action most frequently associated with the cases on section 230 is defamation.” Barnes v. Yahoo!, 24 Inc., 570 F.3d 1096, 1101 (9th Cir. 2009). “This is not surprising, because . . . Congress enacted the Amendment in part to respond to a New York state court decision, Stratton Oakmont, Inc. v. Prodigy 25 Servs. Co., 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995) (unpublished), which held that an internet service provider could be liable for defamation.” Id. The CDA was thus meant to protect 26 interactive computer services from being sued for their role in publishing defamatory content. Here, however, Plaintiffs are not seeking to hold Defendant liable for the speech of ISIS. Rather, it is 27 Twitter’s provision of a powerful communications tool in the first place that constitutes a violation 28 of the ATA. Handing a megaphone to a terrorist group constitutes the provision of material support, regardless of what the terrorists communicate with that tool. PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 8 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 14 of 25 1 allegation that it “delay[ed] in removing” a page on its social network encouraging a Third Intifada. 2 The court ruled that such claims sought to hold Facebook liable as a publisher because “the very 3 essence of publishing is making the decision whether to print or retract a given piece of content.” Id. 4 at 1359. In contrast, Plaintiffs’ allegations in the case at hand are not about a decision by Twitter to 5 issue or remove particular tweets or any other content. Rather, they allege a violation of the ATA 6 that is antecedent to any publishing activity whatsoever. As set out more fully below, this case also 7 differs from Klayman because it involves private communications in the form of Direct Messages— 8 communications that are not published. 9 10 B. Direct Messages Are Not Published Plaintiffs also allege that Defendant is liable under the ATA because it provided ISIS with 11 Direct Message capabilities. FAC ¶ 20-22. Because Direct Messages are unpublished private 12 communications, this theory of liability does not seek to treat Defendant as a publisher or speaker 13 and, accordingly, the CDA does not apply. 14 As Twitter acknowledges, Direct Messages sent through its social network are private 15 communications: 16 17 18 Direct Messages are the private side of Twitter. . . . Communicate quickly and privately with one person or many. Direct Messages support text, photos, links, emoji and Tweets, so you can make your point however you please. . . . Have a private conversation with anyone on Twitter, even a friend of a friend. Direct messages can only be seen between the people included. 19 Id. ¶ 20 (emphasis added). Twitter also advertises its Direct Messaging tool by stressing privacy: 20 21 22 23 24 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 9 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 15 of 25 1 2 3 4 5 6 7 8 9 10 Id. ¶¶ 21-22. ISIS has used these Direct Messages to its great advantage. “ISIS reaches potential recruits by maintaining accounts on Twitter so that individuals across the globe may reach out to them directly. After first contact, potential recruits and ISIS recruiters often communicate via Twitter’s Direct Messaging capabilities.” Id. ¶ 20. 11 These Direct Messages are “extensively monitored by [ISIS’s] emirs and supervisors of the recruiting unit.” According to FBI Director James Comey, “[o]ne of the challenges in facing this hydra-headed monster is that if (ISIS) finds someone online, someone who might be willing to travel or kill in place they will begin a twitter direct messaging contact.” Indeed, according to the Brookings Institution, some ISIS members “use Twitter purely for private messaging or covert signaling.” ISIS has also been known to use Twitter’s Direct Messaging capabilities for fundraising and operational purposes. . . . Through its Direct Messaging tool, Twitter enables ISIS members to receive private Direct Messages from potential recruits, terrorist financiers and other terrorists with operational and intelligence information. Giving ISIS the capability to send and receive Direct Messages in this manner is no different to handing it a satellite phone, walkie-talkies or the use of a mail drop, all of which terrorists use for private communications in order to further their extremist agendas. 12 13 14 15 16 17 18 19 20 Id. ¶¶ 21-22. 21 This theory of liability, based on purely private content, is not barred by the CDA because it 22 does not involve publishing. Publishing necessarily involves the dissemination of information to the 23 public. Klayman, 753 F.3d at 1359 (“Although the [CDA] does not define ‘publisher,’ its ordinary 24 meaning is ‘one that makes public,’ and ‘the reproducer of a work intended for public 25 consumption.’”) (quoting Webster’s Third New International Dictionary 1837 (1981)); Publish 26 Definition, merriam-webster.com, http://www.merriam-webster.com/dictionary/publish (last visited 27 May 4, 2016) (“to disseminate to the public”); Publish Definition, Dictionary.com, 28 http://www.dictionary.com/browse/publish (last visited May 4, 2016) (“to issue . . . for sale or PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 10 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 16 of 25 1 distribution to the public”; “to issue publicly the work of”; “to make publicly or generally known”); 2 Publish Definition, Black’s Law Dictionary (2d Pocket Ed.) (“To distribute copies (of a work) to the 3 public.”); see also Diamond v. Diehr, 450 U.S. 175, 182 (1981) (in construing a statute, “[u]nless 4 otherwise defined, words will be interpreted as taking their ordinary, contemporary, common 5 meaning”). 6 As the protections of the CDA are limited to an interactive computer service’s publishing 7 activities, that statute does not apply to lawsuits based on content that is intended to be private. 8 Batzel v. Smith, 333 F.3d 1018, 1033-35 (9th Cir. 2003) (“The congressional objectives in passing § 9 230 therefore are not furthered by providing immunity in instances where posted material was 10 clearly not meant for publication.”); Accusearch, 2007 WL 4356786, at *4-5 (claims based on 11 defendants’ sale of confidential customer phone records did not treat defendants as publishers). 12 C. Barring Plaintiffs’ Claims Would Not Further The Goals Of The CDA 13 Barring Plaintiffs’ claims in this case would be at odds with the purported goals of the CDA. 14 First, in passing the CDA, “Congress wanted to encourage the unfettered and unregulated 15 development of free speech on the Internet.” Batzel, 333 F.3d at 1027; id. at 1033 (Congress was 16 “concern[ed] with assuring a free market in ideas and information on the Internet.”). But Congress 17 surely did not intend to promote speech that aids designated terrorist organizations. To the contrary, 18 it expressly prohibited such speech through the ATA’s material support provisions. 18 U.S.C. §§ 19 2339A-B (defining “material support or resources” to include “training, expert advice” and 20 “communications equipment”). Numerous courts have held that that violations of the ATA’s 21 material support statutes do not implicate free speech concerns. See, e.g., Holder v. Humanitarian 22 Law Project, 561 U.S. 1, 28 (2010) (the ATA’s prohibition on providing material support to 23 terrorists in the form of legal and political advocacy training is constitutional because such a ban is 24 necessary to further the “[g]overnment’s interest in combating terrorism,” which “is an urgent 25 objective of the highest order”); Peruta v. Cty. of San Diego, 742 F.3d 1144, 1194 (9th Cir. 2014) 26 (“There are, of course, certain types of speech that do not fall within the protection of the First 27 Amendment, such as . . . speech that materially assists a foreign terrorist organization.”); Holy Land 28 Found. for Relief & Dev. v. Ashcroft, 333 F.3d 156, 166 (D.C. Cir. 2003) (holding “as other courts PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 11 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 17 of 25 1 have,” that “there is no First Amendment right nor any other constitutional right to support 2 terrorists”). Accordingly, nothing about the allegations in this lawsuit infringe upon Congress’s goal 3 of promoting free speech on the Internet. To the contrary, barring Plaintiffs’ claims in this case 4 would directly contradict the express language of the ATA and expand the reach of the CDA far 5 beyond its intended purpose. Nor would allowing this case to go forward have a “chilling effect” on 6 Internet free speech. Rather, at most, it would deter interactive computer services from knowingly 7 providing material support to terrorists. 8 Second, Congress enacted the CDA in order “to encourage interactive computer services and 9 users of such services to self-police the Internet for obscenity and other offensive material. . . .” 10 Batzel, 333 F.3d at 1028. The CDA was enacted in large part in reaction to the decision in Stratton 11 Oakmont, where the court held that Prodigy could be held responsible for libelous statements posted 12 on one of its bulletin boards because it had proactively monitored that forum for offensive content. 13 1995 WL 323710, at *1-4. But this is not a case that has anything to do with Twitter’s efforts, or 14 lack thereof, to edit or remove user generated content. Nothing about this case should discourage 15 “Good Samaritan” filtering of third party content. Indeed, it defies credulity that a section entitled 16 “Protection For ‘Good Samaritan’ Blocking And Screening Of Offensive Material” would create 17 immunity for the knowing provision of material support to a terrorist organization. Such an 18 interpretation of the CDA would expand that law far beyond its narrow language and purpose. 19 Various canons of statutory interpretation further counsel against a ruling that the CDA bars 20 Plaintiffs’ claims. First, such a ruling should be avoided because it would needlessly create a 21 conflict between the CDA’s protections for interactive computer services and the ATA’s prohibition 22 on providing material support to terrorists. See Maracich v. Spears, 133 S. Ct. 2191, 2205 (2013) 23 (“The provisions of a text should be interpreted in a way that renders them compatible, not 24 contradictory. . . . [T]here can be no justification for needlessly rendering provisions in conflict if 25 they can be interpreted harmoniously.”) (quoting A. Scalia & B. Garner, Reading Law: The 26 Interpretation of Legal Texts (“Scalia/Garner”) 180 (2012)). But a ruling that the scope of the CDA 27 does not cover the ATA violations alleged in this case would maintain a harmonious reading of the 28 two statutes. In addition, the CDA’s general language stating that “an interactive computer service” PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 12 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 18 of 25 1 should not “be treated as the publisher or speaker” must give way to the ATA’s specific prohibitions 2 against providing material support to terrorists, including in the form of “communications 3 equipment.” Nitro-Lift Techs., L.L.C. v. Howard, 133 S. Ct. 500, 504 (2012) (referring to “the 4 ancient interpretive principle that the specific governs the general (generalia specialibus non 5 derogant )”); Scalia/Garner 185 (“[T]he [general/specific] canon does apply to successive statutes.”). 6 III. PLAINTIFFS STATE CLAIMS UNDER THE ANTI-TERRORISM ACT 7 A. 8 Defendant argues that Plaintiffs fail to adequately allege proximate causation because Plaintiffs Adequately Plead Proximate Causation 9 “nothing that Twitter allegedly did can plausibly be said to have ‘led directly’” to the deaths of 10 Lloyd Fields, Jr. or James Damon Creach. Mot. at 21. But this argument both misstates the 11 applicable law and ignores Twitter’s role in the rise of ISIS. The material support that Twitter has 12 provided to ISIS more than adequately satisfies the ATA’s proximate causation requirement. Proximate causation is established under the ATA when a defendant’s “acts were a 13 14 substantial factor in the sequence of responsible causation,” and the injury at issue “was reasonably 15 foreseeable or anticipated as a natural consequence.” 4 Rothstein v. UBS AG, 708 F.3d 82, 91 (2d 16 Cir. 2013) (quoting Lerner v. Fleet Bank, N.A., 318 F.3d 113, 123 (2d Cir. 2003)); Linde v. Arab 17 Bank, PLC, 97 F. Supp. 3d 287, 328 (E.D.N.Y. 2015) (“The causation charge the Court gave focused 18 solely on whether defendant’s acts were a substantial factor in causing plaintiffs’ injuries, and 19 whether such injuries were a foreseeable result of those acts.”). “A proximate cause determination 20 does not require a jury to identify the liable party as the sole cause of harm; it only asks that the 21 identified cause be a substantial factor in bringing about the injury.” Gill v. Arab Bank, PLC, 893 F. 22 Supp. 2d 474, 508 (E.D.N.Y. 2012) (“Gill I”) (quoting Hydro Investors, Inc. v. Trafalgar Power 23 Inc., 227 F.3d 8, 15 (2d Cir. 2000)). Importantly, there is no “directness” requirement for proximate causation under the ATA. 24 25 26 4 Notably, the ATA does not require but-for causation. Linde v. Arab Bank, PLC, 97 F. Supp. 3d 287, 323 (E.D.N.Y. 2015) (“As the only cases to directly address the issue have held, requiring ‘but 27 for’ causation would effectively annul the civil liability provisions of the ATA. That cannot have 28 been the intent of Congress in enacting them.”); Gill I, 893 F. Supp. 2d at 507 (“‘But for’ cause cannot be required in the section 2333(a) context.”). PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 13 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 19 of 25 1 Linde v. Arab Bank, PLC, 97 F. Supp. 3d 287, 328 (E.D.N.Y. 2015) (“[P]roposed language [for the 2 jury instructions] concerning the ‘directness’ of the relation between plaintiffs’ injury and 3 defendant’s acts was inappropriate in the ATA context.”). In cases involving the provision of 4 financial support to terrorist organizations, courts have refused to impose a “directness” requirement 5 for proximate causation under the ATA because money is fungible. See, e.g., Boim v. Holy Land 6 Found. for Relief & Dev., 549 F.3d 685, 690-91 (7th Cir. 2008) (“Boim III”) (“Because money is 7 fungible, the combination of the link to Hamas and the receipt of an amount that would have been 8 sufficient to finance the shooting at the Beit El bus stop would be enough to show that the ‘material 9 assistance’ of giving money caused the terrorist act that took David Boim’s life.”) (Posner, J.); 10 Strauss v. Credit Lyonnais, S.A., 925 F. Supp. 2d 414, 433–34 (E.D.N.Y. 2013) (“[P]laintiffs who 11 bring an ATA action are not required to trace specific dollars to specific attacks to satisfy the 12 proximate cause standard. Such a task would be impossible and would make the ATA practically 13 dead letter because ‘[m]oney is fungible.’”) (quoting Holder v. Humanitarian Law Project, 561 U.S. 14 1, 30 (2010)); Gill I, 893 F. Supp. 2d at 507 (“The money used need not be shown to have been used 15 to purchase the bullet that struck the plaintiff. A contribution, if not used directly, arguably would 16 be used indirectly by substituting it for money in [ISIS’s] treasury. . . .”). 17 As the Supreme Court has noted, non-financial forms of material support to terrorists are just 18 as fungible. In Holder v. Humanitarian Law Project, 561 U.S. 1 (2010), plaintiffs sought a 19 preliminary injunction because they wished to provide legal and political advocacy training to 20 designated terrorist organizations, but feared that they would be prosecuted under 18 U.S.C. § 2339B 21 for providing material support to FTOs. Id. at 10. The Supreme Court considered “whether the 22 Government may prohibit” the provision of “material support to [terrorists] in the form of speech,” 23 and focused on whether a ban on the kind of material support at issue was necessary to further the 24 Government’s interest in combatting terrorism. Id. at 28. The Supreme Court, following the lead of 25 Congress, determined that “foreign organizations that engage in terrorist activity are so tainted by 26 their criminal conduct that any contribution to such an organization facilitates that conduct.” Id. at 27 29 (quoting Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA), § 301(a)(7), 110 Stat. 28 1247, note following 18 U.S.C. § 2339B (Findings and Purpose)) (original emphasis). The court PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 14 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 20 of 25 1 likewise deferred to the expertise of the State Department which found that “all contributions to 2 foreign terrorist organizations further their terrorism,” and that “it is highly likely that any material 3 support to these organizations will ultimately inure to the benefit of their criminal, terrorist 4 functions—regardless of whether such support was ostensibly intended to support non-violent, non5 terrorist activities.” Id. at 33. 6 7 8 9 10 “Material support,” the court reasoned, “is a valuable resource by definition.” Id. at 30. Such support frees up other resources within the organization that may be put to violent ends. It also importantly helps lend legitimacy to foreign terrorist groups—legitimacy that makes it easier for those groups to persist, to recruit members, and to raise funds—all of which facilitate more terrorist attacks. . . . Indeed, some designated foreign terrorist organizations use social and political components to recruit personnel to carry out terrorist operations, and to provide support to criminal terrorists and their families in aid of such operations. 11 Id. at 30-31 (quotation marks omitted). It is thus unsurprising that the ATA’s material support 12 statutes prohibit not only providing money to terrorists groups, but also “any property, tangible or 13 intangible, or service,” which expressly includes “communications equipment.” 18 U.S.C. 14 2339A(b)(1). “The material-support statute is, on its face, a preventive measure—it criminalizes not 15 terrorist attacks themselves, but aid that makes the attacks more likely to occur.” Humanitarian Law 16 Project, 561 U.S. at 35. 17 Under the standard for proximate causation set out in other ATA cases, Plaintiffs adequately 18 allege that Twitter provided invaluable support to ISIS and thereby proximately caused the deaths of 19 Lloyd Fields, Jr. and James Damon Creach. Twitter has permitted ISIS to use its social network “as 20 a tool for spreading extremist propaganda, raising funds and attracting new recruits.” Id. ¶ 1. 21 Twitter even knowingly permitted ISIS to maintain dozens of official accounts with tens of 22 thousands of followers. Id. ¶ 3. Twitter also gave ISIS access to its Direct Messaging capabilities 23 which it used for “covert signaling” as well as “fundraising and operational purposes.” Id. ¶ 21. 24 The value of the material support that Twitter provided to ISIS cannot be overstated. 25 “Without Twitter, the explosive growth of ISIS over the last few years into the most-feared terrorist 26 group in the world would not have been possible.” Id. ¶ 2. Over just the last year, ISIS has used 27 Twitter to recruit more than 30,000 foreign fighters, “including 4,500 Westerners and 250 28 Americans.” Id. ¶ 29. ISIS has also been able to use Twitter to raise untold sums from its supporters PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 15 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 21 of 25 1 around the world. Id. ¶¶ 21, 22, 30-34. And, perhaps above all else, Twitter has enabled ISIS to 2 effectuate one of the most widespread effective propaganda campaigns in history. Id. ¶¶ 35-47. 3 This material support from Twitter not only enabled ISIS to raise funds and recruit new 4 members, but it also freed up resources for ISIS to carry out numerous terrorist attacks like the one 5 at issue in this case. Because of its access to and use of Twitter, ISIS was able to spend substantially 6 less time, money and other resources on winning hearts and minds through charity work and media 7 outlets as many other terrorist organizations do. See, e.g., Strauss v. Credit Lyonnais, S.A., 2006 WL 8 2862704, at *3 (E.D.N.Y. Oct. 5, 2006) (describing Hamas’s “social wing,” known as the “Dawa,” 9 which combines “charitable and social institutions”); Tamam v. Fransabank Sal, 677 F. Supp. 2d 10 720, 723 (S.D.N.Y. 2010) (noting that the television station Al-Manar and radio station Al-Nour, 11 both run by Hizbullah, are designated Specially Designated Global Terrorists (“SDGT”)). ISIS was 12 also able to save money on communications equipment like radios and phones. As a result, ISIS was 13 able to redirect its resources from recruiting new members and raising money to planning and 14 organizing attacks, and to purchasing guns, ammunition and other items necessary for carrying out 15 acts of terrorism, including the attack in which Mr. Fields and Mr. Creach were killed. 16 B. Twitter Committed Acts of International Terrorism 17 Defendant argues that Plaintiffs have not sufficiently alleged that it “committed an ‘act of 18 international terrorism” because “even as alleged, Twitter’s conduct does not objectively ‘appear to 19 [have been] intended’ to achieve a terrorism purpose.” Mot. at 23-24. That is because, according to 20 Defendant, “[n]o reasonable observer could conclude that Twitter’s worldwide operation of its 21 communications platform was intended ‘to intimidate or coerce a civilian population,’ ‘to influence 22 the policy of a government by intimidation or coercion,’ or ‘to affect the conduct of a government by 23 mass destruction, assassination, or kidnapping.’” Mot. at 25 (quoting 18 U.S.C. § 2331(1)(B)). This 24 argument misstates the applicable law. 25 The ATA’s civil remedies create a private right of action for “[a]ny national of the United 26 States injured in his or her person, property, or business by reason of an act of international 27 terrorism. . . .” 18 U.S.C. § 2333(a). Violations of each of the ATA’s material support provisions 28 (18 U.S.C. §§ 2339A-B) constitute acts of international terrorism for purposes of 18 U.S.C. § PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 16 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 22 of 25 1 2333(a). See Licci ex rel. Licci v. Lebanese Canadian Bank, SAL, 673 F.3d 50, 68-69 (2d Cir. 2012) 2 (“The Seventh Circuit, and several district courts in this Circuit, have concluded that a defendant’s 3 violation of the criminal material-support statutes, see 18 U.S.C. §§ 2339A-C, constitutes an act of 4 ‘international terrorism’ within the meaning of section 2331(1).”) (citing Boim v. Quranic Literacy 5 Inst., 291 F.3d 1000, 1015 (7th Cir. 2002) (“Boim I”)); Strauss v. Credit Lyonnais, S.A., 925 F. Supp. 6 2d 414, 426 (E.D.N.Y. 2013) (“Violations of Sections 2339B and 2339C are considered to be acts of 7 ‘international terrorism’ under Section 2333(a).”). For example, in Linde v. Arab Bank, PLC, 97 F. 8 Supp. 3d 287 (E.D.N.Y. 2015), when the defendant made the same argument raised here and insisted 9 that the jury should have been “charged on each constituent element of an ‘act of international 10 terrorism’ under 18 U.S.C. § 2331,” including that the bank’s actions must “‘appear to be intended’ 11 to intimidate a civilian population, influence government policy, or affect the conduct of government 12 by certain specified means,” the court held that such a charge was improper. Id. at 322. (“I agree 13 with those courts that have held that a violation of 18 U.S.C. § 2339B is itself an act of international 14 terrorism.”). Likewise, here, because Plaintiffs adequately allege that Defendant knowingly 15 provided material support to ISIS in violation of 18 U.S.C. §§ 2339A-B, they also sufficiently allege 16 that Defendant committed an act of international terrorism for purposes of 18 U.S.C. 2333(a). 5 No 17 further inquiry is necessary. Even if Plaintiffs are required to allege that Defendant intended “to achieve a terrorism 18 19 purpose,” Mot. at 23-24, they have done so. A defendant’s actions “appear to be intended to 20 intimidate or coerce a civilian population, influence the policy of a government by intimidation or 21 coercion, or affect the conduct of a government by mass destruction, assassination or kidnaping 22 23 24 25 26 27 28 5 “[T]he scienter standards for” for the material support provisions and “§ 2333(a) are one and the same.” Linde v. Arab Bank, PLC, 97 F. Supp. 3d 287, 332 (E.D.N.Y. 2015). That is, “a plaintiff must prove that a defendant acted intentionally, knowingly, or recklessly.” Gill I, 893 F. Supp. 2d at 503; Goldberg v. UBS AG, 690 F. Supp. 2d 92, 113 (E.D.N.Y. 2010) (“[S]ections 2339A and 2339B make clear Congress’ intent that the intentional (or reckless) provision of material support to a terrorist organization fulfills each prong of Section 2331(1)’s definition of ‘international terrorism,’ and therefore suffice to establish liability under Section 2333(a).”); Weiss v. Nat’l Westminster Bank PLC, 768 F.3d 202, 208 (2d Cir. 2014) (“For the purposes of § 2339B(a)(1), a defendant has knowledge that an organization engages in terrorist activity if the defendant has actual knowledge of such activity or if the defendant exhibited deliberate indifference to whether the organization engages in such activity.”); Boim III, 549 F.3d at 693 (a state of mind of criminal recklessness is sufficient for a violation of Section 2339A as incorporated into Section 2333(a)). PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 17 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 23 of 25 1 when a [defendant] knows the terroristic aims and activities of its recipient and when it is 2 foreseeable that [its actions] will advance such terroristic aims.” Abecassis v. Wyatt, 7 F. Supp. 3d 3 668, 676 (S.D. Tex. 2014). Whether a defendant committed an act of international terrorism 4 “distill[s] to relatively simple questions”: Did the defendant know that it was providing material support to [a terrorist organization], and did the defendant know that [the terrorist organization] was a foreign terrorist organization (or ‘engaged in terrorist activity’ or ‘terrorism’)? If those are the only questions that need be answered to determine whether a defendant committed an ‘act of international terrorism’ with the requisite mental state—and they are—then they are the only questions a jury should be asked. 5 6 7 8 9 Linde v. Arab Bank, PLC, 97 F. Supp. 3d 287, 323 (E.D.N.Y. 2015). 10 Here, both questions must be answered in the affirmative. Plaintiffs’ Amended Complaint is 11 replete with allegations that Defendant has not only been aware of ISIS’s use of its communications 12 platform for terroristic purposes since at least December 2011, but that it has also affirmatively 13 refused to take any action to thwart such use. See FAC ¶¶ 48-70. For instance, “[o]n June 20, 2014, 14 Twitter founder Biz Stone, responding to media questions about ISIS’s use of Twitter to publicize its 15 acts of terrorism, said, ‘[i]f you want to create a platform that allows for the freedom of expression 16 for hundreds of millions of people around the world, you really have to take the good with the bad.’” 17 Id. ¶ 65. 18 These allegations establish that Defendant continued providing material support in the form 19 of a communications platform to ISIS despite having allegedly been aware of a substantial 20 probability that its support would facilitate the planning, preparation for, and execution of terrorist 21 attacks worldwide. As such, these allegations are sufficient to allow a reasonable person to infer that 22 Defendant shared ISIS’s intent to achieve a terrorism purpose: 23 24 25 26 27 28 Based on the[] allegations [that BOC knowingly continued to carry out the PIJ Transfers after being expressly warned of the consequences of its actions and asked to desist], the Court easily finds that the plaintiffs have sufficiently pled grounds from which an objective observer could conclude defendant BOC intended to achieve any of the three results set forth under § 2331(1)(B). … Although directly attributable to the PIJ, a reasonable person could easily infer similar intent of BOC by virtue of its having allegedly provided material support to PIJ despite having allegedly been aware of a substantial probability that its support would facilitate the planning, preparation for, and execution of terrorist attacks in Israel. Cf. Boim III, 549 F.3d at 708 (noting that mere financial support of a Hamas-affiliated charity without reason to PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 18 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 24 of 25 1 2 impute intent from the charity to the financier did not create the requisite appearance of intent). Plaintiffs have thus adequately pled appearance of intent by BOC to achieve goals similar to those of the PIJ. 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Wultz v. Islamic Republic of Iran, 755 F. Supp. 2d 1, 49 (D.D.C. 2010) (emphasis added); see also Abecassis v. Wyatt, 7 F. Supp. 3d 668, 676 (S.D. Tex. 2014) (“In this case, the terrorist attacks at issue in Israel, by their nature, were intended to intimidate and coerce the Israeli population and influence the policies of the Israeli government by intimidation, coercion, and mass destruction. . . . [T]he continued financial and material support outside of the regulations of the OFP by the defendants to the Hussein regime, which was known to fund terrorist acts in Israel, could lead an objective observer to infer that such donations appeared to be intended to accomplish terroristic aims. Plaintiffs’ allegations in their first amended complaint satisfy the minimum pleading requirements for this element of their ATA claims.”). 6 While Defendant compares its activities to the provision of “routine banking service[s],” Mot. at 24, presumably it is not “routine” for interactive computer services to knowingly provide material support to terrorists. This case is thus no different from Arab Bank: Nothing in the amended complaints suggests that Arab Bank is a mere unknowing conduit for the unlawful acts of others, about whose aims the Bank is ignorant. Given plaintiffs’ allegations regarding the knowing and intentional nature of the Bank’s activities, there is nothing “routine” about the services the Bank is alleged to have 18 6 Defendant also contends that “[e]ven where the alleged ‘material support’ was targeted specifically 19 to a terrorist organization . . . courts have concluded the requisite terrorism intent is lacking where 20 the context ‘would . . . lead an objective observer to conclude’ that the defendant sought to achieve some other objective.” Mot. at 25 n.11 (quoting Stansell v. BGP, Inc., 2011 WL 1296881, at *9 21 (M.D. Fla. Mar. 31, 2011). However, Stansell is the only case to reach this conclusion. As noted above, the vast majority of courts look only to whether a plaintiff alleges a violation of the material 22 support statutes for determining if the “international terrorism” element is properly plead. Moreover, the lone court to have considered the holding in Stansell criticized and rejected its 23 reasoning. In Abecassis v. Wyatt, 7 F. Supp. 3d 668 (S.D. Tex. 2014), the court noted that “[w]hile 24 the [Stansell] court found an objective observer could not conclude defendants intended to achieve any of the results listed in the statute, the court relied on the subjective intent of the defendants as 25 pled by the plaintiffs.” Id. at 676. In any event, the Abecassis court found, “the continued financial and material support” of oil and gas companies “outside of the regulations of the [Oil for Food 26 Program]” to the regime of Saddam Hussein, “which was known to fund terrorist acts in Israel, could lead an objective observer to infer that such donations appeared to be intended to accomplish 27 terroristic aims.” Id. Likewise, in this case, Twitter’s knowing provision of material support to the 28 well-known terrorist group ISIS could lead an objective observer to infer that the company intended to accomplish terroristic aims. PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 19 Case 3:16-cv-00213-WHO Document 31 Filed 05/04/16 Page 25 of 25 provided. Thus, plaintiffs’ allegations with respect to Arab Bank’s knowledge and conduct are sufficient under their first factual theory. 1 2 3 4 5 6 7 8 9 Almog v. Arab Bank, PLC, 471 F. Supp. 2d 257, 291 (E.D.N.Y. 2007). IV. CONCLUSION For the foregoing reasons, Defendants’ motion to dismiss should be denied in all respects. Alternatively, if the motion is granted in any respect, Plaintiff should be given leave to amend. See, e.g., Keniston v. Roberts, 717 F.2d 1295, 1300 (9th Cir. 1983) (“Ordinarily, leave to amend should be freely given in the absence of prejudice to the opposing party. . . . In the absence of such a reason, denial of leave to amend is an abuse of discretion and reversible.”). 10 11 Dated: May 4, 2016 Respectfully submitted, BURSOR & FISHER, P.A. 12 13 By: /s/ Scott A. Bursor Scott A. Bursor 14 15 16 17 18 19 20 21 22 23 Scott A. Bursor (State Bar No. 276006) 888 Seventh Avenue New York, NY 10019 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 E-Mail: scott@bursor.com BURSOR & FISHER, P.A. L. Timothy Fisher (State Bar No. 191626) Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 Walnut Creek, CA 94596 Telephone: (925) 300-4455 Facsimile: (925) 407-2700 E-Mail: ltfisher@bursor.com jluster@bursor.com Attorneys for Plaintiffs 24 25 26 27 28 PLAINTIFFS’ OPPOSITION TO DEFENDANT’S MOTION TO DISMISS CASE NO. 3:16-CV-00213-WHO 20

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?