COCKRUM et al v. DONALD J. TRUMP FOR PRESIDENT, INC. et al
Filing
25
Memorandum in opposition to re 20 MOTION to Dismiss , 22 MOTION to Dismiss Amended Complaint filed by ROY COCKRUM, SCOTT COMER, ERIC SCHOENBERG. (Berwick, Benjamin)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
)
ROY COCKRUM, SCOTT COMER, and )
ERIC SCHOENBERG,
)
)
Plaintiffs,
)
)
v.
) Civil Action No. 1:17-cv-1370-ESH
)
DONALD J. TRUMP FOR PRESIDENT, )
INC., and ROGER STONE,
)
)
Defendants.
)
)
PLAINTIFFS’ MEMORANDUM OF POINTS AND AUTHORITIES IN OPPOSITION
TO DEFENDANTS’ MOTIONS TO DISMISS
TABLE OF CONTENTS
Page
INTRODUCTION .......................................................................................................................... 1
FACTUAL BACKGROUND ......................................................................................................... 5
I.
Financial and Personal Ties Between Russia and Trump Campaign Leadership. .............. 6
II.
Extensive Secret Meetings During the Campaign .............................................................. 7
III.
Motive to Collaborate and Exchange of Benefits ............................................................... 9
IV.
Wide-Ranging Cover-Up .................................................................................................. 11
STANDARD OF REVIEW .......................................................................................................... 11
ARGUMENT ................................................................................................................................ 13
I.
This Court Has Subject-Matter Jurisdiction. .................................................................... 13
Plaintiffs have alleged sufficient injury and causation for Article III
standing. ................................................................................................................ 13
This Court has diversity jurisdiction over Plaintiffs’ state-law claims. ................ 14
This Court also has supplemental jurisdiction over the state-law claims. ............ 15
II.
This Court Has Personal Jurisdiction Over Defendants and Is a Proper Venue. .............. 16
This Court may exercise specific personal jurisdiction over Defendants. ............ 18
1.
Plaintiffs’ claims arise from Defendants’ conduct in D.C. ....................... 18
2.
Defendants caused harm in D.C................................................................ 21
This Court may exercise general personal jurisdiction over the Campaign
because it is temporarily at home in D.C. ............................................................. 22
Venue is proper in this Court because a substantial portion of the acts
complained of took place in D.C. ......................................................................... 23
III.
Plaintiffs Have Adequately Stated Claims for Violations of D.C. and Federal Law........ 24
Plaintiffs have adequately alleged a conspiracy. .................................................. 24
1.
Plaintiffs have satisfied the pleading standard for conspiracy. ................. 24
2.
The pleading of certain facts based on information and belief is
appropriate and no basis for dismissal. ..................................................... 28
i
TABLE OF CONTENTS
Page
3.
Plaintiffs have adequately pled a single conspiracy between the
named Defendants and other co-conspirators. .......................................... 29
4.
Aiding and abetting tort liability has been recognized by the D.C.
Circuit and has been adequately pled by Plaintiffs. .................................. 32
This Court should apply D.C. law. ....................................................................... 33
The Complaint states plausible claims for public disclosure of private
facts. ...................................................................................................................... 36
1.
The Complaint sufficiently alleges that the facts in question were
private. ...................................................................................................... 37
2.
The Complaint sufficiently alleges that the private facts were not
matters of legitimate public concern. ........................................................ 45
3.
The Complaint sufficiently alleges that publication of the private
facts would have been highly offensive to a reasonable person of
ordinary sensibilities. ................................................................................ 48
4.
The private-facts tort does not require proof that Defendants
specifically intended to disclose Plaintiffs’ private facts. ......................... 50
The Complaint states plausible claims for intentional infliction of
emotional distress.................................................................................................. 51
1.
The Complaint sufficiently alleges that defendants’ alleged
conduct was extreme and outrageous. ...................................................... 51
2.
The Complaint sufficiently alleges that Defendants acted with
reckless disregard as to whether their conduct would cause
emotional distress...................................................................................... 53
3.
The Complaint sufficiently alleges that the Plaintiffs suffered
severe emotional distress. ......................................................................... 54
D.C. tort laws protecting privacy are not unconstitutional. .................................. 56
1.
The torts do not violate the First Amendment. ......................................... 56
2.
The torts are not void for vagueness ......................................................... 58
The Complaint states plausible claims that Defendants violated
42 U.S.C. § 1985(3). ............................................................................................. 59
ii
TABLE OF CONTENTS
Page
1.
Plaintiffs need not allege state action........................................................ 60
2.
Plaintiffs adequately allege conspiratorial purpose. ................................. 65
3.
Defendants’ extraterritoriality argument is irrelevant............................... 67
4.
Defendants’ respondeat superior argument is irrelevant.......................... 68
5.
Defendants’ intracorporate-conspiracy argument fails. ............................ 70
6.
Stone participated in the conspiracy. ........................................................ 70
CONCLUSION ............................................................................................................................. 70
iii
TABLE OF AUTHORITIES
Page(s)
Federal Cases
Albright v. Morton
321 F. Supp. 2d 130 (D. Mass. 2004) ........................................................................................43
Alkanani v. Aegis Defense Servs., LLC
976 F. Supp. 2d 13 (D.D.C. 2014) .............................................................................................18
Am. Nat’l Ins. Co. v. FDIC
642 F.3d 1137 (D.C. Cir. 2011) .................................................................................................12
*Ashcroft v. Iqbal
556 U.S. 662 (2009) .................................................................................................13, 24, 29, 37
*Attias v. Carefirst, Inc.
865 F.3d 620 (D.C. Cir. 2017) .............................................................................................13, 14
Banneker Ventures, LLC v. Graham
798 F.3d 1119 (D.C. Cir. 2015) .................................................................................................24
Bd. of Cty. Comm’rs of Bryan County v. Brown
520 U.S. 397 (1997) .............................................................................................................68, 69
*Bell Atl. Corp. v. Twombly
550 U.S. 544 (2007) ........................................................................................................... passim
*Benz v. Washington Newspaper Pub. Co.
2006 WL 2844896 (D.D.C. Sept. 29, 2006) ............................................................39, 43, 49, 50
Bettis v. Islamic Republic of Iran
315 F.3d 325 (D.C. Cir. 2003) ...................................................................................................54
Blakeney v. O’Donnell
117 F. Supp. 3d 6 (D.D.C. 2015) ...............................................................................................31
*Bowie v. Maddox
642 F.3d 1122 (D.C. Cir. 2011) ...........................................................................................32, 70
Burger King Corp. v. Rudzewicz
471 U.S. 462 (1985) ...................................................................................................................18
City of Canton v. Harris
489 U.S. 378 (1989) ...................................................................................................................68
Coates v. Cincinnati
402 U.S. 611 (1971) ...................................................................................................................58
Compton v. Alpha Kappa Alpha Sorority, Inc.
64 F. Supp. 3d 1 (D.D.C. 2014) .................................................................................................14
Crane v. Carr
814 F.2d 758 (D.C. Cir. 1987) ...................................................................................................35
iv
TABLE OF AUTHORITIES
Page(s)
Crane v. N.Y. Zoological Soc’y
894 F.2d 454 (D.C. Cir. 1990) ...................................................................................................12
*DAG Enters., Inc. v. Exxon Mobil Corp.
2001 WL 34778782 (D.D.C. Sept. 30, 2001) ......................................................................34, 35
*Daimler AG v. Bauman
134 S. Ct. 746 (2014) .................................................................................................................23
de Lupis v. Bonino
2010 WL 1328813 (D.D.C. Mar. 31, 2010).........................................................................27, 30
Dennis v. Sparks
449 U.S. 24 (1980) .....................................................................................................................30
Diven v. Amalgamated Transit Union International & Local 689
38 F.3d 598 (D.C. Cir. 1994) .....................................................................................................16
Doe v. City of N.Y.
15 F.3d 264 (2d Cir. 1994)...................................................................................................42, 45
Dombrowsky v. Dowling
459 F.2d 190 (7th Cir. 1972) (Stevens, C.J.) .............................................................................70
Dooley v. United Techs. Corp.
786 F. Supp. 65 (D.D.C. 1992) ..................................................................................................20
E.E.O.C. v. St. Francis Xavier Parochial Sch.
117 F.3d 621 (D.C. Cir. 1997) .....................................................................................................2
Edmond v. U.S. Postal Serv. Gen. Counsel
949 F.2d 415 (D.C. Cir. 1991) ...................................................................................................20
EIG Energy Fund XIV, L.P. v. Petroleo Brasileiro S.A.
246 F. Supp. 3d 52 (D.D.C. 2017) .......................................................................................32, 33
Evangelou v. D.C.
901 F. Supp. 2d 159 (D.D.C. 2012) ...........................................................................................28
Exxon Mobil Corp. v. Allapattah Servs., Inc.
545 U.S. 546 (2005) ...................................................................................................................15
Federer v. Gephardt
363 F.3d 754 (8th Cir. 2004) ...............................................................................................64, 65
FC Inv. Grp. LC v. IFX Markets, Ltd.
529 F.3d 1087 (D.C. Cir. 2008) .................................................................................................20
Foretich v. Lifetime Cable
777 F. Supp. 47 (D.D.C. 1991) ............................................................................................40, 46
Friends Christian High Sch. v. Geneva Fin. Consultants
39 F. Supp. 3d 58 (D.D.C. 2014) ...............................................................................................28
v
TABLE OF AUTHORITIES
Page(s)
GEICO v. Fetisoff
958 F.2d 1137 (D.C. Cir. 1992) .................................................................................................34
*Gelboim v. Bank of Am. Corp.
823 F.3d 759 (2d Cir. 2016).......................................................................................................26
*Gilbert v. Med. Econ. Co.
665 F.2d 305 (10th Cir. 1981) ...................................................................................................46
Gill v. Farm Bureau Life Insurance Co.
906 F.2d 1265 (8th Cir. 1990) .............................................................................................64, 65
Godfrey v. Georgia
446 U.S. 420 (1980) ...................................................................................................................58
Grayned v. City of Rockford
408 U.S. 104 (1972) ...................................................................................................................58
*Great Am. Fed. Sav. & Loan Ass’n v. Novotny
442 U.S. 366 (1979) .................................................................................................61, 62, 63, 64
*Griffin v. Breckenridge
403 U.S. 88 (1971) .........................................................................................................60, 61, 63
GTE New Media Servs. Inc. v. BellSouth Corp.
199 F.3d 1343 (D.C. Cir. 2000) .................................................................................................18
*Halberstam v. Welch
705 F.2d 472 (D.C. Cir. 1983) .................................................................................25, 27, 32, 33
Henok v. Kessler
78 F. Supp. 3d 452 (D.D.C. 2015) ...............................................................................................2
Hill v. Colorado
530 U.S. 703 (2000) ...................................................................................................................56
Hustler Magazine, Inc. v. Falwell
485 U.S. 46 (1988) ...............................................................................................................59, 60
In re APA Assessment Fee Litig.
766 F.3d 39 (D.C. Cir. 2014) .....................................................................................................36
Int’l Shoe Co. v. State of Wash., Office of Unemployment Comp. & Placement
326 U.S. 310 (1945) ...................................................................................................................17
*Jacobsen v. Oliver
201 F. Supp. 2d 93 (D.D.C. 2002) .......................................................................................17, 19
James v. Lusby
499 F.2d 488 (D.C. Cir. 1974) ...................................................................................................15
Karraker v. Rent-A-Center, Inc.
239 F. Supp. 2d 828 (C.D. Ill. 2003) ...................................................................................40, 49
vi
TABLE OF AUTHORITIES
Page(s)
Kenley v. Dist. of Columbia
83 F. Supp. 3d 20, 33 (D.D.C. 2015) ...................................................................................31, 32
Klaxon Co. v. Stentor Elec. Mfg. Co.
313 U.S. 487 (1941) ...................................................................................................................34
Klayman v. Zuckerberg
753 F.3d 1354 (D.C. Cir. 2014) .................................................................................................30
Kowal v. MCI Communications. Corp.
16 F.3d 1271 (D.C. Cir. 1994) ...................................................................................................29
*Kush v. Rutledge
460 U.S. 719 (1983) .............................................................................................................62, 64
Kvech v. Holder
2011 WL 4369452 (D.D.C. 2011) .............................................................................................28
Libertad v. Welch
53 F.3d 428 (1st Cir. 1995) ........................................................................................................66
Loumiet v. United States
255 F. Supp. 3d 75, 100 (D.D.C. 2017) .....................................................................................36
Lujan v. Defenders of Wildlife
504 U.S. 555 (1992) ...................................................................................................................14
McAndrew v. Lockheed Martin Corp.
206 F.3d 1031 (11th Cir. 2000) (en banc) .................................................................................69
Miller v. California
413 U.S. 15 (1973) .....................................................................................................................58
Moms Against Mercury v. FDA
483 F.3d 824 (D.C. Cir. 2007) .............................................................................................11, 12
Monell v. Dep’t of Social Servs.
436 U.S. 658 (1978) ...................................................................................................................68
Morgan v. District of Columbia
550 F. Supp. 465 (D.D.C. 1982) ................................................................................................69
Myers v. Holiday Inns, Inc.
915 F. Supp. 2d 136 (D.D.C. 2013) ...........................................................................................12
Owens v. Haas
601 F.2d 1242 (2d. Cir. 1979)..............................................................................................68, 69
*Oxbow Carbon & Minerals LLC v. Union Pac. R.R. Co.
81 F. Supp. 3d 1, 11 (D.D.C. 2015) ...........................................................................3, 24, 25, 28
Paige v. U.S. Drug Enf’t Admin.
818 F. Supp. 2d 4 (D.D.C. 2010), aff’d, 665 F.3d 1355 (D.C. Cir. 2012) .................................49
vii
TABLE OF AUTHORITIES
Page(s)
Parnigoni v. St. Columba’s Nursery Sch.
681 F. Supp. 2d 1 (D.D.C. 2010) ...............................................................................................34
Pearce v. E.F. Hutton Grp., Inc.
664 F. Supp. 1490 (D.D.C. 1987) ..............................................................................................35
Perkins v. Benguet Consol. Mining Co.
342 U.S. 437 (1952) ...................................................................................................................23
Pippinger v. Rubin
129 F.3d 519 (10th Cir. 1997) ...................................................................................................44
Rawlings v. Dist. of Columbia
820 F. Supp. 2d 92 (D.D.C. 2011) .......................................................................................31, 32
Reno v. ACLU
521 U.S. 844 (1997) ...................................................................................................................58
*Rosenboro v. Kim
994 F.2d 13 (D.C. Cir. 1993) .....................................................................................................14
SEC v. Dresser Industries, Inc.
628 F.2d 1368 (D.C. Cir. 1980) (en banc) ...................................................................................5
*Second Amendment Found. v. U.S. Conference of Mayors
274 F.3d 521 (D.C. Cir. 2001) ...................................................................................................20
Sharp Corp. v. Hisense USA Corp.
--- F. Supp. 3d ---, 2017 WL 5449805 (D.D.C. Nov. 13, 2017) ................................................12
Simpson v. Burrows
90 F. Supp. 2d 1108 (D. Or. 2000) ......................................................................................40, 49
*The Florida Star v. B.J.F.
491 U.S. 524 (1989) ...................................................................................................................57
Trans Union Corp. v. FTC
267 F.3d 1138 (D.C. Cir. 2001) .................................................................................................58
*United Bhd. of Carpenters & Joiners of America, Local 610, AFL-CIO v. Scott
463 U.S. 825 (1983) .......................................................................................................62, 64, 65
United Mine Workers of Am. v. Gibbs
383 U.S. 715 (1966) ...................................................................................................................15
United States ex rel. Sansbury v. LB & B Assocs., Inc.
58 F. Supp. 3d 37 (D.D.C. 2014) ...............................................................................................28
United States ex rel. Scollick v. Narula
215 F. Supp. 3d 26 (D.D.C. 2016) .............................................................................................32
United States Telecomm. Ass’n v. FCC
825 F.3d 674 (D.C. Cir. 2016) ...................................................................................................59
viii
TABLE OF AUTHORITIES
Page(s)
United States v. Bridgeman
523 F. 2d 1099 (D.C. Cir. 1975) ................................................................................................21
United States v. Dakins
872 F.2d 1061 (D.C. Cir. 1989) .................................................................................................31
United States v. Flynn
No. 1:17-cr-232-RC (D.D.C. Dec. 1, 2017).....................................................................2, 11, 28
United States v. Manafort
No. 1:17-cr-201 (D.D.C. Oct. 30, 2017) ......................................................................................2
United States v. Oakar
924 F.Supp. 232 (D.D.C. 1996) .................................................................................................31
United States v. Papadopoulos
No. 1:17-cr-182-RDM (D.D.C. Oct. 5, 2017) ................................................................... passim
United States v. Philip Morris, Inc.
116 F. Supp. 2d 116 (D.D.C. 2000) ...........................................................................................12
Village of Hoffman Estates v. Flipside, Hoffman Estates, Inc.
455 U.S. 489 (1982) ...................................................................................................................58
Walden v. Fiore
134 S. Ct. 1115 (2014) .........................................................................................................18, 21
Weiss v. Lehman
713 F. Supp. 489 (D.D.C. 1989) ................................................................................................41
Wisey’s #1 LLC v. Nimellis Pizzeria LLC
952 F. Supp. 2d 184 (D.D.C. 2013) ...........................................................................................16
State Cases
Bodah v. Lakeville Motor Express, Inc.
649 N.W.2d 859 (Minn. Ct. App. 2002) ..............................................................................39, 50
Clemente v. State
206 P.3d 249 (Or. 2009) ............................................................................................................51
Danai v. Canal Square Assocs.
862 A.2d 395 (D.C. 2004) .........................................................................................................38
Diaz v. Oakland Tribune, Inc.
188 Cal. Rptr. 762 (Cal. Ct. App. 1983) ....................................................................................40
Exec. Sandwich Shoppe, Inc. v. Carr Realty Corp.
749 A.2d 724 (D.C. 2000) .........................................................................................................31
Flax v. Schertler
935 A.2d 1091 (D.C. 2007) .......................................................................................................33
ix
TABLE OF AUTHORITIES
Page(s)
Greenwood v. Taft, Stettinius & Hollister
663 N.E.2d 1030 (Ohio Ct. App. 1995) .........................................................................39, 40, 49
Hawkins by & through Hawkins v. Multimedia, Inc.
344 S.E.2d 145 (S.C. 1986) .......................................................................................................46
Lambert v. Hartmann
898 N.E.2d 67 (Ohio App. 2008) (per curiam) ..........................................................................50
*M.G. v. Time Warner, Inc.
107 Cal. Rptr. 2d 504 (Cal. Ct. App. 2001) ...................................................................40, 42, 57
Multimedia WMAZ, Inc. v. Kubach
443 S.E.2d 491 (Ga. Ct. App. 1994) ..........................................................................................41
Oliver v. Mustafa
929 A.2d 873 (D.C. 2007) .........................................................................................................49
*Randolph v. ING Life Ins. & Annuity Co.
973 A.2d 702 (D.C. 2009) ...................................................................................................38, 50
Sere v. Grp. Hospitalization, Inc.
443 A.2d 33 (D.C. 1982) ...........................................................................................................49
*Shoppers Food Warehouse v. Moreno
746 A.2d 320 (D.C. 2000) ...................................................................................................18, 19
*Star-Telegram, Inc. v. Doe
915 S.W.2d 471 (Tex. 1995)......................................................................................................47
Stratton v Krywko
2005 WL 27522 (Mich. Ct. App. 2005) (per curiam) ..........................................................40, 46
Sundberg v. TTR Realty, LLC
109 A.3d 1123 (D.C. 2015) .......................................................................................................33
*Vassiliades v. Garfinckel’s, Brooks Bros., Miller & Rhoades, Inc.
492 A.2d 580 (D.C. 1985) ................................................................................................. passim
*Washkoviak v. Student Loan Mktg. Ass’n
900 A.2d 168 (D.C. 2006) .........................................................................................................34
Wemhoff v. D.C.
887 A.2d 1004 (D.C. 2005) .......................................................................................................38
Wheeler v. United States
977 A.2d 973 (D.C. 2009) .........................................................................................................25
*Wolf v. Regardie
553 A.2d 1213 (D.C. 1989) ............................................................................................... passim
Y.G. v. Jewish Hosp. of St. Louis
795 S.W.2d 488 (Mo. Ct. App. E.D. 1990) ...............................................................................41
x
TABLE OF AUTHORITIES
Page(s)
Yonaty v. Mincolla
945 N.Y.S2d 774 (N.Y. App. Div. 2012) ..................................................................................43
Zieve v. Hairston
598 S.E.2d 25 (Ga. Ct. App. 2004) ............................................................................................41
Federal Statutes
5 U.S.C. § 552a(b) .........................................................................................................................44
28 U.S.C. § 1332 ............................................................................................................................14
28 U.S.C. § 1367(a) .......................................................................................................................15
28 U.S.C. § 1367(c)(1)...................................................................................................................16
28 U.S.C. § 1391(b)(2) ..................................................................................................................23
42 U.S.C. § 1983 ..........................................................................................................32, 65, 68, 69
42 U.S.C. § 1985 ..........................................................................................................32, 65, 68, 69
*42 U.S.C. § 1985(3) ............................................................................................................. passim
47 U.S.C. § 230 ..............................................................................................................................30
State Statutes
*D.C. Code § 13-423(a)(1) ......................................................................................................18, 20
*D.C. Code § 13-423(a)(4) ............................................................................................................21
Federal Rules
Fed. Rule of Evidence 201 ...............................................................................................................2
Fed. Rule of Civil Procedure 9(b) ..................................................................................................29
Fed. Rule of Civil Procedure 8 ......................................................................................................29
Fed. Rule of Civil Procedure 12(b)(1) ...........................................................................................11
Fed. Rule of Civil Procedure 12(b)(2) ...........................................................................................12
Fed. Rule of Civil Procedure 12(b)(3) ...........................................................................................12
Fed. Rule of Civil Procedure 12(b)(6) ...........................................................................................12
Treatises
16 Am. Jur. 2d Conspiracy § 56 ....................................................................................................69
*RESTATEMENT (SECOND) OF TORTS (“RESTATEMENT”) § 652D .......................................... passim
*RESTATEMENT (THIRD) OF TORTS (“RESTATEMENT THIRD”) § 46, cmt. d (2012) ...........51, 53, 54
*Wright & Miller § 1224 .........................................................................................................28, 29
Wright & Miller § 3567.3 ..............................................................................................................16
xi
TABLE OF AUTHORITIES
Page(s)
Other Authorities
Office of the Deputy Attorney General, Order No. 3915-2017, Appointment of Special Counsel
to Investigate Russian Interference with the 2016 Presidential Election & Related Matters
(May 17, 2017).............................................................................................................................1
Jared A. Wilkerson, Battle for the Disclosure Tort, 49 CAL. W. L. REV. 231, 266-67 (2013) ......36
xii
INTRODUCTION1
On July 22, 2016, Plaintiffs’ lives were turned upside down. Their private information—
information of no interest to the public such as social security numbers, financial information,
sexual orientation, and private correspondence—was dumped online for the world to see forever,
causing immediate and permanent injury. Shortly thereafter, two Plaintiffs had their identities
stolen and attempts made to obtain credit in their names, actions that required them to take costly
and time-consuming countermeasures. One Plaintiff was harassed and threatened with violence.
All suffered significant emotional distress. Plaintiffs will have to live the rest of their lives with
their private information available online, required to bear the cost of precautions and countermeasures against further injuries for which the violations of their privacy puts them at risk. All of
Plaintiffs’ injuries occurred due to their support for a candidate in a federal election. Plaintiffs
seek redress for their injuries and, in so doing, hope to deter future similar behavior.
It is the unanimous view of the U.S. Intelligence Community (“IC”) that Russia took
measures to interfere in the 2016 U.S. elections on behalf of then-candidate Donald J. Trump.
The Executive Branch, via Special Counsel Robert Mueller, is investigating “any links and/or
coordination between the Russian government and individuals associated with the campaign of
President Donald Trump,” and is responsible for prosecuting any crimes discovered by that investigation. See Office of the Deputy Attorney General, Order No. 3915-2017, Appointment of
Special Counsel to Investigate Russian Interference with the 2016 Presidential Election & Relat-
1
Throughout this brief, “Compl.” and “Complaint” refer to the First Amended Complaint (ECF
No. 17); “Campaign Br.” refers to Defendant Donald J. Trump for President, Inc.’s Motion to
Dismiss the First Amended Complaint (ECF No. 20); “Stone Br.” refers to Defendant Roger
Stone’s Motion to Dismiss Amended Complaint (ECF No. 22); emphases in case quotations
were added unless otherwise noted; and internal quotation marks, alterations, and citations were
omitted from case quotations.
1
ed Matters (May 17, 2017), https://www.justice.gov/opa/press-release/file/967231/download.2
The Legislative Branch is investigating Russian interference in the 2016 election and is responsible for reporting to the American people on its findings and developing policies to prevent such
interference in the future. These are the proper roles for the Executive and Legislative Branches
in response to Russia’s interference. But our government is made up of three branches, and the
Judiciary has a role to play as well: providing a forum for redress for individuals whose rights
have been violated. That is a role neither of the other branches can adequately play. For this reason, Plaintiffs have come to this Court for relief.
The facts alleged in the Complaint already show—and Plaintiffs will be able to prove—
that the injuries they suffered were the direct result of a conspiracy between Defendants and others, including Russian agents. In the shortest form, Plaintiffs allege that: (1) Russian agents
hacked into DNC servers and stole Plaintiffs’ private information; (2) Russian agents used longstanding connections with the Defendants to see if Defendants would collaborate in weaponizing
the stolen material; (3) Defendants were indeed willing to cooperate, and entered into an agreement with Russian agents that involved a mutual exchange of benefits; and (4) part of that conspiracy involved giving stolen material that contained Plaintiffs’ private information to WikiLeaks in order to have it disseminated in a strategic way designed to help the Trump Campaign.
2
The Special Counsel has already obtained guilty pleas from Campaign advisors George Papadopolous and Michael Flynn, for lying to federal investigators about interactions with Russian
agents, see Statement of the Offense, United States v. Papadopoulos, No. 1:17-cr-182-RDM,
ECF No. 19 (D.D.C. Oct. 5, 2017) (“Papadopoulos SOO”); Statement of the Offense, United
States v. Flynn, No. 1:17-cr-232-RC, ECF No. 4 (D.D.C. Dec. 1, 2017) (“Flynn SOO”), and has
indicted Campaign Chairman Paul Manafort and Deputy Chairman Rick Gates for crimes related
to their long-standing interactions with a pro-Russian political party in Ukraine with close ties to
the Kremlin, see Redacted Indictment, United States v. Manafort, No. 1:17-cr-201, ECF No. 13
(D.D.C. Oct. 30, 2017). The Court may take judicial notice of these public filings. See Fed. Rule
of Evidence 201; E.E.O.C. v. St. Francis Xavier Parochial Sch., 117 F.3d 621, 624 (D.C. Cir.
1997); Henok v. Kessler, 78 F. Supp. 3d 452, 461 n.8 (D.D.C. 2015).
2
The facts alleged are remarkably strong—far stronger than is typical for conspiracy allegations, where, before discovery, Defendants normally have exclusive control of much of the
evidence of the conspiracy; and far stronger than they need be at this stage of the proceedings,
when Plaintiffs do not even need to show that the conspiracy they allege is probable, but merely
that it is plausible. See Bell Atl. Corp. v. Twombly, 550 U.S. 544, 556 (2007). Plaintiffs clear that
bar by a good amount and then some. As courts in this District have recognized, “conspiracies
are rarely evidenced by explicit agreements, but nearly always must be proven through inferences that may be fairly drawn from the behavior of the alleged conspirators.” Oxbow Carbon &
Minerals LLC v. Union Pac. R.R. Co., 81 F. Supp. 3d 1, 11 (D.D.C. 2015) (quoting Anderson
News, LLC v. Am. Media, Inc., 680 F.3d 162, 183 (2d Cir. 2012)). In this case, even before Plaintiffs have had any opportunity to take discovery, the facts alleged (which must be taken as true at
this point in the litigation) make a powerful argument for the existence of a conspiracy. As discussed further below, courts have looked for four elements to demonstrate the existence of a conspiracy (in light of the rarity of signed conspiracy agreements): motive to act together;
opportunity to reach an agreement in the form of repeated communications between the alleged
co-conspirators; benefit to each party; and efforts to conceal the conspiracy. These showings are
particularly indicative of a conspiracy if the alleged conspirators’ actions are hard to explain in
the absence of a conspiracy. The Complaint lays out all four elements in spades. And it is hard to
explain the actions described except by reference to a conspiracy of the sort alleged.
First, the Complaint alleges, as the IC has confirmed, that Russia had a motive to help the
Trump Campaign and indeed took steps to do so; and the Complaint alleges that the Campaign
needed a way to salvage its dimming chances of winning the election.
Second, there was ample opportunity to reach an agreement. The Complaint alleges that
3
Mr. Trump and other individuals affiliated with the Campaign had longstanding personal and
financial ties with Russia, and that senior members of the Campaign held discussions with Russian agents about helping Mr. Trump to win the election. The Complaint also alleges a series of
communications and meetings between Defendants and Russian agents that span the period of
time in which the conspiracy took place—communications that stand in stark contrast to anything seen in prior Presidential campaigns.
Third, the Complaint alleges an exchange of benefits that would be hard to understand
absent a conspiracy. Mr. Trump and his associates intervened in the drafting of the RNC platform to make changes favorable to Russia—in an unexpected move that was without prior substantial support from the Republican Party—on the same day that Trump Campaign associates
were meeting with the Russian Ambassador and just four days before Plaintiffs’ private information was dumped online. Mr. Trump and his associates have gone to great lengths to oppose
sanctions on Russia for its interference in the 2016 election and even sought to return to Russia
property that was confiscated as punishment for Russia’s actions. And Mr. Trump and his associates have repeatedly praised Russia and its President, Vladimir Putin, and denied or excused
Russia’s interference in the election, even after the evidence of Russian interference was well
known and accepted by the IC. On the other side, the Complaint alleges that, as a result of the
conspiracy, the participants in the conspiracy provided the contents of certain stolen DNC email
accounts to WikiLeaks for disclosure, and did so in a manner and at a time optimally beneficial
to the Trump Campaign.
Fourth, the Complaint alleges a long series of instances in which Defendants changed
their stories, failed to disclose information relevant to the conspiracy even under penalty of perjury, and otherwise sought to conceal the actions alleged to be part of the conspiracy.
4
Perhaps because the pleadings are clearly sufficient to allow the Plaintiffs their day in
court, Defendants’ briefs focus instead on (a) atmospheric political arguments and (b) a barrage
of meritless technical and procedural objections, all designed to deny Plaintiffs the opportunity to
prove their case. The pages that follow explain why Plaintiffs have adequately stated all their
substantive claims and why each of Defendants’ procedural objections are without merit.3
Plaintiffs were injured. They have alleged ample facts—far more than courts in this District have previously required to survive a motion to dismiss—indicating that Defendants’ participation in a conspiracy caused these injuries. Federal and state law provide Plaintiffs with protection against these injuries and a right of redress in this Court. Indeed, the courts are the only institutions in our government that can provide them with this redress. Plaintiffs will of course
have to carry their burden of persuasion to obtain that relief, but they have done everything required of them under the law to entitle them to the opportunity to do so.
FACTUAL BACKGROUND4
The Russian government interfered with the 2016 U.S. presidential election in order to
undermine the U.S. democratic process and help elect Mr. Trump. Compl. ¶¶ 83-84. As part of
this effort, Russian intelligence hacked DNC servers and stole large volumes of data, including
3
Also without merit is Defendants’ suggestion that proceedings in this case would interfere with
the criminal investigation. See Campaign Br. 2. There is nothing unusual about parallel civil and
criminal proceedings. See, e.g., SEC v. Dresser Industries, Inc., 628 F.2d 1368, 1374 (D.C. Cir.
1980) (en banc) (“The civil and regulatory laws of the United States frequently overlap with the
criminal laws, creating the possibility of parallel civil and criminal proceedings, either successive
or simultaneous. In the absence of substantial prejudice to the rights of the parties involved, such
parallel proceedings are unobjectionable under our jurisprudence.”). In any event, the motion-todismiss stage is not the time to raise concerns about parallel proceedings, as they are not a basis
for dismissal. Nor are Defendants’ protestations about discovery relevant to the pending motions.
4
The facts set forth here are drawn from the allegations in the Amended Complaint and recent
public filings in other matters in this District, of which this court may take judicial notice. See
supra note 2. These filings postdate the Amended Complaint but are consistent with the allegations therein, and underscore their (ever-increasing) plausibility.
5
the emails of DNC employees. Id. ¶¶ 86-87. On July 22, 2016, stolen DNC emails were posted
on WikiLeaks, making them accessible to anyone in the world with Internet access. Id. ¶¶ 16, 42.
These emails came from the accounts of seven DNC staffers—six members of the finance team
(including Mr. Comer) and the Communications Director. Id. Because the finance-staff email
accounts were targeted (and selected for publication from a range of stolen email accounts and
other data), sensitive information about DNC donors (including Mr. Cockrum and Mr. Schoenberg), such as social security numbers, financial information, home addresses, personal email
addresses, and personal phone numbers, was released to the world. Id. ¶¶ 17-20.
The dumping of the stolen emails—including Plaintiffs’ private information—on the Internet was the result of a conspiracy involving Russia, the Trump Campaign, Mr. Stone, and
WikiLeaks. Compl. ¶¶ 10-16. Defendants and their co-conspirators had motive to act together,
there was ample opportunity to reach agreement, each party realized substantial benefits, and
each party took steps to conceal what had occurred. Furthermore, each party took actions that
would be illogical absent a conspiracy.
I.
Financial and Personal Ties Between Russia and Trump Campaign Leadership.
The conspiracy was made possible, in part, by longstanding ties that existed among the
conspirators—ties long pre-dating the Campaign. Many of those involved with the Trump Campaign had deep personal and financial ties to Russia going back decades. The candidate himself
had longstanding financial connections to Russia and had relied for years on funding from Russian oligarchs to finance his real-estate projects. Id. ¶¶ 103-111. Campaign Chairman Paul Manafort was a paid operative for a pro-Russian political party in Ukraine with close ties to the Kremlin. Id. ¶ 113. In 2005, Manafort proposed to a Russian oligarch and close Putin ally a plan to
influence politics inside the United States to benefit Mr. Putin’s government. Id. Foreign-policy
6
advisor Carter Page had sufficient contact with Russian intelligence that the FBI obtained a FISA
warrant based on probable cause to believe that he was acting as an agent of a foreign power. Id.
¶¶ 115-116. Campaign adviser Michael Flynn had received payments from Russian companies
and had attended a gala hosted by RT, a media entity that the intelligence community described
as “[t]he Kremlin’s principal international propaganda outlet,” where he sat with Mr. Putin and
his chief of staff. Id. ¶ 117. Jared Kushner, a senior Campaign adviser and Mr. Trump’s son-inlaw, had longstanding financial and personal ties to Russian oligarchs. Id. ¶ 118. And George
Papadopoulos, a member of the Campaign’s national-security team, described himself as an intermediary with the Kremlin. Id. ¶¶ 94-95.
II.
Extensive Secret Meetings During the Campaign.
The ties between agents of the Trump Campaign and of Russia led to dozens of interac-
tions during the campaign, out of which came an agreement to disseminate stolen DNC emails to
benefit the Campaign in exchange for policy concessions to benefit Russia. Id. ¶¶ 88-90, 92.
Several contacts between the Campaign and Russian agents appear relevant to the formation of
an agreement, demonstrating the Campaign’s willingness—even eagerness—to collaborate with
Russia to interfere in the election and harm the Campaign’s opponent.
For example, on March 24, 2016—three days after Mr. Trump, in a Washington Post interview, identified Mr. Papadopoulos as one of five named members of his Campaign’s foreignpolicy team—Mr. Papadopoulos sent an email to high-ranking Campaign officials and other
members of the Campaign’s national-security advisory committee offering to set up a meeting
with Russian leadership, including Mr. Putin, “to discuss US-Russia ties under President
Trump.” Id. ¶ 94. Mr. Papadopoulos said he was acting as an intermediary with the Russian government and that his “Russian contacts welcomed the opportunity.” Id. Rather than immediately
7
report these contacts with a hostile foreign power to the FBI, the Campaign welcomed these
overtures. As described in a Statement of the Offense entered as part of a plea agreement between Mr. Papadopoulos and the Special Counsel, Mr. Papadapoulos’s Campaign supervisor responded that he would “work it through the campaign” and added: “Great work.” See Statement
of the Offense ¶ 8, United States v. Papadopoulos, No. 1:17-cr-182-RDM, ECF No. 19 (D.D.C.
Oct. 5, 2017) (“Papadopoulos SOO”).
On March 31, Mr. Papadopoulos attended a meeting of the national-security advisory
committee and Mr. Trump, Compl. ¶ 95, where he said that he had Russian government connections and could help arrange a meeting between Mr. Trump and Mr. Putin. Papadopoulos SOO ¶
9. Over the next months, Mr. Papadopoulos continued to attempt to arrange meetings between
the Campaign and Russian officials. Compl. ¶ 94; see Papadopoulos SOO ¶¶ 10-21. Mr. Papadopoulos learned on April 26, 2016 that the Russians had “dirt” on Mr. Trump’s opponent in the
form of “thousands of emails.” Papadopoulos SOO ¶ 14. High-ranking Campaign officials did
nothing to discourage, and in some cases encouraged, ongoing communications with Russian
agents. Id. ¶¶ 20, 21.b. And on July 7, 2016, Campaign representative Carter Page traveled to
Moscow to meet with Russian officials close to Putin—a trip approved by then-Campaign manager Corey Lewandowski. Compl. ¶ 100.
Mr. Papadopoulos was not the only Trump Campaign agent receptive to Russian entreaties. On June 9, 2016, Donald Trump Jr., Mr. Kushner, and Mr. Manafort met with a Kremlin-connected Russian lawyer described in emails as a “Russian government attorney who is flying over from Moscow.” Id. ¶ 129. Mr. Trump Jr. agreed to attend this meeting after being promised damaging material about his father’s opponent as part of a Russian-government effort to aid
the Trump Campaign. Id. An email to Mr. Trump Jr. about the meeting stated, “[t]his is obvious-
8
ly very high level and sensitive information but is part of Russia and its government’s support for
Mr. Trump.” Id. Mr. Trump Jr. responded enthusiastically by email: “If it’s what you say I love it
especially later in the summer.” Id. “Later in the summer” is, of course, precisely when Plaintiffs’ emails were released.
Mr. Trump, Mr. Manafort, then-Senator Jeff Sessions, and other Campaign agents also
had repeated contact with Russian officials and agents in the period leading up to the release of
the DNC emails. In one such instance, Mr. Kushner and Mr. Sessions met in person with Russian
Ambassador Kislyak just four days before the hacked emails were released. On the same day as
that meeting, Campaign staffer J.D. Gordon successfully steered the Republican Party platform
in a more Russia-friendly direction. See, e.g., Compl. ¶¶ 96-97, 99, 101.
III.
Motive to Collaborate and Exchange of Benefits.
Both sides had ample motive to work together—Russia to maximize the disruptive im-
pact of the stolen emails and extract policy concessions from the Trump Campaign, and the
Campaign to improve its chances of defeating Secretary Clinton. Id. ¶¶ 120-127. Russian efforts
began to bear fruit shortly before the release of the DNC emails: the Campaign cast doubt on the
U.S. commitment to NATO, id. ¶ 151, undertook efforts to lift sanctions on Russia, id. ¶¶ 152155, and generally adopted a markedly more favorable posture toward Russia and Mr. Putin, id.
¶¶ 156-159. These actions were astonishing: no prior Presidential nominee had ever come close
to casting doubt on NATO, nor was there any identifiable, credible movement to do so prior to
Mr. Trump’s adoption of this position. Just four days before the stolen emails were dumped on
WikiLeaks, the Campaign intervened to remove language condemning Russia’s action in
Ukraine from the Republican platform. Id. ¶¶ 147-148. Mr. Gordon, the Campaign’s nationalsecurity policy representative at the Republican National Convention, initially denied involve-
9
ment in shaping this part of the platform. He later admitted that he had been personally involved
in softening the language on Ukraine to align it with Mr. Trump’s views. Id. ¶¶ 36, 149, 217.
On July 22, 2016, the stolen DNC emails were disseminated on WikiLeaks, causing substantial harm to Plaintiffs and other Americans. Id. ¶ 160. The leak targeted DNC finance staff in
particular and was well-timed to maximize political fallout. Id. ¶¶ 161, 165. In addition to Plaintiffs’ private information—information that was of no public interest, but the publication of
which put donors and potential donors on notice that any information they might share with the
DNC was not secure—the dump included other emails that the media viewed as providing insight into tensions within the Democratic Party just days before the Party was set to gather for its
nominating convention. The Campaign immediately sought to maximize its advantage from the
release of the hacked emails. Mr. Trump mentioned WikiLeaks more than 160 times during his
campaign appearances and even called on Russia to continue its cyberattacks, saying: “Russia, if
you’re listening, I hope you’re able to find the 30,000 [Hillary Clinton] emails that are missing.”
Id. ¶¶ 166-169. When later asked if that comment was serious, Mr. Trump declined to explain
the comment away as a joke, instead saying “If Russia or China or any other country has those
emails, I mean, to be honest with you, I’d love to see them.” Id. ¶ 169.
Shortly after the emails were published, Mr. Stone admitted in an interview that he had
communicated with WikiLeaks founder Julian Assange but said he was “not at liberty” to discuss
those communications. Id. ¶ 162. Mr. Stone also began to engage in public and private Twitter
conversations with the hacker Guccifer 2.0, who had claimed credit for the DNC hack. Id.
¶¶ 163-164, 170-172. Mr. Stone was sufficiently connected to Mr. Assange and WikiLeaks to
accurately predict—six weeks in advance—the October 7, 2016 release of Clinton campaign
chairman John Podesta’s emails. Id. ¶¶ 173-179.
10
IV.
Wide-Ranging Cover-Up.
Last, there is the cover-up. Defendants and their agents have repeatedly and falsely de-
nied or failed to disclose longstanding personal and financial relationships with Russia, ¶¶ 199205, and contacts with Russians during and after the campaign, id. ¶¶ 183-198. Despite having
met with Russian agents specifically for the purpose of benefitting the Campaign by obtaining
damaging information about Mr. Trump’s opponent, the Campaign’s agents and associates called
allegations that Russia was working to help Mr. Trump “disgusting,” “phony,” and “absurd.” Id.
¶¶ 184-186. The Campaign falsely denied having approved Mr. Page’s trip to Moscow. Id.
¶¶ 100, 187. It concealed its involvement with ensuring that the Republican Party platform
would be favorable toward Russia. Id. ¶ 217. Agents of the Campaign repeatedly failed to disclose contacts with Russian agents on security clearance forms, id. ¶¶ 194-198; in one instance,
Mr. Kushner failed to disclose his attempt to establish a communication back channel with Russia to avoid detection by U.S. intelligence, id. ¶ 195. Mr. Papadopoulos and Mr. Flynn both lied
to the FBI about their interactions with Russian agents. See Papadopoulos SOO; Statement of the
Offense, United States v. Flynn, No. 1:17-cr-232-RC, ECF No. 4 (D.D.C. Dec. 1, 2017) (“Flynn
SOO”). They continue to cast doubt on or deny Russian involvement in the election, in the face
of overwhelming evidence to the contrary. Id. ¶¶ 206-216. Mr. Trump has done nothing to hold
Russia accountable, repeatedly attempting instead to interfere with ongoing law enforcement investigations, going so far as to fire the FBI Director in order to relieve what the President described as “great pressure because of Russia.” Id. ¶¶ 218-219.
STANDARD OF REVIEW
Pursuant to Rule 12(b)(1), Plaintiffs bear the burden of showing that this Court has subject matter jurisdiction. See, e.g., Moms Against Mercury v. FDA, 483 F.3d 824, 828 (D.C. Cir.
11
2007). However, in making the determination, the court must “assume the truth of all material
factual allegations in the complaint and construe the complaint liberally, granting plaintiff the
benefit of all inferences that can be derived from the facts alleged.” Am. Nat’l Ins. Co. v. FDIC,
642 F.3d 1137, 1139 (D.C. Cir. 2011).
Similarly, under Rule 12(b)(2), “[t]he plaintiff has the burden of establishing a factual basis for the exercise of personal jurisdiction over the defendant,” Crane v. N.Y. Zoological Soc’y,
894 F.2d 454 (D.C. Cir. 1990), which can be satisfied “with a prima facie showing of pertinent
jurisdictional facts,” United States v. Philip Morris, Inc., 116 F. Supp. 2d 116, 121 (D.D.C.
2000). “In determining whether such a basis exists, factual discrepancies appearing in the record
must be resolved in favor of the plaintiff.” Crane, 894 F.2d at 454. “When personal jurisdiction
is challenged, the district judge has considerable procedural leeway in choosing a methodology
for deciding the motion. . . . The Court may rest on the allegations in the pleadings, collect affidavits and other evidence, or even hold a hearing.” Sharp Corp. v. Hisense USA Corp., --- F.
Supp. 3d ---, 2017 WL 5449805, at *3 (D.D.C. Nov. 13, 2017).
Under Rule 12(b)(3), “a court should dismiss or transfer a plaintiff’s complaint if the
plaintiff’s chosen venue is improper or inconvenient. While the plaintiff bears the burden of
proving that venue is proper, a court should accept the plaintiff’s well-pled factual allegations as
true, resolve any factual conflicts in the plaintiff's favor, and draw all reasonable inferences in
favor of the plaintiff.” Myers v. Holiday Inns, Inc., 915 F. Supp. 2d 136, 144 (D.D.C. 2013).
Finally, under Rule 12(b)(6), “the Court must assess the complaint to determine whether
it contains sufficient facts that, when accepted as true, evidence a claim that is ‘plausible on its
face.’” Lannan Found. v. Gingold, --- F. Supp. 3d ---, 2017 WL 4857421, at *6 (D.D.C. Oct. 25,
2017) (quoting Twombly, 550 U.S. at 570). “When a plaintiff pleads factual content that allows
12
the court to draw the reasonable inference that the defendant is liable for the misconduct alleged,
then the claim has facial plausibility.” Barker v. Conroy, --- F. Supp. 3d ---, 2017 WL 4563165,
at *3 (D.D.C. Oct. 11, 2017). “‘The plausibility standard is not akin to a probability requirement,
but it asks for more than a sheer possibility that a defendant has acted unlawfully.’” Id. (quoting
Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009)). “A court must treat the complaint's factual allegations as true, ‘even if doubtful in fact.’” Id. (quoting Twombly, 550 U.S. at 555).
ARGUMENT
I.
This Court Has Subject-Matter Jurisdiction.
Plaintiffs have alleged sufficient injury and causation for Article III standing.
Mr. Stone contends erroneously that Plaintiffs have failed to meet the Article III injury
and causation requirements. Stone Br. 3. “To demonstrate standing, a plaintiff must show that
she has suffered an ‘injury in fact’ that is ‘fairly traceable’ to the defendant’s actions and that is
‘likely to be redressed’ by the relief she seeks.” Attias v. Carefirst, Inc., 865 F.3d 620, 625 (D.C.
Cir. 2017). Plaintiffs have met this bar.
Mr. Stone’s argument about injury fails for at least four reasons. First, it ignores many of
Plaintiffs’ alleged injuries, including lost wages, diminished capacity to find work, and medical
expenses; severe emotional distress resulting from dissemination of personal and identifying information; and resulting instances of actual identity theft (rather than merely a heightened risk),
harassment, and damage to important personal and professional relationships. See Compl. ¶¶ 1718, 49-50, 60-78. These injuries create standing and are ones that Plaintiffs’ tort claims are designed to remedy. Second, the argument about identity theft, see Stone Br. 5, is contradicted by
the D.C. Circuit’s recent holding that a heightened risk of future identity theft can serve as the
basis for standing under Article III. See Attias, 865 F.3d at 626. Third, the injury claimed by
Plaintiffs here is not limited to possible future identity theft, but includes actual identity theft.
13
See Compl. ¶¶ 17-18, 49-50; cf. SAIC, 45 F. Supp. 3d at 29. Finally, “[a]t the pleading stage,
general factual allegations of injury resulting from the defendant’s conduct may suffice.” Lujan
v. Defenders of Wildlife, 504 U.S. 555, 561 (1992); see also Attias, 865 F.3d at 626.
Mr. Stone’s causation argument is just a merits argument disguised as a jurisdictional
one. Stone Br. 3; id. at 6 (“Stone is not connected to a conspiracy to hack or publish.”). It is also
meritless. “Article III standing does not require that the defendant be the most immediate cause,
or even a proximate cause, of the plaintiffs’ injuries; it requires only that those injuries be ‘fairly
traceable’ to the defendant.” Attias, 865 F.3d at 629. Here, Plaintiffs allege that Mr. Stone was
part of a conspiracy to disseminate hacked information and that this conspiracy directly resulted
in Plaintiffs’ injuries. Their injuries are “fairly traceable” to Mr. Stone.
This Court has diversity jurisdiction over Plaintiffs’ state-law claims.
Defendants do not challenge the diversity of the parties but question whether each Plaintiff satisfies the amount-in-controversy requirement. Stone Br. 9; Campaign Br. 8-9. When ruling
on a motion to dismiss under 28 U.S.C. § 1332, the Court must dismiss “only if it appears to a
legal certainty that the amount in controversy barrier cannot be breached.” Rosenboro v. Kim,
994 F.2d 13, 19 (D.C. Cir. 1993). Courts therefore must “be very confident that a party cannot
recover the jurisdictional amount before dismissing the case for want of jurisdiction.” Id. at 17.
Furthermore, in addition to concrete or easily quantifiable damages, “inherently nebulous
unliquidated damage claims” are included in calculating the amount in controversy. Rosenboro,
994 F.2d at 19; see also Compton v. Alpha Kappa Alpha Sorority, Inc., 64 F. Supp. 3d 1, 14-15
(D.D.C. 2014), aff’d, 639 F. App’x 3 (D.C. Cir. 2016).
Here, each Plaintiff has alleged economic and non-economic injuries that exceed the
$75,000 threshold. Mr. Cockrum alleges that he has been the target of identity theft, which requires constant effort and vigilance on his part, and has caused substantial stress and anxiety.
14
Compl. ¶¶ 17, 61-64. Mr. Schoenberg’s experience has been substantially similar. Compl. ¶¶ 18,
65-68. Mr. Comer has incurred significant medical expenses, lost wages, reputational harm, severe emotional distress, anxiety, and depression. Compl. ¶¶ 19, 69-77. Furthermore, Plaintiffs
have requested punitive damages, which must be included in the amount-in-controversy analysis.
See Compl. ¶¶ 230, 239, 251, Prayer for Relief; James v. Lusby, 499 F.2d 488, 493 (D.C. Cir.
1974). Given the outrageous and malicious nature of Defendants’ alleged conduct, punitive damages could easily exceed $75,000 per plaintiff. Compl. ¶ 58. In short, there is no basis to find
with legal certainty that Plaintiffs cannot satisfy the amount-in-controversy requirement.5
This Court also has supplemental jurisdiction over the state-law claims.
Even without diversity jurisdiction, the Court still would have supplemental jurisdiction
over Plaintiff’s state-law claims because those claims “form part of the same case or controversy” as a claim over which the federal court may exercise original jurisdiction under Article III.
28 U.S.C. § 1367(a). Defendants accept that the state and federal claims form part of the same
case or controversy and do not question that they derive from a common nucleus of operative
fact—namely, the conspiracy among Defendants and others to disseminate stolen information.
Rather, Defendants suggest in passing that the Court should exercise its discretion to decline jurisdiction over the state claims. But Defendants fail to show that state issues substantially predominate or raise complex issues of state law.
Courts consider whether state issues substantially predominate “in terms of proof, of the
scope of the issues raised, or of the comprehensiveness of the remedy sought.” United Mine
Workers of Am. v. Gibbs, 383 U.S. 715, 726 (1966). Here, state law issues do not predominate.
5
Even if this Court found that only one Plaintiff met the $75,000 threshold, it still could exercise
supplemental jurisdiction over all of Plaintiffs’ claims. See Exxon Mobil Corp. v. Allapattah
Servs., Inc., 545 U.S. 546 (2005).
15
Plaintiffs’ state and federal claims all depend on showing that there was a conspiracy between
Defendants and others to disseminate information stolen from the DNC. Moreover, the relief
sought is the same and includes both compensatory and punitive damages. The factors Defendants point to—the order in which the counts appear in the Complaint and a phrase on a website
intended to explain the case to interested non-lawyers, see Campaign Br. 9—have no relevance
to the analysis. Accordingly, Defendants cannot show that the state-law claims “each require different elements of proof than the federal claims” or are marked by near-total “legal and factual
separation from the federal claims.” Wisey’s #1 LLC v. Nimellis Pizzeria LLC, 952 F. Supp. 2d
184, 193 (D.D.C. 2013) (declining to exercise supplemental jurisdiction).
Nor have Defendants provided any reason to think that “the state law claims are more
complex or require more judicial resources to adjudicate or are more salient in the case as a
whole than the federal law claims.” Diven v. Amalgamated Transit Union International & Local
689, 38 F.3d 598, 602 (D.C. Cir. 1994). The state-law claims do not raise “novel or complex issue[s] of state law.” 28 U.S.C. § 1367(c)(1); see Campaign Br. 9. “As a general matter, common
law contract and tort claims do not present novel or complex questions of state law.” Wright &
Miller § 3567.3. Defendants offer no reason to think that these common-law tort claims are particularly complex or that adjudicating the state-law claims will require more judicial resources
than adjudicating the federal claim. Nor are the state-law claims somehow “more salient” than
the federal claim: Plaintiffs’ claims under § 1985(3) go directly to the conspiracy at the heart of
all claims in this case. In sum, the state law claims do not “predominate” and there is no reason
to decline to exercise supplemental jurisdiction over those claims.
II.
This Court Has Personal Jurisdiction Over Defendants and Is a Proper Venue.
In this case, a successful presidential campaign (of all things) asserts that it would be un-
reasonable to expect it to respond and litigate in Washington, D.C. (of all places). It is a remark16
able notion, and an incorrect one. Defendants conspired in D.C. with people who hacked servers
in D.C. to release Plaintiffs’ personal information from D.C. to the world, predictably causing
harm in D.C. to Mr. Comer’s professional reputation and to all Plaintiffs’ ability to support candidates for office. The Trump Campaign’s raison d’etre, Mr. Trump, lives, works, and directs the
Campaign’s affairs in D.C. And many of the witnesses and much of the evidence on which Plaintiffs’ claims rely are in D.C. Yet Defendants protest that they cannot be haled into court here.
As explained below, personal jurisdiction is proper under two independently sufficient
theories of specific jurisdiction. The Campaign is also subject to the general jurisdiction of this
forum because it is temporarily at home in D.C. Defendants’ argument is inconsistent with the
purposes of the doctrines governing personal jurisdiction and venue, and it relies on a crabbed
reading of the relevant legal standard as well as of Plaintiffs’ Complaint and the harms that it alleges. Personal jurisdiction is about “traditional notions of fair play and substantial justice.” Int’l
Shoe Co. v. State of Wash., Office of Unemployment Comp. & Placement, 326 U.S. 310, 316
(1945). For that reason, “there are no mechanical tests or talismanic formulations for determining
personal jurisdiction, and the facts of each case must be weighed against the notions of fairness,
reasonableness, and substantial justice.” Jacobsen v. Oliver, 201 F. Supp. 2d 93, 104 (D.D.C.
2002) (Huvelle, J.). The Campaign successfully placed its candidate on ballots in D.C. both in
the primary elections and in the general election, voluntarily participating in a civic process in
D.C. and asking residents of D.C. to let Mr. Trump represent them. The Campaign can hardly
protest that it has done nothing to make itself accountable in a place where it voluntarily availed
itself of the political process.6 Personal jurisdiction here is fair and this Court is a proper venue.
6
Yes, it follows from this last point that most presidential campaigns would be subject to personal jurisdiction in every state. But a candidate for President of the United States, seeking votes
in every state, can hardly argue that there are some states to which s/he has no connection.
17
This Court may exercise specific personal jurisdiction over Defendants.
Specific jurisdiction requires a “relationship among the defendant, the forum, and the litigation.” Walden v. Fiore, 134 S. Ct. 1115, 1126 (2014). The defendant must have purposefully
established contacts with the forum, and the claims brought in the forum must “arise out of or
relate to” those contacts. Burger King Corp. v. Rudzewicz, 471 U.S. 462, 472 (1985).
“[C]ontacts” fall into two broad categories: (1) actions within the forum, and (2) actions outside
the forum that cause effects within the forum. A claim “arises out of” those contacts whenever
“the claim [is] related to or substantially connected with . . . activity in the District . . . , that is
. . . [where] it ha[s] . . . some ‘discernible relationship’ to [that] activity.” Shoppers Food Warehouse v. Moreno, 746 A.2d 320, 335 (D.C. 2000).
Specific personal jurisdiction over the Defendants exists here because (1) Defendants’ actions in the District (and those of their co-conspirators) gave rise to Plaintiffs’ claims; and (2)
Defendants’ actions foreseeably caused harm in the District, which is the basis for the claims.7
1.
Plaintiffs’ claims arise from Defendants’ conduct in D.C.
This Court may exercise personal jurisdiction over Defendants because their conduct in
the District gave rise to Plaintiffs’ claims. Under the D.C. long-arm statute, a court may exercise
jurisdiction over a person “as to a claim for relief arising from the person . . . transacting any
business in the District of Columbia.” D.C. Code § 13-423(a)(1). The reach of this provision is
coextensive with that of the Due Process Clause. Shoppers Food Warehouse, 746 A.2d at 333.
7
Plaintiffs believe that the allegations in the Complaint are sufficient to establish that this Court
may exercise personal jurisdiction over Defendants. If the Court disagrees, Plaintiffs should be
allowed to take jurisdictional discovery. See, e.g., Alkanani v. Aegis Defense Servs., LLC, 976 F.
Supp. 2d 13, 22 (D.D.C. 2014) (in assessing the question of personal jurisdiction, “[t]he court
need not confine itself to the allegations in the complaint as with other motions to dismiss; rather, it can consider materials outside of the pleadings, including declarations and evidence produced during the course of jurisdictional discovery”); GTE New Media Servs. Inc. v. BellSouth
Corp., 199 F.3d 1343, 1351 (D.C. Cir. 2000).
18
The Campaign does not contest that it transacted business in D.C., but it claims that
Plaintiffs’ claims do not arise from that transaction of business. See Campaign Br. 13. However,
“the District of Columbia Court of Appeals interpreted the phrase ‘arise from’ broadly and established a ‘flexible’ nexus test to determine when claims can be said to ‘arise from’ contacts with
the forum.” Jacobsen, 201 F. Supp. 2d at 105. A claim “arise[s] from” contacts with the forum
whenever it bears some “discernible relationship” to those contacts. Shoppers Food Warehouse,
756 A.2d at 335. Here, Defendants’ had extensive contacts with the forum that bear a substantial
relationship to the formation of the conspiracy out of which Plaintiffs’ claims arise. To wit:
•
The Campaign’s foreign policy team, which managed and directed the interactions
with Russia, was based in D.C. Compl. ¶¶ 35-37. Then-Senator Sessions, who chaired
the team, worked in D.C., as did other campaign foreign policy advisors. Id.
•
Defendants negotiated the conspiracy in part through meetings with their coconspirators held in D.C. See, e.g., Compl. ¶ 95 (meeting with Campaign’s nationalsecurity advisors, including Papadopoulos, at Trump International Hotel in D.C.); id.
¶ 96 (meeting between Trump, Kushner, Sessions, and Kislyak at the Mayflower Hotel in D.C.); id. ¶ 154 (meetings between Flynn and Kislyak in D.C.).
•
They negotiated the conspiracy in part through communications during which at least
one party was in D.C. See, e.g., id. ¶ 92 (Manafort call to Kislyak, whose office is in
D.C.).
•
They attempted to cover their tracks from within D.C. See, e.g., id. ¶ 188 (Hope
Hicks, in D.C., denies Campaign contacts with Russians); id. ¶ 192 (Sarah Huckabee
Sanders, in D.C., does same); id. ¶ 203 (Trump, in D.C., tweets that he “do[es]n’t
know Putin”); id. ¶ 204 (Trump, in DC, holds press conference in which he denies
anything to do with Russia); id. ¶ 216 (Stone, in DC, gives speech denying connections to Russia); id. ¶ 218 (Trump, at dinner in DC, pressures former FBI Director
James Comey to drop investigation into Campaign contacts with Russia); id. ¶ 219
(Trump, in D.C., fires Comey and meets with Kislyak and Sergey Lavrov).
These activities in D.C. are at the heart of the conspiracy from which Plaintiffs’ claims arise.8
8
As a general matter, the Campaign directed much of its conduct towards D.C. and conducted a
substantial amount of business in D.C. For example, “Trump[’s] campaign had successfully petitioned for him to appear on the ballot in the [D.C.] in order for him to stand for election in
[D.C.].” Compl. ¶ 31; see also id. ¶¶ 36-37 (discussing Campaign activity in D.C.). The Cam19
Although the precise moment when Defendants finalized their illegal agreement is unknown, that moment is also irrelevant. Complicated deals take time. And a court in this District
has upheld specific jurisdiction where a “conspiracy allegedly came to its inception” in D.C.,
even though it did not come to its conclusion here. Dooley v. United Techs. Corp., 786 F. Supp.
65, 72 (D.D.C. 1992), abrogated on other grounds by FC Inv. Grp. LC v. IFX Markets, Ltd., 529
F.3d 1087 (D.C. Cir. 2008). Plaintiffs’ claims arose from the Defendants’ ongoing course of conspiratorial conduct in D.C. and, therefore, specific jurisdiction over them is proper. It is more
than coincidence that the Special Counsel has empaneled a grand jury in D.C., Compl. ¶ 85, and
initiated proceeding against Mr. Manafort, Mr. Flynn, and Mr. Papadopoulos in this District.
Even putting aside Defendants’ own conduct in D.C., this Court may exercise jurisdiction
over Defendants because their co-conspirators acted here, and those actions gave rise to Plaintiffs’ claims. Under this approach—known as the “conspiracy theory” of personal jurisdiction—
Section 13-423(a)(1) of the D.C. long-arm statute (and the Due Process Clause) are satisfied because “[p]ersons who enter the forum and engage in conspiratorial acts are deemed to ‘transact
business’ there ‘directly’; coconspirators who never enter the forum are deemed to ‘transact
business’ there ‘by an agent.’” Second Amendment Found. v. U.S. Conference of Mayors, 274
F.3d 521, 523 (D.C. Cir. 2001); see also Edmond v. U.S. Postal Serv. Gen. Counsel, 949 F.2d
415, 424-25 (D.C. Cir. 1991) (applying another provision of the D.C. long-arm statute).
In this regard, an additional critical component of the conspiracy took place in D.C.,
where Russian hackers gained access to servers and stole DNC emails. Compl. ¶ 86. Although
paign undertook this activity to elect Trump President (a position headquartered in D.C.)—the
same purpose that motivated the conspiracy. Under the nexus test, the claims in this case bear
more than a discernible relationship to the Campaign’s contact with this forum. But even if Defendants’ general contacts with D.C. were insufficient to warrant personal jurisdiction, their contacts specifically related to the conspiracy are more than adequate, as discussed above.
20
Plaintiffs do not seek to hold Defendants directly liable for hacking the DNC servers in D.C.,
that act is a part of the conspiracy and so relevant to Plaintiffs’ claims. Co-conspirators can be
liable for acts that took place before they joined the conspiracy. See, e.g., United States v.
Bridgeman, 523 F. 2d 1099, 1108 (D.C. Cir. 1975) (“An individual who joins an already formed
conspiracy knowing of its unlawful purpose may be held responsible for acts done in furtherance
of the conspiracy both prior to and subsequent to his joinder.”). Plaintiffs allege that Defendants
conspired with people who hacked servers located in D.C., and the claims in this case arise from
that hack. That is enough to support personal jurisdiction over Defendants in this District.9
2.
Defendants caused harm in D.C.
This Court may also exercise specific personal jurisdiction over Defendants because their
actions foreseeably caused harm in D.C., and that harm is the basis of Plaintiffs’ claims. First,
Defendants harmed Mr. Comer’s professional reputation in D.C. Second, Defendants harmed
Plaintiffs’ ability to support their preferred candidates for elected office, and D.C. was the locus
of Plaintiffs’ political advocacy.
Under D.C. Code § 13-423(a)(4), D.C. courts may exercise personal jurisdiction over defendants who cause tortious injury in the District if they also have other minimum contacts within the District. Due process requires that the tortious injury be caused by conduct that was purposely directed at the forum. Walden, 134 S. Ct. at 1123-24. Defendants concede that they have
the other minimum contacts necessary to support jurisdiction under Section (a)(4) and so are left
to contend that the Complaint does not allege tortious injury in the District. They are wrong.
Mr. Comer pleads a harm to his professional reputation in D.C. Defendants argue that
9
Because Plaintiffs plausibly allege that Mr. Stone was part of the conspiracy, this Court has
personal jurisdiction over him. And Mr. Stone was in D.C. on multiple occasions during the relevant time period. Compl. ¶ 41.
21
this “is not good enough” because the professional harms that Mr. Comer suffered in this district
arose from information whose revelation, Defendants contend, is not tortious. Campaign Br. 1011. According to Defendants, “[t]he only alleged tort here is the disclosure of information suggesting Comer’s sexual orientation.” Id. at 11. That is false. Mr. Comer alleges that his professional reputation has been injured by the wrongful disclosure of many of his private communications. See, e.g., Compl. ¶ 72 (“Mr. Comer’s working environment deteriorated rapidly after his
emails’ release”); id. ¶ 74 (“After being marginalized at work as a result of the publication of his
hacked emails, Mr. Comer determined that he was required to leave his job.”); id. ¶ 75 (describing threatening phone calls to Mr. Comer’s office in D.C.). Defendants’ contention that disclosure of private “gossip” cannot form the basis of a tort action, Campaign Br. 11, is also wrong
(and, in any event, goes to the merits of Mr. Comer’s claims rather than personal jurisdiction).
See infra Part III.C.1.c. Mr. Comer was harmed in D.C., and Defendants may be compelled to
answer for that harm here.
And Defendants ignore Plaintiffs’ claims under 42 U.S.C. § 1985(3), which allege a distinct, D.C.-centered harm. Plaintiffs sent emails to and from the DNC for the purpose of organizing in support of their preferred candidate for President. The DNC, headquartered in D.C., was
the locus of the Plaintiffs’ political action. Plaintiffs therefore suffered harm to their D.C.focused advocacy for a political candidate, and Defendants may be sued here for that reason.
This Court may exercise general personal jurisdiction over the Campaign
because it is temporarily at home in D.C.
As described above, this Court has specific personal jurisdiction over Defendants. In addition, the Court may exercise general personal jurisdiction over the Campaign because, since
January 20, 2017, the Campaign has been controlled from D.C.
An entity may be sued on any claim whatsoever in a forum with general jurisdiction over
22
it. A court may exercise general jurisdiction over a corporation whose “affiliations with the [forum] State are so continuous and systematic as to render it essentially at home in the forum
State.” Daimler AG v. Bauman, 134 S. Ct. 746, 754 (2014). A corporation’s state of incorporation and principal place of business are the “paradigm” fora for general jurisdiction—but those
are not the exclusive fora. Jurisdiction also is proper over a foreign corporation temporarily
headquartered in the forum state. See Daimler, 134 S. Ct. at 755-56; see also Perkins v. Benguet
Consol. Mining Co., 342 U.S. 437, 448 (1952). Since January 20, 2017, the Trump Campaign
has been headquartered in D.C. The person whose reelection it exists to support lives and works
here; his staff lives here; and he directs the Campaign’s activities here. Compl. ¶ 40. Thus, this
Court may exercise general jurisdiction over the Campaign because D.C. is its “principal, if temporary, place of business.” Daimler, 134 S. Ct. at 756.
Venue is proper in this Court because a substantial portion of the acts complained of took place in D.C.
Defendants argue that venue here is improper for essentially the same reasons that they
argue the Court lacks personal jurisdiction over Defendants. They principally contend that
“Plaintiffs’ assertions that the Campaign formed, directed, or planned the conspiracy from the
District are conclusory,” and, therefore, that venue is improper here. Campaign Br. at 16. But
this contention lives and dies with the merits of the suit itself.
Given that this Court may exercise personal jurisdiction over Defendants, venue is easy.
Venue is proper in “a judicial district in which a substantial part of the events or omissions giving rise to the claim occurred.” 28 U.S.C. § 1391(b)(2). As previously discussed, a substantial
portion of the events alleged in this case took place in D.C. The emails whose disclosure is the
center of this case were sent to and from people in D.C. and stored on servers in D.C.; the conspiracy alleged in this case was formed and coordinated in part in D.C.; and the harms alleged in
23
this case happened, in part, in D.C. Proceedings related to the ongoing criminal investigation are
being held in this district. Venue is proper here.
III.
Plaintiffs Have Adequately Stated Claims for Violations of D.C. and Federal Law.
Because this Court has jurisdiction over this case, it should proceed to the merits and de-
ny Defendants’ Motions to Dismiss. Based on the allegations in the Complaint, the existence of a
conspiracy between Defendants, Russia, and WikiLeaks is not only plausible; it is probable. Not
only have Plaintiffs satisfied their burden to plausibly allege a conspiracy, but they have adequately alleged the elements of the underlying D.C. tort claims. Plaintiffs have also successfully
pleaded a cause of action under the support-and-advocacy clauses of 42 U.S.C. § 1985(3). Those
clauses make actionable conspiracies to intimidate, threaten, or injure voters because of their
support or advocacy for a candidate for federal office. Defendants’ conduct fits squarely within
the scope of conduct covered by the statute.
Plaintiffs have adequately alleged a conspiracy.
1.
Plaintiffs have satisfied the pleading standard for conspiracy.
Even at this early stage of the case, the evidence of a conspiracy is compelling. It easily
clears the standard at the motion-to-dismiss stage, which is plausibility. See Twombly, 550 U.S.
at 556; Iqbal, 556 U.S. at 678. Indeed, “[a] well-pleaded complaint may proceed even if it strikes
a savvy judge that actual proof of those facts is improbable, and that a recovery is very remote
and unlikely.” Twombly, 550 U.S. at 556. Plaintiffs’ version of events need not even be more
plausible than other possible versions. See Banneker Ventures, LLC v. Graham, 798 F.3d 1119,
1129 (D.C. Cir. 2015).
As courts in this District have recognized, “conspiracies are rarely evidenced by explicit
agreements, but nearly always must be proven through inferences that may be fairly drawn from
the behavior of the alleged conspirators.” Oxbow Carbon, 81 F. Supp. 3d at 11 (quoting Ander24
son News, 680 F.3d at 183); see also Wheeler v. United States, 977 A.2d 973, 982 n.19 (D.C.
2009) (“[T]he evidence supporting a conspiracy conviction nearly always is circumstantial because [t]here is rarely in a conspiracy case direct evidence of the conspiracy or proof of declarations.” (second alteration in original)).
The Complaint’s allegations easily support such inferences. Defendants argue that Plaintiffs’ allegations are “implausible” because they do not clearly identify the members of the conspiracy and precisely how the hacking and dissemination of the stolen information occurred.
Stone Br. 20; see also Campaign Br. 36. But Plaintiffs need not identify a “specific time, place,
or person involved in [an] alleged conspiracy” nor “when and where the illicit agreement took
place.” Oxbow Carbon, 81 F. Supp. 3d at 12. Furthermore, while Plaintiffs have plausibly alleged that the conspiracy between Defendants and their co-conspirators explicitly included the
dissemination of the stolen emails, that is not a prerequisite to liability. Whatever the precise
contours of the agreement, Defendants are liable for acts taken in furtherance of the conspiracy,
whether or not they actively participated in them or even knew about them. See Halberstam v.
Welch, 705 F.2d 472, 481 (D.C. Cir. 1983). In short, Plaintiffs need only plead “enough facts to
raise a reasonable expectation that discovery will reveal evidence of illegal agreement.”
Twombly, 550 U.S. at 556.
The allegations in this case do considerably more than that: some of those allegations,
such as the existence of meetings premised specifically on Russian offers to help the Campaign
by damaging Mr. Trump’s opponent and the Campaign’s response proposing timing for release
of that information, are damning. But even if the allegations were weaker, a claim of conspiracy
should not be dismissed if it does not present direct evidence of the illegal agreement.
Examples of circumstantial evidence supporting a plausible inference of conspiracy in-
25
clude “parallel behavior that would probably not result from chance, coincidence, independent
responses to common stimuli, or mere interdependence unaided by an advance understanding
among the parties.” Twombly, 550 U.S. at 556 n.4. Conspiracies may be inferred through “allegations of interdependent conduct, accompanied by circumstantial evidence and plus factors,”
which may include (but are not limited to): “(1) a common motive to conspire; (2) evidence that
shows that the parallel acts were against the apparent individual economic self-interest of the alleged conspirators; and (3) evidence of a high level of inter[party] communications.” Gelboim v.
Bank of Am. Corp., 823 F.3d 759, 781 (2d Cir. 2016).
Here, Plaintiffs have assembled an abundance of specific factual allegations showing that
Defendants’ actions bear all the hallmarks of conspiracy that courts look for at the pleading
stage. These facts go far beyond mere “labels and conclusions” or “formulaic recitation[s] of the
elements of a cause of action.” Twombly, 550 U.S. at 555. They support the allegation that Defendants engaged in a conspiracy to disseminate information stolen by Russian agents. They are
not “merely consistent with” liability, as Defendants claim. Stone Br. 22. Rather, they are
paradigmatic of the types of facts that courts look for in order to establish evidence of an illegal
agreement: motive to act together, opportunity to reach agreement in the form of repeated
communications between the co-conspirators, mutual benefit, and a cover up. Furthermore, many
of the actions of Defendants and their co-conspirators are difficult to explain absent a conspiracy.
An inference of conspiracy arises from the following facts, among others: The Trump
Campaign assembled a team of staff and advisors with an astonishing number of close and
longstanding ties to Russia. Compl. ¶¶ 102-118. Those ties extended to the very top of the Campaign—to Chairman Paul Manafort, id. ¶¶ 112-114, 127; to Trump’s closest family members and
confidants, id. ¶¶ 107, 112, 118; and to Mr. Trump himself, id. ¶¶ 103-111. Campaign agents and
26
associates had frequent contact with Russian operatives and with WikiLeaks during the months
before the election, much of it occurring before WikiLeaks released the emails on July 22, 2016
(contrary to what Defendants claim, see Campaign Br. at 36). See, e.g., Compl. ¶ 89 (describing
contact between Trump Campaign and Russian intelligence operatives in late 2015 and early
2016); id. ¶ 92 (calls and emails from April to November 2016); id. ¶ 95 (meeting of nationalsecurity advisory committee on March 31, 2016); id. ¶ 96 (April 27, 2016 meeting between Mr.
Trump, Mr. Kushner, Mr. Sessions, and Mr. Kislyak); id. ¶ 97 (May 2016 meeting between Mr.
Manafort and Mr. Kilimnik); id. ¶ 98 (June 9, 2016 meeting between Mr. Trump Jr., Mr. Manafort, Mr. Kushner, and Russian operatives); id. ¶ 100 (Mr. Page’s trip to Moscow in early July
2016); id. ¶ 101 (meeting with Mr. Kislyak during the Republican National Convention, on the
same day the Trump Campaign inexplicably made changes to the RNC platform favorable to
Russia and just days before the DNC emails were dumped on WikiLeaks). While the substance
of some of these contacts is unknown at this time, stolen emails and other “dirt” on Mr. Trump’s
opponent played a central role in at least some of them. See Papadopoulos SOO ¶ 14; Compl.
¶¶ 129-133.10
Defendants’ actions immediately before and after the emails were released also strongly
indicate a conspiracy. Mr. Trump and his associates have repeatedly taken steps to benefit Rus10
Plaintiffs have adequately pled that the agreement between Defendants and their coconspirators encompassed dissemination of the stolen emails. However, Defendants would be
liable for that dissemination even in the case of a more general agreement—e.g., for Russia to
help elect Trump in exchange for concessions and policy benefits—that did not turn on dissemination of the emails. That is because of the well-established rule that a member of a conspiracy is
liable for the tortious acts of his co-conspirators. See, e.g., Halberstam, 705 F.2d at 481 (“[O]nce
the conspiracy has been formed, all its members are liable for injuries caused by acts pursuant to
or in furtherance of the conspiracy. A conspirator need not participate actively in or benefit from
the wrongful action in order to be found liable. He need not even have planned or known about
the injurious action.”); de Lupis v. Bonino, No. 07-cv-1372, 2010 WL 1328813, at *10 (D.D.C.
Mar. 31, 2010) (“A conspiracy claim spreads liability for a successful tort claim to all parties to
the conspiracy regardless of w[h]ether they actually committed the underlying tortious act.”).
27
sia. Compl. ¶¶ 146-159. Mr. Stone communicated with the hacker who claimed credit for the
DNC hack, openly bragged about his connections to WikiLeaks and Mr. Assange, and correctly
predicted future releases of stolen emails. Id. ¶¶ 162-164, 170-178. Rather than condemn Russia
for interfering in our election, Mr. Trump and his associates did not hesitate to use the leaked
information to their advantage and even called on Russia to engage in further cyberattacks, id.
¶¶ 166-169, all while lying repeatedly about their relationships with Russia and contacts with
Russian actors, id. ¶¶ 183-205; Papadopoulos SOO ¶¶ 1-2; 22-33; Flynn SOO ¶¶ 1-4, and denying that Russia had anything to do with the DNC hack, in the face of overwhelming evidence to
the contrary, id. ¶¶ 206-216.
Given the facts in the Complaint, the existence of the conspiracy is far more than plausible. Indeed, it explains Defendants’ otherwise baffling behavior remarkably well. Courts allow
claims of conspiracy to proceed on far less. See, e.g., Oxbow Carbon, 81 F. Supp. 3d at 11;
United States ex rel. Sansbury v. LB & B Assocs., Inc., 58 F. Supp. 3d 37 (D.D.C. 2014); Friends
Christian High Sch. v. Geneva Fin. Consultants, 39 F. Supp. 3d 58 (D.D.C. 2014).
2.
The pleading of certain facts based on information and belief is appropriate and no basis for dismissal.
Defendants are incorrect to argue that the Complaint cannot survive a motion to dismiss
because some of the allegations are pled on information and belief. See Stone Br. 23-24; Campaign Br. 35. “The Twombly plausibility standard . . . does not prevent a plaintiff from pleading
facts alleged upon information and belief where the facts are peculiarly within the possession and
control of the defendant, or where the belief is based on factual information that makes the inference of culpability plausible.” Evangelou v. D.C., 901 F. Supp. 2d 159, 170 (D.D.C. 2012); accord Kvech v. Holder, 2011 WL 4369452, at *3 n.7 (D.D.C. 2011). As Wright & Miller explain:
[P]ermitting allegations on information and belief is a practical necessity. How
else can a pleader avoid the appearance of perjury when he is without direct per28
sonal knowledge regarding one or more of the allegations necessary to his claim
and therefore must plead on a less certain footing? Pleading on information and
belief is a desirable and essential expedient when matters that are necessary to
complete the statement of a claim are not within the knowledge of the plaintiff but
he has sufficient data to justify interposing an allegation on the subject.
Wright & Miller § 1224 (internal citations omitted).
Here, the facts that Plaintiffs plead on information and belief are based on accounts by respected media outlets or can reasonably be inferred from other facts in the Complaint. All such
allegations are based on information of the type that is necessarily within Defendants’ possession—in particular, details about the conspiracy’s formation and implementation, including the
content of meetings and communications between Defendants and their co-conspirators.
Defendants seem to argue that Plaintiffs must provide citations to the exact articles, intelligence reports, and other publicly available sources that were relied upon in making claims on
information and belief. Plaintiffs could certainly provide this information, but Defendants fail to
provide any case law to support such a requirement for pleading on information and belief—and
no such requirement exists. Defendants’ cases are inapposite. In Robinson v. Cartinhour, this
Court rejected an allegation pled on information and belief not because the plaintiff failed to
identify the specific basis for his belief, but because he “provide[d] scant basis that would ‘allow[] the [C]ourt to draw the reasonable inference that [any particular] defendant is liable for the
misconduct alleged.” 867 F. Supp. 2d 37, 59 n.57 (D.D.C. 2012) (quoting Iqbal, 556 U.S. at
678). And Kowal v. MCI Communications. Corp., 16 F.3d 1271 (D.C. Cir. 1994), involved an
application of the heightened pleading standard for fraud under Federal Rule of Civil Procedure
9(b). Here, the ordinary Rule 8 pleading standard controls. See Wright & Miller § 1224.
3.
Plaintiffs have adequately pled a single conspiracy between the named
Defendants and other co-conspirators.
Defendants also argue that even if the Complaint adequately sets forth a conspiracy, they
29
cannot be liable because the Communications Decency Act (“CDA”) immunizes WikiLeaks
from liability for the acts alleged in the Complaint, Stone Br. 26-27; Campaign Br. 37, and because the intracorporate-conspiracy doctrine eliminates any claim based on conspiracy between
Stone and the Campaign, Stone Br. 23; Campaign Br. 37. These arguments rest on the fallacy
that Plaintiffs allege the existence of several separate conspiracies. See Campaign Br. 34 (describing “four theories of vicarious liability: conspiracy with Russians, conspiracy with WikiLeaks, conspiracy with Roger Stone, and aiding and abetting”). In fact, the Complaint alleges a
single conspiracy involving the named Defendants and their co-conspirators. Accordingly, neither the CDA nor the intracorporate-conspiracy doctrine presents a bar to Defendants’ liability.
a. The CDA does not immunize Defendants from liability.
Defendants argue that under CDA § 230, 47 U.S.C. § 230, WikiLeaks is immune from liability for the misconduct alleged here and that Defendants therefore could not have conspired
with WikiLeaks to commit the alleged unlawful acts. Stone Br. 23; Campaign Br. 37. But even if
WikiLeaks could be shielded from liability for the alleged acts in the Complaint,11 that does not
mean that Defendants are also immune. Even if one party to a conspiracy enjoys immunity from
suit for a particular action, “[i]t does not follow . . . that the action against the private parties accused of conspiring with the [immune party] must also be dismissed.” Dennis v. Sparks, 449 U.S.
24, 27 (1980); see de Lupis v. Bonino, No. 07-cv-1372, 2010 WL 1328813, at *9 (D.D.C. Mar.
31, 2010) (“Even when a conspiracy claim against an alleged tortfeasor is dismissed, the actions
11
Plaintiffs do not concede that WikiLeaks would be immune. Whether WikiLeaks would satisfy
the CDA test for immunity is a fact-intensive inquiry that likely would turn on whether WikiLeaks played enough of an editorial role with respect to the DNC emails to be considered a content provider rather than just a platform. See Klayman v. Zuckerberg, 753 F.3d 1354, 1358-59
(D.C. Cir. 2014). In ruling on a claim against WikiLeaks, a court would “afford a liberal reading
to a complaint” and only dismiss if, “on the face of th[e] complaint, all three prongs of [the
Klayman] test are satisfied.” Id. at 1357.
30
of that individual may still be considered in assessing whether a conspiracy claim has been adequately pled.”). Even in the context of criminal conspiracy, “[a] conspiracy prosecution may proceed even where the alleged co-conspirators are immune from prosecution.” United States v.
Oakar, 924 F.Supp. 232, 244 (D.D.C. 1996) (stating also that “[i]t is not necessary that any coconspirator be indicted or found guilty”), aff’d in part, rev’d in part, 111 F.3d 146 (D.C. Cir.
1997).12 Thus, Defendants’ plea for immunity from civil liability simply because WikiLeaks
might not incur such liability for the underlying acts is misplaced.
b. The intracorporate-conspiracy doctrine does not bar Plaintiffs’
conspiracy claim.
Defendants argue that the Campaign and Mr. Stone could not have conspired because Mr.
Stone was an agent of the Campaign at certain times during the conspiracy and a corporation
cannot conspire with its own employees. See Exec. Sandwich Shoppe, Inc. v. Carr Realty Corp.,
749 A.2d 724, 739 (D.C. 2000). This argument fails for four reasons.
First, the D.C. Court of Appeals has not adopted the intracorporate-conspiracy doctrine.
See Blakeney v. O’Donnell, 117 F. Supp. 3d 6, 15 (D.D.C. 2015); Rawlings v. Dist. of Columbia,
820 F. Supp. 2d 92, 104 (D.D.C. 2011).
Second, courts in this Circuit have been hesitant to extend the intracorporate-conspiracy
doctrine beyond its original purpose of “shield[ing] corporations and their employees from conspiracy liability for routine, collaborative business decisions that are later alleged to be discriminatory.” Kenley v. Dist. of Columbia, 83 F. Supp. 3d 20, 33 (D.D.C. 2015). For example, the
12
The D.C. Circuit has declined to adopt the “rule of consistency” for criminal conspiracy cases,
meaning that even the acquittal of all other co-defendants in a conspiracy case does not shield the
remaining defendant from liability for the conspiracy in this District. See United States v. Dakins, 872 F.2d 1061, 1065–66 (D.C. Cir. 1989). Thus, the possibility that WikiLeaks might be
shielded from civil liability for the acts alleged here even while Defendants could be held liable—while arguably an instance of “inconsistency”—would be of far less concern than the “inconsistencies” that this Circuit allows in the context of criminal conspiracy.
31
D.C. Circuit has reserved judgment on the question of whether the doctrine applies to claims under 42 U.S.C. § 1985, see Bowie v. Maddox, 642 F.3d 1122, 1130 (D.C. Cir. 2011), and district
courts have declined to apply the doctrine in cases under 42 U.S.C. § 1983, see, e.g., Kenley, 83
F. Supp. 3d at 33-34. More generally, courts in this District have questioned the doctrine’s applicability to cases challenging conduct that “cannot be fairly characterized as involving routine
business decisions.” Id. at 32-33. Conspiring with Russian agents to disseminate information stolen from the DNC cannot be deemed a “routine business decision” of a presidential campaign,
and the intracorporate-conspiracy doctrine does not apply.
Third, even if the doctrine applied to situations like this, it would not bar Plaintiffs’ conspiracy claim, because Mr. Stone was not a Campaign employee during much of the relevant
time. See Compl. ¶¶ 6, 41. For the doctrine to apply, “the individual defendants must have been
acting within the scope of their shared employment.” Rawlings 820 F. Supp. 2d at 104.
Fourth, even if Mr. Stone and the Campaign were found to have constituted a single legal
entity throughout the entire conspiracy, the doctrine still would not bar Plaintiffs’ conspiracy
claim, because the Complaint alleges that the conspiracy involved other individuals and entities,
including Russians and WikiLeaks. United States ex rel. Scollick v. Narula, 215 F. Supp. 3d 26,
44-45 (D.D.C. 2016) (refusing to apply intracorporate-conspiracy doctrine where the alleged
conspiracy involved actors other than the corporation and its employee).
4.
Aiding and abetting tort liability has been recognized by the D.C. Circuit and has been adequately pled by Plaintiffs.
Defendants address their aiding and abetting arguments to the wrong court. Halberstam
predicted that the D.C. Court of Appeals would approve of aiding and abetting tort liability. See
705 F.2d 472, 479 (D.C. Cir. 1983). “[A]nd in the absence of an opinion from the D.C. Court of
Appeals plainly contradicting Halberstam, this [C]ourt must apply Circuit precedent.” EIG En-
32
ergy Fund XIV, L.P. v. Petroleo Brasileiro S.A., 246 F. Supp. 3d 52, 88 (D.D.C. 2017).
Neither Sundberg v. TTR Realty, LLC nor Flax v. Schertler contradicts Halberstam. EIG
Energy, 246 F. Supp. 3d at 87-88. All Flax holds is that it is not negligent for an attorney to fail
to raise an aiding and abetting claim. See 935 A.2d 1091, 1107-08 (D.C. 2007). And Sundberg—
which rejects the application of aiding and abetting liability to a statutory cause of action because
it was not proper for a court to expand the statute, see 109 A.3d 1123, 1129-30 (D.C. 2015)—is
inapposite to common-law tort claims that do not rest on statutes in the first place.
Plaintiffs have pleaded the elements of aiding and abetting—that is, that “(1) the party
whom the defendant[s] aid[ed] . . . perform[ed] a wrongful act that cause[d] an injury; (2) the
defendant[s] [were] generally aware of [their] role as part of an overall illegal or tortious activity
at the time that [they] provide[d] the assistance; (3) the defendant[s] . . . knowingly and substantially assist[ed] the principal violation.” Halberstam, 705 F.2d at 477. Russian intelligence
hacked and disseminated emails containing Plaintiffs’ private information. At the very least, Defendants had a “general awareness” of their role in the continuing enterprise, thereby satisfying
the second element for aiding and abetting. See id. at 487-88; Compl. ¶¶ 128-29, 169-81, 224-25,
232-33. Finally, Defendants knowingly provided substantial assistance over a sustained period
by (i) incentivizing the Russians to disseminate the information through the promise of a proRussian foreign policy, Compl. ¶¶ 138-59, (ii) providing strategic and technical assistance to
maximize the public impact of the disclosures, Compl. ¶¶ 119-22, 128-139, 161-65, 169-81, and
(iii) helping to cover up the conspiracy, Compl. ¶¶ 182-222, see Halberstam, 705 F.2d at 488
(noting duration of activity as well as role in cover-up); id. at 482 (explaining that encouraging
illegal activity can constitute substantial assistance).
This Court should apply D.C. law.
A federal court sitting in diversity applies the choice-of-law rules of the forum in which it
33
sits. Klaxon Co. v. Stentor Elec. Mfg. Co., 313 U.S. 487, 496 (1941). D.C. courts apply “a modified governmental interests analysis which seeks to identify the jurisdiction with the most significant relationship to the dispute.” Washkoviak v. Student Loan Mktg. Ass’n, 900 A.2d 168, 180
(D.C. 2006). That analysis begins by asking whether there is a choice of law to make—that is,
whether the potentially applicable laws differ. DAG Enters., Inc. v. Exxon Mobil Corp., No. 00cv-182-CKK, 2001 WL 34778782, at *2 (D.D.C. Sept. 30, 2001). If they do, and if more than
one jurisdiction has a potential interest in having its law applied, GEICO v. Fetisoff, 958 F.2d
1137, 1141 (D.C. Cir. 1992), D.C. courts
evaluate the governmental policies underlying the applicable laws and determine
which jurisdiction’s policy would be more advanced by the application of its law
to the facts of the case under review . . . . As part of this analysis, [courts] also
consider the four factors enumerated in the Restatement (Second) of Conflict of
Laws § 145:
a) the place where the injury occurred;
b) the place where the conduct causing the injury occurred;
c) the domicile, residence, nationality, place of incorporation and place of
business of the parties; and
d) the place where the relationship is centered.
Washkoviak, 900 A.2d at 180.
Under this analysis, D.C. law applies. Defendants wrongly argue that “the District has no
stake in whether plaintiffs . . . receive redress for the alleged violation of their privacy.” Campaign Br. 19. D.C. has a strong interest in preventing people from acting tortiously within its
borders and from causing harm within its borders. See Parnigoni v. St. Columba’s Nursery Sch.,
681 F. Supp. 2d 1, 12-13 (D.D.C. 2010). Imagine if the private information at issue were stolen
from a safe, rather than servers, within D.C. Could Defendants seriously argue that D.C. has no
interest in the case because the documents belonged to someone from Tennessee? D.C. has an
interest in making sure that private information stored within its borders stays private. It has an
interest in making sure that people who work in D.C. and whose professional lives are in D.C.
34
can keep private information private. And D.C.—at least as much as any other jurisdiction in the
country—has an interest in ensuring that political organizing within its borders can proceed undeterred by conspiracies to suppress it. D.C. has a strong interest in applying its law to this case.
Of the remaining factors that D.C. courts consider, all but one favors the application of
D.C. law: the injury (in part) occurred in D.C., see supra Part II.A.2; the Defendants conspired in
D.C., see supra Part II.A.1; and the relationship between the parties centered on the emails
hacked from D.C. Defendants then are left to rest on the fact that, at the time of the suit, they
were not domiciled in D.C. That alone is insufficient, and so this Court should apply D.C. law.
Even if D.C. law did not apply, the logical law to apply would be that of Plaintiffs’ domiciles—Maryland, Tennessee, or New Jersey—a possibility that Defendants ignore. See Crane v.
Carr, 814 F.2d 758, 760 (D.C. Cir. 1987); Pearce v. E.F. Hutton Grp., Inc., 664 F. Supp. 1490,
1498 (D.D.C. 1987).13 Those states also recognize the tort of public disclosure of private facts, so
this Court need not make a choice of law among D.C., Maryland, New Jersey, or Tennessee, because the questions relevant to this motion would be decided identically in each jurisdiction. See,
e.g., DAG Enters., 2001 WL 34778782, at *2.
Defendants contend that New York law should govern this dispute because the Campaign
is permanently headquartered in New York, some of Defendants’ conspiratorial meetings took
place there, and Stone rents an apartment there. But New York has the weakest claim, as its only
plausible interest is in protecting its domiciliaries from liability for revealing private facts. It
cannot assert that interest when, as here, the private facts were taken from beyond its borders.
New York cannot immunize its domiciliaries from being subject to the laws of other states, as
Defendants claim. Finally, even if a balance of the interests of the various states were a close
13
These cases are not in tension with Plaintiffs’ argument that Defendants may be haled into
court here because they caused harm here. Defendants also caused harm where Plaintiffs live.
35
call—and it is not—this Court should then apply D.C. law. See In re APA Assessment Fee Litig.,
766 F.3d 39, 55 (D.C. Cir. 2014) (“Faced with a conflict between jurisdictions, with neither jurisdiction’s law favored by the Restatement factors . . . the law of the forum state govern[s].”).
The Complaint states plausible claims for public disclosure of private facts.
“The District of Columbia has long recognized the common law tort of invasion of privacy,” which “‘represents a vindication of the right of private personality and emotional security.’”
Vassiliades v. Garfinckel’s, Brooks Bros., Miller & Rhoades, Inc., 492 A.2d 580, 587 (D.C.
1985). One form of that tort, known as “public disclosure of private facts,” provides:
One who gives publicity to a matter concerning the private life of another is subject to liability to the other for invasion of his privacy, if the matter published is of
a kind that (a) would be highly offensive to a reasonable person, and (b) is not of
legitimate concern to the public.
Wolf v. Regardie, 553 A.2d 1213, 1220 (D.C. 1989) (quoting RESTATEMENT (SECOND) OF TORTS
(“RESTATEMENT”) § 652D). While Defendants may wish that the private-facts tort were “dead”
and “waiting only . . . to be formally interred,” Campaign Br. 21, it has in fact been accepted in
an ever-growing list of jurisdictions that now includes at least forty states.14 And dispositively,
the private-facts tort clearly remains alive and potent in the District of Columbia. See, e.g.,
Loumiet v. United States, 255 F. Supp. 3d 75, 100 (D.D.C. 2017) (holding that complaint alleging disclosure of amount of legal fees charged to client stated plausible private-facts claim).
In a passage of key significance here, the Restatement explains that the private-facts tort
protects against the offensive public disclosure of the “intimate details of [one’s] life”:
Every individual has some phases of his life and his activities and some facts
about himself that he does not expose to the public eye, but keeps entirely to him14
By 2010, forty states had explicitly recognized private-facts claims, and most followed
Prosser’s conception of the tort as embodied in the Restatement. Jared A. Wilkerson, Battle for
the Disclosure Tort, 49 CAL. W. L. REV. 231, 266-67 (2013) (observing that courts have “increasingly adopted the tort over time” despite scholarly criticism).
36
self or at most reveals only to his family or to close friends. Sexual relations, for
example, are normally entirely private matters, as are family quarrels, many unpleasant or disgraceful or humiliating illnesses, most intimate personal letters,
most details of a man’s life in his home, and some of his past history that he
would rather forget. When these intimate details of his life are spread before the
public gaze in a manner highly offensive to the ordinary reasonable man, there is
an actionable invasion of his privacy, unless the matter is one of legitimate public
interest.
RESTATEMENT § 652D, cmt. b.
The private-facts tort implements these privacy concerns by requiring proof of “five constituent elements: (1) publicity, (2) absent any waiver or privilege, (3) given to private facts (4)
in which the public has no legitimate concern (5) and which would be highly offensive to a reasonable person of ordinary sensibilities.” Wolf, 553 A.2d at 1220.
Defendants do not contest the first two but assert that the Complaint fails to adequately
allege the third, fourth, and fifth. They are mistaken. As to each element, the Complaint alleges
far more than enough to “nudg[e] [Plaintiffs’] claims” of [invasion of privacy] ‘across the line
from conceivable to plausible.’” Iqbal, 556 U.S. at 680 (quoting Twombly, 550 U.S. at 570).
1.
The Complaint sufficiently alleges that the facts in question were private.
The Complaint sufficiently pleads that the publicity was “given to private facts.” Wolf,
553 A.2d at 1220. The Complaint alleges in detail that the hacked emails “contain[ed] private
facts about Plaintiffs and others, including information regarding sexual orientation, personal
health matters, social security numbers, credit cards, personal relationships, banking relationships, home addresses, and telephone numbers.” Compl. ¶¶ 228, 236, 246.
More specifically, the Complaint alleges that four types of private fact were publicized:
(1) Personal-identification information that Mr. Schoenberg and Mr. Cockrum
were required to provide in order to obtain Secret Service clearance to attend
an event. That information included Mr. Schoenberg’s social security number,
date of birth, home address, phone number, and banking relationship, id. ¶¶ 8,
18, 50; and Mr. Cockrum’s social security number, date of birth, address, and
37
phone number, id. ¶¶ 8, 17, 49;
(2) Facts revealing Mr. Comer’s sexual orientation, which he had not disclosed
to several members of his close-knit family, including his grandparents, because “[he] knew that his grandparents viewed homosexuality as inconsistent
with their deeply held religious beliefs,” Compl. ¶¶ 5, 19, 51, 69-70;
(3) Statements regarding personal and professional relationships, including
Mr. Comer’s conflicts with coworkers and collaborators, id. ¶¶ 19, 43, and his
colloquial references to other gay individuals, made to friends without animus
or disrespect, which were taken out of context and thus caused him to be
falsely labeled as homophobic and racist, id. ¶ 73;
(4) Mr. Comer’s health-related information—in particular, an email graphically
describing his physical condition while suffering from an illness, id. ¶ 52.
a.
Mr. Cockrum’s and Mr. Schoenberg’s identification information was private.
Defendants assert that Mr. Cockrum’s and Mr. Schoenberg’s identification information
was not private because it was not “embarrassing.” Campaign Br. 30; Stone Br. 30-31. They are
wrong.15 “In this age of identity theft and other wrongful conduct through the unauthorized use
of electronically-stored data,” the D.C. Court of Appeals has had “little difficulty agreeing that
conduct giving rise to unauthorized viewing of personal information such as a plaintiff’s social
security number and other identifying information can constitute an intrusion that is highly offensive to any reasonable person, and may support an action for invasion of privacy (irrespective
of whether the plaintiff alleges that economic or other resultant injuries have already come to
pass).” Randolph v. ING Life Ins. & Annuity Co., 973 A.2d 702, 710 (D.C. 2009).16
15
Defendants’ non-D.C. cases stating that identification information is not private fail to consider the substantial privacy harms from publication of this type of information and, in any event,
do not state the law of this jurisdiction. See Campaign Br. 30.
16
Cf. Danai v. Canal Square Assocs., 862 A.2d 395, 400 n.4 (D.C. 2004) (explaining that “examining a plaintiff’s private bank account” and “other invasions of that nature” may constitute
tortious invasion of privacy); Wemhoff v. D.C., 887 A.2d 1004, 1009 (D.C. 2005) (enforcing
statute that prevents DMV from disclosing an individual’s social security number, name, address, telephone number, and medical or disability information).
38
Social security numbers, in particular, are “broadly recognized as confidential information” because they “facilitate access by others to many of our most personal and private records and can enable someone to impersonate us to our embarrassment or financial loss.” Bodah
v. Lakeville Motor Express, Inc., 649 N.W.2d 859, 862 (Minn. Ct. App. 2002), rev’d on other
grounds, 663 N.W.2d 550 (Minn. 2003). Accordingly, “[i]n all of the settings where these numbers are available . . . the entities with that information and their employees are bound by contractual and legal constraints to hold our social security numbers in confidence. Given the very
sensitive and important nature of the social security numbers, these constraints are important to a
functioning society.” 649 N.W. 2d at 863. Individuals “have a privacy interest in their home addresses and phone numbers” as well. Benz v. Washington Newspaper Pub. Co., No. 05-cv-1760EGS, 2006 WL 2844896, at *8 (D.D.C. Sept. 29, 2006).
b.
Mr. Comer’s sexual orientation was private regardless of his
prior disclosures to his parents and to close friends and colleagues.
Facts concerning one’s sex life or sexual orientation provide the paradigmatic example of
private facts whose unauthorized disclosure gives rise to tort liability. As the Restatement observes, “[e]very individual has some phases of his life and his activities and some facts about
himself that he does not expose to the public eye, but keeps entirely to himself or at most reveals
only to his family or to close friends. Sexual relations, for example, are normally entirely private
matters.” RESTATEMENT § 652D, cmt. b. The Restatement does not distinguish between heterosexual and same-sex relations—both are private and protected by the private-facts tort.
Disclosure of facts supporting an inference of homosexuality—as occurred here—can
give rise to private-facts liability. For example, in Greenwood v. Taft, Stettinius & Hollister, 663
N.E.2d 1030 (Ohio Ct. App. 1995), the appeals court reversed the dismissal of a private-facts
claim that the plaintiff’s employer had improperly disclosed his sexual orientation by sharing,
39
with persons who had no reason to see it, a form listing the plaintiff’s male partner as the beneficiary of his insurance and pension plans.17 The court reasoned that “[i]t [could] be inferred from
this listing that Greenwood is a gay male. If Greenwood had chosen to keep his sexual orientation private, and the firm’s alleged disclosure ‘outed’ him, a reasonable person may well have
been offended by this disclosure.” Id. at 1035.18
Defendants assert that the facts concerning Mr. Comer’s sexuality are not private because
Mr. Comer came out to his parents and certain close friends and colleagues. See Compl. ¶ 5;
Campaign Br. 28; Stone Br. 29. But private facts do not become public merely because they are
shared with family or close colleagues, or in contexts where confidentiality is reasonably expected. After all, “the claim of a right of privacy is not so much one of total secrecy as it is of the
right to define one’s circle of intimacy—to choose who shall see beneath the quotidian mask.”
M.G. v. Time Warner, Inc., 107 Cal. Rptr. 2d 504, 511 (Cal. Ct. App. 2001) (emphasis in original). Accordingly, “[d]isclosing a fact to a small number of confidants does not equate to making
the information public.” Stratton v Krywko, Nos. 248669 & 248676, 2005 WL 27522, at *5
(Mich. Ct. App. 2005) (per curiam); see RESTATEMENT § 652D, cmt. b. (private facts include
those about sexual relations, that the plaintiff “at most reveals only to his family or to close
17
See also Diaz v. Oakland Tribune, Inc., 188 Cal. Rptr. 762, 766 (Cal. Ct. App. 1983) (liability
for publicizing plaintiff’s transsexual status); Simpson v. Burrows, 90 F. Supp. 2d 1108, 1125 (D.
Or. 2000) (tortious to expose plaintiff’s sexual orientation in a small community); Karraker v.
Rent-A-Center, Inc., 239 F. Supp. 2d 828, 838-39 (C.D. Ill. 2003) (tortious to disseminate confidential profile disclosing plaintiff’s sexual orientation); Foretich v. Lifetime Cable, 777 F. Supp.
47, 50 (D.D.C. 1991) (denying summary judgment where alleged facts showed that child plaintiff “had what appear to be very intimate details about her personal life”—namely, specific facts
about being sexually abused by her father—“broadcast around the globe,” and would “have to
live for many years with whatever consequences that broadcast may have caused, good or ill”).
18
The defendant in Greenwood did not “dispute the fact that sexual orientation is a private fact.”
Id. at 1035.
40
friends”).19
An example from the D.C. Court of Appeals confirms that D.C. law allows a plaintiff to
define the circle with which to share private personal information. In Vassiliades, the plaintiff
“offered evidence that, after agonizing over losing her youthful appearance and contemplating
plastic surgery for many years, she underwent plastic surgery and kept her surgery secret, telling
only family and very intimate friends.” 492 A.2d at 587. Her surgeon took photos of her before
and after her facelift. She understood that these photographs “were being taken as part of the
doctor’s regular routine for use with other patients.” Id. at 585. Months later, however, the surgeon made a presentation in a department store and a related television appearance in which he
briefly displayed the photos. Despite the plaintiff’s having consented to being photographed in
the first place, despite her disclosures about the surgery to family and friends, and despite the
fact that a facelift is the one of the most intentionally public of all medical procedures—it changes a person’s face, after all—the D.C. Court of Appeals had no difficulty concluding that the
plaintiff “was entitled to expect [that] photographs of her surgery would not be publicized without her consent.” Id. at 586-87.20 Vassiliades thus demonstrates just how seriously the District of
19
The Campaign cites Weiss v. Lehman, 713 F. Supp. 489, 504 (D.D.C. 1989), for the proposition that “if a plaintiff reveals ‘intimate facts’ to work colleagues, those facts are no longer private.” Campaign Br. 28. But the Weiss court merely concluded—after a full bench trial and as a
factual matter “determined on a case by case basis”—that the counterclaimant had shared (unspecified) intimate facts about her childhood with real-estate joint-venture co-investors (not
“work colleagues”) without harboring any “expectation” that the co-investors would “not divulge
[the facts] publicly.” 713 F. Supp. at 504.
20
See also Y.G. v. Jewish Hosp. of St. Louis, 795 S.W.2d 488, 500, 503 (Mo. Ct. App. E.D.
1990) (holding that attending a gathering of in vitro parents under assurances that it would not be
open to the public did not constitute ‘‘an appearance in a public place so as to subject appellants
to publicity,” as they “clearly chose” to disclose their status only to other attenders); Zieve v.
Hairston, 598 S.E.2d 25, 30-31 (Ga. Ct. App. 2004) (affirming private-torts verdict where plaintiff told immediate family members about his hair-replacement treatments, which were then publicly revealed by defendant’s use of plaintiff’s before-and-after photos in advertising); Multimedia WMAZ, Inc. v. Kubach, 443 S.E.2d 491, 494 (Ga. Ct. App. 1994) (holding that plaintiff’s
41
Columbia takes the principle that a claim of the right of privacy is “not so much one of total secrecy as it is of the right to define one’s circle of intimacy.” Time Warner, 107 Cal. Rptr. 2d at
511, see also RESTATEMENT § 652D, cmt. c, illus. 11.
This right to define one’s circle of intimacy is most flagrantly and irreparably violated
when private facts are disclosed to the entire world, forever, on the Internet—a scenario more
extreme than any the American Law Institute (ALI) could have contemplated in 1977 when it
described a private fact as being (among other things) one that a person “reveals only to his family or to close friends.” RESTATEMENT § 652D, cmt. b.21 The effect of such a disclosure is at once
global and permanent. Before the disclosure, Mr. Comer could choose whether to disclose his
sexual orientation to existing or new acquaintances, including work colleagues. But now and for
the rest of his life, that information has been placed beyond his control, available to every one of
the billions of people around the world with Internet access. It is therefore beyond perverse that
the Campaign cites publication on the Internet as a ground for dismissing Mr. Comer’s privatefacts claim. Campaign Br. 25 (calling the Internet “the modern equivalent of a street”).
Understanding the right protected by the public disclosure tort as a right to define one’s
own circle of intimacy also makes clear the flaw in Defendants’ argument that homosexuality is
now so universally accepted that being gay is no longer a private fact. Campaign Br. 29; Stone
AIDS status did not become public merely because he disclosed it to family, friends, medical
personnel, and members of his support group, where defendant’s unauthorized disclosure then
spread that information to an entire urban television viewing area); Doe v. City of N.Y., 15 F.3d
264, 269 (2d Cir. 1994) (holding that plaintiff adequately alleged private facts by alleging that he
signed agreement with city agency settling AIDS-discrimination claims while under the belief
that the parties and the agency had agreed to protect his identity).
21
In 1977, the ALI’s vision of worst-case tortious scenarios included “publication in a newspaper or a magazine . . . or in a handbill distributed to a large number of persons, or any broadcast
over the radio, or statement made in an address to a large audience.” RESTATEMENT § 652D, cmt.
a. The global distribution and permanent availability of the WikiLeaks dump at issue here makes
the present scenario infinitely more damaging.
42
Br. 30. Defendants fail to cite a single private-facts case that supports that argument. Instead,
they cite two defamation decisions stating that a false ascription of homosexuality can no longer
be regarded as “libelous per se”—i.e., so obviously harmful to reputation that the law will presume damage. Campaign Br. 29 (citing Albright v. Morton, 321 F. Supp. 2d 130, 138 (D. Mass.
2004), aff’d on other grounds, 410 F.3d 69 (1st Cir. 2005); and Yonaty v. Mincolla, 945 N.Y.S2d
774 (N.Y. App. Div. 2012)). That proposition is doubly irrelevant. First, even if publicizing a
person’s sexuality is not defamatory per se, it can be damaging in particular cases: Mr. Comer
seeks the opportunity to prove his damages, not a ruling that he is automatically damaged as a
matter of law. Second, the issue here is whether information about an individual’s sex life (including sexual orientation) is private, not whether a false ascription of homosexuality is defamatory. A fact is private if it is one that a person “does not expose to the public eye.” See RESTATEMENT
§ 652D, cmt. b. For many people, sexual orientation is just such a fact, and unre-
markably so. After all, the category of private facts normally and paradigmatically includes information about an individual’s sex life regardless of sexual orientation. See RESTATEMENT
§ 652D, cmt. b. A court in this District has held, for example, that private-facts liability can arise
from disclosure of a straight woman’s dating relationships. See Benz, 2006 WL 2844896, at *7.
By contrast, a false statement is libelous per se only if its publication would expose a person to “public hatred, shame, obloquy, contumely, odium, contempt, ridicule, aversion, ostracism, degradation or disgrace, or to induce an evil opinion of [a person] in the minds of rightthinking persons.” Yonaty, 945 N.Y.S.2d at 776. Heterosexual dating relationships, like same-sex
ones, are neither shameful nor disgraceful—but they are private. No case restricts private-facts
liability to the small and extreme category of statements that constitute libel per se.
Defendants also cite the allegation that, shortly before the first WikiLeaks dump, Mr.
43
Comer was named the DNC’s LGBT Finance Chair. Compl. ¶ 34. But not all fundraisers who
work with the gay community are themselves gay. And the Complaint does not allege (1) whether or to whom Mr. Comer publicized his new responsibility, (2) that his grandparents knew that
he had become LGBT Finance Chair, or (3) that his grandparents even knew what “LGBT”
meant. Factual questions like these cannot be resolved on a motion to dismiss.
Finally, Mr. Stone argues that facts suggesting Mr. Comer’s sexual orientation were not
private because they were contained in work emails in which he had no reasonable expectation
of privacy. Stone Br. 31. But Mr. Stone relies on inapposite cases concerning an employee’s expectation of privacy vis-a-vis his employer—not vis-a-vis a completely unauthorized third party.
c. Mr. Comer’s statements about his personal and business relationships were private.
Private communication about an interoffice quarrel or interoffice gossip is also within the
scope of the public disclosure of private facts tort. A provision of the federal Privacy Act of
1974, 5 U.S.C. § 552a(b), provides a useful analogy, as it was “designed to prevent [disclosure
of] the office gossip [and] interoffice and interbureau leaks of information about persons of interest in the agency or community, or such actions as the publicizing of information of a sensational or salacious nature or . . . detrimental to character or reputation.” Pippinger v. Rubin, 129
F.3d 519, 529 (10th Cir. 1997) (quoting legislative history). Few among us would wish to see
their least charitable remark about a work colleague splashed across the Internet. The potential to
ruin work relationships and suffer a catastrophic career setback is clear. That is in fact what happened to Mr. Comer. See Compl. ¶¶ 72-74.
d. Mr. Comer’s embarrassing health-related information was
private.
The Restatement recognizes that facts about “disgraceful or humiliating illnesses” are
private and fall within the scope of the private-facts tort. RESTATEMENT § 652D, cmt. b. Indeed,
44
“there are few matters that are quite so personal as the status of one’s health, and few matters the
dissemination of which one would prefer to maintain greater control over.” Doe v. City of New
York, 15 F.3d 264, 267 (2d Cir. 1994). Thus, Mr. Comer’s graphic and embarrassing description
of his illness while at work was private.
2.
The Complaint sufficiently alleges that the private facts were not matters of legitimate public concern.
Plaintiffs also adequately allege that the disclosed facts are ones “in which the public has
no legitimate concern.” Wolf, 553 A.2d at 1220. This element reflects the principle that “[t]he
conflict between the public’s right to information and the individual’s right to privacy requires a
balancing of the competing interests. In D.C. the right of privacy stands on a high ground, cognate to the values and concerns protected by constitutional guarantees.” Vassiliades, 492 A.2d at
589.
Here, that balance tilts decidedly in favor of privacy. The Complaint alleges that “[n]one
of the private information about Plaintiffs . . . that was disclosed was newsworthy or involved
any public policy matter at issue in the campaign.” Compl. ¶ 21; see also id. ¶¶ 55-59, 227. As a
matter of law, and in light of the other facts pleaded, that allegation is both sufficient and well
supported. None of the Plaintiffs is a public figure. And even if Plaintiffs were public figures,
“the privilege to publicize matters of legitimate public interest is not absolute. . . . Certain private
facts about a person should never be publicized, even if the facts concern matters which are, or
relate to persons who are, of legitimate public interest.” Vassiliades, 492 A.2d at 589.
Defendants argue at length about whether other information revealed through the conspiracy was newsworthy. But they cannot prevail on this element by articulating a general connection between the private facts that they conspired to publicize and some broader issue of possible public concern—for instance, the public’s interest in understanding the inner workings of
45
the Democratic Party. See Campaign Br. 24-26. Instead, there must be a connection between the
substance of the fact publicized and the matter on which the public has a right to be informed.
Gilbert v. Med. Econ. Co., 665 F.2d 305, 308 (10th Cir. 1981). “[T]o properly balance freedom
of the press against the right of privacy, every private fact disclosed in an otherwise truthful,
newsworthy publication must have some substantial relevance to a matter of legitimate public
interest.” Id. In Vassiliades, for example, the D.C. Court of Appeals held that, although plastic
surgery in general may be a matter of legitimate public interest, there was no “logical nexus” between that subject and the defendant surgeon’s unauthorized public disclosure of “before and
after” photos of the plaintiff’s plastic surgery. “Publication of her photographs [strengthened neither] the impact nor the credibility of the [surgeon’s public] presentations nor otherwise enhanced the public’s general awareness of the issues and facts concerning plastic surgery. . . .
[Those] presentations could have been just as informative by using either photographs of other
patients or photographs from medical textbooks.” 492 A.2d at 589-90.22 The court concluded that
“[t]he ‘logical nexus’ that courts have relied upon in determining that no liability exists where a
matter of legitimate public interest is concerned—here, the nexus between the subject matter and
Mrs. Vassiliades’ photographs—is missing.” Id. at 590; see Stratton, 2005 WL 27522, at *7.
Here, likewise, no discussion of the election or any other public issue could have been
made more credible or informative by the disclosure of (1) Mr. Comer’s sexual orientation,
health issues, or squabbles with colleagues, or (2) Mr. Cockrum’s and Mr. Schoenberg’s personal-identification information. As in Vassiliades, the requisite “logical nexus” is missing.
22
See Foretich, 777 F. Supp. at 50 (“The Court acknowledges that the sexual abuse of children is
an issue worthy of public attention, but it does not believe, as a matter of law, that the specific
facts about the alleged abuse of this one particular child . . . as described by the child on the videotape in question are of legitimate public concern.”); Hawkins v. Multimedia, Inc., 344 S.E.2d
145, 146 (S.C. 1986) (holding that jury could find teenage father’s specific identity private even
though report on teenage pregnancies was newsworthy).
46
The Campaign cites three inapposite and out-of-jurisdiction cases to argue that judges
should not second-guess fine-grained editorial judgments about the importance of a private fact
to establishing the credibility of a journalistic work, and likewise should not impose such exacting “nexus” requirements that a journalistic story is delayed until it is no longer newsworthy.
Campaign Br. 23. Even if these cases governed in this jurisdiction, they would not be on point.
For example, Alvarado involved the publication of the identities of two police officers accused
of sexual assault. See 493 F.3d at 1220-21. Whatever the wisdom of the publication of that information, there is an obvious logical nexus between the news story and the published information.
Moreover, the concern with second-guessing the editorial judgments of journalists who
are carefully sifting information or crafting narratives for the public has nothing to do with Defendants’ conduct. Defendants were not exercising editorial care. They simply participated in a
conspiracy to dump tens of thousands of private emails onto the Internet. Indeed, they (mistakenly) assert non-liability on the claim that they did not review the emails at all. Campaign Br. 27;
Stone Br. 28; see infra Part III.C.4. Even now, they cannot articulate a logical nexus between the
disclosed private facts and some other matter that could excuse the conduct of the conspiracy.
And the case they cite for their undue-delay point cautions that publishers “should take precautions to avoid unwarranted public disclosure and embarrassment of innocent individuals who
may be involved in otherwise newsworthy events of legitimate public interest”—precautions the
Defendants never took. Star-Telegram, Inc. v. Doe, 915 S.W.2d 471, 474 (Tex. 1995).
Defendants’ public-concern arguments boil down to the contention that if an email account belonging to a person who is not a public figure contains a few emails that are relevant to
the public, then there can be no liability for the unauthorized release of the contents of the entire
47
account. But that is not the law. If accepted, Defendants’ arguments would defy the protection
offered by D.C. privacy law and create perverse incentives to engage in large-scale political espionage during important elections. Defendants assert that no private-facts liability can arise because the emails (1) were work emails sent or received by political operatives during a presidential campaign, (2) concerned the inner workings and the donor and media relationships of the
Democratic Party, (3) were published just before the Democratic National Convention, (4) were
published on the Internet, (5) were motivated by the desire to help the Trump Campaign and
harm the Clinton Campaign, and (6) “made headlines.” Campaign Br. 24-26. But these characterizations are not relevant to the question of whether Plaintiffs’ private information was worthy
of public disclosure. In fact, Plaintiffs’ private information did not make headlines and was of no
legitimate interest to the public. Defendants conspired to dump thousands of stolen emails on the
Internet. A rule that immunized them from liability because a small portion of those emails contained information of arguable public concern would simply encourage future privacy-violators
to violate as many people’s privacy as possible: if you dump an enormous amount of information, surely something in there will be of public concern. In an Internet-based world, such a
rule offers little protection for privacy at all, and it is not the law in this District.
3.
The Complaint sufficiently alleges that publication of the private facts
would have been highly offensive to a reasonable person of ordinary
sensibilities.
Plaintiffs also meet the fifth element of the private-facts tort: the improper disclosures
“would be highly offensive to a reasonable person of ordinary sensibilities.” Wolf, 553 A.2d at
1220. The “highly offensive” standard is easier to meet than the outrageousness standard for
awarding punitive damages or for finding liability for intentional infliction of emotional distress.
48
See Vassiliades, 492 A.2d at 588, 593.23
When evaluating offensiveness, “[t]he protection afforded to the plaintiff’s interest in his
privacy must be [judged] relative to the customs of the time and place, to the occupation of the
plaintiff and to the habits of his neighbors and fellow citizens.” RESTATEMENT § 652D, cmt. c.
Accordingly, the issue whether the disclosure was “highly offensive to a reasonable person” is “a
factual question usually given to the jury to determine.” Vassiliades, 492 A.2d at 588; see also
Wolf, 553 A.2d at 1219 (offensiveness of privacy invasion “is usually the province of the jury”).
Rarely, if ever, will this be an issue capable of being determined on a motion to dismiss.
Any reasonable person would find it highly offensive to learn that his private communications were disclosed to the world through the collaboration of an American presidential campaign and a hostile foreign power. Even without that context, the disclosures meet the “highly
offensive” standard due to their personal nature. “‘[H]ighly offensive’ matters generally relate to
the intimate details of a person’s life, sexual relations, and other personal matters.” Paige v. U.S.
Drug Enf’t Admin., 818 F. Supp. 2d 4, 17 (D.D.C. 2010) (applying cognate Florida law), aff’d,
665 F.3d 1355 (D.C. Cir. 2012).24 Thus, disclosure of sexual orientation potentially satisfies the
requirement of offending a reasonable person.25 Likewise, the “unauthorized viewing of personal
information such as a plaintiff’s social security number and other identifying information can
constitute an intrusion that is highly offensive to any reasonable person, and may support an ac23
Under D.C. law, the outrageousness necessary to prove intentional infliction of emotional distress is sufficiently elevated that it automatically opens the door to punitive damages. See Sere v.
Grp. Hospitalization, Inc., 443 A.2d 33, 37-38 (D.C. 1982); see Oliver v. Mustafa, 929 A.2d 873,
878 n.2 (D.C. 2007) (same). Plaintiffs believe that heightened standard is satisfied in this case.
24
See Benz, 2006 WL 2844896, at *7 (holding that publication in widely distributed newspaper
of names of people whom plaintiff had dated and with whom she had had sexual relations could
cause “suffering, shame or humiliation to a person of ordinary sensibilities”).
25
See, e.g., Greenwood, 663 N.E.2d at 1035; Simpson, 90 F. Supp. 2d at 1125; Karraker, 239 F.
Supp. 2d at 838-39.
49
tion for invasion of privacy (irrespective of whether the plaintiff alleges that economic or other
resultant injuries have already come to pass).” Randolph, 973 A.2d at 710.26 And the disclosure
of home addresses and phone numbers may be highly offensive, depending on the factual context. Benz, 2006 WL 2844896, at *8. Here, where those disclosures allegedly facilitated identity
theft, the offense is quite real and legally cognizable.
4.
The private-facts tort does not require proof that Defendants specifically intended to disclose Plaintiffs’ private facts.
Defendants erroneously assert that the private-facts tort contains a specific-intent element
that, as applied here, would require proof that Defendants committed their wrongful acts with
actual knowledge that the massive data dump of hacked DNC emails contained the specific private facts at issue in this lawsuit. Campaign Br. 27; Stone Br. 28. This intent element would effectively exempt mass disclosures of private communications from liability as long as the defendant refrained from reading any individual communication.
Fortunately, no such requirement exists. The sole case cited by Defendants held only that
“‘[t]he tort [of invasion of privacy] cannot be committed by unintended conduct amounting
merely to lack of due care.’” Randolph, 973 A.2d at 711 (brackets in original). The harm the
Plaintiffs suffered did not come about through “unintended conduct.” If Defendants had accidentally dumped private emails on the internet by mistakenly hitting the wrong keys on their
computer keyboards, they would have a defense. But that is not what happened. Defendants’
conspiratorial actions were entirely purposeful.
Defendants likewise fail to cite any case supporting their contention that the First
26
See also Bodah, 649 N.W.2d at 862-63; Lambert v. Hartmann, 898 N.E.2d 67, 73-74 (Ohio
App. 2008) (per curiam) (reversing dismissal of private-facts claim and holding that county
clerk’s website publication of traffic ticket showing plaintiff’s name, signature, home address,
birth date, driver’s license number, and social security number met all elements of the tort), rev’d
on other grounds, 927 N.E.2d 585 (Ohio 2010).
50
Amendment imposes the same specific-intent requirement. First Amendment protection is
“baked into” the private-facts tort by operation of its public-concern (or “lack of newsworthiness”) element, which balances the right of privacy against the public’s right to information. No
case holds that this built-in protection is constitutionally inadequate.
The Complaint states plausible claims for intentional infliction of emotional
distress.
The Complaint contains sufficient allegations as to the elements of the intentional infliction tort, as set forth in the proposed D.C. standard jury instruction:
(1) that Defendant engaged in conduct that was extreme and outrageous;
(2) that Defendant intended to cause Plaintiff emotional distress; or that Defendant acted with reckless disregard of whether the conduct would cause Plaintiff
to suffer emotional distress; and
(3) that Defendant’s conduct caused Plaintiff to suffer severe emotional distress.
. . . In order for you to find Defendant’s conduct to be extreme and outrageous,
you must find that conduct to be so outrageous in character and so extreme in degree as to go beyond all possible bounds of decency and to be regarded as atrocious and intolerable in a civilized society.
Standardized Civil Jury Instructions for the District of Columbia (“D.C. Instructions”) § 25.05.
1.
The Complaint sufficiently alleges that defendants’ alleged conduct
was extreme and outrageous.
According to the Restatement, “extreme” connotes unusualness while “outrageous” connotes malice or turpitude. RESTATEMENT (THIRD) OF TORTS (“RESTATEMENT THIRD”) § 46, cmt.
d (2012). “The fact that an act is unlawful,” though not dispositive, “is relevant in determining
whether it is an actionable transgression for purposes of” emotional-distress liability. Clemente v.
State, 206 P.3d 249, 255 n.3 (Or. 2009).
Here, Defendants conspired with Russian agents and others to undermine an election and
the very foundation of our democracy—conduct that is surely malicious and highly unusual, and
51
that would rightfully arouse shock and outrage against Defendants in the District of Columbia.
The Complaint alleges that “[t]he conduct of Defendants and their co-conspirators was extreme,
outrageous, and beyond the bounds of decency.” Compl. ¶ 237. That general allegation is supported by numerous detailed paragraphs setting forth that:
•
In order to influence the 2016 presidential election, Defendants agreed with each other and with other parties, including Russian government officials and WikiLeaks, to
publicly disclose on the Internet private email communications that were stolen, or
hacked, from a political party. Id. ¶¶ 79–80, 88–139, 160–181, 220, 232.
•
In furtherance of that conspiracy, one or more co-conspirators published on the Internet tens of thousands of hacked emails. The emails were published without the slightest effort to curate or redact them to remove Plaintiffs’ private facts. Instead, the published emails contained private facts about sexual orientation, personal health, social
security numbers, credit cards, personal relationships, banking relationships, home
addresses, and telephone numbers. Id. ¶¶ 17–19, 42–45, 47, 228, 236.
In response, Defendants object that it cannot be outrageous to publish stolen private
communications if Ben Franklin and Sam Adams did the same thing in 1773. Campaign Br. 32.
That is not a strong argument. Sam Adams destroyed a lot of privately owned tea, and destruction of property is still a harm compensable in tort. The Founding Fathers also conspired to overthrow the then-existing government by force, but that would not be a useful precedent for anyone
to cite today. Mr. Trump has made clear that he is not troubled by the Russian interference in the
2016 election. But there should be no doubt that conspiring with a hostile foreign power to make
public Americans’ private emails in order to tilt an election is a great outrage, especially to Plaintiffs and other Americans who were directly affected.
Equally unavailing is Defendants’ argument that the emotional-distress tort cannot be
used to evade the public-concern (or “lack of newsworthiness”) element of the private-facts tort.
Id. at 31. That argument fails because the Complaint satisfies that element, as demonstrated
above in Part III.C.2. As explained there, the Complaint’s allegations demonstrate the absence of
52
any “logical nexus” between the wrongful disclosures and matters of legitimate public concern.
2.
The Complaint sufficiently alleges that Defendants acted with reckless
disregard as to whether their conduct would cause emotional distress.
Defendants argue that the complaint fails to state an emotional-distress cause of action
because the plaintiffs were only “collateral victim[s],” and not the directly intended targets, of
their conspiracy. Campaign Br. 32. But the emotional-distress tort merely requires proof of recklessness—a standard easily met by the mass disclosure of private communications, regardless of
whether Plaintiffs were specifically targeted. An actor “acts recklessly when the actor knows of
the risk of severe emotional harm (or knows facts that make the risk obvious) and fails to take a
precaution that would eliminate or reduce the risk even though the burden is slight relative to the
magnitude of the risk, thereby demonstrating the actor’s indifference.” RESTATEMENT THIRD
§ 46, cmt. h.
The Complaint alleges that “Defendants and their co-conspirators knew that the hacked
DNC emails were private and intended to publicly disclose the private emails.” Compl. ¶¶ 226,
234, 244. Yet the emails published to the entire world on the Internet were not redacted to remove private facts about Plaintiffs. Id. ¶ 47. Thus, “Defendants and their co-conspirators knew,
were plainly indifferent to the fact, or consciously disregarded the foreseeable risk that the
hacked DNC emails contained private facts about Plaintiffs and other individuals similarly situated, and that publication of the emails would cause Plaintiffs and others severe or extreme emotional distress.” Id. ¶ 235. These allegations easily meet the recklessness standard.
Moreover, Defendants’ intent to harm Mr. Comer is clear: he and the DNC Finance Office “were singled out for publication” for the purpose of “intimidat[ing] and deter[ring] existing
donors from further supporting the DNC’s financial efforts.” Compl. ¶¶ 16, 34; see id. ¶ 45. WikiLeaks specifically boasted that it had disclosed 3,095 of his emails on July 22, 2016. Id. ¶ 42.
53
The fact that Defendants’ conduct may not have been specifically “directed at” Mr.
Cockrum or Mr. Schoenberg in no way undermines the plausibility of the allegation that Defendants behaved at least recklessly toward them. As donors to the DNC, they were part of a class of
intended targets whom Defendants intentionally sought to “put . . . on notice that their support
and advocacy could expose them to the release of their private information.” Compl. ¶ 181; see
also id. ¶¶ 16-17, 45. And the mass dumping of private communications onto the Internet was
like shooting an arrow at random into a crowd. Even if not “directed at” a specific individual, the
arrow (or here the disclosures) were sure to result in harm to someone in the crowd—in this case,
to many in that crowd.27 “[A]dhering to a ‘directed at’ requirement in such cases would largely
nullify the recklessness element of this Section.” RESTATEMENT THIRD § 46, cmt. i, illus. 7.
3.
The Complaint sufficiently alleges that the Plaintiffs suffered severe
emotional distress.
“‘Emotional harm’ means impairment or injury to a person’s emotional tranquility.” RESTATEMENT
THIRD § 45. “Emotional harm encompasses a variety of mental states, including
fright, fear, sadness, sorrow, despondency, anxiety, humiliation, depression (and other mental
illnesses), and a host of other detrimental—from mildly unpleasant to disabling—mental conditions.” Id., cmt. a. “[T]he existence . . . and severity of emotional harm is ordinarily dependent
on self-reporting.” Id. “Severe harm must be proved, but in many cases the extreme and outrageous character of the defendant’s conduct is itself important evidence bearing on whether the
requisite degree of harm resulted.” Id., § 46, cmt. j.
27
Defendants’ “directed at” argument garners no support from Bettis v. Islamic Republic of Iran,
315 F.3d 325 (D.C. Cir. 2003), which held that the siblings of a priest abducted and tortured by
state-sponsored terrorists were entitled to an emotional-distress recovery, but that his nieces and
nephews were not. Bettis did not concern directness of intent, but directness of harm. The kidnapers did not directly harm the nieces and nephews, who were neither abducted nor tortured.
Here, Defendants directly harmed Plaintiffs by participating in a conspiracy that resulted in the
disclosure of Plaintiffs’ information.
54
Here, the Complaint specifically alleges that each of the plaintiffs suffered severe emotional distress that may not abate for the rest of their lives. Mr. Comer was “outed” to his conservative religious grandparents, testing their previously close relationship. Compl. ¶¶ 51, 69-70.
He also lost a long-term romantic relationship. Id. ¶ 71. He became marginalized and isolated at
work; saw a major event that he had eagerly anticipated organizing taken away from him and
given to other staff; and ultimately felt compelled to leave his job. Id. ¶¶ 72, 74. He suffered
harm to his reputation due to press reports calling him homophobic and racist. Id. ¶ 73. He received as many as 20 harassing phone calls per day for weeks after the publication. Many callers
threatened violence and used vile language, making him feel like a pariah. Id. ¶ 75. As a result of
all this, Mr. Comer experienced significant emotional distress, including anxiety and depression.
He incurred and continues to incur substantial medical expenses to treat the distress caused by
Defendants and their co-conspirators. Id. ¶ 77.
Mr. Cockrum received and continues to receive notices of strangers attempting to obtain
credit in his name, some successfully. Id. ¶ 62. He feared identity theft—and worse—so he directed his personal assistant to take extra precautions when admitting visitors to his office and
speaking with strangers on the phone. Id. ¶ 63. He continues to experience anxiety over actual
and potential identity theft, and especially the ability of sophisticated hackers to gain access to
his personal or business financial accounts. He feels that protecting himself, his family, and his
philanthropy will require extreme vigilance with no end in sight. Id. ¶ 64.
Mr. Schoenberg received phone calls and letters about fraudulent credit applications in
his and his wife’s names. One application resulted in the issuance of a credit card on a new account shared between his wife and a stranger. Id. ¶ 66. Mr. Schoenberg has spent countless hours
speaking with creditors and with other financial and reporting institutions to rectify the problems
55
caused by the disclosure of his social security number Id. ¶ 67. He continues to experience anxiety and fear over potential future identity theft, especially the ability of sophisticated hackers to
gain access to his financial accounts using personally identifying information that is now readily
available online. He fears that these risks will never go away. Id. ¶ 68.
D.C. tort laws protecting privacy are not unconstitutional.
On spurious constitutional grounds, the Trump Campaign asks this Court to expunge the
private-facts tort from American law and to severely limit the emotional distress tort. Campaign
Br. 39-41. The Trump Campaign may wish to be able to indiscriminately make public highly
private information about its opponents and to inflict emotional damage by doing so. But the
Campaign’s attack on these long-accepted torts has no basis in law.
1.
The torts do not violate the First Amendment.
The Campaign contends that the private-facts tort violates the First Amendment in all
cases—regardless of how pleaded or applied in any given case—because the tort limits offensive
and outrageous speech (among other things). Id. at 39-40. The Campaign urges the Court to view
this as a content-based restriction on speech. Of course it is not.
By any recognized measure, the torts at issue here are content-neutral. Neither targets any
specific viewpoint either overtly or implicitly. Each is justified by state interests “unrelated to the
content of” the defendant’s speech. Hill v. Colorado, 530 U.S. 703, 719-20 (2000). The privatefacts tort protects against the offensive public disclosure of the “intimate details of [one’s] life”
and reflects no governmental viewpoint on the content of those details. RESTATEMENT § 652D,
cmt. b. For example, facts about one’s sex life are not protected from disclosure because the
government either favors sex and wants to promote it or disapproves of sex and wants to suppress discussion of it. Rather, such facts are protected from disclosure because every person has
a recognized interest in defining her own “circle of intimacy”—the small group of people with
56
whom she shares her most personal confidences. See Time Warner, 107 Cal. Rptr. 2d at 511.
Likewise, the emotional-distress tort enforces no governmental viewpoint on any specific issue.
Instead, the tort protects against outrageous conduct that inflicts severe psychological harm on
another—and it does so without regard to the specific “viewpoint” being expressed.
The Campaign also asserts that the torts violate the First Amendment because they punish
truthful speech. But the First Amendment creates no general immunity for speech that is truthful:
much of securities law, for example, is precisely about restricting truthful speech. And when ruling in privacy cases, the Supreme Court repeatedly has declined any “invitation to hold broadly
that truthful publication may never be punished consistent with the First Amendment.” The Florida Star v. B.J.F., 491 U.S. 524, 532 (1989). Instead, “[r]especting the fact that press freedom
and privacy rights are both ‘plainly rooted in the traditions and significant concerns of our society,’” the Court has “rel[ied] on limited principles that sweep no more broadly than the appropriate context of the instant case.” Id. at 533. By contrast, the Campaign’s sweeping theory, taken to
its logical conclusion, would vitiate the right to privacy. Any intimate detail shared in a private
email, letter, or video could be published to the world with impunity under the shield of the First
Amendment, as long as the information contained therein was “truthful.” That is not the law.
Moreover, the private-facts and emotional-distress torts take due account of the public interest in truthful speech. No private-facts claim will lie for the disclosure of facts that are of legitimate public concern. See Wolf, 553 A.2d at 1220. The tort’s public-concern element involves “a
balancing of the competing interests” of “the individual’s right to privacy” and “the public’s
right to information.” Vassiliades, 492 A.2d at 589. The Campaign makes no showing that the
inquiry required by the public-concern element is less rigorous than what the First Amendment
requires. The emotional-distress tort likewise targets only conduct “so outrageous” and “ex-
57
treme” as to be “regarded as atrocious and intolerable in a civilized society.” D.C. Instructions
§ 25.05. The First Amendment properly demands that our society have a broad tolerance for unpleasant speech, but it does not mean that every atrocious utterance is protected.
The Campaign again invites error when arguing that these long-established torts are subject to strict scrutiny. As the D.C. Circuit has observed, strict scrutiny generally applies only to
limitations on speech regarding matters of public concern. See Trans Union Corp. v. FTC, 267
F.3d 1138, 1140-41 (D.C. Cir. 2001). But the public-concern element of the private-facts tort and
the extreme-and-outrageous requirement of the emotional-distress tort ensure that those torts will
not infringe upon speech of public concern.
2.
The torts are not void for vagueness
The Campaign asserts that the private-facts and emotional-distress torts are void for
vagueness in all cases and applications because their elements feature terms that lack mathematical precision—e.g., “highly offensive” and “outrageous.” Campaign Br. 40-41. But tort law routinely uses terms of this sort. So it is not surprising that no relevant precedent supports this argument. Miller v. California, 413 U.S. 15 (1973), cited by the Campaign, is easily distinguishable. The Miller majority never mentioned vagueness; and in any event, Miller involved a criminal statute. The Supreme Court has “expressed greater tolerance of [putatively vague] enactments with civil and no criminal penalties because the consequences of imprecision are qualitatively less severe.” Village of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455 U.S. 489,
498–99 (1982). In fact, the majority of the cases that the Campaign cites in support of this argument involved criminal statutes,28 and the civil cases are also distinguishable.29
28
See Coates v. Cincinnati, 402 U.S. 611, 616 (1971); Godfrey v. Georgia, 446 U.S. 420, 428-29
(1980); Reno v. ACLU, 521 U.S. 844, 873 (1997); Grayned v. City of Rockford, 408 U.S. 104,
108 (1972).
58
In the civil sphere, “regulations will be found to satisfy due process so long as they are
sufficiently specific that a reasonably prudent person, familiar with the conditions the regulations
are meant to address and the objectives the regulations are meant to achieve, would have fair
warning of what the regulations require.” United States Telecomm. Ass’n v. FCC, 825 F.3d 674,
736 (D.C. Cir. 2016). The longstanding torts at issue in this case satisfy that test.
If accepted, the Campaign’s vagueness theory would invalidate a vast range of commonlaw and statutory remedies that employ necessarily imprecise standards such as reasonableness,
materiality, and offensiveness as opposed to bright-line rules or mathematical quantities. That
theory would blast a giant hole in the web of civil protections that historically have protected
Americans against wrongdoing, and it must be rejected.
The Complaint states plausible claims that Defendants violated 42 U.S.C.
§ 1985(3).
The support-and-advocacy clauses of 42 U.S.C. § 1985(3)30 seek to protect the integrity
29
Hustler Magazine, Inc. v. Falwell, 485 U.S. 46 (1988), involved a magazine cover featuring a
parody of a Campari Liqueur advertisement that displayed the plaintiff’s name and picture and
was entitled “Jerry Falwell talks about his first time.” Id. at 48. There, the Supreme Court held
that “public figures and public officials may not recover for the tort of intentional infliction of
emotional distress by reason of publications such as the one at issue here.” Id. at 56. Plaintiffs
here were neither public figures nor public officials. Fox Television, 567 U.S. at 253–54, held
that broadcasters did not have “sufficient notice of what is prescribed” by a new FCC policy that
was applied to them retroactively. Id. at 254. By contrast, the torts at issue here have been recognized for decades and Defendants cannot claim any surprise.
30
42 U.S.C. § 1985(3) reads as follows, with the bracketed numerals added and the most relevant
portions in bold text:
If two or more persons in any State or Territory conspire or go in disguise on the highway
or on the premises of another,
[1] for the purpose of depriving, either directly or indirectly, any person or class
of persons of the equal protection of the laws, or of equal privileges and immunities under the laws; or
[2] for the purpose of preventing or hindering the constituted authorities of any
State or Territory from giving or securing to all persons within such State or Territory the equal protection of the laws; or
59
of federal elections. Plaintiffs seek damages for injuries they suffered due to actions that Defendants took as part of a conspiracy made actionable under those clauses. Defendants’ half-dozen
objections to Plaintiffs’ § 1985(3) claims lack merit.
1.
Plaintiffs need not allege state action.
The Supreme Court has made clear that § 1985(3) reaches private conspiracies as well as
conspiracies involving state actors. See Griffin v. Breckenridge, 403 U.S. 88, 101 (1971); see also Stone Br. 33 (acknowledging that § 1985(3) provides “a cause of action for damages caused
by purely private conspiracies”). Defendants argue nonetheless that Plaintiffs’ particular claim
must allege state action. Their specific contention is that claims under the support-and-advocacy
clauses are assertions of First Amendment rights, and First Amendment violations require state
action. See Stone Br. 33-34; Campaign Br. 42.
Defendants are wrong. Claims under the support-and-advocacy clauses are not simply assertions of First Amendment rights. They are freestanding statutory claims, and the statutory
clauses under which they arise have no state-action requirement. Defendants’ contrary view fails
to differentiate among the separate clauses of § 1985(3). It also misreads the case law.
if two or more persons conspire
[3] to prevent by force, intimidation, or threat, any citizen who is lawfully entitled to vote, from giving his support or advocacy in a legal manner, toward
or in favor of the election of any lawfully qualified person as an elector for
President or Vice President, or as a Member of Congress of the United
States; or
[4] to injure any citizen in person or property on account of such support or
advocacy;
in any case of conspiracy set forth in this section, if one or more persons engaged
therein do, or cause to be done, any act in furtherance of the object of such conspiracy, whereby another is injured in his person or property, or deprived of having and
exercising any right or privilege of a citizen of the United States, the party so injured or
deprived may have an action for the recovery of damages occasioned by such injury
or deprivation, against any one or more of the conspirators.
60
The first half of § 1985(3) contains four clauses specifying different kinds of actionable
conspiracies. Clause (1) covers conspiracies to deny equal protection or equal privileges and
immunities. Clause (2) covers conspiracies to hinder authorities in their attempts to enforce equal
protection. Clause (3) covers conspiracies to prevent voters from giving support or advocacy to
candidates. And clause (4) covers conspiracies to injure citizens on account of their support or
advocacy for political candidates. See 42 U.S.C. § 1985(3).
Defendants would read clauses (3) and (4) as mere vehicles for asserting predicate First
Amendment rights, rather than as independently substantive. That view fails to notice the basic
differences between clause (1), which deals with equal protection, and clauses (3) and (4), which
deal with support and advocacy. Clause (1) is a vehicle for asserting predicate rights; clauses (3)
and (4) stand on their own.
Clause (1) is expansively worded. By its terms, it applies to all conspiracies “for the purpose of depriving, either directly or indirectly, any person or class of persons of the equal protection of the laws, or of equal privileges and immunities under the laws.” 42 U.S.C. § 1985(3).
Read for all it might be worth, clause (1) could “apply to all tortious, conspiratorial interferences
with the rights of others.” Griffin, 403 U.S. at 101. Concerned that such a broad reading might
render § 1985(3) a “general federal tort law” and thus raise constitutional concerns, the Supreme
Court has imposed two narrowing constructions on clause (1). Id. at 102. The first narrowing
construction is that plaintiffs proceeding under clause (1) must show that the conspiracies they
allege were motivated by “class-based, invidiously discriminatory animus.” Id. The second narrowing construction is that clause (1) refers to predicate rights created elsewhere. See Great Am.
Fed. Sav. & Loan Ass’n v. Novotny, 442 U.S. 366, 372 (1979). This construction fits the clause’s
language, which speaks of conspiracies to deny “equal protection of the laws” and “equal privi-
61
leges and immunities under the laws”—language sensibly read to refer to the operation of substantive laws beyond § 1985(3).
Defendants would have this Court apply the second narrowing construction to clauses (3)
and (4), the support-and-advocacy clauses. But unlike clause (1), clauses (3) and (4) do not speak
generally of privileges and immunities under the laws, thus necessarily looking to rights created
by other laws. Instead, clauses (3) and (4) describe with particularity the conduct they make actionable: conspiratorial interference with federal elections. The language contains no suggestion
that the clauses rely on rights defined elsewhere. Nor does the language of clauses (3) and (4)
threaten to turn § 1985(3) into a general federal tort law. In short, none of the reasons for applying narrowing constructions to clause (1) applies to clauses (3) and (4). The Supreme Court has
accordingly pronounced the first narrowing construction inapplicable to clauses (3) and (4). Kush
v. Rutledge, 460 U.S. 719, 726 (1983) (limiting the narrowing construction to those portions of
§ 1985 that are worded in terms of equal protection). The second narrowing construction is
equally inapplicable, and for the same reasons.
Defendants’ view that claims under the support-and-advocacy clauses of § 1985(3) must
rest on predicate First Amendment rights stems from a misreading of language from Novotny and
United Brotherhood of Carpenters & Joiners of America, Local 610, AFL-CIO v. Scott, 463 U.S.
825 (1983) (“Carpenters”). See Campaign Br. 42 (quoting Novotny, 442 U.S. at 372, “Section
1985(3) provides no substantive rights itself; it merely provides a remedy for violation of the
rights it designates.”); see also Carpenters 463 U.S. at 833 (“§ 1985(3) . . . ‘provides no substanti[ve] rights itself’ to the class conspired against.” (quoting Novotny, 442 U.S. at 372)). Defendants take this language to mean that no clause of § 1985(3) provides any substantive rights.
From that premise, they reason that the statute’s support-or-advocacy clauses must be mere vehi-
62
cles for invoking preexisting First Amendment rights. See Stone Br. 33-34; Campaign Br. 42.
But Defendants’ interpretation is mistaken, because the Supreme Court’s statements about
§ 1985(3)’s not providing substantive rights refer only to clause (1). These statements have no
bearing on the support-and-advocacy clauses.
Here is the relevant language from Novotny, itself drawing on Griffin. The language Defendants quote is the last sentence of the passage, after the block quote from Griffin.
The Court’s opinion in Griffin discerned the following criteria for measuring
whether a complaint states a cause of action under § 1985(3):
“To come within the legislation a complaint must allege that the defendants did (1) ‘conspire or go in disguise on the highway or on the premises
of another’ (2) ‘for the purpose of depriving, either directly or indirectly,
any person or class of persons of the equal protection of the laws, or of
equal privileges and immunities under the laws.’ It must then assert that
one or more of the conspirators (3) did, or caused to be done, ‘any act in
furtherance of the object of [the] conspiracy,’ whereby another was (4a)
‘injured in his person of property’ or (4b) ‘deprived of having and exercising any right or privilege of a citizen of the United States.’” [Griffin,] 403
U.S., at 102-103, 91 S.Ct. at 1798-1799.
Section 1985(3) provides no substantive rights itself; it merely provides a remedy
for violation of the rights it designates.
442 U.S. at 372. The quoted language from Griffin cannot possibly describe the requirements for
causes of action under all four clauses of § 1985(3). It mentions, as criterion (2), only the conspiracies reached by the first clause, which deals with equal protection and equal privileges and
immunities. Nothing whatsoever is said about the criteria for valid complaints under the other
clauses of § 1985(3). The omission is understandable: in both Griffin and Novotny, the Court adjudicated claims under clause (1) only. So when the Novotny Court wrote, at the end of the quoted passage, that “Section 1985(3)” provides no substantive rights, it meant only that the first
clause of § 1985(3)—the only clause at issue in the case before it—provides no such rights. The
language quoted from Griffin supports no broader reading.
63
The analysis is the same for Carpenters. Relying on Novotny, the Court in Carpenters
wrote that “§ 1985(3) . . . ‘provides no substantial rights itself’ to the class conspired against.
The rights, privileges, and immunities that § 1985(3) vindicates must be found elsewhere.” Carpenters, 463 U.S. at 833 (quoting Novotny, 442 U.S. at 372). But as explained above, the quoted
language from Novotny is pertinent only to the first clause of § 1985(3), and it is clear from context that Carpenters was using it the same way. The Carpenters language says that the statute
provides no substantive rights “to the class conspired against,” and the requirement that plaintiffs
demonstrate a conspiracy that victimizes a class applies only in actions under the first clauses of
§ 1985(3). See Kush, 460 U.S. at 726. The immediately following general language of “rights,
privileges, and immunities” further echoes the language of clause (1). And of course, the Carpenters Court had before it only a claim brought under clause (1). See 463 U.S. at 827.
Defendants rely on two questionable Eighth Circuit decisions when asserting that Plaintiffs’ claims under the support-and-advocacy clauses actually rest on predicate First Amendment
rights. Federer v. Gephardt, 363 F.3d 754 (8th Cir. 2004), misread the Carpenters and Novotny
language about § 1985(3)’s not providing substantive rights as if that language applied to all of
§ 1985(3), rather than just clause (1). Federer relied on Gill v. Farm Bureau Life Insurance Co.,
906 F.2d 1265 (8th Cir. 1990), which similarly regarded a claim under the support-and-advocacy
clauses as a First Amendment claim. Id. at 1270. The opinion in Gill is exceedingly curious: its
treatment of § 1985(3) contains multiple errors, large and small and sometimes obvious. For example, Gill asserts that Carpenters “squarely held” that § 1985(3) can provide no remedy for
economic injuries, Gill, 906 F.2d at 1270—a position with no basis in Carpenters and that contradicts the statute’s plain language affording causes of action to persons “injured in his person
64
or property.”31 Gill’s view that the support-and-advocacy clauses are merely vehicles for asserting First Amendment claims is just as mistaken.32 As circuit precedent, Gill was binding on the
panel that decided Federer. But no court outside the Eighth Circuit has ever cited Gill, and for
good reason: it makes a mess of § 1985(3).
Unlike the first two clauses of § 1985(3), then, the support-and-advocacy clauses have
substantive content that does not depend on rights established elsewhere. Those clauses make
actionable specified sorts of conspiracies—conspiracies to prevent, or to retaliate for, support or
advocacy given to candidates for federal office. The cause of action does not depend on an underlying First Amendment right, and no state action is required.
2.
Plaintiffs adequately allege conspiratorial purpose.
The Campaign argues that the Complaint fails “to allege that the Campaign entered into
the conspiracy for the purpose of preventing or injuring voters—rather than for the purpose of
convincing voters to choose Mr. Trump over Secretary Clinton.” Campaign Br. 43. Similarly,
Mr. Stone argues that the Complaint actually alleges “a larger conspiratorial purpose, elect Donald Trump and defeat Hillary Clinton.” Stone Br. 35. These arguments fail on their own terms.
Of course Mr. Stone and the Trump Campaign acted with the purpose of winning the election for
Mr. Trump. In pursuit of that end, they undertook the acts alleged in the Complaint with the purpose of impeding voters from giving support to Secretary Clinton. To conclude that defendants
did not conspire for the purposes specified in § 1985(3) because their purpose could also be described in terms of making Mr. Trump the President “is akin to saying that a bank robber lacks
31
The closest Carpenters came to such a holding was its statement that animus on the basis of
economic views did not qualify as class-based animus. 463 U.S. at 838.
32
The Gill opinion also consistently mislabels § 1985(3) as “§ 1985(c)” and describes § 1985 as
less “familiar” than 42 U.S.C. § 1983—a statutory provision that really is just a vehicle for the
assertion of rights created by other sources of law. Gill, 906 F.2d at 1266.
65
mens rea and thus cannot be convicted because his ultimate objective was to make money, not to
commit robbery.” Libertad v. Welch, 53 F.3d 428, 446 (1st Cir. 1995).
Plaintiffs adequately allege Defendants’ purpose. The conspiracy aimed to prevent, by intimidation or threat, donors and potential donors from giving concrete financial support to Mr.
Trump’s opponent. By publicizing the email communications of key members of the DNC finance team, the conspirators demonstrated that anyone communicating electronically with those
finance personnel was at risk of having those communications made public, along with sensitive
information like credit-card numbers, bank-account numbers, and social security numbers.
Threatening a loss of privacy and potential identity theft as the price of doing business with a
campaign’s fundraising arm is without doubt an attempt to use intimidation or threat to prevent
citizens from giving support to candidates for election. That purpose brings Defendants’ conspiracy within the clause (3), which covers conspiracies to prevent voters from giving support to
candidates for federal office. And as applied to donors who had already given support to the
campaign, publicizing communications with Trump’s opponent’s fundraising arm had the purpose of causing injury, including through the possibility of identity theft, as the price of doing
business with the campaign, thus deterring those donors from further communications with the
campaign and from giving further support. That purpose brings Defendants’ conspiracy within
clause (4), which covers conspiracies to injure voters on account of their support for candidates.
The Trump Campaign denies that the conspirators focused on dumping the email accounts of members of the DNC finance team. Indeed, the Campaign asserts that the Complaint
characterizes the email dumps as “indiscriminat[e].” Campaign Br. 43 (quoting Compl. ¶ 21) (alteration in original). But that word is quoted out of context. When the Complaint accurately says
that “tens of thousands of emails and attachments [were] indiscriminately dumped on the Inter-
66
net,” Compl. ¶ 21, it is referring to the indiscriminate nature of the email dump for each account
whose contents were dumped. The hacked content of each targeted account was dumped en
masse, without any care for separating information that might be of public interest from information with no public interest. But the choice to dump the content of some accounts rather than
others was made with a conscious purpose. As the Complaint specifies, six of the seven accounts
dumped on July 22, 2016 belonged to members of the finance team. Compl. ¶ 16.
To be sure, the contents of one other account—that of the DNC Communications Director, Compl. ¶ 42—also was dumped. But it is not Plaintiffs’ contention that the Trump Campaign
conspired to hack and dump Democratic Party emails only for purposes covered by § 1985(3).
The Trump Campaign surely also had other purposes, including, as the Campaign indicates, the
ultimate purpose of getting Americans to vote for Mr. Trump. Campaign Br. 43. But no conspiracy plaintiff is required to demonstrate that the conspirators acted only for the specific purpose
covered by the relevant conspiracy statute, any more than a prosecutor must prove that a bank
robber acted only for the purpose of robbery and not also for the purpose of getting rich. Plaintiffs need only allege that Defendants acted with the purpose of using intimidation or threat as a
means of deterring voters from giving financial support to its opponent, or with the purpose to
injure voters on account of support given to that campaign, and that Plaintiffs were injured as a
consequence. That they have done.
3.
Defendants’ extraterritoriality argument is irrelevant.
Defendants’ contention that § 1985(3) cannot be applied extraterritorially has no bearing
on this case. The Complaint specifies that, in furtherance of the conspiracy, agents of the Campaign met with Russian government representatives in the District, New York City, and Cleveland. Compl. ¶ 88. In furtherance of the conspiracy, Mr. Stone communicated with WikiLeaks
founder Julian Assange through an intermediary while both Stone and the intermediary were in
67
the United States. Compl. ¶ 162. Defendants accordingly did everything necessary to trigger
§ 1985(3) while physically present within the United States. To be sure, the conspiracy in this
case involved persons and events outside the United States as well as persons and events within
the United States. But the fact that parts of a conspiracy occurs elsewhere does not immunize
conspirators against liability for agreements and actions occurring within the United States.
4.
Defendants’ respondeat superior argument is irrelevant.
The Campaign argues that a defendant in a § 1985(3) case cannot be held liable on a respondeat superior theory. Campaign Br. 44. But Plaintiffs do not argue respondeat superior, so
this contention is beside the point.33 The term “respondeat superior” appears nowhere in the
Complaint, and Plaintiffs’ theory is not that the Campaign is liable for the improvised actions of
its low-level employees. Rather, Plaintiffs assert that senior officials of the Campaign, with the
33
Were it not beside the point, the argument that there is no respondeat superior liability in this
case would still fail, because it is legally incorrect. The Campaign relies on three cases in which
plaintiffs attempted to sue municipalities under § 1985(3) on the basis of the actions of municipal
employees. Defendant Campaign is not a municipality: it is a private corporation. That difference
matters. As explained in the only appellate decision the Campaign cites, Owens v. Haas, the
proposition that respondeat superior liability will not lie under § 1985(3) rests on the assumption
that, for this purpose, § 1985(3) should be treated analogously to 42 U.S.C. § 1983. See 601 F.2d
1242, 1247 (2d. Cir. 1979). Given that the reasons why plaintiffs in § 1983 actions may not recover on a theory of respondeat superior have to do with the specific language and legislative
history of § 1983, see Monell v. Dep’t of Social Servs., 436 U.S. 658, 691-92 & n.57, the assumption that the same rule applies in § 1985(3) may be flawed at the outset: specific features of
§ 1983’s language that Monell read to reject respondeat superior liability under that statute have
no analogue in § 1985. See id. at 691-92. But even if § 1985(3) should for this purpose be treated
analogously to § 1983 when the defendant is a municipality—thus making the case resemble a §
1983 case in the relevant way—the analogy is particularly out of place when the defendant is a
private corporation. After all, the rule against respondeat superior in § 1983 is animated partly
by the “serious federalism concerns” that would arise if § 1983 were read to make local governments liable for actions that are not even their own, Bd. of Cty. Comm’rs of Bryan County v.
Brown, 520 U.S. 397, 415 (1997), and partly by the need to prevent § 1983 from forcing municipalities to shift their limited budgets from the provision of government services to the satisfaction of § 1983 judgments, see City of Canton v. Harris, 489 U.S. 378, 400 (1989) (O’Connor, J.,
concurring in part and dissenting in part). Those concerns have no bearing on suits against private defendants, and the Campaign cites no case in which a private defendant has successfully
defended against a § 1985(3) claim on the ground that respondeat superior will not lie.
68
authority to act for the Campaign itself, engaged in the conspiracy. See, e.g. Compl. ¶ 12.34
In the cases the Campaign cites, the plaintiffs argued respondeat superior because they
were seeking to impose liability on employers for the actions of low-level employees. See Owens
v. Haas, 601 F.2d 1242, 1247 (2d. Cir. 1979) (suit against municipality for damages arising from
the actions of a prison guard); Morgan v. District of Columbia, 550 F. Supp. 465, 468 (D.D.C.
1982) (dismissing a § 1985 claim where conduct at issue was that of individual police officers
rather than flowing from “an official or unofficial custom or policy of the Metropolitan Police
Department”). In contrast, Plaintiffs in the present case allege that the actionable conspiracy was
known to, developed by, sanctioned by, and directly engaged in by senior members of the campaign, such that the conspiracy is attributable to the Campaign itself. That the specific conspiratorial actions in this case were undertaken by human beings acting as agents of the Campaign
does not mean that those actions were not those of the Campaign. Corporations act through their
agents. See 16 Am. Jur. 2d Conspiracy § 56 (“A corporation is capable of extra-corporate conspiracy; that is, a corporation becomes vicariously liable for the conduct of its agents who conspire with other corporations or with outside third persons. This is so because generally, for purposes of a conspiracy claim, the acts of an agent are the acts of the corporation.”).35 Section 1985
operates on that understanding. See, e.g., McAndrew v. Lockheed Martin Corp., 206 F.3d 1031
(11th Cir. 2000) (en banc) (reversing dismissal of § 1985 claim against private corporation arising from actions of corporate officers on behalf of the corporation).
34
The Papadopoulos Statement of Offense corroborates Plaintiffs’ allegations, as it repeatedly
references high-ranking Trump Campaign officials. See Papadopoulos SOO ¶¶ 4, 8-9, 10, 15-16,
18-21.
35
Even under § 1983, a municipal employer is liable for the actions “of those officials whose
acts may fairly be said to be those of the municipality.” Bd. of Cty. Comm’rs of Bryan County v.
Brown, 520 U.S. 397, 403-04 (1997). The same is true under § 1985. See, e.g., Owens, 601 F.2d
at 1247 (stating that a § 1985 claim would lie against the municipal defendant if the employee’s
actions complained of had resulted from “a conspiracy implicating the county itself”).
69
5.
Defendants’ intracorporate-conspiracy argument fails.
Mr. Stone argues that the Complaint alleges only an intracorporate conspiracy and that
intracorporate conspiracies are not actionable under § 1985(3). But as previously explained, the
Complaint alleges a conspiracy going beyond a single corporate entity. Furthermore—though it
does not matter in this case, because the Complaint alleges a conspiracy going beyond a single
entity—the question of whether § 1985(3) reaches intracorporate conspiracies remains open in
this Circuit. See Bowie, 642 F.3d at 1130. And there are good reasons to think that the statute
should reach conspiracies to interfere with federal elections even when the conspirators are all
part of a single organization. After all, the statute was enacted to combat Ku Klux Klan activity
during Reconstruction. As then-Judge Stevens put the point, “Agents of the Klan certainly could
not carry out acts of violence with impunity simply because they were acting under orders from
the Grand Dragon.” Dombrowsky v. Dowling, 459 F.2d 190, 196 (7th Cir. 1972) (Stevens, C.J.).
6.
Stone participated in the conspiracy.
Finally, Mr. Stone argues that Plaintiffs fail to allege any action by him in furtherance of
the conspiracy that injured Plaintiffs. Stone Br. 35-36. But the Complaint specifically alleges that
Stone participated in the conspiracy in multiple ways, including by acting as a communications
channel with WikiLeaks founder Julian Assange. Compl. ¶ 162.
In sum, all of Defendants’ objections to Plaintiffs’ § 1985(3) claim fail. Section 1985(3)
exists precisely to give voters recourse against conspiracies aimed at compromising the integrity
of federal elections, and Plaintiffs have met every requirement for stating a claim.
CONCLUSION
For the reasons stated above, this Court has jurisdiction to hear this case and Plaintiffs’
claims easily surpass the threshold of plausibility to which they are subject at this stage of the
proceedings. Therefore, the Court should deny Defendants’ motions to dismiss.
70
Date: December 1, 2017
/s/ Benjamin L. Berwick
BENJAMIN L. BERWICK (D.D.C. Bar No. MA0004)
United to Protect Democracy
10 Ware St.
Cambridge, MA 02138
(909) 326-2911
Ben.Berwick@protectdemocracy.org
IAN BASSIN (NY Attorney Reg. No. 4683439)
United to Protect Democracy
222 Broadway
New York, NY 10038
(202) 856-9191
Ian.Bassin@protectdemocracy.org
JUSTIN FLORENCE (D.C. Bar No. 988953)
Justin.Florence@protectdemocracy.org
ANNE TINDALL (D.C. Bar. No. 494607)
Anne.Tindall@protectdemocracy.org
United to Protect Democracy
2020 Pennsylvania Ave. NW, #163
Washington, DC 20006
(202) 856-9191
NANCY GERTNER (MA Bar No. 190140)
Fick & Marx
100 Franklin Street, 7th floor
Boston, MA 02110
(857) 321-8360
ngertner@fickmarx.com
RICHARD PRIMUS (D.C. Bar No. 472223)
The University of Michigan Law School*
625 S. State Street
Ann Arbor, MI 48109
(734) 647-5543
PrimusLaw1859@gmail.com
STEVEN A. HIRSCH (CA Bar No. 171825)
Keker, Van Nest & Peters LLP
633 Battery Street
San Francisco, CA 94111-1809
(415) 391-5400
shirsch@keker.com
* For identification purposes.
Counsel for Plaintiffs
71
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?