Democratic National Committee v. The Russian Federation et al

Filing 212

MEMORANDUM OF LAW in Support re: #211 MOTION to Dismiss Amended Complaint. . Document filed by Donald J. Trump For President, Inc.. (Attachments: #1 Exhibit 1, #2 Exhibit 2, #3 Exhibit 3, #4 Exhibit 4, #5 Exhibit 5, #6 Exhibit 6, #7 Exhibit 7, #8 Exhibit 8, #9 Exhibit 9, #10 Exhibit 10, #11 Exhibit 11, #12 Exhibit 12, #13 Exhibit 13)(Carvin, Michael)

Download PDF
Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 1 of 56 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK DEMOCRATIC NATIONAL COMMITTEE, Plaintiff, v. Case No. 1:18-cv-3501-JGK-SDA Oral Argument Requested THE RUSSIAN FEDERATION, et al., Defendants. MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANT DONALD J. TRUMP FOR PRESIDENT, INC.’S MOTION TO DISMISS COUNTS II, III, IV, VIII, XII, AND XIV OF THE AMENDED COMPLAINT James M. Gross JONES DAY 250 Vesey Street New York, NY 10281 (212) 326-3939 jgross@jonesday.com Michael A. Carvin (pro hac vice) Counsel of Record William D. Coglianese (pro hac vice) Vivek Suri JONES DAY 51 Louisiana Avenue, NW Washington, DC 20001 (202) 879-3939 macarvin@jonesday.com wcoglianese@jonesday.com Counsel for Donald J. Trump for President, Inc. Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 2 of 56 TABLE OF CONTENTS Page Introduction .................................................................................................................................................... 1 Background ...................................................................................................................................................... 3 Standard of Review ...................................................................................................................................... 4 Argument .......................................................................................................................................................... 5 I. The Court Should Dismiss All Claims Against the Campaign Because the Imposition of Liability Would Violate the First Amendment................................................................................... 6 II. The DNC Fails to State RICO Claims Against the Campaign. ......................................................... 10 A. The DNC has not alleged a valid enterprise. ................................................................................. 11 1. The DNC fails to allege a common purpose........................................................................... 12 2. The DNC fails to allege an unlawful common purpose. ....................................................... 17 3. The DNC fails to allege relationships amongst the purported association-in-fact enterprise members. .................................................................................................................... 18 4. The DNC fails to allege an enterprise with the required longevity. ..................................... 21 5. The DNC fails to allege an enterprise that is separate from the purported pattern of racketeering activity. ............................................................................................................... 21 B. The DNC has not alleged that the Campaign conducted or participated in the conduct of the alleged association-in-fact enterprise. ................................................................... 22 C. The DNC has not alleged that the Campaign committed any predicate acts, let alone a pattern of racketeering activity. ..................................................................................................... 24 D. The DNC has not alleged any cognizable injury that was proximately caused by the alleged RICO violations. ................................................................................................................... 27 E. The DNC’s tagalong RICO-conspiracy claim also fails. .............................................................. 31 III. The DNC Fails to State a Wiretap Act Claim Against the Campaign............................................... 32 A. The DNC fails to allege that there was an interception or that the Campaign knew or had to reason to know of an interception. ..................................................................................... 32 B. The DNC fails to allege that the Campaign “used” intercepted communications. .................. 35 IV. The DNC Fails to State State-Law Claims Against the Campaign. ................................................... 37 A. The Court should decline to exercise supplemental jurisdiction over the state-law claims. .................................................................................................................................. 37 B. The DNC fails to state a trade-secrets claim against the Campaign. .......................................... 39 C. The DNC fails to state a claim against the Campaign for conspiracy to commit trespass to chattels.............................................................................................................................. 42 D. The DNC fails to state a Virginia Computer Crimes Act claim against the Campaign. .......... 43 Conclusion ..................................................................................................................................................... 46 -i- Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 3 of 56 TABLE OF AUTHORITIES Page(s) CASES 4 K & D Corp. v. Concierge Auctions, LLC, 2 F. Supp. 3d 525 (S.D.N.Y. 2014) .................................................................................................. 12, 32 Aerowest GmbH v. Freitag, 2016 WL 3636619 (E.D.N.Y. June 28, 2016) ....................................................................................... 22 Agency Holding Corp. v. Malley-Duff & Assocs., 483 U.S. 143 (1987) ................................................................................................................................... 24 Agric. Water v. Occidental Oil & Gas Corp., 235 F. Supp. 3d 1132 (E.D. Cal. 2017) .................................................................................................. 13 Alexander Interactive, Inc. v. Leisure Pro Ltd., 2014 WL 4651942 (S.D.N.Y. Sep. 16, 2014)......................................................................................... 39 Alliance Tech. Grp., LLC v. Achieve 1 LLC, 2013 WL 143500 (E.D. Va. Jan. 11, 2013) ............................................................................................ 38 America Online, Inc. v. IMS, 24 F. Supp. 2d 548 (E.D. Va. 1998) ....................................................................................................... 38 America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444 (E.D. Va. 1998) ....................................................................................................... 42 Anza v. Ideal Steel Supply Corp., 547 U.S. 451 (2006) ............................................................................................................................ 27, 29 Apotex Inc. v. Acorda Therapeutics, Inc., 823 F.3d 51 (2d Cir. 2016) ......................................................................................................................... 4 Ashcroft v. Free Speech Coalition, 535 U.S. 234 (2002) ..................................................................................................................................... 9 Ashcroft v. Iqbal, 556 U.S. 662 (2009) ............................................................................................................................ 32, 34 Bartnicki v. Vopper, 532 U.S. 514 (2001) .......................................................................................................................... 7, 8, 35 Bastable v. Muslu, 2008 WL 7339887 (Va. Cir. Ct. July 8, 2009) ........................................................................................ 44 Bell Atl. Corp. v. Twombly, 550 U.S. 544 (2007) ........................................................................................................................ 4, 34, 39 Boccardi Capital Sys. v. D.E. Shaw Laminar Portfolios, LLC, 2009 WL 362118 (S.D.N.Y. Feb. 9, 2009) ............................................................................................ 40 ii  Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 4 of 56 Boehner v. McDermott, 484 F.3d 573 (D.C. Cir. 2007) ...................................................................................................... 7, 35, 36 BondPro Cop. v. Siemens Power Generation, 463 F.3d 702 (7th Cir. 2006).................................................................................................................... 41 Boyle v. United States, 556 U.S. 938 (2009) ................................................................................................................12, 18, 19, 21 Buckley v. Valeo, 424 U.S. 1 (1976) (per curiam) ................................................................................................................ 17 CAIR Action Network, Inc. v. Gaubatz, 82 F. Supp. 3d 344 (D.D.C. 2015) .......................................................................................................... 40 Cal. Democratic Party v. Jones, 530 U.S. 567 (2000) ................................................................................................................................... 10 Cannon v. Douglas Elliman, LLC, 2007 WL 4358456 (S.D.N.Y. Dec. 10, 2007) ........................................................................................ 20 Casio Computer Co. v. Sayo, 2000 WL 1877516 (S.D.N.Y. Oct. 13, 2000) ........................................................................................ 31 Cent. Bank of Denver, N.A. v. First Interstate Bank of Denver, N.A., 511 U.S. 164 (1994) ................................................................................................................25, 26, 37, 44 Cherrie v. Va. Health Servs., Inc., 787 S.E.2d 855 (Va. 2016) ................................................................................................................ 43, 44 Citizens United v. FEC, 558 U.S. 310 (2010) ............................................................................................................................ 10, 36 City of New York v. Smokes-Spirits.com, Inc., 541 F.3d 425 (2d Cir. 2008) .............................................................................................................. 23, 24 Clinton v. Jones, 520 U.S. 681 (1997) ..................................................................................................................................... 1 Cofacredit, S.A. v. Windsor Plumbing Supply Co., 187 F.3d 229 (2d Cir. 1999) ..................................................................................................................... 31 Crichton v. Golden Rule Ins. Co., 576 F.3d 392 (7th Cir. 2009).................................................................................................................... 23 D. Penguin Bros. v. City Nat. Bank, 587 F. App’x 663 (2d Cir. 2014) ............................................................................................................. 13 DeFalco v. Bernas, 244 F.3d 286 (2d Cir. 2001) ........................................................................................................ 25, 27, 28 iii  Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 5 of 56 Eagle One Roofing Contractors, Inc. v. Acquafredda, 2018 WL 1701939 (E.D.N.Y. Mar. 31, 2018) ....................................................................................... 27 Econ. Research Servs. v. Resolution Econ., LLC, 208 F. Supp. 3d 219 (D.D.C. 2016) ........................................................................................................ 42 First Capital Asset Mgmt., Inc. v. Satinwood, Inc., 385 F.3d 159 (2d Cir. 2004) .............................................................................................................. 12, 17 First Nat’l Bank v. Holland, 39 S.E. 126 (Va. 1901) .............................................................................................................................. 42 Fla. Star v. B.J.F., 491 U.S. 524 (1989) ................................................................................................................................. 8, 9 Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107 (3d Cir. 2003) ..................................................................................................................... 33 Gelber v. Glock, 800 S.E.2d 800 (Va. 2017) ................................................................................................................ 42, 43 Goldfine v. Sichenzia, 118 F. Supp. 2d 392 (S.D.N.Y. 2000)..................................................................................................... 25 Green v. New Vision Int’l, Inc., 156 F.3d 721 (7th Cir. 1998).................................................................................................................... 23 Grimes v. Fremont Gen. Corp., 785 F. Supp. 2d 269 (S.D.N.Y. 2011)..................................................................................................... 11 Grosjean v. Am. Press Co., 297 U.S. 233 (1936) ................................................................................................................................... 10 Gross v. Waywell, 628 F. Supp. 2d 475 (S.D.N.Y. 2009)..................................................................................................... 30 H.J. Inc. v. Nw. Bell Tel. Co., 492 U.S. 229 (1989) ...................................................................................................................... 24, 26, 27 Hechler Chevrolet, Inc. v. Gen. Motors Corp., 337 S.E. 2d 744 (Va. 1985) ...................................................................................................................... 43 Herold v. Merrill Lynch, Pierce, Fenner & Smith, Inc., 2018 WL 1950641 (E.D. Va. April 25, 2018)........................................................................................ 44 Kerik v. Tacopina, 64 F. Supp. 3d 542 (S.D.N.Y. 2014)....................................................................................................... 10 Klayman v. Zuckerberg, 753 F.3d 1354 (D.C. Cir. 2014) ............................................................................................................... 26 iv  Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 6 of 56 Kolari v. N.Y.-Presbyterian Hosp., 455 F.3d 118 (2d Cir. 2006) .............................................................................................................. 38, 39 Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002).................................................................................................................... 33 L-3 Commc’ns Corp. v. Serco, Inc., 2018 WL 1352093 (E.D. Va. Mar. 15, 2018) ........................................................................................ 44 Louis Vuitton Malletier, S.A. v. LY USA, Inc., 676 F.3d 83 (2d Cir. 2012) ....................................................................................................................... 39 Luis v. Zang, 833 F.3d 619 (6th Cir. 2016).................................................................................................................... 33 McCutcheon v. FEC, 572 U.S. 185 (2014) ................................................................................................................................... 17 Michalowski v. Rutherford, 82 F. Supp. 3d 775 (N.D. Ill. 2015) ........................................................................................................ 26 Miller v. California, 413 U.S. 15 (1973) ....................................................................................................................................... 9 Monitor Patriot Co. v. Roy, 401 U.S. 265 (1971) ................................................................................................................................... 17 Moss v. BMO Harris Bank, N.A., 258 F. Supp. 3d 289 (E.D.N.Y. 2017) ................................................................... 11, 17, 19, 20, 21, 23, N.Y. Times Co. v. United States, 403 U.S. 713 (1971) ..................................................................................................................................... 8 Nat’l Grp. for Commc’ns & Computers Ltd. v. Lucent Techs. Inc., 420 F. Supp. 2d 253 (S.D.N.Y. 2006).............................................................................................. 13, 31 Packingham v. North Carolina, 137 S. Ct. 1730 (2017) .............................................................................................................................. 10 Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548 (S.D.N.Y. 2008)..................................................................................................... 33 Reed Constr. Data Inc. v. McGraw-Hill Cos., 745 F. Supp. 2d 343 (S.D.N.Y. 2010)..................................................................................................... 13 Reves v. Ernst & Young, 507 U.S. 170 (1993) ............................................................................................................................ 22, 23 Rolo v. City Investing Co. Liquidating Tr., 155 F.3d 644 (3d Cir. 1998) ..................................................................................................................... 25 v  Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 7 of 56 Rosner v. Bank of China, 528 F. Supp. 2d 419 (S.D.N.Y. 2007).............................................................................................. 17, 18 Roth v. Jennings, 489 F.3d 499 (2d Cir. 2007) ....................................................................................................................... 4 RSM Prod. Corp. v. Fridman, 643 F. Supp. 2d 382 (S.D.N.Y. 2009)..................................................................................................... 20 Ruckelshaus v. Monsanto Co., 467 U.S. 986 (1984) ................................................................................................................................... 41 Salinas v. United States, 522 U.S. 52 (1997) ..................................................................................................................................... 31 Sedima, S.P.R.L. v. Imrex Co., 473 U.S. 479 (1985) ................................................................................................................................... 30 Shaw v. Nissan N. Am., Inc., 220 F. Supp. 3d 1046 (C.D. Cal. 2016) .................................................................................................. 13 Snyder v. Fantasy Interactive, Inc., 2012 WL 569185 (S.D.N.Y. Feb. 9, 2012) ............................................................................................ 33 Snyder v. Phelps, 562 U.S. 443 (2011) ................................................................................................................................. 8, 9 Snyder v. Phelps, 580 F.3d 206 (4th Cir. 2009)...................................................................................................................... 9 Spinale v. United States, 2004 WL 50873 (S.D.N.Y. Jan. 9, 2004) ................................................................................................ 25 Spool v. World Child Int’l Adoption Agency, 520 F.3d 178 (2d Cir. 2008) .......................................................................................................... 4, 26, 27 State Analysis, Inc. v. Am. Fin. Servs. Ass’n, 621 F. Supp. 2d 309 (E.D. Va. 2009) ..................................................................................................... 42 Stein v. World-Wide Plumbing Supply Inc., 71 F. Supp. 3d 320 (E.D.N.Y. 2014) ...................................................................................................... 22 Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457 (5th Cir. 1994) ...................................................................................................................... 33 Tarantos v. Fox News Network, LLC, 2018 WL 2731268 (S.D.N.Y. May 18, 2018) ........................................................................................ 33 Town of Mamakating v. Lamm, 2015 WL 5311265 (S.D.N.Y. Sept. 11, 2015) ....................................................................................... 19 vi  Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 8 of 56 Tribune Co. v. Purcigliotti, 869 F. Supp. 1076 (S.D.N.Y. 1994) ........................................................................................................ 25 United Mine Workers v. Gibbs, 383 U.S. 715 (1966) ................................................................................................................................... 37 United States v. Steiger, 318 F.3d 1039 (11th Cir. 2003) ............................................................................................................... 33 United States v. Turkette, 452 U.S. 576 (1981) ...................................................................................................................... 11, 12, 21 Westchester Cty. Indep. Party v. Astorino, 137 F. Supp. 3d 586 (S.D.N.Y. 2015)..................................................................................27, 28, 30, 31 Wood v. Incorporated Vill. of Patchogue, 311 F. Supp. 2d 344 (E.D.N.Y. 2004) .................................................................................................... 22 STATUTES 18 U.S.C. § 1961 ........................................................................................................................................ 11, 24 18 U.S.C. § 1962 .................................................................................................................................. 10, 11, 12 18 U.S.C. § 1964 ........................................................................................................................................ 11, 27 18 U.S.C. § 2510 ............................................................................................................................................... 33 18 U.S.C. § 2511 ..................................................................................................................... 32, 33, 34, 35, 37 18 U.S.C. § 2701 ............................................................................................................................................... 34 28 U.S.C. § 1367 ............................................................................................................................................... 38 47 U.S.C. § 230 ................................................................................................................................................. 26 52 U.S.C. § 30101 ............................................................................................................................................. 40 D.C. Code § 36-401 ............................................................................................................................ 39, 40, 41 Va. Code § 18.2-152.2–4 ................................................................................................................................. 43 Va. Code § 18.2-152.3–4 ................................................................................................................................. 45 Va. Code § 18.2-152.12 ................................................................................................................................... 44 OTHER AUTHORITIES Merriam-Webster Online Dictionary, intercept ............................................................................................. 33 Restatement (Second) of Torts § 217, Comment (e) .................................................................................. 42 vii    Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 9 of 56 INTRODUCTION In this case, the Democratic National Committee (“DNC”) seeks to litigate and explain away its candidate’s defeat in the 2016 presidential election. The DNC thus alleges—unburdened by any actual facts—that President Trump’s campaign (Donald J. Trump for President, Inc.; “the Campaign”) conspired with Russia and a hodgepodge of others to publish materials stolen from the DNC’s computer systems. But the DNC does not claim the Campaign had any role in hacking its systems and stealing the materials—it attributes that only to Russia. Nor does the DNC claim the Campaign played any part in publishing the stolen materials—it attributes that only to Russia and WikiLeaks. Instead, the DNC predicates its claims against the Campaign exclusively on allegations that: (1) the Campaign received advance notice of some disclosures; and (2) after disclosures occurred, the Campaign made political use of the revealed information and publicly encouraged additional disclosures. There are many problems with the DNC’s politically motivated lawsuit. It threatens to unleash discovery that would interfere with the President’s “vast and important” responsibilities, which require “his undivided time and attention.” Clinton v. Jones, 520 U.S. 681, 697 (1997). And it would inevitably collide with the investigations by Special Counsel Robert Mueller and several congressional committees into alleged collusion between Russia and Americans during the 2016 campaign. The Special Counsel has issued a number of indictments, raising the possibility that this case would need to be stayed so as to not interfere with those criminal defendants’ rights. Fortunately, the DNC’s partisan effort to drag the Court into a political thicket already occupied by Congress and the Special Counsel is legally meritless, and so must be dismissed. For starters, even if the Campaign had a role in publishing materials stolen by others (which the DNC does not claim), the First Amendment protects disclosures of public issues. This protection undoubtedly covers the disclosed materials, which revealed, for instance, the DNC’s questionable conduct during its presidential primaries, its correspondence with wealthy donors, and its cozy relationship with the media. -1-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 10 of 56 The DNC’s claims also fail on their own terms. First, the centerpiece of the Amended Complaint consists of claims that the Campaign participated in an enterprise that violated the Racketeer Influenced Corrupt Organizations Act (RICO) and also conspired to violate RICO. But RICO claims are notoriously meritless, and the DNC’s are no different:  The DNC needs to allege an enterprise whose members pursued an unlawful common purpose by working closely together for an extended period. But its enterprise theory simply lumps together an assortment of individuals and entities who were pursuing differing objectives, who maintained no relationships beyond isolated interactions, and who are not even claimed to have come together until well after the alleged wrongdoing started.  The DNC needs to allege that the Campaign played a role in directing the enterprise’s affairs. But the most it claims is that the Campaign cheered on others who were directing those affairs.  The DNC needs to allege that the Campaign itself committed criminal acts amounting to a pattern of racketeering. But it concedes that the Campaign did no such thing, and instead invokes a theory of aiding-and-abetting that is not available under the civil RICO statute.  The DNC needs to allege that the supposed RICO violations proximately caused injury to its business or property. But it instead alleges mostly noneconomic (and political) injuries, and fails to establish a single cognizable injury directly traceable to the alleged enterprise.  Finally, the DNC needs to plausibly allege that the Campaign agreed with the other Defendants to violate RICO. But it does not even attempt to make this showing. Second, the DNC’s claim under the Wiretap Act fails, because it does not allege that the Campaign had any role in intercepting in-progress communications or using intercepted communications. Finally, the DNC’s state-law claims fare no better. Given the defects in the federal claims and the complex state-law issues raised by the state claims, the Court should decline to exercise supplemental jurisdiction over these claims. But even if the Court were to keep the claims, they would all require dismissal (even if they were not foreclosed by the First Amendment): The DNC invokes D.C.’s Uniform Trade Secrets Act, but fails to plead that this case involves any trade secrets; it brings a claim under Virginia law for conspiracy to commit trespass to chattels, but alleges only that the Campaign agreed to disclose emails that Russia had already obtained on its own; and it asserts a claim under the Virginia Computer Crimes Act, but ignores that that statute does not authorize aiding-and-abetting liability (and that the Campaign is not alleged to have had any involvement in hacking, anyway). The Court should dismiss all claims against the Campaign. -2-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 11 of 56 BACKGROUND The DNC alleges that, during the 2016 presidential campaign, “Russia’s intelligence services illegally hacked into the DNC’s computer systems and email server.” (Am. Compl. ¶ 83.) Russian intelligence agents allegedly launched the first phase of the cyberattack in July 2015 (id. ¶ 115), and the second phase in April 2016 (id. ¶ 101). As a result of these attacks, Russian intelligence agents allegedly copied “thousands of DNC documents and emails.” (Id. ¶ 12.) The DNC further alleges that, after Russian agents had stolen the DNC’s emails and other documents, Russian agents entered into a conspiracy with the Campaign, WikiLeaks, and others to “disseminate [the] stolen DNC material.” (Id. ¶ 82.) The DNC claims that, in accordance with this supposed conspiracy, Russia and WikiLeaks released batches of stolen DNC materials over the course of the next several months. (See id. ¶¶ 140–68.) These disclosures revealed important information about the DNC to the public. For example:  The disclosures revealed DNC officials’ hostility toward Senator Sanders during the primaries. Officials discussed portraying Senator Sanders as an atheist, speculating that “my Southern Baptist peeps would draw a big difference between a Jew and an atheist.” (Ex. 1, 3.) They suggested pushing a “narrative” that he “never ever had his act together, that his campaign was a mess.” (Ex. 2, 3.) They opposed his push for additional debates. (Ex. 3.) They complained that he “has no understanding” of the Democratic Party. (Ex. 4.) The DNC’s chairperson even leaked debate questions to Secretary Clinton. (Ex. 5.)  According to The New York Times, “thousands of emails” between donors and fundraisers revealed “in rarely seen detail the elaborate, ingratiating and often bluntly transactional exchanges necessary to harvest hundreds of millions of dollars from the party’s wealthy donor class.” These emails “capture[d] a world where seating charts are arranged with dollar totals in mind, where a White House celebration … is a thinly disguised occasion for rewarding wealthy donors and where physical proximity to the president is the most precious of currencies.” (Ex. 6.)  The disclosures revealed Secretary Clinton’s positions on important questions of foreign policy. For example, in one email, Secretary Clinton stated: “My dream is a hemispheric common market, with open trade and open borders.” (Ex. 7.)  The disclosures revealed racism at the DNC and the Clinton Campaign. One memo discussed ways to “acquire the Hispanic consumer,” claiming that “Hispanics are the most brand loyal consumers in the World” and that “Hispanics are the most responsive to ‘story telling.’” (Ex. 8.) Another email pitched “a new video we’d like to use to mop up some more taco bowl engagement.” (Ex. 9.) Still another email described “Latinos” as “needy.” (Ex. 10.) -3-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 12 of 56  The disclosures revealed alleged cover-ups of sexual harassment at the Clinton Campaign. A campaign official wrote in one email: “I was recently contacted by a source who claims to have worked on the 2008 Hillary Clinton campaign and is alleging that Marlon Marshall [a senior campaign staffer] made unwelcome sexual advances and propositions towards women on the campaign repeatedly.” The email continues: “The source also claims that [campaign manager] Robby Mook was made aware of the issue, but declined to act on it or intervene because he is personal friends with Marshall.” (Ex. 11.)  The disclosures revealed the DNC’s cozy relationship with the media. For example, emails showed that reporters would ask DNC to approve articles before publication. (Ex. 12.) They also showed DNC staffers discussing giving a CNN reporter “questions to ask us.” (Ex. 13.) In April 2018, the DNC brought this lawsuit. The DNC raises six claims against the Campaign: (1) violation of RICO (count II), (2) conspiracy to violate RICO (count III), (3) violation of the Wiretap Act (count IV), (4) violation of the Washington, D.C. Uniform Trade Secrets Act (count VIII), (5) conspiracy to commit trespass to chattels in violation of Virginia law (count XI), and (6) violation of the Virginia Computer Crimes Act (count XII). STANDARD OF REVIEW Rule 12(b)(6) provides for the dismissal of a complaint for failure to state a claim. Dismissal is necessary where a complaint fails to “state a claim to relief that is plausible on its face.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007). “[B]ald assertions and conclusions of law will not suffice. The pleadings must create the possibility of a right to relief that is more than speculative.” Spool v. World Child Int’l Adoption Agency, 520 F.3d 178, 183 (2d Cir. 2008) (citation omitted). A court must decide a motion under Rule 12(b)(6) on the basis of the factual allegations in the complaint, documents “integral to the complaint,” and judicially noticeable matters. Roth v. Jennings, 489 F.3d 499, 509 (2d Cir. 2007). Here, the Court may consider the contents of the materials published by Russia and WikiLeaks: Those materials are integral to the Amended Complaint because it necessarily relies on them, and they are also subject to judicial notice because their contents are publicly available on the internet. Apotex Inc. v. Acorda Therapeutics, Inc., 823 F.3d 51, 60 (2d Cir. 2016). -4- Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 13 of 56   ARGUMENT Many of the legal issues in this case turn on the distinction between (1) stealing documents and (2) disclosing documents that someone else previously stole. It is thus essential to establish at the outset: The Amended Complaint alleges only that the Campaign conspired to disclose documents that someone else—namely, Russia—previously stole. The Amended Complaint does not allege that the Campaign itself stole any documents, or even that it conspired to steal any documents. The DNC’s description of the Campaign’s conduct makes clear that the DNC alleges participation in the disclosure of the emails, not participation in the hacking or the theft (all emphases added):  “The Conspiracy To Disseminate Stolen DNC Data To Aid Trump.” (Am. Compl. at 21.)  “Defendants conspired to disseminate documents stolen from the DNC.” (Id. ¶ 25.)  “Defendants launched a scheme to disseminate information that was damaging to the Democratic party and the DNC.” (Id. ¶ 131.)  “Following The Trump Tower Meeting, Russia Continues Its Hacking And Launches A Massive Public Dissemination Of Stolen DNC Documents.” (Id. at 33.)  “After The Trump Campaign Blocks Anti-Russia Language From The GOP Platform, WikiLeaks Begins Disseminating Stolen DNC Documents.” (Id. at 37.)  “Trump Associates Secretly Communicate With Russian Agents And WikiLeaks As They Strategically Release Stolen DNC Documents.” (Id.)  “The illegal conspiracy inflicted profound damage upon the DNC. The timing and selective release of the stolen materials prevented the DNC from communicating with the American electorate on its own terms.” (Id. ¶ 199.)  “The timing and selective release of stolen materials was designed to and had the effect of driving a wedge between the DNC and Democratic voters.” (Id. ¶ 200.) The DNC’s factual theory likewise makes it clear that the alleged conspiracy between Russia and the Campaign came into being after the hack and after the theft of the emails. The DNC alleges that Russia began “its cyberattack on the DNC” in July 2015, “launched a pervasive cyberattack on DNC servers” on “April 18, 2016,” and “staged several gigabytes of DNC data located on the DNC’s servers for unauthorized and surreptitious exfiltration” on “April 22, 2016.” (Id. ¶ 84, 101, 104.) The DNC separately alleges that, “[f]our days” after the April 22 theft, a “Kremlin-tied agent” informed George Papadopoulos, an advisor to the Campaign, “that the Russians ‘have dirt’ on [Hillary Clinton] -5-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 14 of 56 in the form of ‘thousands of emails.’” (Id. ¶ 11.) The DNC continues that on “June 3, 2016”—two months after the first theft of information in April, and a month after the last theft of information in May—Russians offered the information to the Campaign. (Id. ¶ 12.) The DNC insinuates that the Campaign accepted this supposed offer in a meeting on “June 9, 2016.” (Id. ¶ 136.) In short, the DNC’s own factual theory is that (1) Russia stole the DNC’s emails on April 22, 2016, but (2) Russia made contact with the Campaign only on April 26, and offered to assist the Campaign only in June. To be sure, the Amended Complaint alleges that Russia continued to “maintai[n] an [un]authorized presence within the DNC network” after April 22, 2016. (Id. ¶ 120.) Even so, the Amended Complaint fails to tie this continued unauthorized presence to the Campaign. First, the Amended Complaint nowhere alleges that the Campaign agreed that Russia should continue to maintain an unauthorized presence in the DNC’s servers. Second, the Amended Complaint nowhere alleges any facts from which one could infer that the Campaign made such an agreement. Third, the DNC identifies “May 2016” as the last date on which Russia stole data from the DNC (id. ¶ 57), but “June 9, 2016,” as the first date on which Russia offered to assist the Campaign (id. ¶ 13). As a result, even taking into account the allegation of Russia’s continued presence in the DNC servers, the Amended Complaint still fails to allege that the Campaign had any involvement in the hacking of the DNC’s servers or in the theft of its materials. Against this backdrop, the Court should dismiss the DNC’s claims. I. The Court Should Dismiss All Claims Against the Campaign Because the Imposition of Liability Would Violate the First Amendment. In each of their claims, the DNC seeks to hold the Campaign legally responsible for the publi- cation of the DNC’s emails and other data on the internet. Of course, the DNC does not actually claim that the Campaign played any role in publishing those materials—only that it took advantage of the materials after WikiLeaks published them. But even if the DNC did make such a claim, the First Amendment protects a speaker’s right to disclose stolen information so long as (1) the speaker -6-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 15 of 56 did not participate in the theft and (2) the information deals with matters of public concern. The DNC does not allege that the Campaign participated in the theft of the leaked materials, and the materials plainly deal with matters of public concern. Each claim must thus be dismissed. A. In Bartnicki v. Vopper, 532 U.S. 514 (2001), the Supreme Court held that the First Amendment protects a speaker’s right to disclose stolen information if (1) the speaker was not “involved” in the acquisition and (2) the disclosure deals with “a matter of public concern.” Id. at 529, 535. There, leaders of a teachers’ union spoke on the phone about using violence against school-board members to influence salary negotiations. Id. at 518–19. An unknown person secretly intercepted the call and shared the illegal recording with a local radio host, who played the recording on his show. Id. at 519. The Court ruled that the First Amendment prohibited the imposition of liability on the radio host, because the host “played no part in the illegal interception” and “the subject matter of the conversation was a matter of public concern.” Id. at 525. It reasoned that “state action to punish the publication of truthful information” “seldom” complies with the Constitution. Id. at 527. The state has an interest in deterring theft of information, but it must pursue that goal by imposing “an appropriate punishment” on “the intercepto[r]”—not by punishing a speaker who was “not involved in the initial illegality.” Id. at 529. The state also has an interest in protecting “privacy of communication,” but “privacy concerns give way when balanced against the interest in publishing matters of public importance.” Id. at 534. In short, Bartnicki establishes that “a stranger’s illegal conduct does not suffice to remove the First Amendment shield from speech about a matter of public concern.” Id. at 535. “[A]n opposite rule”—under which a speaker may be punished for truthful disclosures on account of a “defect in the chain of title”—“would be fraught with danger.” Boehner v. McDermott, 484 F.3d 573, 586 (D.C. Cir. 2007) (opinion of Sentelle, J., joined by a majority of the en banc court). “U.S. newspapers publish information stolen via digital means all the time.” Jack L. Goldsmith, Uncomfortable Questions in the Wake of Russia Indictment 2.0, Lawfare (July 16, 2018), https://goo.gl/ovq117. In- -7-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 16 of 56 deed, they “openly solicit such information.” Id.; see N.Y. Times Co. v. United States, 403 U.S. 713 (1971) (publication of the stolen Pentagon Papers). Punishing “conspiring to publish stolen information” “would certainly narrow protections for ‘mainstream’ journalists.” Goldsmith, supra. B. The Campaign satisfies the first part of Bartnicki’s test: It “played no part in the illegal interception.” Bartnicki, 532 U.S. at 525. As explained above, the DNC alleges a “Conspiracy To Disseminate Stolen DNC Data To Aid Trump.” (Am. Compl. at 21 (emphasis added); supra pp. 5–7.) The DNC does not assert—and cannot plausibly assert—a conspiracy to steal the emails in the first place. C. The Campaign also satisfies the second part of Bartnicki’s test: the disclosure deals with “a matter of public concern.” 532 U.S. at 525. “Speech deals with matters of public concern when it can be fairly considered as relating to any matter of political, social, or other concern to the community, or when it is a subject of legitimate news interest.” Snyder v. Phelps, 562 U.S. 443, 453 (2011) (citations and quotation marks omitted). In applying this test, a court must examine the “content, form, and context” of the speech. Id. A court must judge the public character of a disclosure in the aggregate, not line by line. For example, in Bartnicki, leaders of a teachers’ union spoke on the phone about “blow[ing] off the[] front porches” of school-board members to influence salary negotiations. 532 U.S. at 518–19. Even though that specific threat was not itself speech about public issues, the First Amendment protected the disclosure because the host made it while “engaged in debate about” teacher pay—“a matter of public concern.” Id. at 535. The “public concern” test thus turns on the broader context of the disclosure, not the nature of the specific fact disclosed. The Supreme Court followed the same holistic approach in Florida Star v. B.J.F., 491 U.S. 524 (1989). In that case, a newspaper published an article that revealed the name of a rape victim, violating a state statute that forbade the disclosure of this private fact. Even though the victim’s name itself was a private fact not of public concern, the Court ruled that the First Amendment barred civil -8-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 17 of 56 liability, because “the news article concerned a matter of public significance.” Id. at 536 (emphasis added). The Court emphasized that “the article generally, as opposed to the specific identity contained within it, involved a matter of paramount public import.” Id. at 536–37 (emphasis added). The Supreme Court and Fourth Circuit again took this approach in Snyder v. Phelps. There, protesters held up hateful signs at a soldier’s funeral—some addressing public issues (“God Hates the USA”), some specifically condemning the fallen soldier (“You’re Going to Hell”). 562 U.S. at 454. Yet the Supreme Court held that the First Amendment protected the entire funeral protest— including the private taunts “related to [the fallen soldier and his family] specifically”—because “the overall thrust and dominant theme of [the] demonstration spoke to broader public issues.” Id. The Fourth Circuit, too, ruled that the whole protest was protected, “even when [the soldier’s parents] are mentioned,” because the “general message” “primarily concerned” matters of public concern. Snyder v. Phelps, 580 F.3d 206, 225–26 (4th Cir. 2009). Bartnicki, Florida Star, and Snyder thus show that courts must apply the public-concern test to a disclosure as a whole, not to individual snippets of the disclosure taken in isolation. This approach accords with the broader “First Amendment rule” that courts must always judge speech “as a whole.” Ashcroft v. Free Speech Coalition, 535 U.S. 234, 248 (2002); cf. Miller v. California, 413 U.S. 15, 24 (1973) (speech is obscene only if “the work, taken as a whole, appeals to the prurient interest” and “taken as a whole, lacks serious … value” (citation omitted, emphasis added)). Here, the content, form, and context of the disclosures establish that the disclosures, in the aggregate, dealt with public issues. To begin with the content: Every disclosed item was (1) work material (2) created, sent, or received by a political operative (3) during a presidential campaign. Every disclosed item thus inherently addressed politics, elections, and campaigns—all paradigmatic public issues. Indeed, the disclosed materials dealt pervasively with important public issues. They revealed the DNC’s conduct during its presidential primaries—which are “public affair[s],” “structur[ed] and -9-   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 18 of 56 monitor[ed]” by the state. Cal. Democratic Party v. Jones, 530 U.S. 567, 572 (2000). They revealed the nature of the DNC’s interactions with rich donors—educating citizens about the influence of “moneyed interests.” Citizens United v. FEC, 558 U.S. 310, 370 (2010). And they revealed the closeness of the party’s ties to the media—“the great interpreters between the government and the people.” Grosjean v. Am. Press Co., 297 U.S. 233, 250 (1936). The importance of these issues to the public is only further confirmed by the overwhelming media coverage that the disclosures received. The form of the disclosure reinforces its public character. WikiLeaks published the emails on “the vast democratic forums of the Internet.” Packingham v. North Carolina, 137 S. Ct. 1730, 1735 (2017). It communicated the disclosed information to the public at large—not, for example, just to family members of DNC staffers that it sought to embarrass. Finally, the context of the disclosure confirms that the disclosure deals with matters of public concern. WikiLeaks published the emails on July 22, 2016, “just three days before the Democratic National Convention.” (Am. Compl. ¶ 153.) That timing shows that the “overall thrust” of the disclosure was to reveal important facts to the electorate—not to release social security numbers and office gossip buried in a few out of thousands of emails. In sum, the Campaign did not participate in the theft of the emails, and the emails taken as a whole concerned public issues. The First Amendment bars civil liability. II. The DNC Fails to State RICO Claims Against the Campaign. The DNC asserts that the Campaign committed a substantive violation of RICO under § 1962(c), which makes it “unlawful for any person employed by or associated with any enterprise engaged in, or the activities of which affect, interstate or foreign commerce, to conduct or participate, directly or indirectly, in the conduct of such enterprise’s affairs through a pattern of racketeering activity.” A plaintiff thus must plausibly allege “(1) conduct (2) of an enterprise (3) through a pattern (4) of racketeering activity.” Kerik v. Tacopina, 64 F. Supp. 3d 542, 553 (S.D.N.Y. - 10 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 19 of 56 2014) (citation omitted). The plaintiff also must establish that the RICO violation proximately caused it to suffer an injury to its “business or property.” § 1964(c). The DNC also alleges that the Campaign violated § 1962(d), which makes it “unlawful for any person to conspire to violate any of the” substantive RICO provisions, including § 1962(c). RICO’s standards are hard to satisfy: “although civil RICO may be a ‘potent weapon,’ plaintiffs wielding RICO almost always miss the mark.” Moss v. BMO Harris Bank, N.A., 258 F. Supp. 3d 289, 297 (E.D.N.Y. 2017) (citing Gross v. Waywell, 628 F. Supp. 2d 475, 479–83 (S.D.N.Y. 2009)). For example, from 2004 through 2007, all 36 civil RICO cases brought in the Southern District of New York that were “resolved on the merits resulted in judgments against the plaintiffs, mostly at the motion to dismiss stage.” Id. Courts therefore must “look with particular scrutiny at [RICO] claims.” Grimes v. Fremont Gen. Corp., 785 F. Supp. 2d 269, 299 (S.D.N.Y. 2011) (citation omitted). The DNC’s RICO claims do not withstand scrutiny. In fact, the DNC fails to satisfy any of the requirements for a claim under either § 1962(c) or (d). A. The DNC has not alleged a valid enterprise. “The existence of an enterprise at all times remains a separate element which must be proved” to prevail in a RICO action. United States v. Turkette, 452 U.S. 576, 583 (1981). A RICO enterprise “includes any individual, partnership, corporation, association, or other legal entity, and any union or group of individuals associated in fact although not a legal entity.” 18 U.S.C. § 1961(4). The DNC makes two attempts at alleging the existence of a RICO enterprise. It first alleges that the Campaign was itself an enterprise. (Am. Compl. ¶¶ 222–26). It immediately concedes, however, that this theory applies (if at all) only to the other defendants, not the Campaign. (Id. ¶ 224 (“[E]ach Defendant—except the Trump Campaign itself—participated in the operation or management of the Trump Campaign.”).) This concession was a necessary one: § 1962(c) “imposes liability on a ‘person’ who is employed by or associated with an ‘enterprise,” and so a “plaintiff could not allege a claim - 11 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 20 of 56 against a corporation as a defendant ‘person’ while also claiming that the corporation was the ‘enterprise.’” 4 K & D Corp. v. Concierge Auctions, LLC, 2 F. Supp. 3d 525, 536 n.4 (S.D.N.Y. 2014) (Koeltl, J.) (emphasis added). (In any event, the DNC’s “Campaign as enterprise” theory fails, because the DNC cannot establish that other Defendants “conduct[ed] or participate[d] … in the conduct of the [Campaign’s] affairs through a pattern of racketeering activity (§ 1962(c)), and also for many of the same reasons that its association-in-fact theory fails (infra § II.A).) The DNC’s claim against the Campaign thus rests entirely on its second theory of a RICO enterprise: the allegation that the Campaign “was part of an Association-In-Fact comprising” all Defendants (“the AIF Enterprise”), which formed no earlier than March 2016 and which supposedly worked “to further [Defendants’] mutual goals of improving Trump’s electoral prospects and damaging the DNC.” (Am. Compl. ¶ 227.) This theory, too, fails. An “association-in-fact enterprise must have at least three structural features: a purpose, relationships among those associated with the enterprise, and longevity sufficient to permit these associates to pursue the enterprise’s purpose.” Boyle v. United States, 556 U.S. 938, 946 (2009). In addition, the enterprise requirement is separate from the requirement of a pattern of racketeering activity, and so a plaintiff must plausibly allege “an entity separate and apart from the pattern of activity in which it engages.” Turkette, 452 U.S. at 583. The AIF Enterprise does not satisfy any of these requirements. Each failure alone is fatal to the DNC’s § 1962(c) claim. 1. The DNC fails to allege a common purpose. The members of an association-in-fact enterprise must be “associated together for a common purpose of engaging in a course of conduct.” Boyle, 556 U.S. at 946 (citation omitted). A RICO plaintiff therefore must “provide … solid information” from which a court “could fairly conclude that [alleged enterprise] members functioned as a unit … for a common purpose of engaging in a course of conduct.” First Capital Asset Mgmt., Inc. v. Satinwood, Inc., 385 F.3d 159, 174–75 (2d Cir. 2004) - 12 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 21 of 56 (citations and internal quotation marks omitted)). “Individuals or [entities] that do not share such a common purpose cannot be considered part of a RICO enterprise as a matter of law.” Reed Constr. Data Inc. v. McGraw-Hill Cos., 745 F. Supp. 2d 343, 351 (S.D.N.Y. 2010). To satisfy this requirement at the motion-to-dismiss stage, a RICO complaint must “set forth facts to support the conclusion that all [] defendants were actually working with one another … to accomplish a common purpose.” Nat’l Grp. for Commc’ns & Computers Ltd. v. Lucent Techs. Inc., 420 F. Supp. 2d 253, 271 (S.D.N.Y. 2006); see also, e.g., D. Penguin Bros. v. City Nat. Bank, 587 F. App’x 663, 668 (2d Cir. 2014) (rejecting alleged common purpose of “purchas[ing] the favor and influence of political leaders and government officials” because “this allegation is little more than a ‘naked assertion’ devoid of further factual enhancement” (citations omitted)); Shaw v. Nissan N. Am., Inc., 220 F. Supp. 3d 1046, 1056 (C.D. Cal. 2016) (rejecting unsupported allegations that defendants “shared a common fraudulent purpose” that were unaccompanied by allegations of “plausible facts that satisfy the common purpose requirement”). Where a plaintiff “allege[s] only a series of disconnected incidents, each involving a subset of the overall group of defendants, with no clear indication of a unified agenda,” dismissal is required. Comm. to Protect our Agric. Water v. Occidental Oil & Gas Corp., 235 F. Supp. 3d 1132, 1175 (E.D. Cal. 2017). The DNC asserts that the members of the AIF Enterprise had the common purpose “of improving Trump’s electoral prospects and damaging the DNC.” (Am. Compl. ¶ 227; see also id. ¶ 71.) To survive dismissal, therefore, the DNC must allege specific facts making it plausible that all Defendants in fact shared this common purpose. The DNC has not done so. To the contrary, the DNC is forced to acknowledge (and to rely on materials explaining) that the hodgepodge, disparate members of the supposed AIF Enterprise—a foreign nation and its intelligence agency, an “Azeriborn oligarch” and his pop-singer son, a London-based Maltese academic, “an international organization of unknown structure” and its founder, the Campaign and several employees, multiple - 13 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 22 of 56 members of President Trump’s family, and the President’s supposed “long-time confidant”— actually held widely divergent objectives in connection with the election. (Id. ¶¶ 39–52, 71–80.) Russia. The Amended Complaint and the materials cited therein make clear that Russia’s goals were complex and evolving, but centered on that nation’s overarching geopolitical objectives. For example, a report that the DNC repeatedly cites (reflecting the joint views of the Central Intelligence Agency, the Federal Bureau of Investigation, and the National Security Agency) characterizes “Russian efforts to influence the 2016 US presidential election” as “the most recent expression of Moscow’s longstanding desire to undermine the US-led democratic order,” “the promotion of which [Russian President Vladimir] Putin and other senior Russian leaders view as a threat to Russia and Putin’s regime.” Office of the Director of National Intelligence, Assessing Russian Activities and Intentions in Recent US Elections at ii, 1 (Jan. 6, 2017), https://goo.gl/GLuFuz (cited at Am. Compl. ¶¶ 81, 115, 118) (“IC Report”). Or, as another article cited by the DNC puts it: “the e-mail hacks were part of a larger, and deeply troubling picture: Putin’s desire to damage American confidence and to undermine the Western alliances—diplomatic, financial, and military— that have shaped the postwar world.” Evan Osnos et al., Trump, Putin, and the New Cold War, New Yorker (Mar. 6, 2017), https://goo.gl/kzdhPo (cited at Am. Compl. ¶ 73). The tactics that Russia deployed in pursuit of this objective “evolved over the course of the campaign based on Russia’s understanding of the electoral prospects of the two main candidates.” IC Report at ii. As the DNC admits, Russia’s hacking efforts began in July 2015—long before President Trump even became the front-runner for the Republican nomination, let alone clinched that nomination in May 2016. (Am. Compl. ¶¶ 81, 84, 131.) “When it appeared to Moscow that Secretary Clinton was likely to win the election,” Russia “began to focus more on undermining her future presidency.” IC Report at ii. The common thread in all of this was Russia’s objective of improving its own global standing and undermining U.S. democracy, regardless of which candidate prevailed. - 14 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 23 of 56 The DNC also alleges that Russia was pursuing other objectives having nothing to do with “improving Trump’s electoral prospects” or “damaging the DNC.” (Am. Compl. ¶ 227.) Specifically, the DNC asserts that Russia’s efforts were driven in part by Putin’s personal dislike for Secretary Clinton, stemming from his view that she was to blame for “massive protests [that] broke out in Russia” in December 2011. (Id. ¶¶ 72–73.) Thus, Russia would have sought to defeat Mrs. Clinton regardless of her Republican opponent, and was seeking to “damage” her, not “the DNC.” Moreover, the DNC unsurprisingly does not claim that any other Defendant shared Putin’s objective of “maintaining power and exerting control” as President of Russia. (Id. ¶ 73.) Assange and WikiLeaks. The DNC does not allege that Assange or WikiLeaks shared Russia’s objective of “undermin[ing] the US-led liberal democratic order.” IC Report at ii. More to the point, it does not allege that either of these Defendants had any particular interest in helping President Trump’s electoral prospects or damaging the DNC. Instead, the DNC acknowledges that Assange and Wikileaks’ objective was to undermine Secretary Clinton, based on Assange’s “history [of] conflicts” and personal “policy disagreements” with her. (Id. ¶ 79.) Those disagreements stemmed from not only Assange’s criticisms of Clinton’s actions as Secretary of State (such as her decision to “push[] to intervene in Libya in 2011,” which, in Assange’s view, caused “Libya’s collapse into anarchy, enabling the Islamic State to flourish”) but also Assange’s view of Clinton “as a personal foe.” Charlie Savage, Assange, Avowed Foe of Clinton, Timed Email Release for Democratic Convention, N.Y. Times (July 26, 2016), https://goo.gl/JRbCMk (cited at Am. Compl. ¶ 79). That latter sentiment derived from Assange’s “personal perspective,” as he accused “Mrs. Clinton of having been among those pushing to indict him after WikiLeaks disseminated a quarter of a million diplomatic cables during her tenure as secretary of state,” and declared that he saw her “as a bit of a problem for freedom of the press more generally.’” Id. No other Defendant is alleged to have shared this particular vendetta against Secretary Clinton. - 15 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 24 of 56 The Campaign. The DNC does not ascribe any of the aforementioned purposes— longstanding desires to “undermine the US-led democratic order,” aspirations “to damage American confidence and to undermine [] Western alliances,” or efforts to prosecute personal vendettas against Secretary Clinton—to the Campaign. Instead, the DNC offers only a single sentence as to the Campaign’s purpose, asserting that the Campaign’s “stated goal was to get Trump elected.” (Am. Compl. ¶ 80.) In other words, the Campaign is alleged to have held the same purpose held by every other political campaign ever formed, and by the approximately 63 million Americans who voted for President Trump. Other Defendants. The DNC makes only passing references to the purposes supposedly held by the other Defendants. Its sole allegation as to the GRU and Mifsud is that “they wanted to advance Russia’s interests.” (Id. ¶ 78.) This conclusory assertion obviously does not establish that either Defendant held any purpose whatsoever with respect to either President Trump or the DNC. Separately, the DNC alleges, without elaboration, that “the Agalarovs and the Trump Associates shared the conspirators’ common purpose because they stood to benefit financially and professionally from a Trump Presidency.” (Id. ¶ 80.) As to the Defendants who worked for or are related to President Trump, it is hardly surprising that they would desire his election. Regardless, this supposed desire for pecuniary and professional gain—which the DNC does not allege to have been shared by any of the other Defendants—falls far short of establishing that any of these individuals had a specific objective of harming the DNC. In short, the DNC’s own allegations and cited materials confirm that the AIF Enterprise cobbles together an assortment of disparate individuals and entities, each pursuing unique purposes not held by other Defendants. Because the DNC has not plausibly alleged that the supposed enterprise members shared a common purpose, this enterprise theory—and with it, the DNC’s § 1962(c) claim against the Campaign—fails. - 16 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 25 of 56 2. The DNC fails to allege an unlawful common purpose. Even if the DNC had plausibly alleged that the AIF Enterprise members all shared a common purpose, this enterprise theory would still fall short. A RICO plaintiff must allege not just a common purpose, but an unlawful common purpose. Where a complaint does not plausibly allege that the members of an association-in-fact enterprise “shared a common unlawful purpose to violate RICO,” it “ fails to sufficiently allege the ‘enterprise’ element” of a § 1962(c) claim. Rosner v. Bank of China, 528 F. Supp. 2d 419, 429 (S.D.N.Y. 2007); see also Moss, 258 F. Supp. 3d at 299 (“[F]ailing to allege that members of an association-in-fact enterprise shared a wrongful intent to violate RICO is fatal to an 18 U.S.C. § 1962(c) claim.”); First Capital Asset Mgmt., 385 F.3d at 174 (“[F]or an association of individuals to constitute an enterprise, the individuals must share a common purpose to engage in a particular fraudulent course of conduct and work together to achieve such purposes.” (emphasis added)). There is nothing illicit about the AIF Enterprise’s alleged purpose of advancing President Trump’s electoral prospects and diminishing the DNC’s. Quite the contrary, the rights to “support [a] candidate and his views,” and to “affiliate … with a candidate” “in furtherance of common political goals” are at the heart of the First Amendment. Buckley v. Valeo, 424 U.S. 1, 22 (1976) (per curiam); see also McCutcheon v. FEC, 572 U.S. 185, 226 (2014) (plurality) (noting “the basic nature of the party system, in which party members join together to further common political beliefs, and citizens can choose to support a party because they share some, most, or all of those beliefs”). Indeed, “it can hardly be doubted that the constitutional guarantee has its fullest and most urgent application precisely to the conduct of campaigns for political office.” Monitor Patriot Co. v. Roy, 401 U.S. 265, 272 (1971). To be sure, the DNC takes issue with the tactics that it accuses the AIF Enterprise of deploying in pursuit of its valid objective. But as explained below, an association-in-fact enterprise must exist independently of the acts in which it engages, and that existence (or nonexistence) turns on whether - 17 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 26 of 56 the supposed enterprise members shared an unlawful purpose. Boyle, 556 U.S. at 946; infra II.A.4. It is thus not enough for the DNC to allege that the AIF Enterprise pursued its (legitimate) objective through improper means. Because Defendants’ alleged objective was entirely legitimate, Defendants cannot be said to have formed a RICO enterprise. Indeed, accepting the DNC’s theory would have dire and far-reaching consequences. Every campaign that this country has ever seen—and every voter—has held the objective of promoting a political candidate, which necessarily comes at the expense of opposing candidates and their supporters. If this were enough to satisfy the common-purpose requirement, any campaign or group of voters could be deemed a RICO enterprise and subjected to the threat of civil liability (not to mention treble damages) for promoting their preferred candidate. All a plaintiff would need to do, as the DNC has done here, is allege that those defendants used improper tactics in pursuit of their entirely proper goal. Injecting this rule into the already overheated world of modern campaigning would invite abusive litigation designed to turn political contests into legal ones. The Court need not go down this dangerous path. Because the DNC offers no basis for concluding that the alleged AIF Enterprise members “shared a common unlawful purpose to violate RICO” (Rosner, 528 F. Supp. 2d at 429), this enterprise theory fails. 3. The DNC fails to allege relationships amongst the purported association-in-fact enterprise members. For an association-in-fact enterprise to exist, its members also must have “interpersonal relationships” with one another. Boyle, 556 U.S. at 946. Such relationships are crucial to providing the needed “evidence of an ongoing organization, formal or informal, and [] evidence that the various associates function as a continuing unit.’” Id. at 945 (quoting Turkette, 452 U.S. at 583). “[A]n associationin-fact enterprise must have [this] structure.” Id. A plaintiff cannot satisfy the relationships requirement merely by alleging that “participants in [an enterprise] preserve close business relationships and maintain established and defined roles with- 18 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 27 of 56 in the enterprise” (Moss, 258 F. Supp. 3d at 301), or by alleging that “several individuals, independently and without coordination, engaged in a pattern of crimes listed as RICO predicates” (Boyle, 556 U.S. at 947 n.4). Nor does it suffice for a plaintiff to simply “string[] together [] various defendants and label[] them an enterprise.” Town of Mamakating v. Lamm, 2015 WL 5311265, at *9 (S.D.N.Y. Sept. 11, 2015), aff ’d on other grounds, 651 F. App’x 51 (2d Cir. 2016). Rather, a plaintiff must set forth factual allegations demonstrating that the enterprise members “had an interpersonal relationship in which they worked together for a common illicit interest,” from which it could plausibly be inferred that the members were “acting in any way [other than] in their own independent interests.” Moss, 258 F. Supp. 3d at 301 (citation omitted). The Amended Complaint does not plausibly allege the relationships that RICO requires. To be sure, the DNC baldly asserts that the AIF Enterprise “had an ongoing organizational framework” and that this supposed enterprise “could not have carried out its intricate task of sharing confidential information at the moments when it would be most beneficial to the Trump Campaign unless it had some structure for making and communicating group decisions.” (Am. Compl. ¶ 228.) But at no point does the DNC actually identify any such “framework” or “structure.” In fact, the DNC does not even allege any connection whatsoever between most Defendants. Instead, the DNC alleges a series of isolated connections between various individuals. First, it asserts that some Defendants had “long-standing personal, professional, and financial ties to Russia” or to “individuals closely linked to the Russian government.” (Am. Compl. ¶ 64; see id. ¶¶ 65–70.) But none of these supposed “ties” (President Trump’s pre-presidency business dealings in Russia, Paul Manafort’s previous work for “Russian-allied” Ukrainians, Manafort’s and Robert Gates’ “communication[s]” with a “former linguist in the Russian army,” and Assange’s attempts to flee to Russia to escape extradition on sexual-assault charges) are alleged to have anything to do with the - 19 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 28 of 56 supposed enterprise. And it is not enough to allege simply that various individuals “preserve close business relationships” or other relationships. Moss, 258 F. Supp. 3d at 301. Beyond this, the DNC merely alleges isolated interactions between certain Defendants: for instance, Papadopoulos’s meetings with Joseph Mifsud, a Maltese academic “based in London” with undefined connections to Russia (Am. Compl. ¶¶ 93–98); a meeting at Trump Tower that Donald Trump, Jr., Jared Kushner, and Manafort attended with a Russian publicist and an allegedly “Kremlin-connected Russian lawyer,” among others (id. ¶¶ 136–37); and electronic correspondence amongst “GRU operatives,” WikiLeaks, and Roger Stone (id. ¶¶ 146–48, 157–61). These allegations are insufficient for two reasons. First, many of these allegations rely on unsupported assertions that particular individuals were working as “agents” for other Defendants. (See, e.g., id. ¶ 43 (alleging that Mifsud “acted as a de facto agent of the Russian government”); id. ¶ 64 n.* (alleging that certain Defendants “acted as agents of, and their acts are attributable to, the Trump Campaign”); id. ¶ 137 (alleging that the Russian lawyer who attended the Trump Tower meeting “had a history of acting as an agent of the Russian government”).) But “conclusory allegations regarding [an] agency relationship,” without “facts that support [this] assertion[,] … are not sufficient to survive a motion to dismiss.” RSM Prod. Corp. v. Fridman, 643 F. Supp. 2d 382, 408 (S.D.N.Y. 2009), aff ’d, 387 F. App’x 72 (2d Cir. 2010); see also Cannon v. Douglas Elliman, LLC, 2007 WL 4358456, at *5 (S.D.N.Y. Dec. 10, 2007) (dismissing complaint that contained only “conclusory allegations of an agency relationship” and “offer[ed] no facts from which inferences of actual or apparent authority in this context can be drawn”). The DNC offers no such factual support, and so cannot rely on these bare allegations to bootstrap relationships between various Defendants. The DNC thus has no basis for, among other things, establishing relationships between the Campaign and Russia, the GRU, WikiLeaks, or Assange. - 20 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 29 of 56 Second, these isolated interactions between various Defendants do not establish that the disparate and geographically dispersed enterprise members were “work[ing] together for a common illicit interest,” through “interpersonal relationships,” rather than for “their own independent interests.” Moss, 258 F. Supp. 3d at 301 (citation omitted). As explained above (supra § II.A.1), the Amended Complaint establishes that the Defendants held distinct purposes from one another, and were pursuing those distinct purposes rather than some shared objective. And all of the alleged interactions are entirely consistent with Defendants each pursuing their unique, separate objectives. The fact that various Defendants occasionally communicated with one another simply does not provide any “evidence of an ongoing organization” that “function[ed] as a continuing unit.” Boyle, 556 U.S. at 945 (citation omitted). 4. The DNC fails to allege an enterprise with the required longevity. The DNC similarly cannot establish the third structural requirement of an association-in-fact enterprise: “longevity sufficient to permit the[] associates to pursue the enterprise’s purpose.” Boyle, 556 U.S. at 946. Even in the DNC’s telling, the AIF Enterprise did not form until, at the earliest, March 2016—eight months after Russia allegedly “undert[ook] its cyberattack on the DNC” by infiltrating the DNC’s network. (Am. Compl. ¶¶ 84, 115, 227.) And the DNC does not allege that any other enterprise members assisted Russia and the GRU in infiltrating the DNC’s systems and extracting data. (See id. ¶¶ 4, 82–83.) The AIF Enterprise therefore did not exist long enough to play any role in the conduct that facilitated every theft and every disclosure at issue here. The enterprise lacks the required longevity. 5. The DNC fails to allege an enterprise that is separate from the purported pattern of racketeering activity. Under Section 1962, “[t]he ‘enterprise’ is not the ‘pattern of racketeering activity’”; it is an entity separate and apart from the pattern of activity in which it engages.” Turkette, 452 U.S. at 583. The enterprise, in other words, “must have some sort of existence independent of the commission of - 21 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 30 of 56 the predicate acts.” Wood v. Incorporated Vill. of Patchogue, 311 F. Supp. 2d 344, 357 (E.D.N.Y. 2004). A plaintiff asserting a RICO claim therefore cannot merely lump defendants “‘together for the sole reason that they all allegedly had [a hand]’ in the alleged acts.” Aerowest GmbH v. Freitag, 2016 WL 3636619, at *4 (E.D.N.Y. June 28, 2016) (citation omitted). A “RICO enterprise that is coterminous with the pattern of racketeering activity in which it engages … is not actionable.” Stein v. World-Wide Plumbing Supply Inc., 71 F. Supp. 3d 320, 327 (E.D.N.Y. 2014). The DNC quite plainly fails this test. At no point does it even attempt to allege that the AIF Enterprise had any “existence independent of the commission of the predicate acts.” Wood, 311 F. Supp. 2d at 357. To the contrary, even crediting all of the interactions between various Defendants that the DNC cobbles together, those interactions were purely for the purpose of engaging in a pattern of racketeering activity. Confirming as much, the DNC portrays the AIF Enterprise as simply ceasing to exist on Election Day 2016—the very day that the supposed pattern of racketeering activity came to an end. (Am. Compl. ¶ 227.) This makes perfect sense, because the DNC has not alleged “an organized entity,” but rather has “plead[ed] only that a group existed to commit” predicate acts. Aerowest GmbH, 2016 WL 3636619, at *3. Such allegations “do not substantiate an ‘enterprise’ as required for a RICO claim.” Id. at *4. B. The DNC has not alleged that the Campaign conducted or participated in the conduct of the alleged association-in-fact enterprise. Under § 1962(c), “one is not liable … unless one has participated in the operation or management of the enterprise itself.” Reves v. Ernst & Young, 507 U.S. 170, 183 (1993). It is not enough for a defendant merely to associate with an enterprise; “some part in directing the enterprise’s affairs is required.” Id. at 179 (second emphasis added). This standard is not met where a defendant merely attends to its own business; “liability depends on showing that the defendants conducted or participated in the conduct of the enterprise’s affairs, not just their own affairs.” Id. at 185. - 22 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 31 of 56 This being the case, “a person may not be held liable merely for taking directions and performing tasks that are necessary and helpful to the enterprise, or for providing goods and services that ultimately benefit the enterprise.” Moss, 258 F. Supp. 3d at 306; see also Green v. New Vision Int’l, Inc., 156 F.3d 721, 728 (7th Cir. 1998) (“[S]imply performing services for an enterprise, even with knowledge of the enterprise’s illicit nature, is not enough to subject an individual to RICO liability ….”). Nor do “[a]llegations that a defendant had a business relationship with a putative RICO enterprise … suffice.” Crichton v. Golden Rule Ins. Co., 576 F.3d 392, 399 (7th Cir. 2009). In short, “[s]imply alleging that certain entities provide services which are helpful to an enterprise[,] without any allegations that those entities exert any control over the enterprise[,] does not sufficiently allege a claim under RICO against those entities.” City of New York v. Smokes-Spirits.com, Inc., 541 F.3d 425, 449 (2d Cir. 2008), rev’d on other grounds sub nom., Hemi Grp., LLC v. City of New York, 559 U.S. 1 (2010). Here, the DNC does not even allege that the Campaign provided helpful services to the supposed AIF Enterprise—allegations that still would not pass the operation-and-management test. It does not claim the Campaign had any role in hacking into the DNC’s systems, any role in exfiltrating data, or any role in publishing that data. In other words, the DNC does not allege that the Campaign played a part in—let alone directed—any of the conduct upon which its RICO claim is predicated. Instead, the most the DNC alleges is that the Campaign cheered on others to direct the enterprise’s affairs, by supposedly “counsel[ing] and encourag[ing] Russia, the GRU, WikiLeaks, and Assange to commit economic espionage and theft of trade secrets,” and by “prais[ing] the illegal disseminations” (Am. Compl. ¶¶ 5, 240; see also, e.g., id. ¶¶ 23, 97, 154, 187–94.) This does not suffice. As an initial matter, “counsel[ing] and encourag[ing],” by definition, do not amount to “directing the enterprise’s affairs.” Reves, 507 U.S. at 179. This is particularly true given that none of the supposed counseling or encouraging is alleged to have had any impact on the AIF Enterprise’s conduct. The DNC alleges only that those involved in carrying out the actual theft and dissemination of in- - 23 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 32 of 56 formation told others who worked for or communicated with the Campaign of their plans, without soliciting or receiving any assistance—much less any direction—from those individuals. (E.g., Am. Compl. ¶¶ 94(d), 132, 157, 166.) This is the polar opposite of “exert[ing] … control over the enterprise.” Smokes-Spirits.com, 541 F.3d at 449. Just as clearly, praising the results of others’ efforts in directing the AIF Enterprise’s affairs is not tantamount to directing those affairs. If it were, every journalist that credited the disclosures with providing useful information could similarly be said to have directed the AIF Enterprise. But that is obviously nonsense (and contrary to the First Amendment). The Campaign did not direct the AIF Enterprise’s affairs by praising the disclosure of (true and newsworthy) information any more than a stadium of baseball fans can be said to have directed their team’s affairs on the field. C. The DNC has not alleged that the Campaign committed any predicate acts, let alone a pattern of racketeering activity. “[T]he heart of any RICO complaint is the allegation of a pattern of racketeering.” Agency Holding Corp. v. Malley-Duff & Assocs., 483 U.S. 143, 154 (1987). A “‘pattern of racketeering activity’ requires at least two acts of racketeering activity”—known as “predicate acts”—occurring “within ten years” of one another. § 1961(5). A plaintiff must establish that the predicate acts “are related, and that they amount to or pose a threat of continued criminal activity.” H.J. Inc. v. Nw. Bell Tel. Co., 492 U.S. 229, 239 (1989). The DNC is unable to establish that the Campaign engaged in a pattern of racketeering activity, both because the law forecloses the aiding-and-abetting theory on which the DNC exclusively relies, and because the DNC in any event fails to allege the continuous criminal activity that RICO requires. First, the DNC’s § 1962(c) claim against the Campaign fails because it does not allege that the Campaign committed any predicate acts. Instead, it alleges that only Russia, the GRU, WikiLeaks, and Assange committed predicate acts (namely, economic espionage and theft of trade secrets). (Am. Compl. ¶¶ 231–38.) The DNC’s sole theory as to the Campaign is that it “aided and abetted Russia, - 24 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 33 of 56 the GRU, WikiLeaks, and Assange as they committed economic espionage and theft of Trade Secrets,” by “counsel[ing] and encourag[ing]” them to commit those acts. (Id. ¶ 240 (emphasis added).) The law forecloses this theory. “Courts in this district have routinely held that ‘aiding and abetting’ a RICO enterprise is not a valid cause of action.” Spinale v. United States, 2004 WL 50873, at *6 (S.D.N.Y. Jan. 9, 2004); see also, e.g., Goldfine v. Sichenzia, 118 F. Supp. 2d 392, 406 (S.D.N.Y. 2000) (same); DeFalco v. Bernas, 244 F.3d 286, 330 (2d Cir. 2001) (affirming decision in which district court dismissed RICO claim on the grounds that “RICO does not provide for aider-and-abettor liability”). The reason for this rule is straightforward. The Supreme Court has emphasized that, when Congress enacts a civil statute “under which a person may sue and recover damages from a private defendant for the defendant’s violation of some statutory norm, there is no general presumption that the plaintiff may also sue aiders and abettors.” Cent. Bank of Denver, N.A. v. First Interstate Bank of Denver, N.A., 511 U.S. 164, 182 (1994) (holding that there is no aiding-and-abetting liability under Section 10(b) of the Securities Exchange Act). “Congress knew how to impose aiding and abetting liability when it chose to do so”; if it “intended to impose aiding and abetting liability” under civil RICO, the presumption mandated in Central Bank of Denver is that “it would have used the words ‘aid’ and ‘abet’ in the statutory text.” Id. at 176–77. Those words, however, do not appear in § 1962. See, e.g., Rolo v. City Investing Co. Liquidating Tr., 155 F.3d 644, 657 (3d Cir. 1998) (“Like § 10(b), the text of § 1962 itself contains no indication that Congress intended to impose private civil aiding and abetting liability under RICO.”). Because the DNC cannot rely on an aiding-and-abetting theory, it has not alleged a single predicate act by the Campaign—let alone a pattern of racketeering activity. In all events, the DNC’s allegations fail to plausibly allege aiding and abetting. To establish a claim for aiding and abetting, a complaint must allege, among other things, “‘substantial assistance’ by the aider and abettor in the achievement of the primary violation.” Tribune Co. v. Purcigliotti, 869 F. Supp. 1076, 1100 (S.D.N.Y. 1994) (citation omitted), aff ’d sub nom. Tribune Co. v. Abiola, 66 F.3d 12 (2d - 25 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 34 of 56 Cir. 1995). But the DNC does not plead that the Campaign provided any—let alone substantial— assistance to the Defendants that allegedly committed predicate acts. Instead, it alleges only that the Campaign “counseled and encouraged” those Defendants. (Am. Compl. ¶ 240.) This is not enough. And to the extent that this supposed “counsel[] and encourage[ment]” is premised on the Campaign’s encouraging disclosures of materials that it had no role in stealing or its publicly referencing already-disclosed materials (id. ¶¶ 154, 187–94), that conduct is shielded by the First Amendment and so cannot provide a basis for liability. Supra § I. Additionally, aiding-and-abetting liability applies only where a person “give[s] a degree of aid” to others who “engage in [] proscribed activities.” Cent. Bank of Denver, 511 U.S. at 176. But Russia contends that sovereign immunity shields it from liability for any predicate acts. ECF No. 186 at 4–7. And the Communications Decency Act (47 U.S.C. § 230) forecloses liability for a website that provides a forum where “third parties can post information”—which WikiLeaks is accused of doing here (by allegedly providing a forum for Russia to publish content it had obtained). Klayman v. Zuckerberg, 753 F.3d 1354, 1358 (D.C. Cir. 2014). To the extent that the law does not reach either Russia’s or WikiLeaks’ alleged conduct, the Campaign cannot have aided and abetted any “proscribed activities”—further confirming the futility of the DNC’s theory. Second, even if the law allowed aiding-and-abetting RICO liability, the DNC still would be unable to establish the “continued criminal activity” that RICO requires. H.J., 492 U.S. at 239. A plaintiff can satisfy this requirement “either by showing a ‘closed-ended’ pattern—a series of related predicate acts extending over a substantial period of time—or by demonstrating an ‘open-ended’ pattern of racketeering activity that poses a threat of continuing criminal conduct beyond the period during which the predicate acts were performed.” Spool, 520 F.3d at 183 (citing H.J., 492 U.S. at 241). The DNC attempts to establish only closed-ended continuity, as it alleges that the AIF Enterprise ceased on November 8, 2016 (Election Day). (Am. Compl. ¶ 227.) See also Michalowski v. - 26 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 35 of 56 Rutherford, 82 F. Supp. 3d 775, 790 (N.D. Ill. 2015) (holding that plaintiff alleging RICO enterprise carried out through a political campaign “has alleged a closed period,” because the “campaigns ended with the elections” and so “common sense suggests that there is no credible threat of future harm”). Closed-ended continuity requires “a series of related predicates extending over a substantial period of time” (H.J., 492 U.S. at 242), and the Second Circuit has “never held a period of less than two years to constitute a ‘substantial period of time” (Spool, 520 F.3d at 184). See also Eagle One Roofing Contractors, Inc. v. Acquafredda, 2018 WL 1701939, at *14 (E.D.N.Y. Mar. 31, 2018) (same). But the DNC alleges that the AIF Enterprise existed for no more than nine months, having formed no earlier than March 2016. This is nowhere near the “long-term criminal conduct” that RICO requires. H.J., 492 U.S. at 242. D. The DNC has not alleged any cognizable injury that was proximately caused by the alleged RICO violations. A plaintiff has a cause of action to sue under RICO only if it was “injured in [its] business or property.” 18 U.S.C. § 1964(c). The injury must be “actual [and] quantifiable”; “courts have required that the plaintiff show concrete financial loss in order to show injury under RICO.” Westchester Cty. Indep. Party v. Astorino, 137 F. Supp. 3d 586, 613 (S.D.N.Y. 2015). The injury to business or property, moreover, must be “by reason of a violation of section 1962” (§ 1964(c)) meaning that the RICO violation must be “both the proximate cause and the but-for cause of the plaintiffs’ injuries.” Westchester Cty. Indep. Party, 137 F. Supp. 3d at 612 (citing UFCW Local 1776 v. Eli Lilly & Co., 620 F.3d 121, 132 (2d Cir. 2010)). “When a court evaluates a RICO claim for proximate causation, the central question it must ask is whether the alleged violation led directly to the plaintiff ’s injuries.” Anza v. Ideal Steel Supply Corp., 547 U.S. 451, 460–61 (2006) (emphasis added). A plaintiff must plausibly allege that its damages are “attributable to the violation, as distinct from other, independent factors.” DeFalco, 244 F.3d at 329–30 (quoting Holmes v. Sec. Inv’r Prot. Corp., 503 U.S. 258, 269 (1992)). - 27 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 36 of 56 The DNC makes four attempts at asserting cognizable injuries proximately caused by the supposed RICO violations. All four fail. First, the DNC alleges that the WikiLeaks publications disrupted its political efforts, including by “driving a wedge between the DNC and Democratic voters,” “impair[ing] the DNC’s ability to support Democratic candidates,” “undermining the party’s ability to achieve unity and rally members around their shared values,” and inflicting “a chilling effect on donations to the DNC.” (Am. Compl. ¶ 200–03.) But interference with the DNC’s political efforts does not constitute an “injury to business or property.” “[I]njury to the [p]arty’s ‘business of choosing and securing candidates of their choice’”—or supporting those candidates—“does not become a business injury simply by virtue of calling it that.” Westchester Cty. Indep. Party, 137 F. Supp. 3d at 615. This is instead, “at most, a noneconomic” political injury. Id. Proving the point, the DNC does not even claim to have any way of quantifying the “impair[ment]” of its “ability to support Democratic candidates” or the “interfer[ence] with [its] opportunity to communicate its vision to the electorate.” (Am. Compl. ¶¶ 200–01.) Similarly, allegations that the DNC “has been unable to earn the money donations it normally secures … lack[] the requisite precision necessary to constitute a RICO injury.” Westchester Cty. Indep. Party, 137 F. Supp. 3d at 615. Further, the DNC cannot show that these purported injuries directly followed from the alleged RICO violation, “as distinct from other, independent factors.” DeFalco, 244 F.3d at 329–30. As an initial matter, the DNC cannot establish that any political injury it suffered was caused by the alleged predicate acts (the theft and disclosure of the emails) as opposed to the public’s reaction to the information those emails revealed about the DNC’s conduct. And in any event, there are a number of well-known factors—having nothing to do with the WikiLeaks releases—that caused the DNC to struggle politically in the lead-up to its candidate’s defeat in the general election: the protracted primary fight between Secretary Clinton and Senator Sanders, the then-FBI Director’s public statement - 28 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 37 of 56 declaring that Secretary Clinton had been “extremely careless” in using a private email server as Secretary of State (and later announcing, days before the election, that the investigation into Secretary Clinton’s email practices was being reopened), low enthusiasm for Secretary Clinton among important demographic groups, and so on. See, e.g., A. Chozick et al., Bernie Sanders Endorses Hillary Clinton, Hoping to Unify Democrats, N.Y. Times (July 12, 2016), https://goo.gl/5y6hQh (“After 14 months of policy clashes and moments of disdain, Senator Bernie Sanders endorsed Hillary Clinton ….”); D. Balz & S. Clement, Clinton Holds Narrow Lead over Trump on Eve of Conventions, Wash. Post (July 17, 2016), https://goo.gl/CneHZk (reporting that polls “shift[ed] in Trump’s direction” after “Clinton received a stern rebuke from [the] FBI Director” for her and her aides’ “handling of sensitive classified material in their email exchanges”); A. Chozick, Hillary Clinton Blames F.B.I. Director for Election Loss, N.Y. Times (Nov. 12, 2016), https://goo.gl/CVhaAo (“Hillary Clinton on Saturday cast blame for her surprise election loss on the announcement by the F.B.I. director … days before the election that he had revived the inquiry into her use of a private email server.”); J. Peters et al., Black Turnout Soft in Early Voting, Boding Ill for Hillary Clinton, N.Y. Times (Nov. 1, 2016), https://goo.gl/cjk9cm (reporting that “disappointing black turnout” was “creating a vexing problem for Hillary Clinton as she clings to a deteriorating lead over Donald J. Trump with Election Day just a week away”); J. Peters and Y. Alcindor, Hillary Clinton Struggles to Win Back Young Voters From Third Parties, N.Y. Times (Sept. 28, 2016), https://goo.gl/GTGsjm (“[Young voters] are not moving toward the [Democratic] party and its nominee as quickly and predictably as they have in past elections.”). These factors and others all played major roles in “undermining the party’s ability to achieve unity.” (Am. Compl. ¶ 201.) The DNC thus cannot show that “the alleged violation led directly to” its supposed injuries. Anza, 547 U.S. at 461 (emphasis added). Second, the DNC alleges that “the public releases … exposed employees of the DNC to intense, frightening, and sometimes life-threatening harassment.” (Am. Compl. ¶ 204; see also id. ¶¶ 205–08.) - 29 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 38 of 56 But those individuals are not plaintiffs, and the DNC has no standing to sue on their behalf. A RICO “plaintiff only has standing if, and can only recover to the extent that, he has been injured in his business or property by the conduct constituting the violation.” Sedima, S.P.R.L. v. Imrex Co., 473 U.S. 479, 496 (1985) (emphases added). And in any event, “RICO violations must cause injury to ‘business or property’”; “personal or emotional damages do not qualify.” Gross, 628 F. Supp. 2d at 488; see also Westchester Cty. Indep. Party, 137 F. Supp. 3d at 612 (collecting cases). Third, the DNC alleges that its computer systems were damaged by the alleged hacking, purportedly creating the need to repair and replace certain technology, and to retain staff and consultants to investigate the hacking and remediate the damage. (Am. Compl. ¶ 209.) But the DNC alleges that the hacking commenced in July 2015—months before the AIF Enterprise allegedly came into existence (somewhere between March and June 2016). (Id. ¶¶ 115, 227.) And the DNC does not suggest that it can identify particular damage that resulted from subsequent conduct after the AIF Enterprise came into being, rather than the initial hack. It therefore has no basis for claiming that the AIF Enterprise proximately caused this injury. Finally, the DNC alleges that the GRU “stole proprietary computer code” and “proprietary information concerning the ways in which the DNC analyzed its data, developed its strategies and approached decisions in its efforts to win the 2016 election.” (Id. ¶¶ 210–11.) Although the DNC says that it “derives value” from this code and information “by virtue of their secrecy” (id. ¶¶ 176, 178, 181) and that “[t]he GRU could have derived significant economic value” from this data by “selling the data to the highest bidder” (id. ¶ 185), it does not allege that the information actually was sold, or that the information was disseminated at any point. These supposed injuries thus have no connection to the releases of trade secrets that underlie the DNC’s § 1962(c) claim. And even if they did, the DNC does not claim that it can quantify any “concrete financial loss” stemming from this alleged theft, as would be required. Westchester Cty. Indep. Party, 137 F. Supp. 3d at 612. - 30 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 39 of 56 * * * * * The DNC does not allege a valid association-in-fact enterprise, does not allege that the Campaign participated in the operation or management of any such enterprise, does not allege that the Campaign committed any predicate acts (let alone a continuous pattern of such acts), and does not allege that it sustained any cognizable injury to its property or business that was proximately caused by RICO violations. Its § 1962(c) claim against the Committee must be dismissed. E. The DNC’s tagalong RICO-conspiracy claim also fails. The DNC’s RICO-conspiracy claim under § 1962(d) fares no better. “To establish the existence of a RICO conspiracy, a plaintiff must prove ‘the existence of an agreement to violate RICO’s substantive provisions.’” Cofacredit, S.A. v. Windsor Plumbing Supply Co., 187 F.3d 229, 244 (2d Cir. 1999) (citation omitted). After all, “[a] conspirator must intend to further an endeavor which, if completed, would satisfy all of the elements of a substantive criminal offense.” Salinas v. United States, 522 U.S. 52, 65 (1997). So where, as here, a plaintiff is unable to plead a violation of any of RICO’s substantive provisions, that plaintiff by definition cannot establish a conspiracy to violate any of those provisions. That is why “[c]ase law in this Circuit confirms that a 1962(d) conspiracy claim must be dismissed where the substantive RICO claim is deficient.” Nat’l Grp., 420 F. Supp. 2d at 272; see also, e.g., Westchester Cty. Indep. Party, 137 F. Supp. 3d at 618 (collecting cases so holding). In any event, the DNC’s conspiracy claim fails on its own terms because the DNC has not alleged a conspiratorial agreement with anywhere near the required specificity. “The core of a RICO civil conspiracy is an agreement to commit predicate acts,” and so the DNC must plausibly allege a “conscious agreement among all defendants to commit at least two predicate acts.” Casio Computer Co. v. Sayo, 2000 WL 1877516, at *22 (S.D.N.Y. Oct. 13, 2000). “Conclusory allegations of a conspiracy,” by contrast, “are insufficient to plead a Section 1962(d) claim.” Nat’l Grp., 420 F. Supp. 2d at 272 (ci- - 31 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 40 of 56 tation omitted); see also Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (“Threadbare recitals of the elements of a cause of action, supported by mere conclusory statements, do not suffice ….”). But conclusory allegations are all that the DNC offers. Its § 1962(d) claim spans all of four paragraphs, one of which just incorporates the rest of the Amended Complaint and the other three of which merely recite the elements of a § 1962(d) cause of action. (Am. Compl. ¶¶ 243–46.) At no point does the DNC allege specific facts plausibly suggesting that the Campaign reached an agreement with the other Defendants to commit predicate acts of economic espionage and theft of trade secrets. For this reason, too, the DNC’s § 1962(d) claim fails. See 4 K & D Corp., 2 F. Supp. 3d at 545 (dismissing § 1962(d) claim because “plaintiffs have alleged no facts to show specifically that the defendants had any ‘meeting of the minds’ in the alleged violations”). * * * * * The DNC’s RICO claims under § 1962(c) and § 1962(d) should be dismissed with prejudice. III. The DNC Fails to State a Wiretap Act Claim Against the Campaign. A person violates the “use” clause of the Wiretap Act—the only clause that the Amended Complaint accuses the Campaign of violating (Am. Compl. ¶ 250)—if he “intentionally uses … the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of [the statute].” 18 U.S.C. § 2511(1)(d). The DNC fails to state a claim against the Campaign under the Wiretap Act because (1) it fails to allege that there was an interception or that the Campaign knew or had reason to know that there was an “interception,” and (2) it fails to allege a prohibited “us[e]” of an intercepted communication. A. The DNC fails to allege that there was an interception or that the Campaign knew or had to reason to know of an interception. The Wiretap Act addresses the “interception” of communications. “Every circuit court to have considered the matter has held that an ‘intercept’ under the Act must occur contemporaneously with - 32 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 41 of 56 transmission.” Luis v. Zang, 833 F.3d 619, 627 (6th Cir. 2016); see Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 113 (3d Cir. 2003); United States v. Steiger, 318 F.3d 1039, 1047 (11th Cir. 2003); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 876 (9th Cir. 2002); Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 461 (5th Cir. 1994). This Court, too, has ruled that the Act “has a requirement of contemporaneous interception.” Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548, 557 (S.D.N.Y. 2008); see Tarantos v. Fox News Network, LLC, 2018 WL 2731268, at *8 (S.D.N.Y. May 18, 2018); Snyder v. Fantasy Interactive, Inc., 2012 WL 569185, at *2 (S.D.N.Y. Feb. 9, 2012). This requirement of contemporaneousness follows from the ordinary meaning of “intercept”: “stop, seize, or interrupt in progress or course or before arrival.” Merriam-Webster Online Dictionary, intercept (emphasis added). Just as a football player cannot “intercept” a pass that has already been caught, a defendant cannot “intercept” a communication that has already concluded. This requirement of contemporaneousness also makes sense in context. The Wiretap Act distinguishes between “electronic communication” (a “transfer” of electronic signals) and “electronic storage” (a “storage” of an electronic communication). § 2510(12), (17). “The term ‘intercept’ … applies only to electronic communications, not to electronic storage.… [This] means that the term intercept applies solely to the transfer of electronic signals. The term does not apply to the acquisition of electronic signals that are no longer being transferred.” Luis, 833 F.3d at 627. This interpretation likewise makes sense in light of the distinction between the Wiretap Act and the Stored Communications Act. The Wiretap Act—which, again, addresses “interception”— punishes both the interception itself and the subsequent disclosure of the intercepted information. 18 U.S.C. § 2511(1). In contrast, the Stored Communications Act—which addresses “access to a wire or electronic communication while it is in electronic storage”—punishes only the “access[ing]” of the stored communication; it does not punish the subsequent disclosure of that communication. - 33 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 42 of 56 § 2701(a). Interpreting “interception” to cover accessing stored communications would subvert the distinctions that Congress drew between these statutes. The DNC fails to allege an “interception.” The Amended Complaint states that Russian agents stole “several gigabytes of DNC data located”—i.e., stored—“on the DNC’s servers.” (Am. Compl. ¶ 104.) The Amended Complaint notably does not state that Russian agents acquired the DNC emails while DNC employees were in the process of sending or receiving them. The Amended Complaint thus alleges only that Russian agents gained access to stored communications—not that they intercepted communications contemporaneously with the communications’ transmission. The only allegation in the Amended Complaint that relates to interception—“On information and belief, the hackers intercepted or endeavored to intercept emails and voice-based communications while in the DNC servers” (Id. ¶ 129)—does not suffice. First, a complaint must “give the defendant fair notice of what the claim is and the grounds upon which it rests.” Twombly, 550 U.S. at 555. The DNC’s allegation fails to provide fair notice because it fails to specify which particular “emails and voice-based communications” were intercepted. As a result, the Campaign and the Court have no way to determine whether the DNC has plausibly alleged that those communications were intercepted at all, whether the Campaign knew or had reason to know of such an interception, or whether the Campaign even used those particular communications. Second, a complaint must plead “factual content,” not “conclusory statements” that parrot “the elements of a cause of action.” Iqbal, 556 U.S. at 678. The Amended Complaint asserts the legal conclusion that the hackers “intercepted” emails, but fails to back up that legal conclusion with factual allegations that the hackers obtained any emails contemporaneously with their transmission. Third, the allegation in all events does not establish that the Campaign “kn[ew] or ha[d] reason to know that the information was obtained through … interception.” § 2511(1)(d). The Amended Complaint nowhere alleges that the Campaign knew or should have known that Russian agents ac- - 34 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 43 of 56 quired the emails contemporaneously with the emails’ transmission. It is particularly telling that, even though the DNC hired “a cybersecurity technology firm” to “investigate the attack” and conduct a “forensic analysis on the DNC’s computer network,” the DNC pleads interception only “on information and belief.” If the DNC itself cannot tell whether there was an “interception,” the Campaign cannot have known or had reason to know that there was an interception. B. The DNC fails to allege that the Campaign “used” intercepted communications. The provision of the Wiretap Act at issue here prohibits the intentional “use” of intercepted communications. § 2511(1)(d). But a defendant does not “use” an interception if someone else discloses the contents of an intercepted communication to the public, and the defendant then discusses those publicly available materials. Common sense and the First Amendment both compel this reading of the statute. Newspapers and other media resources routinely publish unlawfully intercepted communications. See, e.g., Bartnicki, 532 U.S. 514 (radio show’s publication of wiretapped telephone call); Boehner, 484 F.3d 573 (newspaper’s publication of wiretapped telephone call). Members of the public, in turn, routinely listen to or read these disclosed communications. As discussed above (supra § I), it would defy common sense and violate the First Amendment to punish, as an illegal user of intercepted communications, “every reader of the information in the newspapers [who] learned that it had been obtained by unlawful intercept.” Boehner, 484 F.3d at 586 (opinion of Sentelle, J.). “Under [such a ] rule … no one in the United States could communicate [about publicly available information] because of the defect in the chain of title.” Id. Neither common sense nor the First Amendment “permits this interdiction of public information.” Id. Under these principles, the DNC fails to allege that the Campaign engaged in a prohibited “use” of any intercepted communications. The Amended Complaint alleges that “WikiLeaks and Assange”—not the Campaign—“disclosed the contents of [the DNC’s] wire, oral, or electronic communi- - 35 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 44 of 56 cations.” (Am. Compl. ¶ 249.) The Amended Complaint adds that, after WikiLeaks “disclosed” these communications to the public, Mr. Trump “lauded the disclosure,” “encouraged the media and voters to pay more attention to the leaks,” and “enthusiastically direct[ed] attention to those stolen documents” “[a]t his rallies.” (id. ¶¶ 187, 193.) This alleged conduct, however, does not amount to a prohibited “use,” because WikiLeaks had already made the emails public by that time. The Wiretap Act does not prohibit—and, under the First Amendment, cannot prohibit—a speaker from discussing publicly available information, even if there is a “defect in the chain of title.” Boehner, 484 F.3d at 586 (opinion of Sentelle, J.). That is all the more true when the speaker is a political candidate, for “the First Amendment has its fullest and most urgent application to speech uttered during a campaign for political office.” Citizens United, 558 U.S. at 339. In effect, the DNC’s Wiretap Act claim goes a step beyond what the Supreme Court prohibited in Bartnicki. As explained above, the Supreme Court ruled in Bartnicki that the Government may prohibit the theft of private communications, but may not punish their subsequent disclosure. Supra § I. Here, the DNC does not claim that the Campaign stole or even disclosed its communications; rather, it claims only that the Campaign “used” those communications after their theft and after their disclosure. This theory of liability has no logical stopping point. Thousands of newspaper, radio, television, and internet journalists covered the disclosed DNC emails, and millions of citizens read and discussed them. On the DNC’s theory, all of these people would be “users” of intercepted information, simply because they (like the Campaign) “discussed the disclosure.” (Am. Compl. ¶ 193.) Certainly all media that covered the story would fall squarely within the DNC’s expansive interpretation of “use.” That result is absurd and unconstitutional. The DNC cannot get around these problems by asserting that the Campaign conspired with Russian agents and WikiLeaks to disclose the DNC emails. For one thing, the Wiretap Act includes separate clauses addressing the “use” and the “disclos[ure]” of intercepted communications. - 36 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 45 of 56 § 2511(1)(c)–(d). The Amended Complaint asserts a claim against the Campaign only under the use clause, not the disclosure clause. (Am. Compl. ¶¶ 249–50.) For another thing, federal statutes, as noted, presumptively impose civil liability only on “primary violator[s]”—the people who actually commit the act prohibited by the statute. Cent. Bank of Denver, 511 U.S. at 191; see also supra § II.C. Courts may impose “secondary liability”—for instance, liability for conspiracy, aiding and abetting, or concerted action—only where Congress expressly authorizes it. Cent. Bank of Denver, 511 U.S. at 184. In contrast with other clauses of the Wiretap Act, the use and disclosure clauses do not provide for any form of secondary liability. Compare § 2511(1)(a) (“intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept ” ) (emphasis added), with § 2511(1)(c)–(d) (“intentionally discloses, or endeavors to disclose … [or] intentionally uses, or endeavors to use”). As a result, allegations that the Campaign conspired with others to disclose the DNC’s emails are beside the point. As far as the Wiretap Act is concerned, all that matters is what the Campaign itself allegedly did. What the Campaign itself allegedly did—talk about the DNC emails after WikiLeaks published them—is protected speech, not a violation of a federal statute. IV. The DNC Fails to State State-Law Claims Against the Campaign. The DNC fails to state a claim against the Campaign for misappropriation of trade secrets in violation of Washington, D.C. law, for conspiracy to commit trespass to chattels in violation of Virginia law, and for violation of Virginia’s Computer Crimes Act. A. The Court should decline to exercise supplemental jurisdiction over the state-law claims. The DNC urges the Court to exercise supplemental jurisdiction over its state-law claims. (Am. Compl. ¶ 33.) But supplemental jurisdiction “is a doctrine of discretion, not of plaintiff ’s right.” United Mine Workers v. Gibbs, 383 U.S. 715, 726 (1966). The Court should exercise its discretion to decline supplemental jurisdiction over the state-law claims in this case. - 37 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 46 of 56 1. The supplemental-jurisdiction statute identifies four grounds for declining supplemental jurisdiction, two of which are relevant here. A federal court may decline supplemental jurisdiction over a claim if “the claim raises a novel or complex issue of State law.” 28 U.S.C. § 1367(c)(1). The tradesecrets claim raises the novel issue whether a political party’s donor information qualifies as a trade secret, and the complex issues associated with sorting through the thousands of documents on the DNC’s servers in order to determine which (if any) qualify as trade secrets and which do not. The claim for conspiracy to commit trespass to chattels raises novel issues regarding the scope of the tort of trespass to chattels in Virginia. See America Online, Inc. v. IMS, 24 F. Supp. 2d 548, 550 (E.D. Va. 1998) (“[A]uthority under Virginia law respecting an action for trespass to chattels is sparse ….”). And the claim that the Campaign aided and abetted a violation of the Computer Crimes Act raises the novel issue whether the Act imposes liability upon aiders and abetters. See Alliance Tech. Grp., LLC v. Achieve 1 LLC, 2013 WL 143500, at *4 (E.D. Va. Jan. 11, 2013) (“[T]he Supreme Court of Virginia has refrained from either recognizing or rejecting a separate ‘aiding and abetting’ tort.”). A federal court may also decline to exercise supplemental jurisdiction if it “has dismissed all claims over which it has original jurisdiction.” § 1367(c)(3). For the reasons explained above and in the other Defendants’ motions to dismiss, the Court should dismiss the federal claims in this case— the only claims over which it has original jurisdiction. 2. When a case falls within one of the factors set forth in § 1367(c) and “trigger[s]” the district court’s discretion, the court “balances the traditional values of judicial economy, convenience, fairness, and comity” to determine whether to exercise that discretion to decline jurisdiction. Kolari v. N.Y.-Presbyterian Hosp., 455 F.3d 118, 122 (2d Cir. 2006). These factors strongly support declining jurisdiction here. First, the Special Counsel and multiple congressional committees are already investigating allegations of collusion between Russia and Americans during the 2016 presidential campaign. Exercising supplemental jurisdiction would complicate those investigations by forcing the - 38 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 47 of 56 Special Counsel and congressional committees to coordinate their efforts with a private plaintiff ’s discovery demands. Second, the Special Counsel has already filed an indictment against twelve Russians for allegedly conspiring to hack into the DNC’s servers. See Indictment, United States v. Netyshko, No. 1:18-cr-215 (D.D.C. July 13, 2018), ECF No. 1. If the Court were to exercise supplemental jurisdiction, it may have to stay proceedings in this case anyway, to ensure that civil discovery does not interfere with the criminal defendants’ rights in the pending criminal case. See Louis Vuitton Malletier, S.A. v. LY USA, Inc., 676 F.3d 83, 101 (2d Cir. 2012) (“There is considerable authority for the principle that a stay is most justified where a movant … is already under indictment for a serious criminal offense and is required at the same time to defend a civil action involving the same subject matter”). Finally, the Second Circuit has “repeatedly held that a district court particularly abuses its discretion when it retains jurisdiction over state-law claims raising unsettled questions of law following dismissal of all original-jurisdiction claims.” Kolari, 455 F.3d at 124. B. The DNC fails to state a trade-secrets claim against the Campaign. The District of Columbia Uniform Trade Secrets Act prohibits the misappropriation of “trade secrets”—“information … that (A) [d]erives actual or potential independent economic value, from not being generally known …; and (B) [i]s the subject of reasonable efforts to maintain its secrecy.” D.C. Code § 36-401(4). The DNC fails to state a claim for misappropriation because they fail to plead that this case involves any “trade secrets.” 1. A complaint must “give the defendant fair notice of what the claim is and the grounds upon which it rests.” Twombly, 550 U.S. at 555. To give a defendant fair notice of a trade-secrets claim, a plaintiff must, “at a minimum,” “generally identify the trade secrets at issue.” Alexander Interactive, Inc. v. Leisure Pro Ltd., 2014 WL 4651942, at *5 (S.D.N.Y. Sep. 16, 2014). A plaintiff may not simply identify “broad” “categories” that “potentially encompass both confidential information and [public] - 39 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 48 of 56 information.” Boccardi Capital Sys. v. D.E. Shaw Laminar Portfolios, LLC, 2009 WL 362118, at *4 (S.D.N.Y. Feb. 9, 2009). The DNC’s Complaint fails this test. The Amended Complaint asserts that the pertinent “trade secrets” “included Democratic donor information, … opposition research, and strategic information regarding planned political activities.” (Am. Compl. ¶ 267.) But these “broad” “categories” encompass at least some plainly public information. Boccardi, 2009 WL 362118, at *4. For example, “Democratic donor information” encompasses the names and addresses of donors—information that federal law requires political committees to disclose, and which the Federal Election Commission already posts on its website. See 52 U.S.C. § 30101; FEC, Transaction Query by Individual Contributor, https://goo.gl/1V6DaC. “Opposition research” encompasses damaging information about political adversaries that is already publicly known. And “strategic information” is so vague that it could encompass nearly anything. The Campaign cannot properly defend itself against the DNC’s tradesecrets claim when the DNC refuses to say what the trade secrets in question are. 2. To qualify as a trade secret, information must also “[d]eriv[e] … independent economic value[] from not being generally known to, and not being readily ascertainable by, … another who can obtain economic value from its disclosure or use.” D.C. Code § 36-401(4)(A). It is not enough for the information simply to have “independent economic value”; the information must derive that value “from not being generally known” and “not being readily ascertainable.” The DNC’s purported “trade secrets” fail this test. First, the DNC has failed to show that “donor information” derives value from secrecy. A list of potential donors may have value to political parties, but that value does not depend on whether the list is public or private. Either way, a political party can continue to use the information to reach potential contributors. See CAIR Action Network, Inc. v. Gaubatz, 82 F. Supp. 3d 344, 361 (D.D.C. 2015) (“The Court doubts that Plaintiffs have shown, as necessary, that the donor lists in this case qualify as trade secrets: Plaintiffs have not … shown - 40 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 49 of 56 how their particular value derives from their secrecy”). Second, the DNC has failed to show that “opposition research” derives value from secrecy. Quite the opposite, opposition research derives value from publicity; it can have an effect only when the damaging information is revealed to the public. Finally, the DNC has failed to show that “strategic information”—whatever that may be—has any “independent economic value” at all, much less that it derives such value from secrecy. 3. Next, a trade secret must be secret—“not … generally known.” § 36-401(4)(A). “A trade secret that becomes public knowledge is no longer a trade secret.” BondPro Cop. v. Siemens Power Generation, 463 F.3d 702, 706 (7th Cir. 2006) (Posner, J.); see Ruckelshaus v. Monsanto Co., 467 U.S. 986, 1002 (1984). This principle defeats the DNC’s trade-secret claims against the Campaign, because the DNC’s information was no longer secret by the time the Campaign allegedly used it. The Amended Complaint alleges that Russian agents first stole the DNC’s information, that WikiLeaks then disclosed that information to the public, and that the Campaign then “used” the information by discussing that public disclosure. Supra pp. 5–7. The Amended Complaint nowhere alleges that the Campaign itself stole the information, that the Campaign itself disclosed the information, or even that the Campaign itself used the information at any time between the theft and the public disclosure. Put simply, WikiLeaks’ public disclosure of the DNC’s information had already extinguished any tradesecret protection by the time the Campaign did anything with that information. The trade-secret claim against the Campaign must therefore be dismissed. 4. Finally, to qualify as a trade secret, information must be “the subject of reasonable efforts to maintain its secrecy.” D.C. Code § 36-401(4)(B). The DNC’s Complaint fails to allege this element. The Amended Complaint nowhere describes measures the DNC took to keep its information secret before the theft. Rather, the Amended Complaint discusses only the measures that the DNC took after “discovering the intrusion.” (Am. Compl. ¶ 110.) Because “the Complaint contains no factual allegations that would support an inference … that [the plaintiff] used ‘reasonable efforts to safe- - 41 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 50 of 56 guard its secrecy,’” the trade-secret claim should be “dismissed … for failure to state a claim.” Econ. Research Servs. v. Resolution Econ., LLC, 208 F. Supp. 3d 219, 233 (D.D.C. 2016) (citation omitted). C. The DNC fails to state a claim against the Campaign for conspiracy to commit trespass to chattels. Under Virginia law, two or more persons engage in civil conspiracy if they “combin[e] to accomplish, by some concerted action, some criminal or unlawful purpose or some lawful purpose by a criminal or unlawful means.” Gelber v. Glock, 800 S.E.2d 800, 820 (Va. 2017). And a person commits trespass to chattels if he “intentionally uses or intermeddles with personal property in rightful possession of another without authorization,” and as a result “the chattel is impaired as to its condition, quality, or value.” State Analysis, Inc. v. Am. Fin. Servs. Ass’n, 621 F. Supp. 2d 309, 320 (E.D. Va. 2009). Critically, hacking a computer network may qualify as trespass to chattels, but publishing emails retrieved from such a hack does not. The term “chattel” covers “visible, tangible, personal property only.” First Nat’l Bank v. Holland, 39 S.E. 126, 129 (Va. 1901). And a person “intermeddles” with a chattel if he “intentionally bring[s] about a physical contact with the chattel.” Restatement (Second) of Torts § 217, comment (e). A “computer network” may qualify as a chattel, because “computers … are tangible personal property.” America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444, 452 (E.D. Va. 1998). And the unauthorized “transmission of electrical signals through a computer network [may be] sufficiently ‘physical’” to qualify as intermeddling. Id. In contrast, however, merely publishing an email that someone else has hacked does not involve unauthorized physical contact with tangible personal property—and, thus, does not amount to trespass to chattels. In light of this principle, the Court should dismiss the DNC’s claim for conspiracy to commit trespass to chattels for two separate reasons. One, a plaintiff alleging a civil conspiracy under Virginia law must first show that the defendants have “combined to accomplish” the asserted “criminal or unlawful” act. Gelber, 800 S.E.2d at 820. The DNC, however, has not alleged that the Campaign has combined with anyone else to hack into the DNC’s servers (which would be a trespass to chattels). - 42 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 51 of 56 Rather, the DNC has alleged, at most, that the Campaign has combined with Russia to disclose emails that Russia has already obtained (which would not be a trespass to chattels). Supra pp. 5–7. The Campaign thus did not conspire to commit a trespass to chattels. Two, a plaintiff alleging a civil conspiracy under Virginia law must also show that the conspirators sought to use “concerted action” to commit the unlawful act. Gelber, 800 S.E.2d at 820; see Hechler Chevrolet, Inc. v. Gen. Motors Corp., 337 S.E. 2d 744, 748 (Va. 1985) (contrasting a “criminal conspiracy,” which requires only “an agreement,” with a “civil conspiracy,” which also requires “some concerted action … to accomplish [the] criminal or unlawful purpose”). The DNC, however, alleges that Russia hacked the DNC’s servers and extracted information all by itself. Supra pp. 5–7. The DNC does not allege that the Campaign acted in concert with Russia during the hacking or the theft of information. Because the DNC fails to allege concerted action to trespass on its computer network (as opposed to mere concerted action to publish the emails after the trespass had occurred), the DNC fails to state a claim against the Campaign for conspiracy to commit a trespass to chattels. D. The DNC fails to state a Virginia Computer Crimes Act claim against the Campaign. The Virginia Computer Crimes Act prohibits computer fraud, computer trespass, and invasion of computer privacy. Va. Code § 18.2-152.2–4. The DNC claims that the Campaign is liable under the Act because it “knowingly aided, abetted, encouraged, induced, instigated, contributed to and assisted” Russia’s violation of these prohibitions. (Am. Compl. ¶ 308.) The Court should dismiss this claim, because (1) the Computer Crimes Act does not authorize aiding-and-abetting liability, and (2) the DNC in all events does not plausibly plead that the Campaign aided and abetted a violation. 1. The Computer Crimes Act does not establish liability for aiders and abettors. “One of the basic principles of statutory construction” in Virginia “is that where a statute creates a right and provides a remedy for the vindication of that right,” “that remedy is exclusive.” Cherrie v. Va. Health Servs., Inc., 787 S.E.2d 855, 858 (Va. 2016). A court has “no authority” to create or expand a remedy - 43 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 52 of 56 where the statute “is silent” about that remedy. Id. This principle means that—in Virginia, as in the federal system—a statute creates a remedy against aiders and abetters only if the legislature “expressly” “used the words ‘aid’ and ‘abet’ in the statutory text.” Cent. Bank of Denver, 511 U.S. at 177. Here, the Computer Crimes Act creates a civil remedy for a “violation of any provision” of the statute—not for the aiding and abetting of a violation of the statute. Va. Code § 18.2-152.12(A). Indeed, the civil-remedy section of the statute nowhere uses the words “aid” and “abet.” Under Virginia’s “basic principles of statutory construction,” a court has “no authority” to create aiding-and-abetting liability that the state legislature refused to create. Cherrie, 787 S.E. 2d at 858. This point is all the more true because, as a general matter, Virginia courts do not even recognize aiding-and-abetting liability in the context of common-law torts. The Supreme Court of Virginia has not definitively resolved the issue, but the Supreme Court of the United States has observed that the “aiding and abetting tort … [has] not [been] expressly recognized by the state courts of the Commonwealth of Virginia.” Cent. Bank of Denver, 511 U.S. at 182; see Herold v. Merrill Lynch, Pierce, Fenner & Smith, Inc., 2018 WL 1950641, at *4 (E.D. Va. April 25, 2018) (“Virginia law has not clearly recognized an aiding and abetting cause of action for tortious claims”); L-3 Commc’ns Corp. v. Serco, Inc., 2018 WL 1352093, at *9 (E.D. Va. Mar. 15, 2018) (“Virginia does not recognize an aiding and abetting theory of tort liability”); Bastable v. Muslu, 2008 WL 7339887, at *3 (Va. Cir. Ct. July 8, 2009) (“With respect to … [the] cause of action of ‘Aiding and Abetting,’ the Court does not believe this is a valid cause of action in the Commonwealth … [T]here is no modern authority which supports a claim for aiding and abetting a tortious action”). In other words, Virginia courts refuse to impose aiding-and-abetting liability even when exercising their own common-law powers to define the scope of tort actions. It follows, a fortiori, that they would also refuse to impose such liability when interpreting a statute that says nothing about aiding and abetting. - 44 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 53 of 56 2. In all events, the DNC fails to plausibly plead that the Campaign aided and abetted a violation of the Computer Crimes Act. The provisions on which the DNC relies prohibit acts involved in hacking into another person’s computer network: “us[ing]” the network to convert property, “disabl[ing]” computer programs, “[c]aus[ing] [the] computer to malfunction,” “alter[ing]” computer data, “[u]s[ing] [the] computer … to make … an unauthorized copy,” “collect[ing] information” by installing certain kinds of malicious software, and “us[ing] [the] computer” to examine private financial information. Va. Code § 18.2-152.3–4; see Am. Compl. ¶ 304–09. None of the provisions prohibits publishing information that someone else has previously retrieved from a computer. The DNC’s Complaint fails to allege that the Campaign did anything to aid and abet the Russian hack of the DNC’s servers. Quite the contrary, the Amended Complaint’s factual theory is that Russia began colluding with the Campaign after the hack had occurred and the information in the DNC’s servers had been stolen. The DNC thus fails to state a claim against the Campaign under the Computer Crimes Act. - 45 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 54 of 56 CONCLUSION The Court should dismiss all claims against the Campaign with prejudice for failure to state a claim. Dated: December 7, 2018 Respectfully submitted, /s/ Michael A. Carvin James M. Gross JONES DAY 250 Vesey Street New York, NY 10281 (212) 326-3939 jgross@jonesday.com Michael A. Carvin (pro hac vice) Counsel of Record William D. Coglianese (pro hac vice) Vivek Suri JONES DAY 51 Louisiana Avenue, NW Washington, DC 20001 (202) 879-3939 macarvin@jonesday.com wcoglianese@jonesday.com Counsel for Donald J. Trump for President, Inc. - 46 -   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 55 of 56 CERTIFICATE OF COMPLIANCE I, Michael A. Carvin, certify that this brief complies with the Scheduling Order that this Court entered on October 1, 2018 (ECF No. 181) because it is under 50 pages, and that this brief complies with this Court’s formatting rules. Dated: December 7, 2018 /s/ Michael A. Carvin Michael A. Carvin Counsel for Donald J. Trump for President, Inc.   Case 1:18-cv-03501-JGK Document 212 Filed 12/07/18 Page 56 of 56 CERTIFICATE OF SERVICE I, Michael A. Carvin, certify that on December 7, 2018, I caused the foregoing document to be electronically filed with the Clerk of Court using the CM/ECF system, which will send a notice of electronic filing to all registered parties. Dated: December 7, 2018 /s/ Michael A. Carvin Michael A. Carvin Counsel for Donald J. Trump for President, Inc.

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?