28
10 5. NEGLIGENT INFLICTION OF
11
EMOTIONAL DISTRESS
12
13 6. WRONGFUL DEATH
14
15
JURY TRIAL DEMANDED
16
17
18
19
20
21
22
23
24
25
26
27
28
1 COMPLAINT
2
3 NOW COME Plaintiffs, by and through their attorneys, and allege the following
4
against Defendants Twitter, Inc., Google, Inc., Facebook, Inc. (Defendants):
5
6 NATURE OF ACTION
7
1. For years, Defendants have knowingly and recklessly provided the terrorist group
8
ISIS with accounts to use its social networks as a tool for spreading extremist
9
10 propaganda, raising funds, and attracting new recruits. This material support
11
has been instrumental to the rise of ISIS and has enabled it to carry out or
12
20 viewer. Defendants share revenue with ISIS for its content and profit from ISIS
21 postings through advertising revenue.
22
2. Without Defendants Twitter, Facebook, and Google (YouTube), the explosive
23
24 growth of ISIS over the last few years into the most feared terrorist group in the
25
world would not have been possible. According to the Brookings Institution,
26
27
ISIS has exploited social media, most notoriously Twitter, to send its propaganda
11
3. Since first appearing on Twitter in 2010, ISIS accounts on Twitter have grown at
15 and well-known ISIS members, some with tens of thousands of followers. For
16
example, Al-Furqan, ISISs official media wing responsible for producing ISISs
17
18
multimedia propaganda, maintained a dedicated Twitter page where it posted
19 messages from ISIS leadership as well as videos and images of beheadings and
20
other brutal forms of executions to 19,000 followers.
21
26
27
1
28 https://www.brookings.edu/blog/markaz/2015/11/09/how-terrorists-recruit-online-and-how-to-stop-it/
14 September 2014.
15
16
17
18
19
20
21
26
7. As with Twitter, ISIS has used Google (YouTube) and Facebook in a similar
27 manner.
28
1 8. Plaintiffs claims are based not upon the content of ISIS social media postings,
2
but upon Defendants provision of the infrastructure which provides material
3
4 support to ISIS. Furthermore, Defendants profit from ISIS by placing ads on ISIS
5 postings. For at least one of the Defendants, Google, revenue earned from
6
advertising is shared with ISIS. Lastly, Defendants incorporate ISIS postings to
7
11
postings and the advertisements.
12 PARTIES
13
9. Plaintiff Gregory Clayborn is a citizen of the United States domiciled in the State
14
15 of California and is the father of Sierra Clayborn. He brings this lawsuit on behalf
16
of himself and as a successor-in-interest of the estate of his daughter Sierra
17
18 Clayborn, a U.S. citizen and domiciliary of California at the time of her death.
19 10. Plaintiff Kim Clayborn is a citizen of the United States domiciled in the State of
20
California and is the step-mother of Sierra Clayborn.
21
22 11. Plaintiff Tamishia Clayborn is a citizen of the United States domiciled in the State
23
of California and is the sister of Sierra Clayborn.
24
25
12. Plaintiff Vanessa Nguyen is a citizen of the United States domiciled in the State
26 of California and is the mother of Tin Nguyen. She brings this lawsuit on behalf
27
of herself and as a successor-in-interest of the estate of her daughter Tin Nguyen,
28
8 15. Plaintiff James Thalasinos is a citizen of the United States domiciled in the state
9
of California and is the son of Nicholas Thalasinos.
10
11
16. Defendant Twitter, Inc. (Twitter) is a publicly traded U.S. company
18
Road, Menlo Park, California, 94025.
19 18. Defendant Google Inc. (Google) is a publicly traded U.S company incorporated
20
in Delaware, with its principal place of business at 1600 Amphitheatre Parkway,
21
22 Mountain View, California, 94043. Google owns the social media site YouTube.
23
For the purposes of this complaint, Google and YouTube are used
24
interchangeably.
25
28 19. This Court has subject matter jurisdiction over this action pursuant to 28 U.S.C.
1 1331 and 18 U.S.C. 2333(a) as a civil action brought by a citizen of the United
2
States injured by reason of an act of international terrorism and the estate,
3
8 2334(a) because at least one of the Plaintiffs and/or decedents was a resident of
9
the Central District of California, Western District and Defendants conduct
10
11
significant business operations in the state of California and within the Central
12 District of California.
13
ALLEGATIONS
14
15
21. ISIS, which stands for the Islamic State of Iraq and Syria, is also known as
16
17
the Islamic State of Iraq and the Levant (ISIL), the Islamic State (IS), ad-
21 22. Originally affiliated with al Qaeda, ISISs stated goal is the establishment of
22
a transnational Islamic caliphate, i.e. an Islamic state run under strict Sharia law.
23
24
By February 2014, however, ISISs tactics had become too extreme for even
1 attain its military and political goals, including summary executions, mass
2
beheadings, amputations, shootings and crucifixions, which it applies to anyone
3
11
Organization (FTO) under Section 219 of the Immigration and Nationality Act,
12 as amended.
13
ISIS is Dependent on Twitter, YouTube, and Facebook to Terrorize
14
17
26. One of ISISs primary uses of Defendants sites is as a recruitment platform,
23
via Defendants Direct Messaging capabilities. According to FBI Director James
6 Westerners and instructing them on how to travel to the Middle East to join its
7 fight.
8
30. That same month, ISIS posted a recruitment video on various social media sites,
9
including Defendants. Although YouTube removed the video from its site, the
10
link remained available for download from Twitter. The video was further
11
17
propaganda tools themselves, using Defendants to advertise their membership and
18 terrorist activities.
19 32. For example, in May 2013, a British citizen who publicly identified himself as
20
an ISIS supporter tweeted about his touchdown in Turkey before crossing the
21
border into Syria to join ISIS in the fight against the Syrian regime. And in
22
23
December 2013, the first Saudi Arabian female suicide bomber to join ISIS in
24 Syria tweeted her intent to become a martyr for the ISIS cause, as she embarked
25 for Syria.
26
33. As another example, two Tunisian girls, ages 19 and 21, were lured by ISISs use
27
28
of Facebook to travel to Syria believing they would be providing humanitarian
1 aid2. Instead, they were taken to an ISIS compound where there were forced to
2
serve as prostitutes and were repeatedly raped. The girls escaped during a
3
8 35. After kidnapping and murdering Ruqia Hassan Mohammad, a female journalist
9
and activist, ISIS used her account to lure others into supporting ISIS4.
10
11
36. Through its use of Defendants sites, ISIS has recruited more than 30,000 foreign
12 recruits since 2013, including some 4,500 Westerners and 250 Americans.
13 ISIS Uses Defendants to Fund Terrorism
14
37. ISIS also uses Defendants to raise funds for its terrorist activities.
15
38. According to David Cohen, the U.S. Treasury Departments Under Secretary
16
17 for Terrorism and Financial Intelligence, [y]ou see these appeals on Twitter in
18
particular from, you know, well-know[n] terrorist financiers . . . and theyre
19
20 quite explicit that these are to be made to ISIL for their military campaign.
21
39. The Financial Action Task Force confirms that individuals associated with ISIL
22
have called for donations via Twitter and have asked the donors to contact them.
23
24
25 2
http://www.teenvogue.com/story/isis-recruits-american-teens
26 3
http://www.mirror.co.uk/news/uk-news/british-isis-leader-using-facebook-7545645?
27 4
http://www.independent.co.uk/news/world/middle-east/ruqia-hassan-mohammed-the-activist-and-citizen-
28 journalist-that-isis-murdered-and-then-posed-as-for-a6798111.html
1 These tweets even promote donation tiers. One ISIS-linked cleric with the
2
Twitter account @Jahd_bmalk, for instance, sought donations for weapons with
3
4 the slogan Participate in Jihad with your Money. The account tweeted that if
5 50 dinars is donated, equivalent to 50 sniper rounds, one will receive a silver
6
status. Likewise, if 100 dinars is donated, which buys eight mortar rounds, the
7
8 contributor will earn the title of gold status donor. According to various tweets
9
from the account, over 26,000 Saudi Riyals (almost $7,000) were donated.
10
11
12
13
14
15
16
17
18
Figure 3 Fundraising Images from ISIS Twitter Accounts
19
20 40. A similar Twitter campaign in the spring of 2014 asked followers to support
21
the Mujahideen with financial contribution via the following reliable accounts
22
and provided contact information for how to make the requested donations.
23
24
In its other Twitter fundraising campaigns, ISIS has posted photographs of cash
25 gold bars and luxury cars that it received from donors, as well as weapons
26
purchased with the proceeds.
27
28
11 41. As discussed more fully below, YouTube approves of ISIS videos allowing for
12
ads to be placed with ISIS videos. YouTube earns revenue from these
13
14
advertisements and shares a portion of the proceeds with ISIS.
18
19
20
21
22
23
24
25
28
ISIS Uses Defendants Sites to Spread Its Propaganda
1 43. ISIS also uses Defendants sites to spread propaganda and incite fear by
2
posting graphic photos and videos of its terrorist feats.
3
4 44. Through Defendants sites, ISIS disseminates its official media publications as
5 well as posts about real-time atrocities and threats to its perceived enemies.
6
45. In October 2013, ISIS posted a video of a prison break at the Abu Ghraib prison
7
11
a man it mistakenly believed to be Shiite. Another post by an ISIS account
12 purported to depict Abu Dahr, identified as the suicide bomber that attacked the
13
Iranian embassy.
14
18
48. In June 2014, ISIS tweeted a picture of an Iraqi police chief, sitting with his
19 severed head perched on his legs. The accompanying tweet read: This is our
20
ball . . . it has skin on it. ISIS then hashtagged the tweet with the handle
21
22 #WorldCup so that the image popped up on the feeds of millions following the
23
soccer challenge in Brazil.
24
49. On July 25, 2014, ISIS members tweeted photos of the beheading of around 75
25
26 Syrian soldiers who had been captured during the Syrian conflict.
27
50. In August 2014, an Australian member of ISIS tweeted a photo of his seven-
28
11
Some of the photos depicted U.S. marines hung from bridges in Fallujah, human
12 heads on spikes and the twin towers in flames following the 9/11 attacks. Other
13
messages included direct threats to attack U.S. embassies around the world, and
14
18
of Americans James Foley, Steven Sotloff, and Peter Kassig.
19 54. To keep its membership informed, in April 2014, ISIS created an Arabic-
20
language Twitter App called The Dawn of Glad Tidings, or The Dawn, which
21
4 tweets. One such campaign dubbed a Twitter storm, took place on June 8, 2014,
5 and led to a surge in followers.
6
56. In 2014, propaganda operatives from ISIS posted videos of photojournalist John
7
8 Cantile and other captors on both Twitter and YouTube 5. These operatives used
9
various techniques to ensure that ISIS posting was spread using Defendants
10
11
sites. In her New York Times article, (Not Lone Wolves After All: How ISIS
15 enabled attacks Islamic State handlers acted as confidants and coaches, coaxing
16
recruits to embrace violence. Because the recruits are instructed to use
17
18
encrypted messaging applications, the guiding role played by the terrorist group
19 often remains obscured. As a result, remotely guided plots in Europe, Asia, and
20
the United States were initially labeled the work of lone wolves, and only
21
26 57. For years, the media has reported on the ISISs use of Defendants social media
27
5
28 http://www.theguardian.com/world/2014/sep/24/isis-Twitter-youtube-message-social-media-jihadi
1 sites and their refusal to take any meaningful action to stop it.
2
58. In December 2011, the New York Times reported that the terrorist group al-
3
4 Shabaab, best known for chopping off hands and starving their own people, just
5 opened a Twitter account and have been writing up a storm, bragging about recent
6
attacks and taunting their enemies.
7
8 59. That same month, terrorism experts cautioned that Twitter terrorism was part
9 of an emerging trend and that several branches of al Qaeda were using Twitter
10
to recruit individuals, fundraise and distribute propaganda more efficiently. New
11
York Times correspondent, Rukmini Callimachi, probably the most significant
12
19 The Ideology is now a living, breathing thing, because of Twitter. You no longer
20 have to go to some closed dark-web forum to see their stuff. Using Twitter, you
21
dont need to even know the exact address to gain access to messages. With
22
Twitter, you can guess; you look for certain words and you end up finding these
23
accounts. And then its kind of organic; You go to one account, then you go to
24
25 their followers and you follow all those people, and suddenly youre in the know.
26 (Rukmini Callimachi, Wired.com, 8/3/16.)
27
60. On November 20, 2015, Business Insider reported that ISIS members have been
28
6 61. On October 14, 2013, the BBC issued a report on The Sympatic, one of the
7 most important spokesmen of the Islamic State of Iraq and the Levant on the social
8
contact website Twitter who famously tweeted: I swear by God that with us
9
there are mujahideen who are not more than 15 years old!! Where are the men of
10
the [Arabian] Peninsula? By God, shame on you.
11
12 62. On October 31, 2013, Agence France-Presse reported on an ISIS video depicting
13 a prison break at Abu Ghraib and the execution of Iraqi army officers that was
14
posted on jihadi forums and Twitter.
15
63. On June 19, 2014, CNN reported on ISISs use of Twitter to raise money for
16
17 weapons, food, and operations. The next day, Seth Jones, Associate Director of
18
International Security and Defense Policy Center, stated in an interview on CNN
19
that Twitter was widely used by terrorist groups like ISIS to collect information,
20
21 fundraise and recruit. Social media is where its at for these groups, he added.
22
64. On August 21, 2014, after ISIS tweeted out the graphic video showing the
23
beheading of American James Foley, the Wall Street Journal warned that Twitter
24
10 political intelligence "Many users don't even bother finding out who they are
11
confirming as 'friend' and to whom they are providing access to a large amount of
12
information on their personal life. The terrorists themselves, in parallel, are able
13
14 to create false profiles that enable them to get into highly visible groups," he said 6.
15
67. On January 10, 2014, the Washington post released an article titled Why arent
16
17 YouTube, Facebook, and Twitter doing more to stop terrorists from inciting
18 violence? 7
19
68. In June 2014, the Washington times reported that Facebook is refusing to take
20
21 down a known ISIS terror group fan page that has nearly 6,000 members and
22
adoringly quotes Abu Musab al-Zarqawi, founder of al-Qaeda in Iraq who was
23
24
killed by U.S. forces in 2006. 8
25
6
http://www.cbc.ca/news/technology/terrorist-groups-recruiting-through-social-media-1.1131053
26 7
https://www.washingtonpost.com/posteverything/wp/2014/07/10/farrow-why-arent-youtube-facebook-and-
27 Twitter-doing-more-to-stop-terrorists-from-inciting-violence/
8
28 http://www.washingtontimes.com/news/2014/jun/16/husain-facebook-refuses-take-down-isis-terror-grou/
1 69. On August 21, 2014, the anti-defamation league explained that ISIS supporters on
2
Twitter have not only promoted ISIS propaganda (primarily in English) but has
3
8 70. On October 28, 2015, at the Radicalization: Social Media And The Rise Of
9
Terrorism hearing it was reported that Zale Thompson who attacked four New
10
11
York City Police Officers with an ax posted on Facebook Which is better, to sit
15 a convert to Islam and ex-convict who had just been fired from his job at a food
16
processing plant, entered his former workplace and beheaded an employee with a
17
18
knife. This attack combines elements of workplace violence and terrorism. Nolen
22 72. On November 11, 2015, it was reported that one of the attackers from a terrorist
23
24 9
http://www.adl.org/combating-hate/international-extremism-terrorism/c/isis-islamic-state-social-
media.html?referrer=https://www.google.com/#.Vzs0xfkrIdU
25
10
https://oversight.house.gov/wp-content/uploads/2015/10/10-28-2015-Natl-Security-Subcommittee-Hearing-
26
on-Radicalization-Purdy-TRC-Testimony.pdf
27 11
https://oversight.house.gov/wp-content/uploads/2015/10/10-28-2015-Natl-Security-Subcommittee-Hearing-
28 on-Radicalization-Gartenstein-Ross-FDD-Testimony.pdf
1 bus attack two weeks prior was a regular on Facebook, where he had already
2
posted a will for any martyr. Very likely, they made use of one of the thousands
3
8 damage. 12
9
73. On December 4, 2015, The Counter Extremism Project released a statement that
10
11
Todays news that one of the shooters in the San Bernardino attack that killed 14
15 no borders.13
16
74. On April 8, 2016, the Mirror reported that Jihadi fighters in the Middle East are
17
18
using Facebook to buy and sell heavy duty weaponry and that Fighters in ISIS-
19 linked regions in Libya are creating secret arms bazaars and hosting them on the
20
massive social network. Because of Facebook's ability to create groups and to send
21
24
25 12
http://www.nytimes.com/2015/11/03/opinion/the-facebook-intifada.html?_r=1
26 13
http://www.counterextremism.com/press/counter-extremism-project-releases-statement-news-san-bernardino-
shooter-pledged-
27
allegiance?utm_content=buffer38967&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer#sthash.i
28 JjhU3bF.dpuf
4 75. The media has widely reported on terrorists use of YouTube and YouTubes
5 refusal to take any meaningful action to stop it.
6
76. On July 7, 2014, CBS Local reported that militants post beheading videos on
7
8 sites like Googles YouTube, giving an image the chance to go viral before being
9
shut down.15
10
11
77. On March 1, 2015, the New York Times reported that some of the most
15 instance, in a video available on YouTube and Facebook, the Islamic State has
16
manipulated the video game Grand Theft Auto, making the games officers look
17
18
like New York police officers and showing how a militant could attack them. 16
19 78. On March 3, 2015, CNN Money reported that YouTube was placing
20
advertisements in front of ISIS videos 17.
21
22 79. On March 10th 2015, Death and Taxes released an article titled Beer ads keep
23
24 14
http://www.mirror.co.uk/tech/isis-terrorists-use-facebook-buy-7713893
25 15
http://sanfrancisco.cbslocal.com/2015/07/24/should-Twitter-facebook-be-held-liable-for-a-terrorist-attack/
26 16
http://www.nytimes.com/2015/03/01/nyregion/brooklyn-arrests-highlight-challenges-in-fighting-of-isis-and-
27 known-wolves.html?_r=0
17
28 http://money.cnn.com/2015/03/03/technology/isis-ads-youtube/
8 make apologies after ads for their products started rolling in front of ISIS
9
recruiting videos which have been cropping up ever more frequently on the site. 20
10
11
82. On August 6, 2015, Journal-Neo.org reported that The well-known online video
12 platform YouTube serves as the main media platform of these radical fighters. 21
13
83. On April 28, 2015, MusicTechPolicy.com reported that the Islamic State has
14
15 released a new YouTube video showcasing recent battles in the Al Sufiyah area
16
of eastern Ramadi. Approximately 30 Iraqi police have been killed and around
17
18
100 more have been injured in recent days in the western provincial capital.22
19 84. In March 2016, the Morning Consult reported that a video ad from a pro-Ted
20
Cruz Super PAC (Reigniting the Promise PAC) was the inadvertent prelude to a
21
22
23 18
http://www.deathandtaxesmag.com/239510/beer-ads-keep-showing-up-on-isis-youtube-videos/
24 19
http://www.nbcnews.com/storyline/isis-terror/ads-shown-isis-videos-youtube-catch-companies-guard-n320946
25 20
http://newmediarockstars.com/2015/03/advertisers-apologize-for-ads-shown-on-isis-youtube-videos/
26 21
http://journal-neo.org/2015/06/08/hi-tech-tools-of-isil-propaganda/
27 22
https://musictechpolicy.com/2015/04/28/live-from-youtubeistan-google-still-providing-material-support-for-
28 isis/
1 video produced by an official media outlet of the Islamic State terror group. The
2
outlet, Al-Hayat Media Center, produces propaganda for ISIS. Digital Citizens
3
11
urged Defendants to stop providing its services to terrorists.
12 87. In December 2011, an Israeli law group threatened to file suit against Twitter for
13
allowing terrorist groups like Hezbollah to use its social network in violation of
14
18
Mueller asking the Bureau to demand that the Twitter block the accounts of
26
27 23
https://media.gractions.com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/cbb90db1-b1aa-4b29-
28 a4d5-5d6453acc2cd.pdf
1 of the law. In 2015, Rep. Poe again reported that Twitter had consistently failed
2
to respond sufficiently to pleas to shut down clear incitements to violence by
3
4 terrorists.
5 90. Recently, former Secretary of State Hillary Clinton has urged Defendants to
6
become more aggressive in preventing ISIS from using its network. Resolve
7
11
and other companies cannot permit the recruitment and the actual direction of
15 91. On January 7, 2016, White House officials announced that they would hold
16 high- level discussions with Defendants to encourage them to do more to block
17
terrorists from using their services. The primary purpose is for government
18
officials to press the biggest Internet firms to take a more proactive approach to
19
20
countering terrorist messages and recruitment online. . . . That issue has long
1 93. In a January 2011 blog post entitled The tweets Must Flow, Twitter co-
2
founder Biz Stone and Twitter General Counsel Alex Macgillivray wrote: We
3
4 dont always agree with the things people choose to tweet, but we keep the
5 information flowing irrespective of any view we may have about the content.
6
94. On June 20, 2014, Twitter founder Biz Stone, responding to media questions about
7
8 ISISs use of Twitter to publicize its acts of terrorism, said, [i]f you want to create
9
a platform that allows for the freedom of expression for hundreds of millions of
10
11
people around the world, you really have to take the good with the bad.
15 approximately 500 million tweets each day, and we do not monitor them
16
proactively. The Twitter Rules reiterated that Twitter do[es] not actively
17
18
monitor and will not censor user content, except in exceptional circumstances.
19 In February 2015, Twitter confirmed that it does not proactively monitor content
20
and that it reviews only that content which is reported by other users as violating
21
22 its rules.
23
96. Most technology experts agree that Defendants could and should be doing more
24
to stop ISIS from using its social network. When Twitter says, We cant do this,
25
I dont believe that, said Hany Farid, chairman of the computer science
26
6 97. According to Rita Katz, the director of SITE Intelligence Group, Twitter is not
7 doing enough. With the technology Twitter has, they can immediately stop these
8
accounts, but they have done nothing to stop the dissemination and recruitment of
9
lone wolf terrorists.
10
98. Even when Defendants shut down an ISIS-linked account, they do nothing to stop
11
12 it from springing right back up. According to the New York Times, the Twitter
13 account of the pro- ISIS group Asawitiri Media has had 335 accounts. When its
14
account @TurMedia333 was shut down, it started @TurMedia334. When that was
15
shut down, it started @TurMedia335. This naming convention adding one
16
17
digit to a new account after the last one is suspended does not seem as if it
18 would require artificial intelligence to spot. Each of these accounts also used the
19 same user photograph of a bearded mans face over and over again. In the hours
20
after the shooting attack in San Bernardino, California on December 2, 2015,
21
@TurMedia335 tweeted: California, we have already arrived with our soldiers.
22
23
Decide how to be your end, with knife or bomb.
24 99. Using this simplistic naming scheme is critical to ISISs use of social media.
25
Without a common prefix, it would be difficult for followers of ISIS accounts to
26
27
know the new name of the account.
28 100. Because of the simplistic renaming scheme, Defendants could easily detect names
1 that are likely to be replacement accounts and delete them almost as soon as they
2
are created. Yet Defendants have failed to implement such a basic account
3
4 detection methodology.
5 101. Furthermore, ISIS keeps track of the followers of each account. Once an account
6
is deleted by one of the Defendants and then regenerated, ISIS uses a bot to contact
7
8 each of its followers asking them to connect. This allows ISIS to reconstitute the
9
connections for each account very quickly. Defendants could easily detect such
10
11
activity but chose not to.
12 102. Although Defendants proclaim that they do take accounts down including those
13
of ISIS, Defendants do nothing to keep those accounts down. ISIS and other
14
15 nefarious groups are dependent upon having a social media network from which
16
to collect money and conduct terrorist operations including recruitment and
17
18
radicalization.
19 103. The following example illustrates how Defendants allow ISIS to quickly construct
20
networks of followers. Below is a posting from Twitter captured on June 20,
21
26
27
28
10
11
12
13
14
Figure 6: DriftOne00146 posting 06/20/2016
15
104. The very next day, this individual now has 547 followers with only 3 additional
16
17 tweets.
18
19
20
21
22
23
24
25
26
27
28
10
11
12
13
14
Figure 7: DriftOne00146 posting June 21, 2016
15
105. The next morning, this individuals account was taken down by Twitter. That
16
19
20
21
22
23
24
25
26
27
28
10
11
12
16
DriftOne150. Most disturbing is that his posting of #Bangladesh and #Dhaka just
19
20
21
22
23
24
25
26
27
28
10
11
12
13
14
Figure 9: DriftOne150 posting June 28, 2016
15
107. The day after the attacks, he is now DriftOne0151 and he posts pictures of those
16
19
20
21
22
23
24
25
26
27
28
10
11
12
15
108. What the above example clearly demonstrates is that there is a pattern that is easily
16
20 a text prefix to the username that contains a numerical suffix. When an account
21 is taken down by a Defendant, assuredly all such names are tracked by
22
Defendants. It would be trivial to detect names that appear to have the same name
23
27
been deleted, this will disrupt the ability of individuals and organizations from
1 109. Prohibiting this conduct would be simple for Defendants to implement and not
2
impinge upon the utility of Defendants sites. There is no legitimate purpose for
3
11
newly created account is also suspicious activity. As shown in the DriftOne
12 example above, it is clear that this individual must be keeping track of those
13
previously connected. When an account is taken down and then re-established,
14
15 the individual then uses an automated method to send out requests to all those
16
members previously connected. Thus, accounts for ISIS and others can quickly
17
18
reconstitute after being deleted. Such activity is suspicious on its face.
19 111. Clearly, it is not normal activity for a newly created account to send out large
20
numbers of requests for friends and followers immediately after creation. It is
21
22 further unusual for those connections requests to be accepted in a very short period
23
of time. As such, this activity would be easy to detect and could be prohibited by
24
Defendants in a content-neutral manner as the content is never considered; only
25
26 the conduct.
27
112. Furthermore, limiting the rapidity with which a newly created account can send
28
8 period of time.
9
113. Because the suspicious activity used by ISIS and other nefarious organizations
10
11
engaged in illegal activities is easily detectable and preventable and that
12 Defendants are fully aware that these organizations are using their networks to
13
engage in illegal activity demonstrates that Defendants are acting knowingly and
14
15 recklessly allowing such illegal conduct. ISIS is dependent on using social media
16
to conduct its terrorist operations. Limiting ISIS ability to rapidly connect and
17
18
reconnect to supports Thus, Defendants knowing and reckless conduct provides
1 115. On November 17, 2015, the hacking group Anonymous took down several
2
thousand ISIS Twitter accounts. That an external third party could identify and
3
4 disrupt ISIS Twitter accounts confirms that Twitter itself could have prevented or
5 substantially limited ISIS use of Twitter.
6
Twitter, Facebook, and Google Profit from allowing ISIS to use their services
7
116. Astonishingly, Defendants routinely profit from ISIS. Each Defendant places ads
8
12 the viewer using knowledge about the viewer as well as information about the
13
content being viewed. The following sites for each Defendant show how
14
targeting works: https://business.Twitter.com/en/targeting.html,
15
16 https://www.facebook.com/business/a/online-sales/ad-targeting-details,
17
https://static.googleusercontent.com/media/www.youtube.com/en//yt/advertise/
18
19 medias/pdfs/targeting-onesheeter-en.pdf.
20 118. By specifically targeting advertisements based on viewers and content,
21
Defendants are no longer simply passing through the content of third parties.
22
26
profits are enhanced by charging advertisers extra for targeting advertisements at
27 viewers based upon knowledge of the viewer and the content being viewed.
28
1 119. Not only does Defendant Google profit from ISIS, it shares some of those
2
revenues with ISIS. In order for ads to appear associated with a posting on a
3
4 YouTube video, the poster must create a Google AdSense account. The poster
5 must the register the account for monetization 24.
6
9
120. According to Google, each video must be approved in order for ads to be placed.
10
These videos must meet Googles terms of service.
11
12
13
14
121. Videos that are approved generate revenue for both the poster and for Google.
15
16 Therefore, according to its terms, if there are ads associated with a YouTube
17 video, the video has been approved by Google, Google is earning revenue from
18
each view of that video, and Google is sharing revenue with the poster.
19
20 122. With respect to ISIS, Google has placed ads on ISIS postings.
21
22
23
24
25
26
27
24
28 https://www.youtube.com/account_monetization accessed on 5/24/2016.
10
11
12
13
14
Figure 11 ISIS video on YouTube with ad place by Google
15 123. Given that ad placement on videos requires Googles specific approval of the
16
video according to Googles terms and conditions, any video which is associated
17
with advertising has been approved by Google.
18
19 124. Because ads appear on the above video posted by ISIS, this means that Google
20
specifically approved the video for monetization, Google earned revenue from
21
22 each view of this video, and Google shared the revenue with ISIS. As a result,
23
Google provides material support to ISIS.
24
125. Twitter also profits from material posted by ISIS by routinely placing ads. For
25
26 example, a view of the account of DJ Nasheed on May 17, 2016, shows that
27
Twitter placed an ad for OneNorth for their M.E.A.N. Stack offering. As such,
28
1 Twitter provides material support to ISIS and is compensated for the effort.
2
10
11
12
13
14
Figure 12 ISIS post on Twitter with ad placed by Twitter
15
16 126. Facebook also profits from ISIS postings. On May 31, 2016, the following
screenshot was collected:
17
18
19
20
21
22
23
24
25
26
27
28
10
11
12
15 127. As such, Facebook provides material support to ISIS and is compensated for the
16
effort.
17
18 128. Thus, not only does each Defendant provide material support to ISIS by allowing
19
ISIS to make use of their social media sites, each Defendant derives revenue from
20
ISIS postings irrespective of the content of ISISs postings.
21
1 injured. Subsequent to the attack, Farook and Malik were killed in a shootout
2
with police.
3
4 130. Among the murdered were Decedents Sierra Clayborn, Tin Nguyen, and
5 Nicholas Thalasinos.
6
10
11
12
13
14
15
16
Figure 14: Sierra Clayborn
17
18
131. Sierra Clayborn, only 27, was killed in the mass terrorist shooting in San
26 132. Family and friends acknowledge that Sierra was such a bright star in the lives
27
of others that the terrorism committed by Rizwan Farook and Tasheen Malik,
28
1 has resulted in the reality that Sierra will never be forgotten, and will always be
2
missed. Following the massacre, her best friend and sister Tamishia, stated,
3
10
11
12
13
14
15
Figure 15: Tin Nguyen
16
133. Tin Nguyen was an ambitious and goal oriented 31-year old, Public Health
17
18
Inspector in San Bernardino, California. She and her family fled Vietnam when
19 Tin was only 8 years of age, with hope that Tin would live a happier, more
20
successful life in the United States. Tin was tragically killed in the terrorist
21
10
11
12
13
18
was remembered by his surviving spouse, Jennifer, as a very devout believer.
19 A member of the Messianic Jewish faith, Nicholas was always known to wear
20
tzitzit, Traditional fringe tassels, as well as a tie clip bearing the Star of David,
21
11
139. Investigators have confirmed that Farook and Malik started a dialogue on line
12 via a dating web site, and married a short time after Farook travelled to Saudi
13
Arabia in 2014. Malik travelled to California to live with her husband shortly
14
15 after their wedding. At the time of their terrorist attack and ultimately their
16
deaths, Malik and Farook had a 6-month-old daughter.
17
18
140. The acts of terrorism in the San Bernardino massacre were conducted against
22 season.
23
141. Instead, Farook and Malik killed 14 people and severely injured 14 others during
24
their terrorist massacre. The assassins, Farook and Malik were also killed the
25
26 same day by resisting arrest and entering a shoot- out with law enforcement.
27
142. Farook and Malik were dressed in black outfits and face coverings, and armed
28
1 with .223 AR-15 type semi-automatic rifles, and a .9mm semi-automatic pistol,
2
as well as assembled pipe bombs that failed to detonate.
3
4 143. Just a couple of days later, ISIS embraced the acts of terrorism by declaring on
5 their station, al-Bayan Radio, Two followers of Islamic State attacked several
6
days ago a center in San Bernardino in California, we pray to God to accept them
7
8 as Martyrs.
9
144. Moreover, during the time of the shooting massacre, terrorist Tashfeen Malik,
10
11
declared on Facebook her allegiance and pledge of loyalty to ISIS leader, Abu
12 Bakr al-Baghdadi.
13
145. On December 9, 2015, during Senate Judiciary testimony concerning the San
14
15 Bernardino terrorist attack, FBI Director James Comey, stated for the record that
16
the investigation by the FBI had established that Farook and Malik were
17
18
consuming poison on the internet and that both had become radicalized to
26 years ago with 5 people the Bureau investigated and labelled as having links to
27
terrorism.
28
1 148. Further links to terrorism were discovered in the home of Farook and Malik,
2
where FBI search uncovered what they described as pipe bombs, bomb making
3
11
extremists in 2014 releases via the ISIS Online magazine Dabiq which urged in
12 their October 2014 on line edition At this point of our crusade. It is very
13
important that attacks take place in every country that has entered into alliance
14
15 against the Islamic State, especially the U.S., U.K., France, Australia and
16
Germany.
17
18
150. The DOJ, in their 2016 report entitled Bringing Calm to Chaos: A critical
19 incident review of the San Bernardino public safety response to the December
20
2, 2015, terrorist shooting at the Island Regional Center, confirms that the
21
22 attack committed by Rizwan Farouk, and Tashfeen Malik was in fact an act of
23
international terrorism. (page 48)
24
151. A factor helping to confirm that the massacre in San Bernardino was an act of
25
26 terrorism was the discovery in the aftermath by FBI SWAT agents, that Terrorist
27
Farook had evidently assembled and left in a suspicious package, explosive
28
1 devices that miraculously failed to detonate and were later safely detonated by
2
the bomb squad.
3
4 152. The DOJ summary report confirms that investigators believed the explosive
5 devices left by Farook in the conference room where the carnage occurred, was
6
likely intended to be detonated upon the arrival of the first responders who would
7
11
153. FBI and DOJ investigators have indicated that they are of the belief that terrorists
12 Farook and Malik, left at the massacre site a remote-controlled toy car strapped
13
with the 3 rudimentary explosive devices. The deadly remote was found with
14
15 Farook and Malik upon their deaths, and evidently did not work.
16
154. FBI investigators have opined that the explosive devices along with the remote
17
18
control was likely intended to be detonated against the first responders arriving
19 to provide medical help to terrorism victims. Further they are potentially derived
20
from Al Qaedas Inspire Magazine, plus the ISIS Dabiq Magazine, wherein the
21
26 155. The murders of Nguyen, Clayborn and Thalasinos has caused Plaintiffs severe
27
mental anguish, extreme emotional pain and suffering, and the loss of Nguyens,
28
6
156. ISISs reputation as an organization that has engaged in and continues to engage
7
8 in terrorist acts is widespread and has been reported in the world news media.
9
10
157. ISISs designation as a Foreign Terrorist Organization is public knowledge that
13 158. At all times relevant to this Complaint, Defendants have known that ISIS is an
14
organization that has engaged in and continues to engage in terrorist activity.
15
16 159. At all times relevant to this Complaint, Defendants have known that ISIS is
17
designated as a Foreign Terrorist Organization.
18
19 160. Despite this knowledge, Defendants have for years knowingly provided its
20
Services to ISIS, its members, organizations owned or controlled by ISIS, and
21
22 organizations and individuals that provide financing and material support to ISIS,
23
including individuals and organizations that are designated as and SDGTs.
24
25 161. The identifiers for ISIS-associated Twitter, You-Tube, and Facebook accounts are
26
often publicized on ISIS websites, social media sites, and platforms.
27
28 162. ISISs news and media organizations operate Twitter, YouTube, and Facebook
1 accounts, and equipment often including separate accounts for Arabic and
2
English.
3
4 163. ISIS, its members, and its related entities and affiliates have operated numerous
5
Twitter accounts of the defendants using their own names and displaying
6
7 emblems and symbols associated with ISIS and its related terrorist entities.
8
164. The rise of ISIS has been substantial fueled through their use of Defendants social
9
10 media sites which have been used by ISIS for fundraising activities. Furthermore,
11
as discussed above, Defendant Google shares advertising revenue with ISIS.
12
13 165. Defendants sites have been used by ISIS to conduct terrorist operations, including
14
the San Bernadino attack and have also been used as a recruitment tool and
15
16 fundraising tool.
17
18
166. The FBI believes that the San Bernadino shooters were self-radicalized on the
21 167. ISIS uses Defendants sites to radicalize individuals to conduct terrorist activities.
22
Farook and Malik were radicalized by ISISs use of Defendants tools to conduct
23
terrorist operations.
24
25
168. Even if Farook and Malik had never been directly in contact with ISIS, ISIS use
26
27
of social media directly influenced their actions on the day of the San Bernadino
28 massacre:
11
170. Money raised through the use of Defendants sites was used by ISIS to conduct
14 171. Individuals recruited by ISIS through the use of Defendants sites allowed ISIS to
15
conduct terrorist operations, including radicalizing Farook and Malik contributing
16
to their decision to launch the San Bernadino attack and murdering Plainitffs
17
18 Decedents.
19
20 172. Subsequent to the San Bernadino attack and before their death, Malik pledged her
21 allegiance to ISIS on Facebook. Facebook further confirmed that postings to an
22
account established by Malic under an alias praised the Islamic state26.
23
24
173. On December 5, 2015 ISIS claimed responsibility for the attack on its radio
25
26
27 25
http://www.homelandsecuritynewswire.com/dr20160620-tracking-analyzing-how-isis-recruits-through-social-
28 media
26
http://www.cnbc.com/2015/12/05/san-bernardino-killers-were-our-followers-isis-claims.html
1 broadcast27.
2
3
174. But for ISIS use of Defendants sites to raise funds, recruit, and conduct terrorist
7 been able to radicalize Farook and Malik leading to the deadly attack in San
8
Bernadino.
9
12 175. When individuals look at a page on one of Defendants sites that contains postings
13 and advertisements, the page has been created by Defendants. In other words, a
14
viewer does not simply see a posting. Nor does the viewer see just an
15
19 176. Defendants create this page by selecting which advertisement to match with the
20
content on the page. This selection is done by Defendants proprietary algorithms
21
22 that select the advertisement based on information about the viewer and the
23
content being viewed. Thus there is a content triangle matching postings,
24
advertisements, and viewers.
25
26
27
27
28 Id.
10 179. Thus, Defendants have incorporated content from others into Defendant created
11
content for revenue purposes. Defendants choice to combine certain
12
13 advertisements with certain postings for specific viewers means that Defendants
14
are not simply passing along content created by third parties.
15
16 180. Specifically, as shown above, Defendants have incorporated ISIS postings along
17
with advertisements matched to the viewer and ISIS postings to create new
18
19
content for which Defendants have earned revenue. ISIS has received material
28 182. By radicalizing individuals through social media, this allowed ISIS to exert its
1 influence without the necessity of direct physical contact with these individuals.
2
Furthermore, this allows ISIS to incite or participate in attacks without the
3
10
terrorism.
11
184. Farook and Malik were radicalized by ISIS use of social media. This was the
12
13 stated goal of ISIS. Farook and Mateen then carried out the deadly attack in San
14
Bernadino. Conducting terrorist acts via radicalized individuals is a stated goal
15
of ISIS.
16
17
185. Farook and Maliks attack on the Inland Regional Center was a violent act causing
18
19
death and injury and constitutes numerous criminal acts under the laws of the
20 United States.
21
22 186. ISIS intended to intimidate and coerce western populations and governments
23
through a pattern of intimidation and coercion as discussed throughout Plaintiffs
24
Complaint.
25
26
187. ISIS acts from outside the United States using Defendants platforms in a manner
27
1 Defendants platforms.
2
3
188. But for ISIS postings using Defendants social media platforms, Farook and
4 Malik would not have engaged in their attack on the Inland Regional Center.
5
6 189. Farook and Maliks terrorist actions were a direct result of ISIS actions and
7
given that ISIS is an international terrorist organization, Farook and Maliks
8
actions were also an act of international terrorism.
9
10
CLAIMS FOR RELIEF
11
16
190. Plaintiffs repeat and reallege each and every allegation of the foregoing
17
paragraphs as if fully set forth herein.
18
19
191. Since October 31, 2001, ISIS has been international terrorist organization.
20
21 192. ISIS has committed, planned, or authorized activities that involved violence or
22
acts dangerous to human life that are a violation of the criminal laws of the United
23
27
kill, causing serious bodily injury, or attempting to cause serious bodily injury to
1 193. These activities committed, planned, or authorized by ISIS appear to have been,
2
and were intended to: (a) intimidate or coerce the civilian population of the United
3
4 States and other countries; (b) influence the policy of the Governments of the
5 United States and other countries by intimidation or coercion; or (c) affect the
6
conduct of the Governments of the United States and other countries by mass
7
10
194. These activities committed, planned, or authorized by ISIS occurred entirely or
11 primarily outside of the territorial jurisdiction of the United States and constituted
12
acts of international terrorism as defined in 18 U.S.C. 2331(1).
13
14
195. Plaintiffs have been injured in their person by reason of the acts of international
15
terrorism committed, planned, or authorized by ISIS. At all times relevant to this
16
17 action, Defendants knew that ISIS was a Foreign Terrorist Organization, that it
18
had engaged in and continued to engage in illegal acts of terrorism, including
19
20
international terrorism.
21
196. Defendants knowingly provided substantial assistance and encouragement to
22
23 ISIS, and thus aided and abetted ISIS in committing, planning, or authorizing acts
24
of international terrorism, including the acts of international terrorism that injured
25
Plaintiffs.
26
27
197. By aiding and abetting ISIS in committing, planning, or authorizing acts of
28
4 and (d) for threefold any and all damages that Plaintiffs have sustained as a result
5 of such injuries, and the costs of this suit, including attorneys fees.
6
7 198. The services and support that Defendants purposefully, knowingly or with
8
willful blindness provided to ISIS constitute material support to the preparation
9
10
and carrying out of acts of international terrorism, including the attack in which
16 200. By virtue of its violations of 18 U.S.C. 2339A, Defendants are liable pursuant
17
to 18 U.S.C. 2333 for any and all damages that Plaintiffs have sustained.
18
23
201. Plaintiffs repeat and reallege each and every allegation of the foregoing
24
27
202. Defendants knowingly agreed, licensed, and permitted ISIS, its affiliates, and
28 other radical groups to register and use Defendants sites to promote and carry out
1 ISISs activities, including ISISs illegal acts of international terrorism and injured
2
Plaintiffs.
3
4 203. Defendants were aware that U.S. federal law prohibited providing material
5
support and resources to, or engaging in transactions with, designated foreign
6
10 and equipment to promote and carry out ISISs illegal acts of international
11
terrorism, including the acts that injured Plaintiffs.
12
16 Plaintiffs to be injured in his or her person and property, Defendants are liable
17
pursuant to 18 U.S.C. 2333(a) and (d) for threefold any and all damages that
18
19
Plaintiffs have sustained as a result of such injuries, and the costs of this suit,
28
207. The online social media platform and communication services which Defendants
7 208. These services and equipment constituted material support and resources pursuant
8
to 18 U.S.C. 2339A and they facilitated acts of terrorism in violation of 18
9
10
U.S.C. 2332 that caused the deaths and injury of more than 36 individuals at the
13 209. Defendants provided these services and equipment to ISIS, knowing that they
14
were to be used in preparation for, or in carrying out, criminal acts including the
15
acts that injured the Plaintiffs.
16
17
210. As set forth more fully above, but for the material support and resources provided
18
19
by ISIS, the attack that injured the Plaintiffs would have been substantially more
20 difficult to implement.
21
9 equipment, for the benefit of ISIS, Defendants have provided material support and
10
resources to a designated Foreign Terrorist Organization under the Antiterrorism
11
19
blindness provided to ISIS constitute material support to the preparation and
20 carrying out of acts of international terrorism, including the attack in which the
21
Plaintiffs were killed or injured.
22
23 217. The Defendants provision of material support to ISIS was a proximate cause of
24
the injury inflicted on Plaintiffs.
25
26
218. Defendants violation of 18 U.S.C. 2339B proximately caused the damages to
13
222. Defendants acts of providing services to ISIS constituted a willful violation of
14
25
26 224. Plaintiffs repeat and re-allege each of the foregoing allegations with the same
27
force and effect as if more fully set forth herein.
28
1 225. Each of the Defendants provides services to ISIS that, among other things,
2
substantially assist and contribute to ISISs ability to carry out its terrorist
3
4 activities.
5 226. As set forth more fully above, but for the assistance provided by the
6
Defendants the terrorist attack that killed each of Plaintiffs Decedents
7
11
exceeds the bounds usually tolerated by decent society, and was done
15 228. The conduct of each Defendant was a direct, foreseeable and proximate cause
16
of the wrongful deaths of each of Plaintiffs Decedents and therefore the
17
18
Defendants are liable to Plaintiffs for their wrongful deaths.
3
a) Accept jurisdiction over this action;
4
5
b) Enter judgment against Defendants and in favor of Plaintiffs for
6
12
d) Enter judgment against Defendants and in favor of Plaintiffs for any and
13
14 all costs sustained in connection with the prosecution of this action, including
15
attorneys fees, pursuant to 18 U.S.C. 2333;
16
17
e) Order any equitable relief to which Plaintiffs might be entitled;
18
19
23
g) Grant such other and further relief as justice requires.
24
25
26
27
28
4
Dated: May 1, 2017 Respectfully Submitted,
5
6
EXCOLO LAW, PLLC
14 1-800-LAW-FIRM, PLLC
15
/s/ Ari Kresch
16 Ari Kresch (MI P29593 pro hac
17 vice to be applied for)
26700 Lahser Road, Suite 400
18
Southfield, MI 48033
19 (800) 529-3476
akresch@1800lawfirm.com
20
3 VERIFICATION
4
I, the undersigned, certify and declare that I have read the foregoing complaint,
5
10 For that reason, I am making this verification for and on behalf of the Plaintiffs. I am
11
informed and believe on that ground allege the matters stated in said document are true.
12
13 I declare under penalty of perjury under the laws of the State of California that
14
the foregoing is true and correct.
15
Executed on May 1, 2017 at Los Angeles, California.
16
17
18
Respectfully Submitted,
27
28