18‐397
Force v. Facebook, Inc.
1 In the
2 United States Court of Appeals
3 For the Second Circuit
4
5
6 August Term, 2018
7 No. 18‐397
8
9 STUART FORCE, individually and as Administrator on behalf of the
10 Estate of TAYLOR FORCE, ROBBI FORCE, KRISTIN ANN FORCE,
11 ABRAHAM RON FRAENKEL, individually and as Administrator on
12 behalf of the Estate of YAAKOV NAFTALI FRAENKEL, and as the
13 natural and legal guardian of minor plaintiffs A.H.H.F., A.L.F.,
14 N.E.F, N.S.F., and S.R.F., A.H.H.F., A.L.F., N.E.F., N.S.F., S.R.F.,
15 RACHEL DEVORA SPRECHER FRAENKEL, individually and as
16 Administrator on behalf of the Estate of YAAKOV NAFTALI FRAENKEL
17 and as the natural and legal guardian of minor plaintiffs A.H.H.F.,
18 A.L.F., N.E.F, N.S.F., and S.R.F., TZVI AMITAY FRAENKEL, SHMUEL
19 ELIMELECH BRAUN, individually and as Administrator on behalf of
20 the Estate of CHAYA ZISSEL BRAUN, CHANA BRAUN, individually and
21 as Administrator on behalf of the Estate of CHAYA ZISSEL BRAUN,
22 SHIMSHON SAM HALPERIN, SARA HALPERIN, MURRAY BRAUN, ESTHER
23 BRAUN, MICAH LAKIN AVNI, individually and as Joint Administrator
24 on behalf of the Estate of RICHARD LAKIN, MAYA LAKIN, individually
25 and as Joint Administrator on behalf of the Estate of RICHARD LAKIN,
26 MENACHEM MENDEL RIVKIN, individually and as the natural and
27 legal guardian of minor plaintiffs S.S.R., M.M.R., R.M.R., S.Z.R.,
28 BRACHA RIVKIN, individually and as the natural and legal guardian
29 of minor plaintiffs S.S.R., M.M.R., R.M.R., and S.Z.R., S.S.R., M.M.R.,
30 R.M.R., S.Z.R.,
1 Plaintiffs‐Appellants,
2
3 v.
4
5 FACEBOOK, INC.,
6 Defendant‐Appellee.1
7
8
9 Appeal from the United States District Court
10 for the Eastern District of New York.
11 No. 16‐cv‐5158 — Nicholas G. Garaufis, Judge.
12
13
14 ARGUED: FEBRUARY 25, 2019
15 DECIDED: JULY 31, 2019
16
17 Before: KATZMANN, Chief Judge, DRONEY, and SULLIVAN, Circuit
18 Judges.
19
20
21 Plaintiffs‐Appellants, U.S. citizen victims of Hamas terrorist
22 attacks in Israel (or their representatives), appeal from a final
23 judgment of the United States District Court for the Eastern District
24 of New York (Garaufis, J.). Plaintiffs brought federal civil anti‐
25 terrorism and Israeli law claims against Defendant‐Appellee
26 Facebook, Inc., alleging that Facebook unlawfully assisted Hamas in
27 those attacks. The district court dismissed the claims on the basis of
28 47 U.S.C. § 230(c)(1), which bars civil liability for claims that “treat[]”
29 a “provider or user of an interactive computer service . . . as the
30 publisher or speaker of any information provided by another
1The Clerk of the Court is directed to amend the official caption to conform to
the above.
2
1 information content provider.” We agree with the district court that
2 Section 230(c)(1) bars plaintiffs’ federal claims. We also conclude,
3 upon a review of plaintiffs’ assertion of diversity jurisdiction over
4 their foreign law claims, 28 U.S.C. § 1332(a), that such jurisdiction is
5 lacking, and we decline to exercise supplemental jurisdiction sua
6 sponte. Accordingly, we AFFIRM the judgment of the district court
7 as to plaintiffs’ federal claims and DISMISS plaintiffs’ foreign law
8 claims.
9
10 Chief Judge KATZMANN concurs in this opinion except as to
11 Parts I and II of the Discussion, concurs in the judgment with respect
12 to plaintiffs’ foreign law claims, and dissents from the judgment with
13 respect to plaintiffs’ federal claims.
14
15
16 MEIR KATZ (Robert J. Tolchin, on the
17 brief), The Berkman Law Office, LLC,
18 Brooklyn, New York, for Plaintiffs‐
19 Appellants.
20
21 CRAIG S. PRIMIS (K. Winn Allen,
22 Matthew S. Brooker, on the brief),
23 Kirkland & Ellis, LLP, Washington,
24 DC, for Defendant‐Appellee.
25
26 Sophia Cope, David Greene,
27 Electronic Frontier Foundation, San
28 Francisco, CA, amicus curiae.
29
3
1 DRONEY, Circuit Judge:
2 The principal question presented in this appeal is whether 47
3 U.S.C. § 230(c)(1), a provision enacted by the Communications
4 Decency Act of 1996, shields Defendant‐Appellee Facebook, Inc.,
5 from civil liability as to Plaintiffs‐Appellants’ federal anti‐terrorism
6 claims. Plaintiffs include the U.S. citizen victims, and relatives and
7 representatives of the estates of those victims, of certain terrorist
8 attacks committed by Hamas in Israel. They contend that Facebook
9 unlawfully provided Hamas, a U.S.‐designated foreign terrorist
10 organization, with a communications platform that enabled those
11 attacks.
12 The district court granted Facebook’s motion to dismiss
13 plaintiffs’ First Amended Complaint under Federal Rule of Civil
14 Procedure 12(b)(6) on the basis of Section 230(c)(1) immunity, an
15 affirmative defense. After entering judgment without prejudice to
16 moving to file an amended complaint, the district court denied with
4
1 prejudice plaintiffs’ motion to file a second amended complaint on the
2 basis that the proposed complaint did not cure the deficiencies in the
3 First Amended Complaint.
4 On appeal, plaintiffs argue that the district court improperly
5 dismissed their claims because Section 230(c)(1) does not provide
6 immunity to Facebook under the circumstances of their allegations.
7 We conclude that the district court properly applied Section
8 230(c)(1) to plaintiffs’ federal claims. Also, upon our review of
9 plaintiffs’ assertion of diversity jurisdiction over their foreign law
10 claims, 28 U.S.C. § 1332(a), we conclude that such jurisdiction is
11 lacking. Accordingly, we affirm the judgment of the district court as
12 to the federal claims. We also dismiss the foreign law claims, but
13 without prejudice.
5
1 FACTUAL AND PROCEDURAL BACKGROUND
2 I. Allegations in Plaintiffs’ Complaint2
3
4 Because this case comes to us on a motion to dismiss, we
5 recount the facts as plaintiffs provide them to us, treating as true the
6 allegations in their complaint. See Galper v. JP Morgan Chase Bank,
7 N.A., 802 F.3d 437, 442 (2d Cir. 2015).
8 A. The Attacks
9
10 Hamas is a Palestinian Islamist organization centered in Gaza.
11 It has been designated a foreign terrorist organization by the United
12 States and Israel. Since it was formed in 1987, Hamas has conducted
13 thousands of terrorist attacks against civilians in Israel.
14 Plaintiffs’ complaint describes terrorist attacks by Hamas
15 against five Americans in Israel between 2014 and 2016. Yaakov
16 Naftali Fraenkel, a teenager, was kidnapped by a Hamas operative in
2As used here, the term “complaint” refers to both the allegations of the First
Amended Complaint and those of the proposed second amended complaint,
which sought to supplement the prior complaint.
6
1 2014 while walking home from school in Gush Etzion, near Jerusalem,
2 and then was shot to death. Chaya Zissel Braun, a 3‐month‐old baby,
3 was killed at a train station in Jerusalem in 2014 when a Hamas
4 operative drove a car into a crowd. Richard Lakin died after Hamas
5 members shot and stabbed him in an attack on a bus in Jerusalem in
6 2015. Graduate student Taylor Force was stabbed to death by a
7 Hamas attacker while walking on the Jaffa boardwalk in Tel Aviv in
8 2016. Menachem Mendel Rivkin was stabbed in the neck in 2016 by
9 a Hamas operative while walking to a restaurant in a town near
10 Jerusalem. He suffered serious injuries but survived. Except for
11 Rivkin, plaintiffs are the representatives of the estates of those who
12 died in these attacks and family members of the victims.
13 B. Facebook’s Alleged Role in the Attacks
14 1. How Facebook Works
15 Facebook operates an “online social network platform and
16 communications service[].” App’x 230. Facebook users populate
7
1 their own “Facebook ‘pages’” with “content,” including personal
2 identifying information and indications of their particular “interests.”
3 App’x 250–51, 345. Organizations and other entities may also have
4 Facebook pages. Users can post content on others’ Facebook pages,
5 reshare each other’s content, and send messages to one another. The
6 content can be text‐based messages and statements, photos, web
7 links, or other information.
8 Facebook users must first register for a Facebook account,
9 providing their names, telephone numbers, and email addresses.
10 When registering, users do not specify the nature of the content they
11 intend to publish on the platform, nor does Facebook screen new
12 users based on its expectation of what content they will share with
13 other Facebook users. There is no charge to prospective users for
14 joining Facebook.3
3According to Facebook, hundreds of millions of Facebook pages are maintained
on its platform.
8
1 Facebook does not preview or edit the content that its users
2 post. Facebook’s terms of service specify that a user “own[s] all of the
3 content and information [the user] post[s] on Facebook, and [the user]
4 can control how it is shared through [the user’s] privacy and
5 application settings.” App’x 252 (alterations in original).
6 While Facebook users may view each other’s shared content
7 simply by visiting other Facebook pages and profiles, Facebook also
8 provides a personalized “newsfeed” page for each user. Facebook
9 uses algorithms—“a precisely defined set of mathematical or logical
10 operations for the performance of a particular task,” Algorithm,
11 Oxford English Dictionary (3d ed. 2012)—to determine the content to
12 display to users on the newsfeed webpage. Newsfeed content is
13 displayed within banners or modules and changes frequently. The
14 newsfeed algorithms—developed by programmers employed by
15 Facebook—automatically analyze Facebook users’ prior behavior on
16 the Facebook website to predict and display the content that is most
9
1 likely to interest and engage those particular users. Other algorithms
2 similarly use Facebook users’ behavioral and demographic data to
3 show those users third‐party groups, products, services, and local
4 events likely to be of interest to them.
5 Facebook’s algorithms also provide “friend suggestions,”
6 which, if accepted by the user, result in those users seeing each other’s
7 shared content. App’x 346–47. The friend‐suggestion algorithms are
8 based on such factors as the users’ common membership in
9 Facebook’s online “groups,” geographic location, attendance at
10 events, spoken language, and mutual friend connections on
11 Facebook. App’x 346.
12 Facebook’s advertising algorithms and “remarketing”
13 technology also allow advertisers on Facebook to target specific ads
14 to its users who are likely to be most interested in them and thus to
15 be most beneficial to those advertisers. App’x 347. Those
16 advertisements are displayed on the users’ pages and other Facebook
10
1 webpages. A substantial portion of Facebook’s revenues is from such
2 advertisers.
3 2. Hamas’s Use of Facebook4
4 Plaintiffs allege that Hamas used Facebook to post content that
5 encouraged terrorist attacks in Israel during the time period of the
6 attacks in this case. The attackers allegedly viewed that content on
7 Facebook. The encouraging content ranged in specificity; for
8 example, Fraenkel, although not a soldier, was kidnapped and
9 murdered after Hamas members posted messages on Facebook that
10 advocated the kidnapping of Israeli soldiers. The attack that killed
11 the Braun baby at the light rail station in Jerusalem came after Hamas
12 posts encouraged car‐ramming attacks at light rail stations. By
13 contrast, the killer of Force is alleged to have been a Facebook user,
14 but plaintiffs do not set forth what specific content encouraged his
4 When we refer to “Hamas” as users of Facebook in this opinion, we mean
individuals alleged to be Hamas members or supporters, as well as various Hamas
entities that are alleged to have Facebook pages.
11
1 attack, other than that “Hamas . . . use[d] Facebook to promote
2 terrorist stabbings.” App’x 335.
3 Hamas also used Facebook to celebrate these attacks and
4 others, to transmit political messages, and to generally support
5 further violence against Israel. The perpetrators were able to view
6 this content because, although Facebook’s terms and policies bar such
7 use by Hamas and other designated foreign terrorist organizations,
8 Facebook has allegedly failed to remove the “openly maintained”
9 pages and associated content of certain Hamas leaders, spokesmen,
10 and other members. App’x 229. It is also alleged that Facebook’s
11 algorithms directed such content to the personalized newsfeeds of the
12 individuals who harmed the plaintiffs. Thus, plaintiffs claim,
13 Facebook enables Hamas “to disseminate its messages directly to its
14 intended audiences,” App’x 255, and to “carry out the essential
15 communication components of [its] terror attacks,” App’x 256.
12
1 II. Facebook’s Antiterrorism Efforts
2 A. Intended Uses of Facebook
3 Facebook has Terms of Service that govern the use of Facebook
4 and purport to incorporate Facebook’s Community Standards.5 In its
5 Terms of Service, Facebook represents that its services are intended to
6 “[c]onnect you with people and organizations you care about,” by,
7 among other things, “[p]rovid[ing] a personalized experience” and
8 “[h]elp[ing] you discover content, products, and services that may
9 interest you.” Terms of Service, Facebook,
10 https://www.facebook.com/terms.php (last visited June 26, 2019). To
5 Plaintiffs’ complaint relies extensively on, and incorporates by reference,
Facebook’s Terms of Service and Community Standards (together, “terms”). The
publicly available terms are also subject to judicial notice. See Fed. R. Evid.
201(b)(2); see also, e.g., 23‐34 94th St. Grocery Corp. v. N.Y.C. Bd. of Health, 685 F.3d
174, 183 n.7 (2d Cir. 2012) (taking judicial notice of content of website whose
authenticity was not in question). With the exception of such terms that plaintiffs
allege Facebook actually follows in practice, we recount this information only for
the limited purpose of setting forth Facebook’s stated representations about its
policies and practices and to provide context for plaintiffs’ allegations, but not for
the truth of whether Facebook follows those policies.
13
1 do so, Facebook “must collect and use your personal data,” id., subject
2 to a detailed “Data Policy,” Data Policy, Facebook,
3 https://www.facebook.com/about/privacy/update (last visited June
4 26, 2019). Facebook also uses information about its users to sell
5 targeted online advertising and to provide advertisers with data on
6 the effectiveness of their ads. How do we use this information?, Data
7 Policy, Facebook, https://www.facebook.com/about/privacy/update
8 (last visited May 23, 2019).
9 B. Prohibited Uses of Facebook
10 According to the current version of Facebook’s Community
11 Standards, Facebook “remove[s] content that expresses support or
12 praise for groups, leaders, or individuals involved in,” inter alia,
13 “[t]errorist activity.” 2. Dangerous Individuals and Organizations,
14 Community Standards, Facebook,
15 https://www.facebook.com/communitystandards/dangerous_indivi
16 duals_organizations (last visited June 26, 2019). “Terrorist
14
1 organizations and terrorists” may not “maintain a presence” on
2 Facebook, nor is “coordination of support” for them allowed. Id.
3 Facebook “do[es] not allow symbols that represent any [terrorist]
4 organizations or [terrorists] to be shared on [the] platform without
5 context that condemns or neutrally discusses the content.” Id. In
6 addition, Facebook purports to ban “hate speech” and to “remove
7 content that glorifies violence or celebrates the suffering or
8 humiliation of others.” Objectionable Content, Community Standards,
9 Facebook, https://www.facebook.com/communitystandards/objectio
10 nable_content (last visited June 26, 2019).
11 Facebook’s Terms of Service also prohibit using its services “to
12 do or share anything” that is, inter alia, “unlawful” or that “infringes
13 or violates someone else’s rights.”6 Terms of Service, supra. Violating
6Facebook’s sign‐up webpage states that by clicking “Sign Up,” prospective users
agree to Facebook’s Terms of Service, Data Policy, and Cookies Policy—all of
which are hyperlinked from that page. Create a New Account, Facebook,
https://www.facebook.com/r.php (last visited June 26, 2019). As indicated above,
the Terms of Service also purport to incorporate Facebook’s Community
Standards.
15
1 any of these policies may result in Facebook suspending or disabling
2 a user’s account, removing the user’s content, blocking access to
3 certain features, and contacting law enforcement. Id.
4 According to recent testimony by Facebook’s General Counsel
5 in a United States Senate hearing, Facebook employs a multilayered
6 strategy to enforce these policies and combat extremist content on its
7 platform.7 Facebook claimed in the hearing that most of the content
8 it removes is identified by Facebook’s internal procedures before it is
9 reported by users. For example, terrorist photos or videos that users
10 attempt to upload are matched against an inventory of known
11 terrorist content. Facebook is also experimenting with artificial
12 intelligence to block or remove “text that might be advocating for
13 terrorism.” App’x 373. When Facebook detects terrorist‐related
14 content, it also uses artificial intelligence to identify similar, socially
7Plaintiffs included this testimony in the appendix on appeal and attached and
referred to the testimony in their brief responding to the district court’s order to
show cause for why their proposed second amended complaint was not futile. We
recount such testimony only for the purposes described supra n.5.
16
1 interconnected accounts, content, and pages that may themselves
2 support terrorism.
3 The General Counsel also testified that, for content that is not
4 automatically detected, Facebook employs thousands of people who
5 respond to user reports of inappropriate content and remove such
6 content. Id. Facebook also has a 150‐person team of
7 “counterterrorism specialists,” including academics, engineers, and
8 former prosecutors and law enforcement officers.8 Id.
8 Facebook has been criticized recently—and frequently—for not doing enough to
take down offensive or illegal content. E.g., Cecilia Kang, Nancy Pelosi Criticizes
Facebook for Handling of Altered Videos, N.Y. Times (May 29, 2019),
https://www.nytimes.com/2019/05/29/technology/facebook‐pelosi‐video.html;
Kalev Leetaru, Countering Online Extremism Is Too Important to Leave to Facebook,
FORBES (May 9, 2019),
https://www.forbes.com/sites/kalevleetaru/2019/05/09/countering‐online‐
extremism‐is‐too‐important‐to‐leave‐to‐facebook; Julia Fioretti, Internet Giants Not
Doing Enough to Take Down Illegal Content: EU, Reuters (Jan. 9, 2018),
https://www.reuters.com/article/us‐eu‐internet‐meeting/internet‐giants‐not‐
doing‐enough‐to‐take‐down‐illegal‐content‐eu‐idUSKBN1EY2BL; see Staehr v.
Harford Fin. Servs. Grp., Inc., 547 F.3d 406, 425 (2d Cir. 2008) (“[I]t is proper to take
judicial notice of the fact that press coverage . . . contained certain information,
without regard to the truth of their contents.”).
17
1 III. District Court Proceeding
2 Plaintiffs brought this action on July 10, 2016, in the United
3 States District Court for the Southern District of New York. On
4 consent of the parties, the action was transferred to the United States
5 District Court for the Eastern District of New York on September 16,
6 2016. 9 In their First Amended Complaint, Plaintiffs claimed that,
7 under 18 U.S.C. § 2333, Facebook was civilly liable for aiding and
8 abetting Hamas’s acts of international terrorism; conspiring with
9 Hamas in furtherance of acts of international terrorism; providing
10 material support to terrorists; and providing material support to a
11 designated foreign terrorist organization.10 Plaintiffs also alleged that
9The parties moved jointly under 28 U.S.C. § 1404(a) to transfer the case to the
Eastern District of New York because plaintiffs’ counsel had already filed the
Cohen action there, see infra n.11, and resolving both cases in the same district, the
parties argued, would be efficient and convenient.
1018 U.S.C. § 2333 provides civil remedies for injuries suffered through acts of
international terrorism. Plaintiffs also cite to 18 U.S.C. § 2339A (providing material
support for terrorism) and § 2339B (providing material support or resources to a
designated foreign terrorist organization).
18
1 the district court had diversity‐based subject matter jurisdiction
2 under 28 U.S.C. § 1332(a)(2) to adjudicate Plaintiffs’ Israeli‐law tort
3 claims arising from the same conduct.
4 Facebook moved to dismiss plaintiffs’ claims for lack of
5 personal jurisdiction under Rule 12(b)(2) and for failure to state a
6 claim under Rule 12(b)(6). The district court determined that it had
7 personal jurisdiction over Facebook, a ruling that Facebook does not
8 challenge on appeal. But the district court also held that 47 U.S.C.
9 § 230(c)(1) foreclosed plaintiffs’ claims because they impermissibly
10 involved “treat[ing]” Facebook “as the publisher or speaker of any
11 information provided by” Hamas. S. App’x 18–23 (quoting 47 U.S.C.
12 § 230(c)(1)).11 On May 18, 2017, the district court granted the motion
13 to dismiss under Rule 12(b)(6) and entered judgment in Facebook’s
11In the same opinion, the district court also dismissed for lack of Article III
standing the claims brought in a separate action by 20,000 Israeli citizens who,
according to the district court, claimed “to be threatened only by potential future
attacks.” S. App’x 3. The district court referred to those plaintiffs as the “Cohen
Plaintiffs” and to the plaintiffs in this appeal as the “Force Plaintiffs.” Id. at 1. The
Cohen Plaintiffs did not appeal. Cohen v. Facebook, 16‐cv‐04453‐NGG‐LB
(E.D.N.Y.).
19
1 favor, without prejudice to plaintiffs seeking leave to file an amended
2 complaint.
3 Plaintiffs then filed a Rule 59(e) motion to alter the judgment,
4 asking the district court to reconsider its dismissal of their First
5 Amended Complaint, and filed a motion seeking leave to file a second
6 amended complaint. The proposed complaint retained all of
7 plaintiffs’ prior claims for relief and added a claim that Facebook had
8 concealed its alleged material support to Hamas. In January 2018, the
9 district court denied plaintiffs’ motions with prejudice, holding that
10 plaintiffs’ proposed second amended complaint was futile in light of
11 47 U.S.C. § 230(c)(1). Plaintiffs timely appealed.
12 STANDARD OF REVIEW
13 Because the district court determined that it was futile to allow
14 plaintiffs to file a second amended complaint, we evaluate that
15 proposed complaint “as we would a motion to dismiss, determining
16 whether [it] contains enough facts to state a claim to relief that is
20
1 plausible on its face.”12 Ind. Pub. Ret. Sys. v. SAIC, Inc., 818 F.3d 85, 92
2 (2d Cir. 2016) (citation and internal quotation marks omitted). We
3 accept as true all alleged facts in both the First Amended Complaint
4 and the proposed second amended complaint.13 See Ashcroft v. Iqbal,
5 556 U.S. 662, 678 (2009). We also review de novo a district court’s grant
6 of a Rule 12(b)(6) motion to dismiss on the basis of an affirmative
7 defense. See Ricci v. Teamsters Union Local 456, 781 F.3d 25, 26 (2d Cir.
8 2015).
9 DISCUSSION
10 On appeal, plaintiffs contend that the district court improperly
11 held that Section 230(c)(1) barred their claims. Plaintiffs argue that
12 their claims do not treat Facebook as the “publisher” or “speaker” of
12 We have jurisdiction over this appeal from a final judgment. 28 U.S.C. § 1291.
13Plaintiffs do not distinguish their arguments between their First Amended
Complaint, which the district court dismissed, and their proposed second
amended complaint, which the district court determined was futile. We agree that
the Section 230(c)(1) issues raised by both complaints are materially
indistinguishable.
21
1 content 14 provided by Hamas, as Section 230(c)(1) requires for
2 immunity. Plaintiffs similarly contend that Facebook contributed to
3 that content through its algorithms. Plaintiffs also argue that to apply
4 Section 230(c)(1) to their claims based on Facebook’s and Hamas’s
5 actions taken outside of the United States would constitute the
6 unlawful extraterritorial application of that statute. In addition,
7 plaintiffs maintain that 47 U.S.C. § 230(e)(1), which provides that
8 Section 230 shall not be “construed to impair the enforcement of . . .
9 any . . . Federal criminal statute,” precludes the application of Section
10 230(c)(1) to their claims, that the Anti‐Terrorism Act’s (“ATA”) civil
11 remedies provision, 18 U.S.C. § 2333, irreconcilably conflicts with
12 Section 230(c)(1), and that the Justice Against Sponsors of Terrorism
13 Act (“JASTA”) impliedly narrowed or repealed Section 230(c)(1).
14 Lastly, plaintiffs contend that Section 230(c)(1) cannot apply to their
14 We refer to “content” and “information” synonymously in this opinion.
22
1 claims brought under the foreign law of Israel.
2 In response to plaintiffs’ claims, Facebook contends that Section
3 230(c)(1) provides it immunity and that, even absent such immunity,
4 plaintiffs fail to plausibly allege that Facebook assisted Hamas in the
5 ways required for their federal antiterrorism claims and Israeli law
6 claims.
7 We first turn to the issues regarding Section 230(c)(1). 15
8 I. Background of Section 230(c)(1)
9 The primary purpose of the proposed legislation that
10 ultimately resulted in the Communications Decency Act (“CDA”)
11 “was to protect children from sexually explicit internet content.” FTC
12 v. LeadClick Media, LLC, 838 F.3d 158, 173 (2d Cir. 2016) (citing 141
15Plaintiffs argue that the district court prematurely applied Section 230(c)(1), an
affirmative defense, because discovery might show that Facebook was indeed a
“developer” of Hamas’s content. However, the application of Section 230(c)(1) is
appropriate at the pleading stage when, as here, the “statute’s barrier to suit is
evident from the face of” plaintiffs’ proposed complaint. Ricci, 781 F.3d at 28; see
also Marshall’s Locksmith Serv. Inc. v. Google, LLC, 925 F.3d 1263, 1267–68 (D.C. Cir.
2019) (affirming dismissal of claims at pleading stage based on Section 230(c)(1)
immunity).
23
1 Cong. Rec. S1953 (daily ed. Feb. 1, 1995) (statement of Sen. Exon)).
2 Section 230, though—added as an amendment to the CDA bill, id.—
3 was enacted “to maintain the robust nature of Internet
4 communication and, accordingly, to keep government interference in
5 the medium to a minimum,” Ricci, 781 F.3d at 28 (quoting Zeran v.
6 Am. Online, Inc., 129 F.3d 327, 330 (4th Cir. 1997)). Indeed, Congress
7 stated in Section 230 that “[i]t is the policy of the United States—(1) to
8 promote the continued development of the Internet and other
9 interactive computer services and other interactive media; [and] (2) to
10 preserve the vibrant and competitive free market that presently exists
11 for the Internet and other interactive computer services, unfettered by
12 Federal or State regulation.” 47 U.S.C. § 230(b)(1)–(2).
13 In the seminal Fourth Circuit decision interpreting the
14 immunity of Section 230 shortly after its enactment, Zeran v. America
15 Online, Inc., that court described Congress’s concerns underlying
16 Section 230:
24
1 The amount of information communicated via
2 interactive computer services is . . . staggering. The
3 specter of . . . liability in an area of such prolific speech
4 would have an obvious chilling effect. It would be
5 impossible for service providers to screen each of their
6 millions of postings for possible problems. Faced with
7 potential liability for each message republished by their
8 services, interactive computer service providers might
9 choose to severely restrict the number and type of
10 messages posted. Congress . . . chose to immunize
11 service providers to avoid any such restrictive effect.
12
13 129 F.3d at 331.
14
15 The addition of Section 230 to the proposed CDA also
16 “assuaged Congressional concern regarding the outcome of two
17 inconsistent judicial decisions,” Cubby, Inc. v. CompuServe, Inc., 776 F.
18 Supp. 135 (S.D.N.Y. 1991) and Stratton Oakmont, Inc. v. Prodigy Servs.
19 Co., No. 31063/94, 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995), both
20 of which “appl[ied] traditional defamation law to internet providers,”
21 LeadClick, 838 F.3d at 173. As we noted in LeadClick, “[t]he first
22 [decision] held that an interactive computer service provider could
23 not be liable for a third party’s defamatory statement . . . but the
25
1 second imposed liability where a service provider filtered its content
2 in an effort to block obscene material.” Id. (citations omitted) (citing
3 141 Cong. Rec. H8469‐70 (daily ed. Aug. 4, 1995 (statement of Rep.
4 Cox))).
5 To “overrule Stratton,” id., and to accomplish its other
6 objectives, Section 230(c)(1) provides that “[n]o provider . . . of an
7 interactive computer service shall be treated as the publisher or
8 speaker of any information provided by another information content
9 provider.” 16 47 U.S.C. § 230(c)(1). Subject to certain delineated
10 exceptions, id. § 230(e), Section 230(c)(1) thus shields a defendant from
16 Section 230(c)(2), which, like Section 230(c)(1), is contained under the
subheading “Protection for ‘Good Samaritan’ Blocking and Screening of Offensive
Material,” 47 U.S.C. § 230(c), responds to Stratton even more directly. It provides
that “[n]o provider or user of an interactive computer service shall be held liable
on account of—(A) any action voluntarily taken in good faith to restrict access to
or availability of material that the provider or user considers to be obscene, lewd,
lascivious, filthy, excessively violent, harassing, or otherwise objectionable,
whether or not such material is constitutionally protected; or (B) any action taken
to enable or make available to information content providers or others the
technical means to restrict access to material described in [Section 230(c)(1)].” Id.
§ 230(c)(2).
26
1 civil liability when: (1) it is a “provider or user of an interactive
2 computer service,” as defined by § 230(f)(2); (2) the plaintiff’s claims
3 “treat[]” the defendant as the “publisher or speaker” of information,
4 id. § 230(c)(1); and (3) that information is “provided by” an
5 “information content provider,” id. § 230(f)(3), other than the
6 defendant interactive computer service.
7 In light of Congress’s objectives, the Circuits are in general
8 agreement that the text of Section 230(c)(1) should be construed
9 broadly in favor of immunity. See LeadClick, 838 F.3d at 173 (collecting
10 cases); Marshall’s Locksmith Serv. Inc. v. Google, LLC, 925 F.3d 1263,
11 1267 (D.C. Cir. 2019) (“Congress inten[ded] to confer broad immunity
12 for the re‐publication of third‐party content.”); Jane Doe No. 1 v.
13 Backpage.com, LLC, 817 F.3d 12, 18 (1st Cir. 2016) (“There has been
14 near‐universal agreement that section 230 should not be construed
15 grudgingly.”); Jones v. Dirty World Entmʹt Recordings LLC, 755 F.3d
16 398, 408 (6th Cir. 2014) (“[C]lose cases . . . must be resolved in favor of
27
1 immunity.”) (quoting Fair Hous. Council v. Roommates.Com, LLC, 521
2 F.3d 1157, 1174 (9th Cir. 2008) (en banc))); Doe v. MySpace, Inc., 528
3 F.3d 413, 418 (5th Cir. 2008) (“Courts have construed the immunity
4 provisions in § 230 broadly in all cases arising from the publication of
5 user‐generated content.”); Almeida v. Amazon.com, Inc., 456 F.3d 1316,
6 1321 (11th Cir. 2006) (“The majority of federal circuits have
7 interpreted [Section 230] to establish broad . . . immunity.”)); Carafano
8 v. Metrosplash.com, Inc., 339 F.3d 1119, 1123 (9th Cir. 2003) (Ҥ 230(c)
9 provides broad immunity for publishing content provided primarily
10 by third parties.”) (citation omitted); Zeran, 129 F.3d at 330 (4th Cir.
11 1997) (“Congress recognized the threat that tort‐based lawsuits pose
12 to freedom of speech in the new and burgeoning Internet medium.”).
28
1 II. Whether Section 230(c)(1) Protects Facebook’s Alleged
2 Conduct17
3
4 The parties agree that Facebook is a provider of an “interactive
5 computer service,” but dispute whether plaintiffs’ claims allege that
6 (1) Facebook is acting as the protected publisher of information, and
7 (2) the challenged information is provided by Hamas, or by Facebook
8 itself.18
9 A. Whether Plaintiffs’ Claims Implicate Facebook as a
10 “Publisher” of Information
11
12 Certain important terms are left undefined by Section 230(c)(1),
17 Because, as is discussed later in this opinion, plaintiffs’ foreign law claims are
dismissed on jurisdictional grounds, our discussion of Section 230(c)(1) immunity
is confined to plaintiffs’ federal claims.
18Plaintiffs also argue that because publication is not an explicit element of their
federal anti‐terrorism claims, Section 230(c)(1) does not provide Facebook with
immunity. However, it is well established that Section 230(c)(1) applies not only
to defamation claims, where publication is an explicit element, but also to claims
where “the duty that the plaintiff alleges the defendant violated derives from the
defendant’s status or conduct as a publisher or speaker.” LeadClick, 838 F.3d at 175
(quoting Barnes v. Yahoo!, Inc., 570 F.3d 1096, 1102 (9th Cir. 2009)) (emphasis
added) (internal quotation marks omitted). “Thus, courts have invoked the
prophylaxis of section 230(c)(1) in connection with a wide variety of causes of
action, including housing discrimination, negligence, and securities fraud and
cyberstalking.” Backpage.com, 817 F.3d at 19 (internal citations omitted); see also
Marshall’s Locksmith, 925 F.3d at 1267 (“As courts uniformly recognize, § 230
29
1 including “publisher.” 47 U.S.C. § 230(c)(1). This Circuit and others
2 have generally looked to that term’s ordinary meaning:19 “one that
3 makes public,” Klayman v. Zuckerberg, 753 F.3d 1354, 1359 (D.C. Cir.
4 2014) (citing Webster’s Third New International Dictionary 1837
5 (1981)); “the reproducer of a work intended for public consumption,”
6 LeadClick, 838 F.3d at 175 (citing Barnes v. Yahoo!, Inc., 570 F.3d 1096,
7 1102 (9th Cir. 2009) (quoting Webster’s Third New International
8 Dictionary 1837 (Philip Babcock Gove ed., 1986))); and “one whose
9 business is publication,” id. Consistent with these definitions, in
10 Zeran v. America Online, Inc., the Fourth Circuit concluded that “[e]ven
11 distributors are considered to be publishers,” including “[t]hose who
12 are in the business of making their facilities available to disseminate
immunizes internet services for third‐party content that they publish, . . . against
causes of action of all kinds.”); HomeAway.com, Inc. v. City of Santa Monica, 918 F.3d
676, 684 (9th Cir. 2019) (“[W]e have repeatedly held the scope of [Section 230]
immunity to reach beyond defamation cases.”).
19 “When a term goes undefined in a statute, we give the term
its ordinary meaning.” Taniguchi v. Kan Pac. Saipan, Ltd., 566 U.S. 560, 566 (2012).
30
1 . . . the information gathered by others.” 129 F.3d at 332 (quoting W.
2 Page Keeton et al., Prosser and Keeton on the Law of Torts § 113, at
3 803 (5th ed. 1984)). The courts’ generally broad construction of
4 Section 230(c)(1) in favor of immunity “has resulted in a capacious
5 conception of what it means to treat a website operator as the
6 publisher . . . of information provided by a third party.” Backpage.com,
7 817 F.3d at 19.
8 Plaintiffs seek to hold Facebook liable for “giving Hamas a
9 forum with which to communicate and for actively bringing Hamas’
10 message to interested parties.” Appellants’ Reply Br. 37; see also, e.g.,
11 Appellants’ Br. 50–51 (arguing that the federal anti‐terrorism statutes
12 “prohibit[] Facebook from supplying Hamas a platform and
13 communications services”). But that alleged conduct by Facebook
14 falls within the heartland of what it means to be the “publisher” of
15 information under Section 230(c)(1). So, too, does Facebook’s alleged
16 failure to delete content from Hamas members’ Facebook pages. See
31
1 LeadClick, 838 F.3d at 174 (stating that acting as the “publisher” under
2 Section 230(c)(1) includes the decision whether to “withdraw”
3 content).
4 Plaintiffs also argue that Facebook does not act as the publisher
5 of Hamas’s content within the meaning of Section 230(c)(1) because it
6 uses algorithms to suggest content to users, resulting in
7 “matchmaking.” Appellants’ Br. 51–52. For example, plaintiffs allege
8 that Facebook’s “newsfeed” uses algorithms that predict and show
9 the third‐party content that is most likely to interest and engage users.
10 Facebook’s algorithms also provide “friend suggestions,” based on
11 analysis of users’ existing social connections on Facebook and other
12 behavioral and demographic data. And, Facebook’s advertising
13 algorithms and “remarketing” technology allow advertisers to target
14 ads to its users who are likely most interested in those ads.
15 We disagree with plaintiffs’ contention that Facebook’s use of
16 algorithms renders it a non‐publisher. First, we find no basis in the
32
1 ordinary meaning of “publisher,” the other text of Section 230, or
2 decisions interpreting Section 230, for concluding that an interactive
3 computer service is not the “publisher” of third‐party information
4 when it uses tools such as algorithms that are designed to match that
5 information with a consumer’s interests.20 Cf., e.g., Roommates.Com,
6 521 F.3d at 1172 (recognizing that Matchmaker.com website, which
7 “provided neutral tools specifically designed to match romantic
8 partners depending on their voluntary inputs,” was immune under
9 Section 230(c)(1)) (citing Carafano, Inc., 339 F.3d 1119); Carafano, 339
10 F.3d at 1124–25 (“Matchmaker’s decision to structure the information
11 provided by users allows the company to offer additional features,
12 such as ‘matching’ profiles with similar characteristics . . . , [and such
13 features] [a]rguably promote[] the expressed Congressional policy ‘to
14 promote the continued development of the Internet and other
20To the extent that plaintiffs rely on their undeveloped contention that the
algorithms are “designed to radicalize,” Appellants’ Br. 51, we deem that
argument waived. In addition, this allegation is not made in plaintiffs’ complaints.
33
1 interactive computer services.’ 47 U.S.C. § 230(b)(1).”); Herrick v.
2 Grindr, LLC, 765 F. App’x 586, 591 (2d Cir. 2019) (summary order) (“To
3 the extent that [plaintiff’s claims] are premised on Grindr’s [user‐
4 profile] matching and geolocation features, they are likewise
5 barred . . . .”).21
6 Indeed, arranging and distributing third‐party information
7 inherently forms “connections” and “matches” among speakers,
8 content, and viewers of content, whether in interactive internet
9 forums or in more traditional media.22 That is an essential result of
21While lacking precedential value, “[w]e are, of course, permitted to consider
summary orders for their persuasive value, and often draw guidance from them
in later cases.” Brault v. Soc. Sec. Admin., Commʹr, 683 F.3d 443, 450 n.5 (2d Cir.
2012).
22As journalist and author Tom Standage has observed, “[M]any of the ways in
which we share, consume, and manipulate information, even in the Internet era,
build upon habits and conventions that date back centuries.” Tom Standage,
Writing on the Wall: Social Media – The First 2000 Years 5 (2013). See also Tom
Standage, Benjamin Franklin, Social Media Pioneer, Medium (Dec. 10, 2013),
https://medium.com/new‐media/benjamin‐franklin‐social‐media‐pioneer‐
3fb505b1ce7c (“Small and local, with circulations of a few hundred copies at best,
[colonial] newspapers consisted in large part of letters from readers, and reprinted
speeches, pamphlets and items from other papers. They provided an open
platform through which people could share and discuss their views with others.
They were, in short, social media.”).
34
1 publishing. Accepting plaintiffs’ argument would eviscerate Section
2 230(c)(1); a defendant interactive computer service would be
3 ineligible for Section 230(c)(1) immunity by virtue of simply
4 organizing and displaying content exclusively provided by third
5 parties.
6 Plaintiffs’ “matchmaking” argument would also deny
7 immunity for the editorial decisions regarding third‐party content
8 that interactive computer services have made since the early days of
9 the Internet. The services have always decided, for example, where
10 on their sites (or other digital property) particular third‐party content
11 should reside and to whom it should be shown. Placing certain third‐
12 party content on a homepage, for example, tends to recommend that
13 content to users more than if it were located elsewhere on a website.
14 Internet services have also long been able to target the third‐party
15 content displayed to users based on, among other things, users’
16 geolocation, language of choice, and registration information. And,
35
1 of course, the services must also decide what type and format of third‐
2 party content they will display, whether that be a chat forum for
3 classic car lovers, a platform for blogging, a feed of recent articles
4 from news sources frequently visited by the user, a map or directory
5 of local businesses, or a dating service to find romantic partners. All
6 of these decisions, like the decision to host third‐party content in the
7 first place, result in “connections” or “matches” of information and
8 individuals, which would have not occurred but for the internet
9 services’ particular editorial choices regarding the display of third‐
10 party content. We, again, are unaware of case law denying Section
11 230(c)(1) immunity because of the “matchmaking” results of such
12 editorial decisions.
13 Seen in this context, plaintiffs’ argument that Facebook’s
14 algorithms uniquely form “connections” or “matchmake” is wrong.
15 That, again, has been a fundamental result of publishing third‐party
16 content on the Internet since its beginning. Like the decision to place
36
1 third‐party content on a homepage, for example, Facebook’s
2 algorithms might cause more such “matches” than other editorial
3 decisions. But that is not a basis to exclude the use of algorithms from
4 the scope of what it means to be a “publisher” under Section 230(c)(1).
5 The matches also might—as compared to those resulting from other
6 editorial decisions—present users with targeted content of even more
7 interest to them, just as an English speaker, for example, may be best
8 matched with English‐language content. But it would turn Section
9 230(c)(1) upside down to hold that Congress intended that when
10 publishers of third‐party content become especially adept at
11 performing the functions of publishers, they are no longer immunized
12 from civil liability.23
23The dissent contends that our holding would necessarily immunize the dissent’s
hypothetical phone‐calling acquaintance who brokers a connection between two
published authors and facilitates the sharing of their works. See Dissent at 2. We
disagree, for the simple reason that Section 230(c)(1) immunizes publishing
activity only insofar as it is conducted by an “interactive computer service.”
Moreover, the third‐party information must be “provided through the Internet or
any other interactive computer service.” 47 U.S.C. § 230(f)(3).
37
1 Second, plaintiffs argue, in effect, that Facebook’s use of
2 algorithms is outside the scope of publishing because the algorithms
3 automate Facebook’s editorial decision‐making. That argument, too,
4 fails because “so long as a third party willingly provides the essential
5 published content, the interactive service provider receives full
6 immunity regardless of the specific edit[orial] or selection process.”
7 Carafano, 339 F.3d at 1124; see Marshall’s Locksmith, 925 F.3d at 1271
8 (holding that “automated editorial act[s]” are protected by Section
9 230) (quoting O’Kroley v. Fastcase, Inc., 831 F.3d 352, 355 (6th Cir.
10 2016)); cf., e.g., Roommates.Com, 521 F.3d at 1172; Herrick, 765 F. App’x
11 at 591. We disagree with plaintiffs that in enacting Section 230 to, inter
12 alia, “promote the continued development of the Internet,” 47 U.S.C.
13 § 230(b)(1), and “preserve the vibrant and competitive free market,”
14 id. § 230(b)(2), Congress implicitly intended to restrain the automation
15 of interactive computer services’ publishing activities in order for
16 them to retain immunity.
38
1 Our dissenting colleague calls for a narrow textual
2 interpretation of Section 230(c)(1) by contending that the Internet was
3 an “afterthought” of Congress in the CDA because the medium
4 received less “committee attention” than other forms of media and
5 that Congress, with Section 230, “tackled only . . . the ease with which
6 the Internet delivers indecent or offensive material, especially to
7 minors.” Dissent at 5–6. But such a constrained view of Section 230
8 simply is not supported by the actual text of the statute that Congress
9 passed. In addition to the broad language of Section 230(c)(1) and the
10 pro‐Internet‐development policy statements in Section 230 (discussed
11 ante at 24, 38), Congress announced the following specific findings in
12 Section 230:
13 (1) The rapidly developing array of Internet and other
14 interactive computer services available to individual
15 Americans represent an extraordinary advance in the
16 availability of educational and informational resources
17 to our citizens.
18
19 (2) These services offer users a great degree of control
20 over the information that they receive, as well as the
39
1 potential for even greater control in the future as
2 technology develops.
3
4 (3) The Internet and other interactive computer services
5 offer a forum for a true diversity of political discourse,
6 unique opportunities for cultural development, and
7 myriad avenues for intellectual activity.
8
9 (4) The Internet and other interactive computer services
10 have flourished, to the benefit of all Americans, with a
11 minimum of government regulation.
12
13 (5) Increasingly Americans are relying on interactive
14 media for a variety of political, educational, cultural, and
15 entertainment services.
16
17 47 U.S.C. § 230(a)(1)–(5). These Congressional statements all point to
18 the benefits of interactive media and “publisher” immunity to
19 interactive computer services when they arrange and transmit
20 information provided by others.
21 We therefore conclude that plaintiffs’ claims fall within
22 Facebook’s status as the “publisher” of information within the
23 meaning of Section 230(c)(1).
40
1 B. Whether Facebook is the Provider of the Information
2 We turn next to whether Facebook is plausibly alleged to itself
3 be an “information content provider,” or whether it is Hamas that
4 provides all of the complained‐of content. “The term ‘information
5 content provider’ means any person or entity that is responsible, in
6 whole or in part, for the creation or development of information
7 provided through the Internet or any other interactive computer
8 service.” 47 U.S.C. § 230(f)(3). If Facebook was a creator or developer,
9 even “in part,” of the terrorism‐related content upon which plaintiffs’
10 claims rely, then Facebook is an “information content provider” of
11 that content and is not protected by Section 230(c)(1) immunity.
12 47 U.S.C. § 230(f)(3). Plaintiffs contend that Facebook’s algorithms
13 “develop” Hamas’s content by directing such content to users who
14 are most interested in Hamas and its terrorist activities, without those
41
1 users necessarily seeking that content.
2 The term “development” in Section 230(f)(3) is undefined.
3 However, consistent with broadly construing “publisher” under
4 Section 230(c)(1), we have recognized that a defendant will not be
5 considered to have developed third‐party content unless the
6 defendant directly and “materially” contributed to what made the
7 content itself “unlawful.” LeadClick, 838 F.3d at 174 (quoting
8 Roommates.Com, 521 F.3d at 1168). This “material contribution” test,
9 as the Ninth Circuit has described it, “draw[s] the line at the ‘crucial
10 distinction between, on the one hand, taking actions . . . to . . . display
11 . . . actionable content and, on the other hand, responsibility for what
12 makes the displayed content [itself] illegal or actionable.’” Kimzey v.
13 Yelp! Inc., 836 F.3d 1263, 1269 n.4 (9th Cir. 2016) (quoting Jones,
14 755 F.3d at 413–14).
15 Employing this “material contribution” test, we held in FTC v.
16 LeadClick that the defendant LeadClick had “developed” third parties’
42
1 content by giving specific instructions to those parties on how to edit
2 “fake news” that they were using in their ads to encourage consumers
3 to purchase their weight‐loss products. LeadClick, 838 F.3d at 176.
4 LeadClick’s suggestions included adjusting weight‐loss claims and
5 providing legitimate‐appearing news endorsements, thus “materially
6 contributing to [the content’s] alleged unlawfulness.” Id. (quoting
7 Roommates.Com, 521 F.3d at 1160) (alterations in the original).
8 LeadClick also concluded that a defendant may, in some
9 circumstances, be a developer of its users’ content if it encourages or
10 advises users to provide the specific actionable content that forms the
11 basis for the claim. See id. Similarly, in Fair Housing Council v.
12 Roommates.Com, 521 F.3d at 1172, the Ninth Circuit determined that—
13 in the context of the Fair Housing Act, 42 U.S.C. § 3601 et seq., which
14 prohibits discrimination on the basis of sex, family status, sexual
15 orientation, and other protected classes in activities related to
16 housing—the defendant website’s practice of requiring users to use
43
1 pre‐populated responses to answer inherently discriminatory
2 questions about membership in those protected classes amounted to
3 developing the actionable information for purposes of the plaintiffs’
4 discrimination claim.
5 Although it did not explicitly adopt the “material contribution”
6 test, the D.C. Circuit’s recent decision in Marshall’s Locksmith Service v.
7 Google, 925 F.3d 1263, illustrates how a website’s display of third‐
8 party information does not cross the line into content development.
9 There, “scam locksmiths”—who were apparently actual locksmiths
10 seeking to mislead consumers with lock emergencies into believing
11 that they were closer in proximity to the emergency location than they
12 actually were—allegedly provided Google, Microsoft, and Yahoo!’s
13 internet mapping services with false locations, some of which were
14 exact street addresses and others which were “less‐exact,” such as
15 telephone area codes. Id. at 1265–70. The internet mapping services
16 of Google, Microsoft, and Yahoo! translated this information into
44
1 textual and pictorial “pinpoints” on maps that were displayed to the
2 services’ users. Id. at 1269. The D.C. Circuit concluded that this
3 “translation” of the third‐party information by the interactive
4 computer services did not develop that information (or create new
5 content) because the underlying “information [was] entirely provided
6 by the third party, and the choice of presentation” fell within the
7 interactive computer services’ prerogative as publishers. Id.
8 (emphasis added).
9 As to the “less‐exact” location information, such as area codes,
10 provided by the scam locksmiths, the plaintiffs also argued that the
11 mapping services’ algorithmic translation of this information into
12 exact pinpoint map locations developed or created the misleading
13 information. Id. at 1269–70. The D.C. Circuit also rejected that
14 argument, holding that “defendants’ translation of [imprecise] third‐
15 party information into map pinpoints does not convert them into
16 ‘information content providers’ because defendants use a neutral
45
1 algorithm to make that translation.” Id. at 1270. In using the term
2 “neutral,” the court observed that the algorithms were alleged to
3 make no distinction between “scam” and other locksmiths and that
4 the algorithms did not materially alter (i.e., they “hew[ed] to”) the
5 underlying information provided by the third parties. Id. at 1270 n.5,
6 1270–71.
7 Here, plaintiffs’ allegations about Facebook’s conduct do not
8 render it responsible for the Hamas‐related content. As an initial
9 matter, Facebook does not edit (or suggest edits) for the content that
10 its users—including Hamas—publish. That practice is consistent
11 with Facebook’s Terms of Service, which emphasize that a Facebook
12 user “own[s] all of the content and information [the user] post[s] on
13 Facebook, and [the user] can control how it is shared through [the
14 user’s] privacy and application settings.” App’x 252.
15 Nor does Facebook’s acquiring certain information from users
16 render it a developer for the purposes of Section 230. Facebook
46
1 requires users to provide only basic identifying information: their
2 names, telephone numbers, and email addresses. In so doing,
3 Facebook acts as a “neutral intermediary.” LeadClick, 838 F.3d at 174.
4 Moreover, plaintiffs concede in the pleadings that Facebook does not
5 publish that information, cf., e.g., Roommates.Com, 521 F.3d at 1172,
6 and so such content plainly has no bearing on plaintiffs’ claims.
7 Plaintiffs’ allegations likewise indicate that Facebook’s
8 algorithms are content “neutral” in the sense that the D.C. Circuit
9 used that term in Marshall’s Locksmith: The algorithms take the
10 information provided by Facebook users and “match” it to other
11 users—again, materially unaltered—based on objective factors
12 applicable to any content, whether it concerns soccer, Picasso, or
13 plumbers.24 Merely arranging and displaying others’ content to users
24We do not mean that Section 230 requires algorithms to treat all types of content
the same. To the contrary, Section 230 would plainly allow Facebook’s algorithms
to, for example, de‐promote or block content it deemed objectionable. We
emphasize only—assuming that such conduct could constitute “development” of
third‐party content—that plaintiffs do not plausibly allege that Facebook
augments terrorist‐supporting content primarily on the basis of its subject matter.
47
1 of Facebook through such algorithms—even if the content is not
2 actively sought by those users—is not enough to hold Facebook
3 responsible as the “develop[er]” or “creat[or]” of that content. See,
4 e.g., Marshall’s Locksmith, 925 F.3d at 1269–71; Roommates.Com,
5 521 F.3d at 1169–70.
6 Plaintiffs’ arguments to the contrary are unpersuasive. For one,
7 they point to the Ninth Circuit’s decision in Roommates.Com as
8 holding that requiring or encouraging users to provide any particular
9 information whatsoever to the interactive computer service
10 transforms a defendant into a developer of that information. The
11 Roommates.Com holding, however, was not so broad; it concluded
12 only that the site’s conduct in requiring users to select from “a limited
13 set of pre‐populated answers” to respond to particular
14 “discriminatory questions” had a content‐development effect that
15 was actionable in the context of the Fair Housing Act. See 521 F.3d at
16 1166. There is no comparable allegation here.
48
1 Plaintiffs also argue that Facebook develops Hamas’s content
2 because Facebook’s algorithms make that content more “visible,”
3 “available,” and “usable.” Appellants’ Br. at 45–46. But making
4 information more available is, again, an essential part of traditional
5 publishing; it does not amount to “developing” that information
6 within the meaning of Section 230. Similarly, plaintiffs assert that
7 Facebook’s algorithms suggest third‐party content to users “based on
8 what Facebook believes will cause the user to use Facebook as much
9 as possible” and that Facebook intends to “influence” consumers’
10 responses to that content. Appellants’ Br. 48. This does not describe
11 anything more than Facebook vigorously fulfilling its role as a
12 publisher. Plaintiffs’ suggestion that publishers must have no role in
13 organizing or distributing third‐party content in order to avoid
14 “develop[ing]” that content is both ungrounded in the text of Section
15 230 and contrary to its purpose.
49
1 Finally, we note that plaintiffs also argue that Facebook should
2 not be afforded Section 230 immunity because Facebook has chosen
3 to undertake efforts to eliminate objectionable and dangerous content
4 but has not been effective or consistent in those efforts. However,
5 again, one of the purposes of Section 230 was to ensure that interactive
6 computer services should not incur liability as developers or creators
7 of third‐party content merely because they undertake such efforts—
8 even if they are not completely effective.25
9 We therefore conclude from the allegations of plaintiffs’
10 complaint that Facebook did not “develop” the content of the
11 Facebook postings by Hamas and that Section 230(c)(1) applies to
12 Facebook’s alleged conduct in this case.
13 III. Whether Applying Section 230(c)(1) to Plaintiffs’ Claims
14 Would Impair the Enforcement of a Federal Criminal Statute
15
16 Plaintiffs also argue that Section 230(c)(1) may not be applied
25 See supra, Discussion, Part I.
50
1 to their claims because that would impermissibly “impair the
2 enforcement” of a “Federal criminal statute.” Appellant’s Br. at 52
3 (quoting 47 U.S.C. § 230(e)(1)). Section 230(e)(1), entitled, “No effect
4 on criminal law,” is one of the enumerated exceptions to the
5 application of Section 230(c)(1) immunity. It provides that “[n]othing
6 in . . . section [230] shall be construed to impair the enforcement of . . .
7 any [] Federal criminal statute.” 47 U.S.C. § 230(e)(1). Plaintiffs
8 observe that 18 U.S.C. §§ 2339A, 2339B, and 2339C, which criminalize
9 providing material support for terrorism, providing material support
10 for foreign terrorist organizations, and financing terrorism,
11 respectively, are federal criminal statutes. Plaintiffs argue that
12 preventing them from bringing an action under the statute providing
13 for “civil remedies” for individuals injured “by reason of an act of
14 international terrorism,” 18 U.S.C. § 2333(a), would “impair the
15 enforcement” of those criminal statutes within the meaning of
16 47 U.S.C. § 230(e)(1). In response, citing the First Circuit’s decision in
51
1 Backpage.com, 817 F.3d at 23–24, Facebook argues that Section 230(e)(1)
2 pertains only to criminal enforcement actions brought by a
3 prosecutor, not civil actions such as this.
4 We agree with the district court’s conclusion that Section
5 230(e)(1) is inapplicable in this civil action. Even accepting, arguendo,
6 plaintiffs’ assertion that a civil litigant could be said to “enforce” a
7 criminal statute through a separate civil remedies provision, any
8 purported ambiguity in Section 230(e)(1) is resolved by its title, “No
9 effect on criminal law.”26 “Criminal law” concerns “prosecuting and
10 punishing offenders” and is “contrasted with civil law,” which, as
11 here, concerns “private relations between individuals.” Criminal Law,
12 Civil Law, Oxford English Dictionary (3d ed. 2010). Furthermore, as
13 the First Circuit pointed out in Jane Doe No. 1 v. Backpage.com, LLC,
14 “where Congress wanted to include both civil and criminal remedies
26“[W]here the text is ambiguous, a statute’s titles can offer ‘a useful aid in
resolving [the] ambiguity.’” Lawson v. FMR LLC, 571 U.S. 429, 465 (2014) (quoting
FTC v. Mandel Bros., Inc., 359 U.S. 385, 388–89 (1959) (alterations in original)).
52
1 in CDA provisions, it did so through broader language.” 817 F.3d
2 at 23. Section 230(e)(4), for example, states that Section 230 “should
3 not ‘be construed to limit the application of the Electronic
4 Communications Privacy Act of 1986,’ a statute that contains both
5 criminal penalties and civil remedies.” Id. (first quoting 18 U.S.C.
6 § 230(e)(4), then citing 18 U.S.C. §§ 2511, 2520). In light of the
7 presumption that the use of “different words within the same
8 statutory scheme is deliberate,” the fact that Congress’s word choice
9 in “[p]reserving the ‘application’ of this Act” is distinct from its
10 “significantly narrower word choice in safeguarding the
11 ‘enforcement’ of federal criminal statutes” counsels against the broad
12 reading of Section 230(e)(1) urged by plaintiffs. Id. (citing Sosa v.
13 Alvarez‐Machain, 542 U.S. 692, 711 n.9 (2004)).27 We therefore join the
27We do not here decide whether the word “enforcing” in a different provision,
Section 230(e)(3), necessarily has the same meaning as “enforcement” in Section
230(e)(1), given their different linguistic contexts. See 47 U.S.C. § 230(e)(3)
(“Nothing in this section shall be construed to prevent any State from enforcing
any State law that is consistent with this section.”); Beharry v. Ashcroft, 329 F.3d 51,
61 (2d Cir. 2003) (Sotomayor, J.) (“Usually identical words in different sections
53
1 First Circuit in concluding that Section 230(e)(1) is “quite clearly . . .
2 limited to criminal prosecutions.” Backpage.com, 817 F.3d at 23.
3 Accordingly, Section 230(e)(1) provides no obstacle to the application
4 of Section 230(c)(1) in this case.
5 IV. Whether the Anti‐Terrorism Act’s Civil Remedies Provision,
6 18 U.S.C. § 2333, Implicitly Narrowed or Repealed Section
7 230(c)(1)
8
9 Plaintiffs also argue that the ATA’s civil remedies provision,
10 18 U.S.C. § 2333, irreconcilably conflicts with Section 230 and
11 impliedly repealed it when Congress amended Section 2333 by
12 adopting the Justice Against Sponsors of Terrorism Act (“JASTA”) in
13 2016. JASTA, among other things, added civil liability for aiding and
14 abetting and civil conspiracy to Section 2333, with a stated purpose of
15 “provid[ing] civil litigants with the broadest possible basis . . . to seek
16 relief” against material supporters of terrorism. Pub. L. 114–222,
mean identical things, but not invariably. All depends on context.” (citation
omitted)).
54
1 § 2(b), 130 Stat. 852, 853 (2016).
2 “[R]epeals by implication are not favored and will not be
3 presumed unless the intention of the legislature to repeal is clear and
4 manifest.” Nat’l Ass’n of Home Builders v. Defs. of Wildlife, 551 U.S. 644,
5 662 (2007) (citation, internal quotation marks, and alterations
6 omitted). In other words, “[a]n implied repeal will only be found
7 where provisions in two statutes are in irreconcilable conflict, or
8 where the latter Act covers the whole subject of the earlier one and is
9 clearly intended as a substitute.” Branch v. Smith, 538 U.S. 254, 273
10 (2003) (citation and internal quotation marks omitted). Here, there is
11 no irreconcilable conflict between the statutes. Section 230 provides
12 an affirmative defense to liability under Section 2333 for only the
13 narrow set of defendants and conduct to which Section 230 applies.
14 JASTA merely expanded Section 2333’s cause of action to secondary
15 liability; it provides no obstacle—explicit or implicit—to applying
16 Section 230.
55
1 V. Whether Applying Section 230(c)(1) to Plaintiffs’ Claims
2 Would Be Impermissibly Extraterritorial
3
4 Plaintiffs also argue that the presumption against the
5 extraterritorial application of federal statutes bars applying Section
6 230(c)(1) to their claims because Hamas posted content and
7 conducted the attacks from overseas, and because Facebook’s
8 employees who failed to take down Hamas’s content were allegedly
9 located outside the United States, in Facebook’s foreign facilities. In
10 response, Facebook contends that Section 230(c)(1) merely limits civil
11 liability in American courts, a purely domestic application.
12 Under the canon of statutory interpretation known as the
13 “presumption against extraterritoriality,” “[a]bsent clearly expressed
14 congressional intent to the contrary, federal laws will be construed to
15 have only domestic application.”
16 RJR Nabisco, Inc. v. European Cmty., 136 S. Ct. 2090, 2100 (2016). The
17 Supreme Court has instructed courts to apply “a two‐step framework
18 for analyzing extraterritoriality issues.” Id. at 2101. “At the first step,
56
1 we ask whether the presumption against extraterritoriality has been
2 rebutted—that is, whether the statute gives a clear, affirmative
3 indication that it applies extraterritorially.” Id.
4 If the statute is not extraterritorial on its face, then “at the
5 second step we determine whether the case involves a domestic
6 application of the statute, and we do this by looking to the statute’s
7 ‘focus.’” Id. “The focus of a statute is the object of its solicitude, which
8 can include the conduct it seeks to regulate, as well as the parties and
9 interests it seeks to protect or vindicate.” WesternGeco LLC v. ION
10 Geophysical Corp., 138 S. Ct. 2129, 2137 (2018) (citation, internal
11 quotation marks, and alterations omitted). “If the conduct relevant to
12 the statute’s focus occurred in the United States, then the case
13 involves a permissible domestic application even if other conduct
14 occurred abroad . . . .” RJR Nabisco, 136 S. Ct. at 2101. “[B]ut if the
15 conduct relevant to the focus occurred in a foreign country, then the
57
1 case involves an impermissible extraterritorial application regardless
2 of any other conduct that occurred in U.S. territory.” Id.
3 The two‐step framework arguably does not easily apply to a
4 statutory provision that affords an affirmative defense to civil
5 liability. Indeed, it is unclear how an American court could apply
6 such a provision “extraterritorially.” Even if it could be applied
7 extraterritorially—say, by somehow treating the defendant’s conduct
8 rather than the lawsuit itself as the “focus” of a liability‐limiting
9 provision—the presumption against extraterritoriality primarily
10 “serves to avoid the international discord that can result when U.S.
11 law is applied to conduct in foreign countries.” Id. at 2100. Allowing
12 a plaintiff’s claim to go forward because the cause of action applies
13 extraterritorially, while then applying the presumption to block a
14 different provision setting out defenses to that claim, would seem
15 only to increase the possibility of international friction. Such a regime
16 could also give plaintiffs an advantage when they sue over
58
1 extraterritorial wrongdoing that they would not receive if the
2 defendant’s conduct occurred domestically. It is doubtful that
3 Congress ever intends such a result when it writes provisions limiting
4 civil liability.
5 The Ninth Circuit addressed this issue in Blazevska v. Raytheon
6 Aircraft Co., 522 F.3d 948 (9th Cir. 2008), which was decided prior to
7 the Supreme Court’s adoption of the two‐step extraterritoriality
8 framework. The plaintiffs in Blazevska argued that the General
9 Aviation Revitalization Act’s (“GARA”) statute of repose could not
10 limit the defendant’s liability because, like here, certain events related
11 to plaintiffs’ claims occurred overseas. Id. at 950. The Ninth Circuit
12 disagreed, holding that the presumption against extraterritoriality
13 was inapplicable to a liability‐limiting statute. It found that GARA
14 did not “impermissibly regulate conduct that has occurred abroad,”
15 and instead,
16 merely eliminates the power of any party to bring a suit
17 for damages against a general aviation aircraft
59
1 manufacturer, in a U.S. federal or state court, after the
2 limitation period. The only conduct it could arguably be
3 said to regulate is the ability of a party to initiate an
4 action for damages against a manufacturer in American
5 courts—an entirely domestic endeavor. Congress has no
6 power to tell courts of foreign countries whether they
7 could entertain a suit against an American defendant.
8
9 Id. at 953. “Accordingly,” the Ninth Circuit held, “the presumption
10 against extraterritoriality simply is not implicated by GARA’s
11 application.” Id.
12 The Supreme Court has left open the question of whether
13 certain types of statutes might not be subject to the presumption
14 against extraterritoriality. See WesternGeco, 138 S. Ct. at 2136 (noting,
15 without deciding, the question whether “the presumption against
16 extraterritoriality should never apply to statutes . . . that merely
17 provide a general damages remedy for conduct that Congress has
18 declared unlawful”). However, we need not decide here whether the
19 presumption against extraterritoriality is “simply . . . not
20 implicated,”Blazevska, 522 F.3d at 953, by statutes that merely limit
60
1 civil liability, or whether the two‐step RJR Nabisco framework must
2 be applied, because that framework is workable in this context and
3 compels the same result. At step two, we conclude from the text of
4 Section 230, particularly the words “shall be treated,” that its primary
5 purpose is limiting civil liability in American courts.28 The regulated
6 conduct—the litigation of civil claims in federal courts—occurs
7 entirely domestically in its application here. We thus hold that the
8 presumption against extraterritoriality is no barrier to the application
9 of Section 230(c)(1) in this case.29
10 VI. Foreign Law Claims
11 Turning next to plaintiffs’ foreign tort claims, the parties
12 disagree as to the reach of Section 230 immunity. The district court
28 Although “a finding of extraterritoriality at step one will obviate step two’s
‘focus’ inquiry,” courts may instead “start[] at step two in appropriate cases.” RJR
Nabisco, 136 S. Ct. at 2101 n.5.
29Because we conclude that the affirmative defense of Section 230(c)(1) applies, we
need not reach Facebook’s alternative argument that plaintiffs’ complaint does not
plausibly allege that, absent such immunity, Facebook assisted Hamas under the
federal antiterrorism claims.
61
1 held that Section 230 applies to foreign law claims brought in United
2 States courts, but it did not address the basis for its exercise of subject
3 matter jurisdiction over those claims. Before we can reach the merits
4 of those causes of action, including the applicability of Section 230, we
5 must independently ensure the basis for federal subject matter
6 jurisdiction. Ruhrgas AG v. Marathon Oil Co., 526 U.S. 574, 583 (1999).
7 Plaintiffs allege that, under 28 U.S.C. § 1332(a)(2), we have
8 diversity jurisdiction over their foreign law claims purportedly
9 brought between “citizens of a State and citizens or subjects of a
10 foreign state.” It is well established, however, that “United States
11 citizens who are domiciled abroad are neither citizens of any state of
12 the United States nor citizens or subjects of a foreign state, and
13 § 1332(a) does not provide that the courts have jurisdiction over a suit
14 to which such persons are parties.” Cresswell v. Sullivan & Cromwell,
15 922 F.2d 60, 68 (2d Cir. 1990). In other words, “a suit by or against
16 United States citizens domiciled abroad may not be premised on
62
1 diversity.” Id.; see also Newman‐Green, Inc. v. Alfonzo‐Larrain, 490 U.S.
2 826, 829 (1989) (stating that “stateless” United States citizens may not
3 be parties to diversity‐based suits).
4 Here, a substantial majority of the plaintiffs are alleged to be
5 United States citizens domiciled in Israel.30 A suit based on diversity
6 jurisdiction may not proceed with these plaintiffs as parties.
7 In addition, “[i]t is well established that for a case to come
8 within [§ 1332] there must be complete diversity,” Cresswell, 922 F.2d
9 at 68, and the complaint must set forth the citizenship of the parties,
10 Leveraged Leasing Admin. Corp. v. PacifiCorp Capital, Inc., 87 F.3d 44, 47
11 (2d Cir. 1996). Plaintiffs’ complaint fails to allege the state citizenship,
12 if any, of U.S.‐citizen plaintiffs Taylor Force, Kristin Ann Force,
13 Yaakov Naftali Fraenkel, Chaya Zissel Braun, Richard Lakin, or the
14 minor‐children plaintiffs S.S.R., M.M.R., R.M.R. and S.Z.R. We thus
15 cannot determine on the present record whether those plaintiffs are
30A representative of a decedent’s estate is “deemed to be a citizen only of the
same State as the decedent.” 28 U.S.C. § 1332(c)(2).
63
1 of diverse citizenship from Facebook. Indeed, only two plaintiffs—
2 Stuart Force and Robbi Force—are alleged to be of diverse citizenship
3 to Facebook.
4 The joinder of Israel‐domiciled U.S.‐citizen plaintiffs requires
5 us either to dismiss the diversity‐based claims altogether, or exercise
6 our discretion to: 1) dismiss those plaintiffs who we determine are
7 “dispensable jurisdictional spoilers;” or 2) vacate in part the judgment
8 of the district court and remand for it to make that indispensability
9 determination and to determine whether dismissal of those
10 individuals would be appropriate. SCS Commcʹns, Inc. v. Herrick Co.,
11 360 F.3d 329, 335 (2d Cir. 2004). As for the plaintiffs for whom no state
12 citizenship is alleged, we have discretionary authority to accept
13 submissions for the purpose of amending the complaint on appeal, or
14 we could remand for amendment. See Leveraged Leasing, 87 F.3d at 47
15 (“Defective allegations of jurisdiction may be amended, upon terms,
16 in the trial or appellate courts.” (quoting 28 U.S.C. § 1653)).
64
1 We decline to exercise our discretion to attempt to remedy
2 these jurisdictional defects. This is not a case in which a small number
3 of nondiverse parties defeats jurisdiction, but rather one in which—
4 after multiple complaints have been submitted—most of the plaintiffs
5 are improperly joined. Moreover, the case remains at the pleading
6 stage, with discovery not yet having begun. Proceeding with the few
7 diverse plaintiffs would be inefficient given the expenditure of
8 judicial and party resources that would be required to address the
9 jurisdictional defects. The most appropriate course is for any diverse
10 plaintiffs to bring a new action and demonstrate subject matter
11 jurisdiction in that action. 31 Accordingly, plaintiffs’ foreign law
31Plaintiffs do not assert supplemental jurisdiction under 28 U.S.C. § 1367. All
claims over which we have original jurisdiction are dismissed at the pleading
stage, see id. § 1367(c)(3), and, by plaintiffs’ own argument, some of the foreign
claims “differ[] markedly from American concepts of . . . liability,” Appellants’ Br.
59; see id. § 1367(c)(1). Therefore, even assuming that plaintiffs’ foreign law claims
form “part of the same case or controversy” as their federal claims, 28 U.S.C.
§ 1367(a), we decline to exercise supplemental jurisdiction here.
65
1 claims are dismissed, without prejudice.32
2 CONCLUSION
3 For the foregoing reasons, we AFFIRM the judgment of the
4 district court as to plaintiffs’ federal claims and DISMISS plaintiffs’
5 foreign law claims.
32Because plaintiffs’ foreign law claims are dismissed on jurisdictional grounds,
we express no opinion as to the district court’s conclusion that Section 230 applies
to foreign law claims brought in United States courts.
66
KATZMANN, Chief Judge, concurring in part and dissenting in part:
I agree with much of the reasoning in the excellent majority opinion, and I
join that opinion except for Parts I and II of the Discussion. But I must respectfully
part company with the majority on its treatment of Facebook’s friend‐ and content‐
suggestion algorithms under the Communications Decency Act (“CDA”).1
1 I agree with the majority that the CDA’s exception for enforcement of criminal
laws, 47 U.S.C. § 230(e)(1), does not apply to plaintiffs’ claims, see ante, at 50‐54. However,
I find the question to be somewhat closer than the majority does, in part because some of
the statutes enumerated in § 230(e)(1) themselves contain civil remedies. Section 230(e)(1)
states that “[n]othing in [§ 230] shall be construed to impair the enforcement of section
223 or 231 of this title, chapter 71 (relating to obscenity) or 110 (relating to sexual
exploitation of children) of title 18, or any other Federal criminal statute.” One of those
enumerated chapters—Chapter 110 of Title 18—includes a civil suit provision for victims
of specific child sex crimes. See 18 U.S.C. § 2255. Meanwhile, 47 U.S.C. § 223—which
prohibits obscene or harassing phone calls—specifies that civil fines may be levied
“pursuant to civil action by,” or “after appropriate administrative proceedings” of, the
Federal Communications Commission (“FCC”), and it authorizes the Attorney General
to bring civil suits to enjoin practices that violate the statute. 47 U.S.C. § 223(b)(5)(B)‐
(b)(6). If § 230(e)(1) covers “enforcement” of the listed chapters in their entirety, it is
difficult to see how it would not cover other provisions that authorize civil suits for
violations of criminal laws, particularly given that the enumerated list is followed by “or
any other criminal law.”
However, as detailed post, § 230 was designed as a private‐sector‐driven
alternative to a Senate plan that would allow the FCC “either civilly or criminally, to
punish people” who put objectionable material on the Internet. 141 Cong. Rec. 22,045
(1995) (statement of Rep. Cox); accord id. at 22,045‐46 (statement of Rep. Wyden); see Reno
v. ACLU, 521 U.S. 844, 859 & n.24 (1997). On the House floor, author Christopher Cox
disparaged the idea of FCC enforcement and then stated: “Certainly, criminal
enforcement of our obscenity laws as an adjunct is a useful way of punishing the truly
1
As to the reasons for my disagreement, consider a hypothetical. Suppose
that you are a published author. One day, an acquaintance calls. “I’ve been reading
over everything you’ve ever published,” he informs you. “I’ve also been looking
at everything you’ve ever said on the Internet. I’ve done the same for this other
author. You two have very similar interests; I think you’d get along.” The
acquaintance then gives you the other author’s contact information and photo,
along with a link to all her published works. He calls back three more times over
the next week with more names of writers you should get to know.
Now, you might say your acquaintance fancies himself a matchmaker. But
would you say he’s acting as the publisher of the other authors’ work?
Facebook and the majority would have us answer this question “yes.” I,
however, cannot do so. For the scenario I have just described is little different from
how Facebook’s algorithms allegedly work. And while those algorithms do end
up showing users profile, group, or event pages written by other users, it strains
guilty.” 141 Cong. Rec. 22,045 (emphasis added). This history, along with the provision’s
title, strongly suggests that § 230(e)(1) was intended as a narrow criminal‐law exception.
It would be odd, then, to read § 230(e)(1) as allowing for civil enforcement by, among
others, the FCC, even if only in aid of criminal law enforcement.
2
the English language to say that in targeting and recommending these writings to
users—and thereby forging connections, developing new social networks—
Facebook is acting as “the publisher of . . . information provided by another
information content provider.” 47 U.S.C. § 230(c)(1) (emphasis added).
It would be one thing if congressional intent compelled us to adopt the
majority’s reading. It does not. Instead, we today extend a provision that was
designed to encourage computer service providers to shield minors from obscene
material so that it now immunizes those same providers for allegedly connecting
terrorists to one another. Neither the impetus for nor the text of § 230(c)(1) requires
such a result. When a plaintiff brings a claim that is based not on the content of the
information shown but rather on the connections Facebook’s algorithms make
between individuals, the CDA does not and should not bar relief.
The Anti‐Terrorism Act (“ATA”) claims in this case fit this bill. According
to plaintiffs’ Proposed Second Amended Complaint (“PSAC”)—which we must
take as true at this early stage—Facebook has developed “sophisticated
algorithm[s]” for bringing its users together. App’x 347 ¶ 622. After collecting
mountains of data about each user’s activity on and off its platform, Facebook
3
unleashes its algorithms to generate friend, group, and event suggestions based
on what it perceives to be the user’s interests. Id. at 345‐46 ¶¶ 608‐14. If a user posts
about a Hamas attack or searches for information about a Hamas leader, Facebook
may “suggest” that that user become friends with Hamas terrorists on Facebook
or join Hamas‐related Facebook groups. By “facilitat[ing] [Hamas’s] ability to
reach and engage an audience it could not otherwise reach as effectively,”
plaintiffs allege that Facebook’s algorithms provide material support and
personnel to terrorists. Id. at 347 ¶ 622; see id. at 352‐58 ¶¶ 646‐77. As applied to the
algorithms, plaintiffs’ claims do not seek to punish Facebook for the content others
post, for deciding whether to publish third parties’ content, or for editing (or
failing to edit) others’ content before publishing it. In short, they do not rely on
treating Facebook as “the publisher” of others’ information. Instead, they would
hold Facebook liable for its affirmative role in bringing terrorists together.
When it comes to Facebook’s algorithms, then, plaintiffs’ causes of action do
not run afoul of the CDA. Because the court below did not pass on the merits of
the ATA claims pressed below, I would send this case back to the district court to
decide the merits in the first instance. The majority, however, cuts off all possibility
4
for relief based on algorithms like Facebook’s, even if these or future plaintiffs
could prove a sufficient nexus between those algorithms and their injuries. In light
of today’s decision and other judicial interpretations of the statute that have
generally immunized social media companies—and especially in light of the new
reality that has evolved since the CDA’s passage—Congress may wish to revisit
the CDA to better calibrate the circumstances where such immunization is
appropriate and inappropriate in light of congressional purposes.
I.
To see how far we have strayed from the path on which Congress set us out,
we must consider where that path began. What is now 47 U.S.C. § 230 was added
as an amendment to the Telecommunications Act of 1996, a statute designed to
deregulate and encourage innovation in the telecommunications industry. Pub. L.
104‐104, § 509, 110 Stat. 56, 56, 137‐39; see Reno, 521 U.S. at 857. Congress devoted
much committee attention to traditional telephone and broadcast media; by
contrast, the Internet was an afterthought, addressed only through floor
amendments or in conference. Reno, 521 U.S. at 857‐58. Of the myriad issues the
emerging Internet implicated, Congress tackled only one: the ease with which the
5
Internet delivers indecent or offensive material, especially to minors. See
Telecommunications Act of 1996, tit. V, subtit. A, 110 Stat. at 133‐39. And § 230
provided one of two alternative ways of handling this problem.
The action began in the Senate. Senator James J. Exon introduced the CDA
on February 1, 1995. See 141 Cong. Rec. 3,203. He presented a revised bill on June
9, 1995, “[t]he heart and the soul” of which was “its protection for families and
children.” Id. at 15,503 (statement of Sen. Exon). The Exon Amendment sought to
reduce the proliferation of pornography and other obscene material online by
subjecting to civil and criminal penalties those who use interactive computer
services to make, solicit, or transmit offensive material. Id. at 15,505.
The House of Representatives had the same goal—to protect children from
inappropriate online material—but a very different sense of how to achieve it.
Congressmen Christopher Cox (R‐California) and Ron Wyden (D‐Oregon)
introduced an amendment to the Telecommunications Act, entitled “Online
Family Empowerment,” about two months after the revised CDA appeared in the
Senate. See id. at 22,044. Making the argument for their amendment during the
House floor debate, Congressman Cox stated:
6
We want to make sure that everyone in America has an open
invitation and feels welcome to participate in the Internet. But as you
know, there is some reason for people to be wary because, as a Time
Magazine cover story recently highlighted, there is in this vast world
of computer information, a literal computer library, some offensive
material, some things in the bookstore, if you will, that our children
ought not to see.
As the parent of two, I want to make sure that my children have access
to this future and that I do not have to worry about what they might
be running into on line. I would like to keep that out of my house and
off my computer.
Id. at 22,044‐45. Likewise, Congressman Wyden said: “We are all against smut and
pornography, and, as the parents of two small computer‐literate children, my wife
and I have seen our kids find their way into these chat rooms that make their
middle‐aged parents cringe.” Id. at 22,045.
As both sponsors noted, the debate between the House and the Senate was
not over the CDA’s primary purpose but rather over the best means to that shared
end. See id. (statement of Rep. Cox) (“How should we do this? . . . Mr. Chairman,
what we want are results. We want to make sure we do something that actually
works.”); id. (statement of Rep. Wyden) (“So let us all stipulate right at the outset
the importance of protecting our kids and going to the issue of the best way to do
it.”). While the Exon Amendment would have the FCC regulate online obscene
7
materials, the sponsors of the House proposal “believe[d] that parents and families
are better suited to guard the portals of cyberspace and protect our children than
our Government bureaucrats.” Id. at 22,045 (statement of Rep. Wyden). They also
feared the effects the Senate’s approach might have on the Internet itself. See id.
(statement of Rep. Cox) (“[The amendment] will establish as the policy of the
United States that we do not wish to have content regulation by the Federal
Government of what is on the Internet, that we do not wish to have a Federal
Computer Commission with an army of bureaucrats regulating the Internet . . . .”).
The Cox‐Wyden Amendment therefore sought to empower interactive computer
service providers to self‐regulate, and to provide tools for parents to regulate,
children’s access to inappropriate material. See S. Rep. No. 104‐230, at 194 (1996)
(Conf. Rep.); 141 Cong. Rec. 22,045 (statement of Rep. Cox).
There was only one problem with this approach, as the House sponsors saw
it. A New York State trial court had recently ruled that the online service Prodigy,
by deciding to remove certain indecent material from its site, had become a
“publisher” and thus was liable for defamation when it failed to remove other
objectionable content. Stratton‐Oakmont, Inc. v. Prodigy Servs. Co., 1995 WL 323710,
8
at *4 (N.Y. Sup. Ct. May 24, 1995) (unpublished). The authors of § 230 saw the
Stratton‐Oakmont decision as indicative of a “legal system [that] provides a massive
disincentive for the people who might best help us control the Internet to do so.”
141 Cong. Rec. 22,045 (statement of Rep. Cox). Cox‐Wyden was designed, in large
part, to remove that disincentive. See S. Rep. No. 104‐230, at 194.
The House having passed the Cox‐Wyden Amendment and the Senate the
Exon Amendment, the conference committee had before it two alternative visions
for countering the spread of indecent online material to minors. The committee
chose not to choose. Congress instead adopted both amendments as part of a final
Communications Decency Act. See Telecommunications Act of 1996, §§ 502, 509,
110 Stat. at 133‐39; Reno, 521 U.S. at 858 n.24.2 The Supreme Court promptly struck
down two major provisions of the Exon Amendment as unconstitutionally
2 It helped that the Cox‐Wyden Amendment exempted from its deregulatory
regime the very provisions that the Exon Amendment strengthened, see
Telecommunications Act of 1996, §§ 502, 507‐508, 509(d)(1), 110 Stat. at 133‐39, and that
Congress stripped from the House bill a provision that would have denied jurisdiction
to the FCC to regulate the Internet, compare id. § 509, 110 Stat. at 138 (eliminating original
§ 509(d)), with 141 Cong. Rec. 22,044 (including original § 509(d)).
9
overbroad under the First Amendment, leaving the new § 230 as the dominant
force for securing decency on the Internet. See Reno, 521 U.S. at 849.
Section 230 overruled Stratton‐Oakmont through two interlocking
provisions, both of which survived the legislative process unscathed. The first,
which is at issue in this case, states that “[n]o provider or user of an interactive
computer service shall be treated as the publisher or speaker of any information
provided by another information content provider.” 47 U.S.C. § 230(c)(1). The
second provision eliminates liability for interactive computer service providers
and users for “any action voluntarily taken in good faith to restrict access to or
availability of material that the provider or user considers to be . . . objectionable,”
or “any action taken to enable or make available to . . . others the technical means
to restrict access to [objectionable] material.” Id. § 230(c)(2). These two subsections
tackle, in overlapping fashion, the two jurisprudential moves of the Stratton‐
Oakmont court: first, that Prodigy’s decision to screen posts for offensiveness
rendered it “a publisher rather than a distributor,” 1995 WL 323710, at *4; and
second, that by making good‐faith efforts to remove offensive material Prodigy
became liable for any actionable material it did not remove.
10
The legislative history illustrates that in passing § 230 Congress was focused
squarely on protecting minors from offensive online material, and that it sought
to do so by “empowering parents to determine the content of communications
their children receive through interactive computer services.” S. Rep. No. 104‐230,
at 194. The “policy” section of § 230’s text reflects this goal. See 47 U.S.C.
§ 230(b)(3)‐(4).3 It is not surprising, then, that Congress emphasized the narrow
civil liability shield that became § 230(c)(2), rather than the broad rule of
construction laid out in § 230(c)(1). Indeed, the conference committee summarized
§ 230 by stating that it “provides ‘Good Samaritan’ protections from civil liability
for providers or users of an interactive computer service for actions to restrict or
3 The policy section of the statute also expresses Congress’s desire “to preserve the
vibrant and competitive free market that presently exists for the Internet and other
interactive computer services, unfettered by Federal or State regulation.” 47 U.S.C.
§ 230(b)(2). It is therefore true that “Section 230 was enacted, in part, to maintain the
robust nature of Internet communication.” Ricci v. Teamsters Union Local 456, 781 F.3d 25,
28 (emphasis added) (quoting Zeran v. Am. Online, Inc., 129 F.3d 327, 330 (4th Cir. 1997));
see ante, at 24. As the legislative history laid out in this opinion shows, however, one
cannot fully understand the purpose of § 230 without considering that it was one
chamber’s proposal in a disagreement between the two houses of Congress over how best
to shield children from indecent material, and that in that contest the House was
principally concerned with two things: (1) overruling Stratton‐Oakmont and
(2) preventing “a Federal Computer Commission with an army of bureaucrats regulating
the Internet.” 141 Cong. Rec. 22,045 (statement of Rep. Cox).
11
to enable restriction of access to objectionable online material”—a description that
could just as easily have applied to § 230(c)(2) alone. S. Rep. No. 104‐230, at 194.
Congress also titled the entirety of § 230(c) “Protection for ‘Good Samaritan’
blocking and screening of offensive material,” suggesting that the definitional rule
outlined in § 230(c)(1) may have been envisioned as supporting or working in
tandem with the civil liability shield in § 230(c)(2).
None of this is to say that § 230(c)(1) exempts interactive computer service
providers from publisher treatment only when they remove indecent content.
Statutory text cannot be ignored, and Congress grabbed a bazooka to swat the
Stratton‐Oakmont fly. Whatever prototypical situation its drafters may have had in
mind, § 230(c)(1) does not limit its protection to situations involving “obscene
material” provided by others, instead using the expansive word “information.”4
4 This point—that Congress chose broader language than may have been necessary
to accomplish its primary goal—should not be confused with the Seventh Circuit’s
rationale for § 230(c)(1)’s general application: that “a law’s scope often differs from its
genesis.” See Chi. Lawyers Cmte. for Civil Rights Under Law, Inc. v. Craigslist, Inc., 519 F.3d
666, 671 (7th Cir. 2008). True as this axiom might be, it does not apply here—the language
of § 230(c)(1) remained untouched from introduction to passage. Nor is there any
evidence from the legislative record that interest groups altered the statutory language.
But cf. id. (“Once the legislative process gets rolling, interest groups seek (and often
obtain) other provisions.”). That § 230(c)(1)’s breadth flowed from Congress’s desire to
12
Illuminating Congress’s original intent does, however, underscore the extent of
§ 230(c)(1)’s subsequent mission creep. Given how far both Facebook’s suggestion
algorithms and plaintiffs’ terrorism claims swim from the shore of congressional
purpose, caution is warranted before courts extend the CDA’s reach any further.
II.
With the CDA’s background in mind, I turn to the text. By its plain terms,
§ 230 does not apply whenever a claim would treat the defendant as “a publisher”
in the abstract, immunizing defendants from liability stemming from any activity
in which one thinks publishing companies commonly engage. Contra ante, at 30‐
31, 33‐34, 49. It states, more specifically, that “[n]o provider or user of an interactive
computer service shall be treated as the publisher or speaker of any information
provided by another information content provider.” 47 U.S.C. § 230(c)(1) (emphases
added). “Here grammar and usage establish that ‘the’ is a function word
indicating that a following noun or noun equivalent is definite . . . .” Nielsen v.
Preap, 139 S. Ct. 954, 965 (2019) (citation and internal quotation marks omitted).
overrule Stratton‐Oakmont, rather than from mere interest group protectionism, matters.
13
The word “publisher” in this statute is thus inextricably linked to the “information
provided by another.” The question is whether a plaintiff’s claim arises from a
third party’s information, and—crucially—whether to establish the claim the court
must necessarily view the defendant, not as a publisher in the abstract, but rather
as the publisher of that third‐party information. See FTC v. LeadClick Media, LLC,
838 F.3d 158, 175 (2d Cir. 2016) (stating inquiry as “whether the cause of action
inherently requires the court to treat the defendant as the ‘publisher or speaker’ of
content provided by another”).
For this reason, § 230(c)(1) does not necessarily immunize defendants from
claims based on promoting content or selling advertising, even if those activities
might be common among publishing companies nowadays. A publisher might
write an email promoting a third‐party event to its readers, for example, but the
publisher would be the author of the underlying content and therefore not
immune from suit based on that promotion. See 47 U.S.C. § 230(c)(1), (f)(3).
Similarly, the fact that publishers may sell advertising based on user data does not
immunize the publisher if someone brings a claim based on the publisher’s selling
of the data, because the claim would not treat the defendant as the publisher of a
14
third party’s content. Cf. Oberdorf v. Amazon.com Inc., No. 18‐1041, 2019 WL
2849153, at *12 (3d Cir. July 3, 2019) (holding that the CDA does not bar claims
against Amazon.com “to the extent that” they “rely on Amazon’s role as an actor
in the sales process,” including both “selling” and “marketing”). Section 230(c)(1)
limits liability based on the function the defendant performs, not its identity.
Accordingly, our precedent does not grant publishers CDA immunity for
the full range of activities in which they might engage. Rather, it “bars lawsuits
seeking to hold a service provider liable for its exercise of a publisher’s traditional
editorial functions—such as deciding whether to publish, withdraw, postpone or
alter content” provided by another for publication. LeadClick, 838 F.3d at 174
(citation and internal quotation marks omitted); accord Oberdorf, 2019 WL 2849153,
at *10; Jane Doe No. 1 v. Backpage.com, LLC, 817 F.3d 12, 19 (1st Cir. 2016); Jones v.
Dirty World Entm’t Recordings LLC, 755 F.3d 398, 407 (6th Cir. 2014); Barnes v.
Yahoo!, Inc., 570 F.3d 1096, 1102 (9th Cir. 2009); Zeran, 129 F.3d at 330; see Klayman
v. Zuckerberg, 753 F.3d 1354, 1359 (D.C. Cir. 2014); Ben Ezra, Weinstein, & Co., Inc. v.
Am. Online Inc., 206 F.3d 980, 986 (10th Cir. 2000). For instance, a claim against a
newspaper based on the content of a classified ad (or the decision to publish or
15
withdraw that ad) would fail under the CDA not because newspapers traditionally
publish classified ads, but rather because such a claim would necessarily treat the
newspaper as the publisher of the ad‐maker’s content. Similarly, the newspaper
does not act as an “information content provider”—and thus maintains its CDA
protection—when it decides to run a classified ad because it neither “creates” nor
“develops” the information in the ad. 47 U.S.C. § 230(f)(3).
This case is different. Looking beyond Facebook’s “broad statements of
immunity” and relying “rather on a careful exegesis of the statutory language,”
Barnes, 570 F.3d at 1100, the CDA does not protect Facebook’s friend‐ and content‐
suggestion algorithms. A combination of two factors, in my view, confirms that
claims based on these algorithms do not inherently treat Facebook as the publisher
of third‐party content.5 First, Facebook uses the algorithms to create and
communicate its own message: that it thinks you, the reader—you, specifically—
will like this content. And second, Facebook’s suggestions contribute to the
5 Many of Facebook’s algorithms mentioned in the PSAC, such as its third‐party
advertising algorithm, its algorithm that places content in a user’s newsfeed, and (based
on the limited description in the PSAC) its video recommendation algorithm, remain
immune under the analysis I set out here.
16
creation of real‐world social networks. The result of at least some suggestions is
not just that the user consumes a third party’s content. Sometimes, Facebook’s
suggestions allegedly lead the user to become part of a unique global community,
the creation and maintenance of which goes far beyond and differs in kind from
traditional editorial functions.
It is true, as the majority notes, see ante, at 47, that Facebook’s algorithms
rely on and display users’ content. However, this is not enough to trigger the
protections of § 230(c)(1). The CDA does not mandate “a ‘but‐for’ test that would
provide immunity . . . solely because a cause of action would not otherwise have
accrued but for the third‐party content.” HomeAway.com, Inc. v. City of Santa
Monica, 918 F.3d 676, 682 (9th Cir. 2019). Rather, to fall within § 230(c)(1)’s radius,
the claim at issue must inherently fault the defendant’s activity as the publisher of
specific third‐party content. Plaintiffs’ claims about Facebook’s suggestion
algorithms do not do this. The complaint alleges that “Facebook collects detailed
information about its users, including, inter alia, the content they post, type of
content they view or engage with, people they communicate with, groups they
belong to and how they interact with such groups, visits to third party websites,
17
apps and Facebook partners.” App’x 345 ¶ 608. Then the algorithms “utilize the
collected data to suggest friends, groups, products, services and local events, and
target ads” based on each user’s input. Id. at 346 ¶ 610.
If a third party got access to Facebook users’ data, analyzed it using a
proprietary algorithm, and sent its own messages to Facebook users suggesting
that people become friends or attend one another’s events, the third party would
not be protected as “the publisher” of the users’ information. Similarly, if Facebook
were to use the algorithms to target its own material to particular users, such that
the resulting posts consisted of “information provided by” Facebook rather than
by “another information content provider,” § 230(c)(1), Facebook clearly would
not be immune for that independent message.
Yet that is ultimately what plaintiffs allege Facebook is doing. The PSAC
alleges that Facebook “actively provides ‘friend suggestions’ between users who
have expressed similar interests,” and that it “actively suggests groups and events
to users.” App’x 346 ¶¶ 612‐13. Facebook’s algorithms thus allegedly provide the
user with a message from Facebook. Facebook is telling users—perhaps implicitly,
but clearly—that they would like these people, groups, or events. In this respect,
18
Facebook “does not merely provide a framework that could be utilized for proper
or improper purposes; rather, [Facebook’s] work in developing” the algorithm and
suggesting connections to users based on their prior activity on Facebook,
including their shared interest in terrorism, “is directly related to the alleged
illegality of the site.” Fair Housing Council of San Fernando Valley v. Roommates.Com,
LLC, 521 F.3d 1157, 1171 (9th Cir. 2008) (en banc). The fact that Facebook also
publishes third‐party content should not cause us to conflate its two separate roles
with respect to its users and their information. Facebook may be immune under
the CDA from plaintiffs’ challenge to its allowance of Hamas accounts, since
Facebook acts solely as the publisher of the Hamas users’ content. That does not
mean, though, that it is also immune when it conducts statistical analyses of that
information and delivers a message based on those analyses.
Moreover, in part through its use of friend, group, and event suggestions,
Facebook is doing more than just publishing content: it is proactively creating
networks of people. Its algorithms forge real‐world (if digital) connections through
friend and group suggestions, and they attempt to create similar connections in
the physical world through event suggestions. The cumulative effect of
19
recommending several friends, or several groups or events, has an impact greater
than the sum of each suggestion. It envelops the user, immersing her in an entire
universe filled with people, ideas, and events she may never have discovered on
her own. According to the allegations in the complaint, Facebook designed its
website for this very purpose. “Facebook has described itself as a provider of
products and services that enable users . . . to find and connect with other users
. . . .” App’x 250 ¶ 129. CEO Mark Zuckerberg has similarly described Facebook as
“build[ing] tools to help people connect with the people they want,” thereby
“extending people’s capacity to build and maintain relationships.” Id. at 251 ¶ 132.
Of course, Facebook is not the only company that tries to bring people together
this way, and perhaps other publishers try to introduce their readers to one
another. Yet the creation of social networks goes far beyond the traditional
editorial functions that the CDA immunizes.
Another way to consider the CDA immunity question is to “look . . . to what
the duty at issue actually requires: specifically, whether the duty would
necessarily require an internet company to monitor[, alter, or remove] third‐party
content.” HomeAway.com, 918 F.3d at 682. Here, too, the claims regarding the
20
algorithms are a poor fit for statutory immunity. The duty not to provide material
support to terrorism, as applied to Facebook’s use of the algorithms, simply
requires that Facebook not actively use that material to determine which of its
users to connect to each other. It could stop using the algorithms altogether, for
instance. Or, short of that, Facebook could modify its algorithms to stop them
introducing terrorists to one another. None of this would change any underlying
content, nor would it necessarily require courts to assess further the difficult
question of whether there is an affirmative obligation to monitor that content.
In reaching this conclusion, I note that ATA torts are atypical. Most of the
common torts that might be pleaded in relation to Facebook’s algorithms “derive
liability from behavior that is identical to publishing or speaking”—for instance,
“publishing defamatory material; publishing material that inflicts emotional
distress; or . . . attempting to de‐publish hurtful material but doing it badly.”
Barnes, 570 F.3d at 1107. The fact that Facebook has figured out how to target
material to people more likely to read it does not matter to a defamation claim, for
instance, because the mere act of publishing in the first place creates liability.
21
The ATA works differently. Plaintiffs’ material support and aiding and
abetting claims premise liability, not on publishing qua publishing, but rather on
Facebook’s provision of services and personnel to Hamas. It happens that the way
in which Facebook provides these benefits includes republishing content, but
Facebook’s duties under the ATA arise separately from the republication of
content. Cf. id. (determining that liability on a promissory estoppel theory for
promising to remove content “would come not from Yahoo’s publishing conduct,
but from Yahoo’s manifest intention to be legally obligated to do something, which
happens to be removal of material from publication”). For instance, the operation
of the algorithms is allegedly provision of “expert advice or assistance,” and the
message implied by Facebook’s prodding is allegedly a “service” or an attempt to
provide “personnel.” 18 U.S.C. § 2339A(b).
For these reasons, § 230(c)(1) does not bar plaintiffs’ claims.
III.
Even if we sent this case back to the district court, as I believe to be the right
course, these plaintiffs might have proven unable to allege that Facebook’s
matchmaking algorithms played a role in the attacks that harmed them. However,
22
assuming arguendo that such might have been the situation here, I do not think we
should foreclose the possibility of relief in future cases if victims can plausibly
allege that a website knowingly brought terrorists together and that an attack
occurred as a direct result of the site’s actions. Though the majority shuts the door
on such claims, today’s decision also illustrates the extensive immunity that the
current formulation of the CDA already extends to social media companies for
activities that were undreamt of in 1996. It therefore may be time for Congress to
reconsider the scope of § 230.
As is so often the case with new technologies, the very qualities that drive
social media’s success—its ease of use, open access, and ability to connect the
world—have also spawned its demons. Plaintiffs’ complaint illustrates how
pervasive and blatant a presence Hamas and its leaders have maintained on
Facebook. Hamas is far from alone—Hezbollah, Boko Haram, the Revolutionary
Armed Forces of Colombia, and many other designated terrorist organizations use
Facebook to recruit and rouse supporters. Vernon Silver & Sarah Frier, Terrorists
Are Still Recruiting on Facebook, Despite Zuckerberg’s Reassurances, Bloomberg
Businessweek (May 10, 2018), http://www.bloomberg.com/news/articles/2018‐05‐
23
10/terrorists‐creep‐onto‐facebook‐as‐fast‐as‐it‐can‐shut‐them‐down. Recent news
reports suggest that many social media sites have been slow to remove the
plethora of terrorist and extremist accounts populating their platforms,6 and that
such efforts, when they occur, are often underinclusive. Twitter, for instance,
banned the Ku Klux Klan in 2018 but allowed David Duke to maintain his account,
see Roose & Conger, supra, while researchers found that Facebook removed fewer
than half the terrorist accounts and posts those researchers identified, see Waters
& Postings, supra, at 8; Desmond Butler & Barbara Ortulay, Facebook Auto‐Generates
Videos Celebrating Extremist Images, Assoc. Press (May 9, 2019),
http://apnews.com/f97c24dab4f34bd0b48b36f2988952a4. Those whose accounts
are removed often pop up again under different names or with slightly different
See, e.g., Gregory Waters & Robert Postings, Spiders of the Caliphate: Mapping the
6
Islamic State’s Global Support Network on Facebook 8, Counter Extremism Project (May
2018), http://www.counterextremism.com/sites/default/files/Spiders%20of%20the%20
Caliphate%20%28May%202018%29.pdf; Yaacov Benmeleh & Felice Maranz, Israel Warns
Twitter of Legal Action Over Requests to Remove Content, Bloomberg (Mar. 20, 2018),
http://www.bloomberg.com/news/articles/2018‐03‐20/israel‐warns‐twitter‐of‐legal‐
steps‐over‐incitement‐to‐terrorism; Mike Isaac, Twitter Steps Up Efforts to Thwart
Terrorists’ Tweets, N.Y. Times (Feb. 5, 2016), http://www.nytimes.com/2016/02/06/
technology/twitter‐account‐suspensions‐terrorism.html; Kevin Roose & Kate Conger,
YouTube to Remove Thousands of Videos Pushing Extreme Views, N.Y. Times (June 5, 2019),
http://www.nytimes.com/2019/06/05/business/youtube‐remove‐extremist‐videos.html.
24
language in their profiles, playing a perverse and deadly game of Whack‐a‐Mole
with Silicon Valley. See Isaac, supra; Silver & Frier, supra.
Of course, the failure to remove terrorist content, while an important policy
concern, is immunized under § 230 as currently written. Until today, the same
could not have been said for social media’s unsolicited, algorithmic spreading of
terrorism. Shielding internet companies that bring terrorists together using
algorithms could leave dangerous activity unchecked.
Take Facebook. As plaintiffs allege, its friend‐suggestion algorithm appears
to connect terrorist sympathizers with pinpoint precision. For instance, while two
researchers were studying Islamic State (“IS”) activity on Facebook, one “received
dozens of pro‐IS accounts as recommended friends after friending just one pro‐IS
account.” Waters & Postings, supra, at 78. More disturbingly, the other “received
an influx of Philippines‐based IS supporters and fighters as recommended friends
after liking several non‐extremist news pages about Marawi and the Philippines
during IS’s capture of the city.” Id. News reports indicate that the friend‐
suggestion feature has introduced thousands of IS sympathizers to one another.
See Martin Evans, Facebook Accused of Introducing Extremists to One Another Through
25
‘Suggested Friends’ Feature, The Telegraph (May 5, 2018),
http://www.telegraph.co.uk/news/2018/05/05/facebook‐accused‐introducing‐
extremists‐one‐another‐suggested.
And this is far from the only Facebook algorithm that may steer people
toward terrorism. Another turns users’ declared interests into audience categories
to enable microtargeted advertising. In 2017, acting on a tip, ProPublica sought to
direct an ad at the algorithmically‐created category “Jew hater”—which turned
out to be real, as were “German Schutzstaffel,” “Nazi Party,” and “Hitler did
nothing wrong.” Julia Angwin et al., Facebook Enabled Advertises to Reach ‘Jew
Haters,’ ProPublica (Sept. 14, 2017), https://www.propublica.org/article/facebook‐
enabled‐advertisers‐to‐reach‐jew‐haters. As the “Jew hater” category was too
small for Facebook to run an ad campaign, “Facebook’s automated system
suggested ‘Second Amendment’ as an additional category . . . presumably because
its system had correlated gun enthusiasts with anti‐Semites.” Id.
That’s not all. Another Facebook algorithm auto‐generates business pages
by scraping employment information from users’ profiles; other users can then
“like” these pages, follow their posts, and see who else has liked them. Butler &
26
Ortutay, supra. ProPublica reports that extremist organizations including al‐Qaida,
al‐Shabab, and IS have such auto‐created pages, allowing them to recruit the
pages’ followers. Id. The page for al‐Qaida in the Arabian Peninsula included the
group’s Wikipedia entry and a propaganda photo of the damaged USS Cole,
which the group had bombed in 2000. Id. Meanwhile, a fourth algorithm integrates
users’ photos and other media to generate videos commemorating their previous
year. Id. Militants get a ready‐made propaganda clip, complete with a thank‐you
message from Facebook. Id.
This case, and our CDA analysis, has centered on the use of algorithms to
foment terrorism. Yet the consequences of a CDA‐driven, hands‐off approach to
social media extend much further. Social media can be used by foreign
governments to interfere in American elections. For example, Justice Department
prosecutors recently concluded that Russian intelligence agents created false
Facebook groups and accounts in the years leading up to the 2016 election
campaign, bootstrapping Facebook’s algorithm to spew propaganda that reached
between 29 million and 126 million Americans. See 1 Robert S. Mueller III, Special
Counsel, Report on the Investigation Into Russian Interference in the 2016 Presidential
27
Election 24‐26, U.S. Dep’t of Justice (March 2019), http://www.justice.gov/storage/
report.pdf. Russia also purchased over 3,500 advertisements on Facebook to
publicize their fake Facebook groups, several of which grew to have hundreds of
thousands of followers. Id. at 25‐26. On Twitter, Russia developed false accounts
that impersonated American people or groups and issued content designed to
influence the election; it then created thousands of automated “bot” accounts to
amplify the sham Americans’ messages. Id. at 26‐28. One fake account received
over six million retweets, the vast majority of which appear to have come from
real Twitter users. See Gillian Cleary, Twitterbots: Anatomy of a Propaganda
Campaign, Symantec (June 5, 2019), http://www.symantec.com/blogs/threat‐
intelligence/twitterbots‐propaganda‐disinformation. Russian intelligence also
harnessed the reach that social media gave its false identities to organize “dozens
of U.S. rallies,” some of which “drew hundreds” of real‐world Americans.
Mueller, Report, supra, at 29. Russia could do all this only because social media is
designed to target messages like Russia’s to the users most susceptible to them.
While Russia’s interference in the 2016 election is the best‐documented
example of foreign meddling through social media, it is not the only one. Federal
28
intelligence agencies expressed concern in the weeks before the 2018 midterm
election “about ongoing campaigns by Russia, China and other foreign actors,
including Iran,” to “influence public sentiment” through means “including using
social media to amplify divisive issues.” Press Release, Office of Dir. of Nat’l
Intelligence, Joint Statement from the ODNI, DOJ, FBI, and DHS: Combatting
Foreign Influence in U.S. Elections, (Oct. 19, 2018), https://www.dni.gov/index.
php/newsroom/press‐releases/item/1915‐joint‐statement‐from‐the‐odni‐doj‐fbi‐
and‐dhs‐combating‐foreign‐influence‐in‐u‐s‐elections. News reports also suggest
that China targets state‐sponsored propaganda to Americans on Facebook and
purchases Facebook ads to amplify its communications. See Paul Mozur, China
Spreads Propaganda to U.S. on Facebook, a Platform It Bans at Home, N.Y. Times (Nov.
8, 2017), https://www.nytimes.com/2017/11/08/technology/china‐facebook.html.
Widening the aperture further, malefactors at home and abroad can
manipulate social media to promote extremism. “Behind every Facebook ad,
Twitter feed, and YouTube recommendation is an algorithm that’s designed to
keep users using: It tracks preferences through clicks and hovers, then spits out a
steady stream of content that’s in line with your tastes.” Katherine J. Wu, Radical
29
Ideas Spread Through Social Media. Are the Algorithms to Blame?, PBS (Mar. 28, 2019),
https://www.pbs.org/wgbh/nova/article/radical‐ideas‐social‐media‐algorithms.
All too often, however, the code itself turns those tastes sour. For example, one
study suggests that manipulation of Facebook’s news feed influences the mood of
its users: place more positive posts on the feed and users get happier; focus on
negative information instead and users get angrier. Adam D. I. Kramer et al.,
Experimental Evidence of Massive‐Scale Emotional Contagion Through Social Networks,
111 PNAS 8788, 8789 (2014). This can become a problem, as Facebook’s algorithm
“tends to promote the most provocative content” on the site. Max Fisher, Inside
Facebook’s Secret Rulebook for Global Political Speech, N.Y. Times (Dec. 27, 2018),
http://www.nytimes.com/2018/12/27/world/facebook‐moderators.html. Indeed,
“[t]he Facebook News Feed environment brings together, in one place, many of
the influences that have been shown to drive psychological aspects of
polarization.” Jaime E. Settle, Frenemies: How Social Media Polarizes America (2018).
Likewise, YouTube’s video recommendation algorithm—which leads to more
than 70 percent of time people spend on the platform—has been criticized for
shunting visitors toward ever more extreme and divisive videos. Roose & Conger,
30
supra; see Jack Nicas, How YouTube Drives People to the Internet’s Darkest Corners,
Wall St. J. (Feb. 7, 2018), https://www.wsj.com/articles/how‐youtube‐drives‐
viewers‐to‐the‐internets‐darkest‐corners‐1518020478. YouTube has fine‐tuned its
algorithm to recommend videos that recalibrate users’ existing areas of interest
and steadily steer them toward new ones—a modus operandi that has reportedly
proven a real boon for far‐right extremist content. See Kevin Roose, The Making of
a YouTube Radical, N.Y. Times (June 8, 2019), http://www.nytimes.com/interactive/
2019/06/08/technology/youtube‐radical.html.
There is also growing attention to whether social media has played a
significant role in increasing nationwide political polarization. See Andrew
Soergel, Is Social Media to Blame for Political Polarization in America?, U.S. News &
World Rep. (Mar. 20, 2017), https://www.usnews.com/news/articles/2017‐03‐20/is‐
social‐media‐to‐blame‐for‐political‐polarization‐in‐america. The concern is that
“web surfers are being nudged in the direction of political or unscientific
propaganda, abusive content, and conspiracy theories.” Wu, Radical Ideas, supra.
By surfacing ideas that were previously deemed too radical to take seriously,
social media mainstreams them, which studies show makes people “much more
31
open” to those concepts. Max Fisher & Amanda Taub, How Everyday Social Media
Users Become Real‐World Extremists, N.Y. Times (Apr. 25, 2018),
http://www.nytimes.com/2018/04/25/world/asia/facebook‐extremism.html. At its
worst, there is evidence that social media may even be used to push people toward
violence.7 The sites are not entirely to blame, of course—they would not have such
success without humans willing to generate and to view extreme content.
Providers are also tweaking the algorithms to reduce their pull toward hate speech
and other inflammatory material. See Isaac, supra; Roose & Conger, supra. Yet the
dangers of social media, in its current form, are palpable.
While the majority and I disagree about whether § 230 immunizes
interactive computer services from liability for all these activities or only some, it
See, e.g., Sarah Marsh, Social Media Related to Violence by Young People, Say Experts,
7
The Guardian (Apr. 2, 2018), https://www.theguardian.com/media/2018/apr/02/social‐
media‐violence‐young‐people‐gangs‐say‐experts; Kevin Roose, A Mass Murder of, and for,
the Internet, N.Y. Times (Mar. 15, 2019), https://www.nytimes.com/2019/03/15/
technology/facebook‐youtube‐christchurch‐shooting.html; Craig Timberg et al., The New
Zealand Shooting Shows How TouTube and Facebook Spread Hate and Violent Images—Yet
Again, Wash. Post (Mar. 15, 2019), https://www.washingtonpost.com/technology/
2019/03/15/facebook‐youtube‐twitter‐amplified‐video‐christchurch‐mosque‐shooting;
Julie Turkewitz & Kevin Roose, Who Is Robert Bowers, the Suspect in the Pittsburgh
Synagogue Shooting?, N.Y. Times (Oct. 27, 2018), https://www.nytimes.com/2018/
10/27/us/robert‐bowers‐pittsburgh‐synagogue‐shooter.html.
32
is pellucid that Congress did not have any of them in mind when it enacted the
CDA. The text and legislative history of the statute shout to the rafters Congress’s
focus on reducing children’s access to adult material. Congress could not have
anticipated the pernicious spread of hate and violence that the rise of social media
likely has since fomented. Nor could Congress have divined the role that social
media providers themselves would play in this tale. Mounting evidence suggests
that providers designed their algorithms to drive users toward content and people
the users agreed with—and that they have done it too well, nudging susceptible
souls ever further down dark paths. By contrast, when the CDA became law, the
closest extant ancestor to Facebook (and it was still several branches lower on the
evolutionary tree) was the chatroom or message forum, which acted as a digital
bulletin board and did nothing proactive to forge off‐site connections.8
8 See Caitlin Dewey, A Complete History of the Rise and Fall—and Reincarnation!—of
the Beloved ‘90s Chatroom, Wash. Post (Oct. 30, 2014), http://www.washingtonpost.com/
news/the‐intersect/wp/2014/10/30/a‐complete‐history‐of‐the‐rise‐and‐fall‐and‐
reincarnation‐of‐the‐beloved‐90s‐chatroom; see also Then and Now: A History of Social
Networking Sites, CBS News, http://www.cbsnews.com/pictures/then‐and‐now‐a‐history‐
of‐social‐networking‐sites (last accessed July 9, 2019) (detailing the evolution of social
media sites from Classmates, launched only “as a list of school affiliations” in December
1995; to “the very first social networking site” Six Degrees, which launched in May 1997
but whose networks were limited “due to the lack of people connected to the Internet”;
33
Whether, and to what extent, Congress should allow liability for tech
companies that encourage terrorism, propaganda, and extremism is a question for
legislators, not judges. Over the past two decades “the Internet has outgrown its
swaddling clothes,” Roommates.Com, 521 F.3d at 1175 n.39, and it is fair to ask
whether the rules that governed its infancy should still oversee its adulthood. It is
undeniable that the Internet and social media have had many positive effects
worth preserving and promoting, such as facilitating open communication,
dialogue, and education. At the same time, as outlined above, social media can be
manipulated by evildoers who pose real threats to our democratic society. A
healthy debate has begun both in the legal academy9 and in the policy
to Friendster, launched in March 2002 and “credited as giving birth to the modern social
media movement”; to Facebook, which was “rolled out to the public in September 2006”).
9 See, e.g., Danielle Keats Citron & Benjamin Wittes, The Problem Isnʹt Just Backpage:
Revising Section 230 Immunity, 2 Geo. L. Tech. Rev. 453, 454‐55 (2018); Jeff Kosseff,
Defending Section 230: The Value of Intermediary Immunity, 15 J. Tech. L. & Polʹy 123, 124
(2010); Daniela C. Manzi, Managing the Misinformation Marketplace: The First Amendment
and the Fight Against Fake News, 87 Fordham L. Rev. 2623, 2642‐43 (2019). Much of the
enterprising legal scholarship debating the intersection of social media, terrorism, and
the CDA comes from student Notes. See, e.g., Jaime E. Freilich, Note, Section 230’s Liability
Shield in the Age of Online Terrorist Recruitment, 83 Brook. L. Rev. 675, 690‐91 (2018); Anna
Elisabeth Jayne Goodman, Note and Comment, When You Give a Terrorist a Twitter:
Holding Social Media Companies Liable for their Support of Terrorism, 46 Pepp. L. Rev. 147,
182‐86 (2018); Nicole Phe, Note, Social Media Terror: Reevaluating Intermediary Liability
34
community10 about changing the scope of § 230. Perhaps Congress will clarify
what I believe the text of the provision already states: that the creation of social
networks reaches beyond the publishing functions that § 230 protects. Perhaps
Congress will engage in a broader rethinking of the scope of CDA immunity. Or
perhaps Congress will decide that the current regime best balances the interests
involved. In the meantime, however, I cannot join my colleagues’ decision to
immunize Facebook’s friend‐ and content‐suggestion algorithms from judicial
scrutiny. I therefore must in part respectfully dissent, as I concur in part.
Under the Communications Decency Act, 51 Suffolk U. L. Rev. 99, 126‐30 (2018).
10 See, e.g., Tarleton Gillespie, How Social Netowrks Set the Limits of What We Can Say
Online, Wired (June 26, 2018), http://www.wired.com/story/how‐social‐networks‐set‐the‐
limits‐of‐what‐we‐can‐say‐online; Christiano Lima, How a Widening Political Rift Over
Online Liability Is Splitting Washington, Politico (July 9, 2019), http://www.politico.com/
story/2019/07/09/online‐industry‐immunity‐section‐230‐1552241; Mark Sullivan, The
1996 Law That Made the Web Is in the Crosshairs, Fast Co. (Nov. 29, 2018),
http://www.fastcompany.com/90273352/maybe‐its‐time‐to‐take‐away‐the‐outdated‐
loophole‐that‐big‐tech‐exploits; cf. Darrell M. West & John R. Allen, How Artificial
Intelligence Is Transforming the World, Brookings (Apr. 24, 2018),
http://www.brookings.edu/research/how‐artificial‐intelligence‐is‐transforming‐the‐
world (“The malevolent use of AI exposes individuals and organizations to unnecessary
risks and undermines the virtues of the emerging technology.”).
35