TWITTER, INC. v. TAAMNEH ET AL.
No. 21-1496
SUPREME COURT OF THE UNITED STATES
Decided May 18, 2023
Argued February 22, 2023
(Slip Opinion)
OCTOBER TERM, 2022
1
Syllabus
NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U.S. 321, 337.
Syllabus
TWITTER, INC. v. TAAMNEH ET AL.
CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
No. 21-1496. Argued February 22, 2023—Decided May 18, 2023
The parties today agree on the basic aspects of these platforms: Billions of people from around the world have signed up for them and upload massive amounts of content each day. Defendants profit from that content by placing advertisements on or near it and use “recommendation” algorithms that match content, advertisements, and users based on information about the use, advertisement, and content being viewed. As the parties represent things, the algorithms here match any content with any user who is more likely to view that content, and the platforms perform little to no front-end screening on any content before it is uploaded.
Plaintiffs, however, allege that for several years the companies have knowingly allowed ISIS and its supporters to use their platforms and “recommendation” algorithms as tools for recruiting, fundraising, and spreading propaganda; plaintiffs further allege that these companies have, in the process, profited from the advertisements placed on ISIS’ tweets, posts, and videos. The District Court dismissed the complaint for failure to state a claim, but the Ninth Circuit reversed.
Held: Plaintiffs’ allegations that these social-media companies aided and abetted ISIS in its terrorist attack on the Reina nightclub fail to state a claim under
(a) In 2016, Congress enacted the Justice Against Sponsors of Terrorism Act (JASTA) to impose secondary civil liability on anyone “who aids and abets, by knowingly providing substantial assistance, or who conspires with the person who committed such an act of international terrorism.”
(b) The text of JASTA begs two questions: What does it mean to “aid and abet“? And, what precisely must the defendant have “aided and abetted“? Pp. 8–21.
(1) Nothing in the statute defines any of the critical terms in the phrase “aids and abets, by knowingly providing substantial assistance.” The term “aids and abets,” however, is a familiar common-law term and thus presumably “brings the old soil” with it. Sekhar v. United States, 570 U. S. 729, 733. Congress also provided additional context in JASTA by pointing to Halberstam v. Welch, 705 F. 2d 472, as “provid[ing] the proper legal framework” for “civil aiding and abetting and conspiracy liability.” 130 Stat. 852. Halberstam‘s legal framework, viewed in context of the common-law tradition
(i) In Halberstam, the D. C. Circuit undertook an extensive survey of the common law with respect to aiding and abetting and synthesized the surveyed cases as resting on three main elements: (1) there must be a wrongful act causing an injury performed by the person whom the defendant aided; (2) at the time assistance was provided, the defendant must have been “generally aware of his role as part of an overall illegal or tortious activity; and (3) the defendant must have “knowingly and substantially assist[ed] the principal violation.” 705 F. 2d, at 477. The court then articulated six factors to help determine whether a defendant‘s assistance was “substantial.” They are (1) “the nature of the act assisted,” (2) the “amount of assistance” provided, (3) whether the defendant was “present at the time” of the principal tort, (4) the defendant‘s “relation to the tortious actor,” (5) the “defendant‘s state of mind,” and (6) the “duration of the assistance” given. Id., at 488 (emphasis deleted). Halberstam also clarified that those who aid and abet “a tortious act may be liable” not only for the act itself but also “for other reasonably foreseeable acts done in connection with it.” Id., at 484. Finally, the court warned that its formulations should “not be accepted as immutable components” but should be “adapted as new cases test their usefulness in evaluating vicarious liability.” Id., at 489. Pp. 9–11.
(ii) Because the allegations here—involving international terrorist networks and world-spanning internet platforms—are a far cry from the facts of Halberstam, the Court must ascertain the basic thrust of Halberstam‘s elements to determine how to adapt them to the facts of this case. To do so, the Court turns to the common law of aiding and abetting upon which Halberstam rested, and to which JASTA‘s common-law terminology points. At common law, the basic “view of culpability” animating aiding and abetting liability is that “a person may be responsible for a crime he has not personally carried out if he helps another to complete its commission.” Rosemond v. United States, 572 U. S. 65, 70. However, the concept of “helping” in the commission of a crime or a tort has never been boundless and ordinarily requires some level of blameworthy conduct; those limits ensure that aiding and abetting does not sweep in mere passive bystanders or those who, for example, simply deliver mail that happens to aid criminals. In tort law, many cases have thus required a voluntary, conscious, and culpable participation in the wrongful conduct to establish aiding and abetting. In doing so, they further articulated Halberstam‘s framework to capture those limits. As above, that framework requires that the defendant give knowing and substantial assistance to the primary tortfeasor; notably, courts often viewed those twin requirements as working in tandem, with a lesser showing of one demanding a greater showing of the other to establish a conscious, culpable participation in the tort. Pp. 11–16.
(iii) Halberstam differentiated types of aid along the same culpability axis that grounded the common law. And its six factors for “substantial assistance” call for the same balancing that courts had undertaken previously between the nature and amount of assistance and the defendant‘s scienter. Pp. 16–17.
(2) The parties then vigorously dispute what precisely a defendant must aid and abet under
To summarize the requirements of
(c) Plaintiffs have satisfied Halberstam‘s first two elements by alleging both that ISIS committed a wrong and that defendants knew they were playing some sort of role in ISIS’ enterprise. But plaintiffs’ allegations do not show that defendants gave such knowing and substantial assistance to ISIS that they culpably participated in the Reina attack. Pp. 21–30.
(1) Plaintiffs allege that defendants aided and abetted ISIS in the following ways: First, they provided social-media platforms, which are generally available to the internet-using public; ISIS was able to upload content to those platforms and connect with third parties on them. Second, defendants’ recommendation algorithms matched ISIS-related content to users most likely to be interested in that content. And, third, defendants knew that ISIS was uploading this content but took insufficient steps to ensure that its content was removed. Plaintiffs do not allege that ISIS or Masharipov used defendants’ platforms to plan or coordinate the Reina attack. Nor do plaintiffs allege that defendants gave ISIS any special treatment or words of encouragement. Nor is there reason to think that defendants carefully screened any content before allowing users to upload it onto their platforms.
None of plaintiffs’ allegations suggest that defendants culpably “associate[d] [themselves] with” the Reina attack, “participate[d] in it as something that [they] wishe[d] to bring about,” or sought “by [their] action to make it succeed.” Nye & Nissen, 336 U. S., at 619 (internal quotation marks omitted). Defendants’ mere creation of their media platforms is no more culpable than the creation of email, cell phones, or the internet generally. And defendants’ recommendation algorithms are merely part of the infrastructure through which all the content on their platforms is filtered. Moreover, the algorithms have been presented as agnostic as to the nature of the content. At bottom, the allegations here rest less on affirmative misconduct and more on passive
First, the relationship between defendants and the Reina attack is highly attenuated. Plaintiffs make no allegations that defendants’ relationship with ISIS was significantly different from their arm‘s length, passive, and largely indifferent relationship with most users. And their relationship with the Reina attack is even further removed, given the lack of allegations connecting the Reina attack with ISIS’ use of these platforms. Second, plaintiffs provide no reason to think that defendants were consciously trying to help or otherwise participate in the Reina attack, and they point to no actions that would normally support an aiding-and-abetting claim.
Plaintiffs’ complaint rests heavily on defendants’ failure to act; yet plaintiffs identify no duty that would require defendants or other communication-providing services to terminate customers after discovering that the customers were using the service for illicit ends. Even if such a duty existed in this case, it would not transform defendants’ distant inaction into knowing and substantial assistance that could establish aiding and abetting the Reina attack. And the expansive scope of plaintiffs’ claims would necessarily hold defendants liable as having aided and abetted each and every ISIS terrorist act committed anywhere in the world. The allegations plaintiffs make here are not the type of pervasive, systemic, and culpable assistance to a series of terrorist activities that could be described as aiding and abetting each terrorist act by ISIS.
In this case, the failure to allege that the platforms here do more than transmit information by billions of people—most of whom use the platforms for interactions that once took place via mail, on the phone, or in public areas—is insufficient to state a claim that defendants knowingly gave substantial assistance and thereby aided and abetted ISIS’ acts. A contrary conclusion would effectively hold any sort of communications provider liable for any sort of wrongdoing merely for knowing that the wrongdoers were using its services and failing to stop them. That would run roughshod over the typical limits on tort liability and unmoor aiding and abetting from culpability. Pp. 21–27.
(2) The Ninth Circuit‘s analysis obscured the essence of aiding-and-abetting liability. First, the Ninth Circuit framed the issue of substantial assistance as turning on defendants’ assistance to ISIS’ activities in general, rather than with respect to the Reina attack. Next, the Ninth Circuit misapplied the “knowing” half of “knowing and substantial assistance,” which is designed to capture the defendants’ state of mind with respect to their actions and the tortious conduct (even if not always the particular terrorist act). Finally, the Ninth Circuit appears to have regarded Halberstam‘s six substantiality factors as a sequence of disparate, unrelated considerations without a common conceptual core. In doing so, the Ninth Circuit focused primarily on the value of defendants’ platforms to ISIS, rather than whether defendants culpably associated themselves with ISIS’ actions. Pp. 27–29.
(3) There is also one set of allegations specific to Google: that Google reviewed and approved ISIS videos on YouTube as part of a revenue-sharing system and thereby shared advertising revenue with ISIS. But the complaint here alleges nothing about the amount of money that Google supposedly shared with ISIS, the number of accounts approved for revenue sharing, or the content of the videos that
(d) The concepts of aiding and abetting and substantial assistance do not lend themselves to crisp, bright-line distinctions. Applying the guideposts provided by the common law and Halberstam, the nexus between defendants and the Reina attack is far removed. As alleged by plaintiffs, defendants designed virtual platforms and knowingly failed to do “enough” to remove ISIS-affiliated users and ISIS-related content from their platforms. Yet, plaintiffs have failed to allege that defendants intentionally provided any substantial aid to the Reina attack or otherwise consciously participated in it—much less that defendants so pervasively and systemically assisted ISIS as to render them liable for every ISIS attack. Plaintiffs accordingly have failed to state a claim under
2 F. 4th 871, reversed.
THOMAS, J., delivered the opinion for a unanimous Court. JACKSON, J., filed a concurring opinion.
Opinion of the Court
NOTICE: This opinion is subject to formal revision before publication in the United States Reports. Readers are requested to notify the Reporter of Decisions, Supreme Court of the United States, Washington, D. C. 20543, pio@supremecourt.gov, of any typographical or other formal errors.
JUSTICE THOMAS delivered the opinion of the Court.
Under
I
Plaintiffs’ case arises from a 2017 terrorist attack on the Reina nightclub in Istanbul, Turkey. The attack was carried out by Abdulkadir Masharipov on behalf of the Islamic State of Iraq and Syria (ISIS).1 Born in Uzbekistan, Masharipov had received military training with al Qaeda in Afghanistan in 2011 and eventually became affiliated with ISIS. In 2016, he was ordered by ISIS to travel to Turkey and launch an attack in Istanbul on New Year‘s Eve. After planning and coordinating the attack with ISIS emir Abu Shuhada, Masharipov entered the Reina nightclub in the early hours of January 1, 2017, and fired over 120 rounds into a crowd of more than 700 people. In total, Masharipov killed 39 people and injured 69 others. The next day, ISIS released a statement claiming responsibility for the attack. Two weeks later, Masharipov was arrested in Istanbul after hiding out in ISIS safe houses.
One of Masharipov‘s victims was Nawras Alassaf, who was killed in the attack. Several members of Alassaf‘s family then brought the present lawsuit under
As is common knowledge, these three companies control three of the largest and most ubiquitous platforms on the internet: Facebook, YouTube, and Twitter. At the time of the Reina attack, Facebook had over 2 billion active users each month, YouTube had over 1 billion, and Twitter had around 330 million. See Facebook, Inc., Form 10-K for Fiscal Year Ended Dec. 31, 2017, p. 34; Twitter, Inc., Form 10-K for Fiscal Year Ended Dec. 31, 2017, p. 47; YouTube, YouTube Hits a Billion Monthly Users (Mar. 21, 2013), https://blog.youtube/news-and-events/onebillionstrong. At least for Facebook and YouTube, those numbers are even higher today.
Everyone before us today agrees on the basic aspects of these platforms’ business models. People from around the world can sign up for the platforms and start posting content on them, free of charge and without much (if any) advance screening by defendants. Once on the platforms, users can upload messages, videos, and other types of content, which others on the platform can then view, respond to, and share. As noted above, billions of people have done just that. As a result, the amount of content on defendants’ platforms is staggering. It appears that for every minute of the day, approximately 500 hours of video are uploaded to
YouTube, 510,000 comments are posted on Facebook, and 347,000 tweets are sent on Twitter. See Statista, Media Usage in an Internet Minute as of April 2022 (2023), https://www.statista.com/statistics/195140/new-user-generated-content-uploaded-by-users-per-minute; Statista, YouTube—Statistics & Facts; B. Marr, How Much Data Do We Create Every Day? Forbes, May 21, 2018. On YouTube alone, users collectively watch more than 1 billion hours of video every day. See YouTube Advertising, Reach Your Customers and Discover New Ones, https://youtube.com/intl/en_us/ads/how-it-works/set-up-a-campaign/audience.
Defendants profit from this content largely by charging third parties to advertise on their platforms. Those advertisements are placed on or near the billions of videos, posts, comments, and tweets uploaded by the platforms’ users. To organize and present all those advertisements and pieces of content, defendants have developed “recommendation” algorithms that automatically match advertisements and content with each user; the algorithms generate those outputs based on a wide range of information about the user, the advertisement, and the content being viewed. So, for example, a person who watches cooking shows on YouTube is more likely to see cooking-based videos and advertisements for cookbooks, whereas someone who likes to watch professorial lectures might see collegiate debates and advertisements for TED Talks.
But not all of the content on defendants’ platforms is so benign. As plaintiffs allege, ISIS and its adherents have used these platforms for years as tools for recruiting, fundraising, and spreading their propaganda. Like many others around the world, ISIS and its supporters opened accounts on Facebook, YouTube, and Twitter and uploaded videos and messages for others to see. Like most other content on those platforms, ISIS’ videos and messages were then matched with other users based on those users’ information and use history. And, like most other content, advertisements were displayed with ISIS’ messages, posts, and videos based on information about the viewer and the content being viewed. Unlike most other content, however, ISIS’ videos and messages celebrated terrorism and recruited new terrorists. For example, ISIS uploaded videos that fundraised for weapons of terror and that showed brutal executions of soldiers and civilians alike. And plaintiffs allege that these platforms have been crucial to ISIS’ growth, allowing it to reach new audiences, gain new members, and spread its message of terror.
Plaintiffs also allege that defendants have known that ISIS has used their platforms for years. Yet, plaintiffs claim that defendants have failed to detect and remove a substantial number of ISIS-related accounts, posts, and videos. (For example,
Plaintiffs also provide a set of allegations specific to Google. According to plaintiffs, Google has established a system that shares revenue gained from certain advertisements on YouTube with users who posted the videos watched with the advertisement. As part of that system, Google allegedly reviews and approves certain videos before Google permits ads to accompany that video. Plaintiffs allege that Google has reviewed and approved at least some ISIS videos under that system, thereby sharing some amount of revenue with ISIS.
The District Court dismissed plaintiffs’ complaint for failure to state a claim.4 But the Ninth Circuit reversed, finding that plaintiffs had plausibly alleged that defendants aided and abetted ISIS within the meaning of
II
Section 2333 was originally enacted as part of the Antiterrorism Act (ATA) in 1990. 104 Stat. 2250. At that time, Congress authorized United States nationals or their “estate, survivors, or heirs” to bring civil lawsuits when “injured in [their] person, property, or business by reason of an act of international terrorism.” Id., at 2251.5 In such a
lawsuit, the plaintiff could recover treble damages and the cost of the suit, including attorney‘s fees. See
Then, in 2016, Congress enacted the Justice Against Sponsors of Terrorism Act (JASTA) to provide for a form of secondary civil liability. 130 Stat. 852. Thus, as the law now stands, those injured by an act of international terrorism can sue the relevant terrorists directly under
The parties here do not dispute that the first three components of
In short, the act generally must be violent, criminal, intended to intimidate or coerce civilians or a government, and occur either primarily outside the United States or transcending national boundaries. See ibid.
III
As always, we start with the text of
A
We turn first to the meaning of the phrase “aids and abets, by knowingly providing substantial assistance.” Nothing in the statute defines any of those critical terms. Yet terms like “aids and abets” are familiar to the common law, which has long held aiders-and-abettors secondarily liable for the wrongful acts of others. See Central Bank of Denver, N. A. v. First Interstate Bank of Denver, N. A., 511 U. S. 164, 181 (1994). We generally presume that such common-law terms “brin[g] the old soil” with them. Sekhar v. United States, 570 U. S. 729, 733 (2013) (internal quotation marks omitted). In enacting JASTA, Congress provided additional context by pointing to Halberstam v. Welch, 705 F. 2d 472 (CADC 1983), as “provid[ing] the proper legal framework” for “civil aiding and abetting and conspiracy liability.”
Long regarded as a leading case on civil aiding-and-abetting and conspiracy liability, see
To determine Hamilton‘s liability, the D. C. Circuit undertook an extensive survey of the common law, examining
a series of state and federal cases, the Restatement (Second) of Torts, and prominent treatises that discussed secondary liability in tort. Id., at 476–478, 481–486. With respect to aiding and abetting, the court synthesized the cases as resting on three main elements: First, “the party whom the defendant aids must perform a wrongful act that causes an injury.” Id., at 477. Second, “the defendant must be generally aware of his role as part of an overall illegal or tortious activity at the time that he provides the assistance.” Ibid. And, third, “the defendant must knowingly and substantially assist the principal violation.” Ibid. (citing, e.g., Landy v. Federal Deposit Ins. Corp., 486 F. 2d 139, 162–163 (CA3 1973); Woodward v. Metro Bank of Dallas, 522 F. 2d 84, 94–95 (CA5 1975)). Halberstam then articulated six factors to help determine whether a defendant‘s assistance was “substantial.” 705 F. 2d, at 486–488. Those factors are (1) “the nature of the act assisted,” (2) the “amount of assistance” provided, (3) whether the defendant was “present at the time” of the principal tort, (4) the defendant‘s “relation to the tortious actor,” (5) the “defendant‘s state of mind,” and (6) the “duration of the assistance” given. Id., at 488 (emphasis deleted). Last, Halberstam clarified that those who aid and abet “a tortious act may be liable” not only for the act itself but also “for other reasonably foreseeable acts done in connection with it.” Id., at 484.
Applying that framework, the D. C. Circuit held that Hamilton was liable for aiding and abetting Halberstam‘s murder. Id., at 489.8 The court first determined that Welch had committed a wrong (in killing Halberstam during the burglary) and that
assistance to Welch‘s activities by helping him turn his “stolen goods into ‘legitimate’ wealth,” thereby intending to help Welch succeed by performing a function crucial to any thief. Ibid. And it clarified that Hamilton knew Welch was committing some sort of “personal property crime,” the “foreseeable risk” of which was “violence and killing.” Ibid. The court therefore concluded that Hamilton substantially helped Welch commit personal property crimes and was liable for Halberstam‘s death, which was a foreseeable result of such crimes. Ibid.
That articulation of the common law thus resolved Halberstam. But Halberstam recognized that the elements and factors it provided could “be merged or articulated somewhat differently without affecting their basic thrust.” Id., at 478, n. 8. It thus cautioned—in a typical common-law fashion—that its formulations should “not be accepted as immutable components.” Id., at 489. Rather, Halberstam suggested that its framework should be “adapted as new cases test their usefulness in evaluating vicarious liability.” Ibid.
2
The allegations before us today are a far cry from the facts of Halberstam. Rather than dealing with a serial burglar and his live-in partner-in-crime, we are faced with international terrorist networks and world-spanning internet platforms. By Halberstam‘s own lights, its precise three-element and six-factor test thus may not be entirely adequate to resolve these new facts. Ibid. And JASTA itself points only to Halberstam‘s “framework,” not its facts or its exact phrasings and formulations, as the benchmark for aiding and abetting.
As we have recognized, “[a]iding and abetting is an ancient criminal law doctrine” that has substantially influenced its analog in tort. Central Bank of Denver, 511 U. S., at 181. In one early statement of the criminal-law doctrine, William Blackstone explained that those who were “present, aiding and abetting the fact to be done,” or “procure[d], counsel[ed], or command[ed] another to commit a crime,” were guilty and punishable. 4 Commentaries on the Laws of England 34, 36 (1795). Over the years, many statutes and courts have offered variations on that basic rule. See United States v. Peoni, 100 F. 2d 401, 402 (CA2 1938) (L. Hand, J., for the court) (collecting authorities). Yet, to this day, the basic “view of culpability” that animates the doctrine is straightforward: “[A] person may be responsible for a crime he has not personally carried out if he helps another to complete its commission.” Rosemond v. United States, 572 U. S. 65, 70 (2014).
Importantly, the concept of “helping” in the commission of a crime—or a tort—has never been boundless. That is because, if it were, aiding-and-abetting liability could sweep in innocent bystanders as well as those who gave only tangential assistance. For example, assume that any assistance of any kind were sufficient to create liability. If that were the case, then anyone who passively watched a robbery could be said to commit aiding and abetting by failing to call the police. Yet, our legal system generally does not impose
For these reasons, courts have long recognized the need to cabin aiding-and-abetting liability to cases of truly culpable conduct. They have cautioned, for example, that not “all those present at the commission of a trespass are liable as principals” merely because they “make no opposition or manifest no disapprobation of the wrongful” acts of another. Brown v. Perkins, 83 Mass. 89, 98 (1861); see also Hilmes v. Stroebel, 59 Wis. 74, 17 N. W. 539 (1883); Duke v. Feldman, 245 Md. 454, 457–458, 226 A. 2d 345, 347 (1967). Put another way, overly broad liability would allow for “one person [to] be made a trespasser and even a felon against his or her consent, and by the mere rashness or precipitancy or overheated zeal of another.” Bird v. Lynn, 49 Ky. 422, 423 (1850). Moreover, unlike its close cousin conspiracy, aiding and abetting does not require any agreement with the primary wrongdoer to commit wrongful acts, thus eliminating a significant limiting principle. See Nye & Nissen v. United States, 336 U. S. 613, 620 (1949).
To keep aiding-and-abetting liability grounded in culpable misconduct, criminal law thus requires “that a defendant ‘in some sort associate himself with the venture, that he participate in it as in something that he wishes to bring about, that he seek by his action to make it succeed‘” before he could be held liable. Id., at 619 (quoting Peoni, 100 F. 2d, at 402). In other words, the defendant has to take some “affirmative act” “with the intent of facilitating the offense‘s commission.” Rosemond, 572 U. S., at 71. Such intentional participation can come in many forms, including abetting, inducing, encouraging, soliciting, or advising the commission of the offense, such as through words of encouragement or driving the getaway car. 2 LaFave §13.2(a), at 457–460; see also J. Hawley & M. McGregor, The Criminal Law 81 (3d ed. 1899). Regardless of the particulars, however, it is clear that some culpable conduct is needed. See Rosemond, 572 U. S., at 73, 77.9
Similar principles and concerns have shaped aiding-and-abetting doctrine in tort law, with numerous cases directly employing them to help articulate the standard
of some sort is necessary to justify punishment of a secondary actor,” lest mostly passive actors like banks become liable for all of their customers’ crimes by virtue of carrying out routine transactions. Monsen v. Consolidated Dressed Beef Co., 579 F. 2d 793, 799 (CA3 1978). And others have suggested that “inaction cannot create liability as an aider and abettor” absent a duty to act. Zoelsch, 824 F. 2d, at 36; see also Woodward, 522 F. 2d, at 96.
In articulating those limits, courts simultaneously began to crystalize the framework for aiding and abetting that Halberstam identified and applied. See, e.g., Monsen, 579 F. 2d, at 799 (stating a similar three-part test).10 As in Halberstam, that framework generally required what the text of
3
Halberstam‘s framework reflected and distilled those common-law principles. Indeed, Halberstam started with a survey of many earlier common-law cases, including many of the same cases cited above. 705 F. 2d, at 477, 483 (citing, e.g., Woodward, 522 F. 2d, at 94-95; Landy, 486 F. 2d, at 162-163; Duke, 245 Md., at 457-458, 226 A. 2d, at 347). As part of that survey, Halberstam explicitly distinguished different types of aid along the same culpability axis
Despite that deep-rooted common-law basis, the Ninth Circuit appears to have understood JASTA‘s approval of Halberstam‘s “legal framework” as requiring it to hew tightly to the precise formulations that Halberstam used. The parties before us similarly make a conscious effort to draw analogies to the facts of that case. But any approach that too rigidly focuses on Halberstam‘s facts or its exact phraseology risks missing the mark. Halberstam is by its own terms a common-law case and provided its elements and factors as a way to synthesize the common-law approach to aiding and abetting. And JASTA employs the common-law terms “aids and abets,” pointing to Halberstam‘s common-law “framework” as the primary guidepost for understanding the scope of
At bottom, both JASTA and Halberstam‘s elements and factors rest on the same conceptual core that has animated aiding-and-abetting liability for centuries: that the defendant consciously and culpably “participate[d]” in a wrongful act so as to help “make it succeed.” Nye & Nissen, 336 U. S., at 619. To be sure, nuances may establish daylight between the rules for aiding and abetting in criminal and tort law; we have described the doctrines as “rough[ly] simila[r],” not identical. Central Bank of Denver, 511 U. S., at 181. But we need not resolve the extent of those differences today; it is enough for our purposes to recognize the framework that Halberstam set forth and the basis on which it rests. The phrase “aids and abets” in
B
The next question, however, is what precisely a defendant must aid and abet. As noted above, JASTA imposes liability on anyone “who aids and abets, by knowingly providing substantial assistance, or who conspires with the person who committed such an act of international terrorism.”
To start, we find it unnecessary to parse whether the textual object of “aids and abets” is “the person” or the “act of international terrorism.” That syntactic dispute makes little difference here, because aiding and abetting is inherently a rule of
Nor would a contrary rule make sense for torts. That is because tort law imposes liability only when someone commits an actual tort; merely agreeing to commit a tort or suggesting a tortious act is not, without more, tortious. See Prosser & Keeton 324; Halberstam, 705 F. 2d, at 479.11 “Enterprises” or “conspiracies” alone are therefore not tortious—the focus must remain on the tort itself. The same is true here: The ATA opens the courthouse doors only if the plaintiff is “injured . . . by reason of an act of international terrorism.”
Plaintiffs insist that Halberstam proves the contrary, but their argument misses the gist of that case. To be sure, Linda Hamilton was not on the scene for the burglary of Halberstam‘s house and did not lend any specific support to Halberstam‘s murder. Ibid. But Hamilton‘s assistance to Welch was so intentional and systematic that she assisted each and every burglary committed by Welch; any time that Welch left the house to burglarize, he would have relied on Hamilton‘s assistance in laundering the stolen goods and transforming them into usable wealth. See ibid. Thus, Hamilton did aid and abet Welch in burglarizing Halberstam‘s home—and, as noted above, killing Halberstam was a foreseeable consequence of that burglary. See ibid.
On the other hand, defendants overstate the nexus that
Moreover, in appropriate circumstances, a secondary defendant‘s role in an illicit enterprise can be so systemic that the secondary defendant is aiding and abetting every wrongful act committed by that enterprise—as in Halberstam itself. Id., at 487-488. At this point, aiding-and-abetting liability begins to blur with conspiracy liability, which typically holds co-conspirators liable for all reasonably foreseeable acts taken to further the conspiracy. See Pinkerton v. United States, 328 U. S. 640, 647-648 (1946); see also Halberstam, 705 F. 2d, at 482-483 (noting the occasional overlap). Yet, as noted above, aiding and abetting lacks the requisite agreement that justifies such extensive conspiracy liability. See Restatement (Second) of Torts §876, Comment a, at 316 (“The theory of the early common law was that there was mutual agency of each [conspirator] to act for the others“); Pinkerton, 328 U. S., at 646. Thus, while the facts of Halberstam are not totemic (lest courts strain to compare Linda Hamilton with international criminal syndicates), its facts are useful when determining whether a defendant has so consciously “participate[d] in” a series of tortious acts in order to “make [each one] succeed.” Nye & Nissen, 336 U. S., at 619 (internal quotation marks omitted).
*
*
*
To summarize the requirements of
IV
Under the appropriate framework, some aspects of today‘s case become immediately clear: First, because they are trying to hold defendants liable for the Reina attack, plaintiffs must plausibly allege that defendants aided and abetted ISIS12 in carrying out that attack. Next, plaintiffs have satisfied Halberstam‘s first two elements by alleging both that ISIS committed a wrong and that defendants knew they were playing some sort of role in ISIS’ enterprise.
A
To start, recall the basic ways that defendants as a group allegedly helped ISIS. First, ISIS was active on defendants’ social-media platforms, which are generally available to the internet-using public with little to no front-end screening by defendants. In other words, ISIS was able to upload content to the platforms and connect with third parties, just like everyone else. Second, defendants’ recommendation algorithms matched ISIS-related content to users most likely to be interested in that content—again, just like any other content. And, third, defendants allegedly knew that ISIS was uploading this content to such effect, but took insufficient steps to ensure that ISIS supporters and ISIS-related content were removed from their platforms. Notably, plaintiffs never allege that ISIS used defendants’ platforms to plan or coordinate the Reina attack; in fact, they do not allege that Masharipov himself ever used Facebook, YouTube, or Twitter.
None of those allegations suggest that defendants culpably “associate[d themselves] with” the Reina attack, “participate[d] in it as something that [they] wishe[d] to bring about,” or sought “by [their] action to make it succeed.” Nye & Nissen, 336 U. S., at 619 (internal quotation marks omitted). In part, that is because the only affirmative “conduct” defendants allegedly undertook was creating their platforms and setting up their algorithms to display content relevant to user inputs and user history. Plaintiffs never allege that, after defendants established their platforms, they gave ISIS any special treatment or words of encouragement. Nor is there reason to think that defendants selected or took any action at all with respect to ISIS’ content (except, perhaps, blocking some of it).13 Indeed, there is not even reason to think that defendants carefully screened any content before allowing users to upload it onto their platforms. If anything, the opposite is true: By plaintiffs’ own allegations, these platforms appear to transmit most content without inspecting it.
The mere creation of those platforms, however, is not culpable. To be sure, it might be that bad actors like ISIS are able to use platforms like defendants’ for illegal—and sometimes terrible—ends. But the same could be said of cell phones, email, or the internet generally. Yet, we generally do not think that internet or cell service providers incur culpability merely for providing their services to the public writ large. Nor do we think that such providers would normally be described as aiding and abetting, for example, illegal drug deals brokered over cell phones—even if the provider‘s conference-call or video-call features made the sale easier. See Doe v. GTE Corp., 347 F. 3d 655, 659 (CA7 2003).
To be sure, plaintiffs assert that defendants’ “recommendation” algorithms go beyond passive aid and constitute active, substantial assistance. We disagree. By plaintiffs’ own telling, their claim is based on defendants’ “provision of the infrastructure which provides material support to ISIS.” App. 53. Viewed properly, defendants’
At bottom, then, the claim here rests less on affirmative misconduct and more on an alleged failure to stop ISIS from using these platforms. But, as noted above, both tort and criminal law have long been leery of imposing aiding-and-abetting liability for mere passive nonfeasance. To show that defendants’ failure to stop ISIS from using these platforms is somehow culpable with respect to the Reina attack, a strong showing of assistance and scienter would thus be required. Plaintiffs have not made that showing.
First, the relationship between defendants and the Reina attack is highly attenuated. As noted above, defendants’ platforms are global in scale and allow hundreds of millions (or billions) of people to upload vast quantities of information on a daily basis. Yet, there are no allegations that defendants treated ISIS any differently from anyone else. Rather, defendants’ relationship with ISIS and its supporters appears to have been the same as their relationship with their billion-plus other users: arm‘s length, passive, and largely indifferent. Cf. Halberstam, 705 F. 2d, at 488. And their relationship with the Reina attack is even further removed, given the lack of allegations connecting the Reina attack with ISIS’ use of these platforms.
Second, because of the distance between defendants’ acts (or failures to act) and the Reina attack, plaintiffs would need some other very good reason to think that defendants were consciously trying to help or otherwise “participate in” the Reina attack. Nye & Nissen, 336 U. S., at 619 (internal quotation marks omitted). But they have offered no such reason, let alone a good one. Again, plaintiffs point to no act of encouraging, soliciting, or advising the commission of the Reina attack that would normally support an aiding-and-abetting claim. See 2 LaFave §13.2(a), at 457. Rather, they essentially portray defendants as bystanders, watching passively as ISIS carried out its nefarious schemes. Such allegations do not state a claim for culpable assistance or participation in the Reina attack. See Halberstam, 705 F. 2d, at 481, 483.
Because plaintiffs’ complaint rests so heavily on defendants’ failure to act, their claims might have more purchase if they could identify some independent duty in tort that would have required defendants to remove ISIS’ content. See Woodward, 522 F. 2d, at 97, 100. But plaintiffs identify no duty that would require defendants or other communication-providing services to terminate customers after discovering that the customers were using the service for illicit ends. See Doe, 347 F. 3d, at 659; People v. Brophy, 49 Cal. App. 2d 15, 33-34 (1942).14 To be sure, there
If there were any doubt, the expansive scope of plaintiffs’ claims would put it to rest. Given the lack of any concrete nexus between defendants’ services and the Reina attack, plaintiffs’ claims would necessarily hold defendants liable as having aided and abetted each and every ISIS terrorist act committed anywhere in the world. Under plaintiffs’ theory, any U. S. national victimized by an ISIS attack could bring the same claim based on the same services allegedly provided to ISIS. Plaintiffs thus must allege that defendants so systemically and pervasively assisted ISIS that defendants could be said to aid and abet every single ISIS attack. Viewed in that light, the allegations here certainly fall short. Plaintiffs do not claim that defendants intentionally associated themselves with ISIS’ operations or affirmatively gave aid that would assist each of ISIS’ terrorist acts. Nor have they alleged that defendants and ISIS formed a near-common enterprise of the kind that could establish such broad liability. These allegations are thus a far cry from the type of pervasive, systemic, and culpable assistance to a series of terrorist activities that could be described as aiding and abetting each terrorist act.
To be sure, we cannot rule out the possibility that some set of allegations involving aid to a known terrorist group would justify holding a secondary defendant liable for all of the group‘s actions or perhaps some definable subset of terrorist acts. There may be, for example, situations where the provider of routine services does so in an unusual way or provides such dangerous wares that selling those goods to a terrorist group could constitute aiding and abetting a foreseeable terror attack. Cf. Direct Sales Co. v. United States, 319 U. S. 703, 707, 711-712, 714-715 (1943) (registered morphine distributor could be liable as a co-conspirator of an illicit operation to which it mailed morphine far in excess of normal amounts). Or, if a platform consciously and selectively chose to promote content provided by a particular terrorist group, perhaps it could be said to have culpably assisted the terrorist group. Cf. Passaic Daily News v. Blair, 63 N. J. 474, 487-488, 308 A. 2d 649, 656 (1973) (publishing employment advertisements that discriminate on the basis of sex could aid and abet the discrimination).
In those cases, the defendants would arguably have offered aid that is more direct, active, and substantial than what we review here; in such cases, plaintiffs might be able to establish liability with a lesser showing of scienter. But we need not consider every iteration on this theme. In this case, it is enough that there is no allegation that the platforms here do more than transmit information by billions of people, most of whom use the platforms for interactions that once took place via mail, on the phone, or in public areas. The fact that some bad actors took advantage of these platforms is insufficient to state a claim that defendants knowingly gave substantial assistance and thereby aided and abetted those wrongdoers’ acts. And that
B
In holding that plaintiffs had stated a claim, the Ninth Circuit went astray through a series of missteps that, together, obscured the essence of aiding-and-abetting liability. To correct those errors, we proceed through the Ninth Circuit‘s application of Halberstam‘s framework.
The Ninth Circuit framed the issue of substantial assistance as turning on defendants’ assistance to ISIS’ activities in general. See 2 F. 4th, at 909. But, as we explained above, the question is whether defendants gave substantial assistance to ISIS with respect to the Reina attack. The focus thus must remain on the Reina attack; plaintiffs’ failure to allege any definable nexus between the defendants’ assistance and that attack therefore—at minimum—drastically increases their burden to show that defendants somehow consciously and culpably assisted the attack.
Next, the Ninth Circuit misapplied the “knowing” half of “knowing and substantial assistance.” It first separated the “knowing” and “substantial” subelements; it then analyzed the “knowing” subelement as a carbon copy of the antecedent element of whether the defendants were “generally aware” of their role in ISIS’ overall scheme. Ibid.; see also id., at 908. But, as discussed above, “the knowledge and substantial assistance” components “should be considered relative to one another” as part of a single inquiry designed to capture conscious and culpable conduct. Camp, 948 F. 2d, at 459 (internal quotation marks omitted). The “knowing” part of that inquiry is therefore designed to capture the defendants’ state of mind with respect to their actions and the tortious conduct (even if not always the particular terrorist act), not the same general awareness that defines Halberstam‘s second element.
Finally, when applying Halberstam‘s six substantiality factors, the Ninth Circuit appears to have regarded the factors as a sequence of disparate, unrelated considerations without a common conceptual core. See 2 F. 4th, at 909-910. That is incorrect. The point of those factors is to help courts capture the essence of aiding and abetting: participation in another‘s wrongdoing that is both significant and culpable enough to justify attributing the principal wrongdoing to the aider and abettor. The Ninth Circuit thus erred in focusing (as it did) primarily on the value of defendants’ platforms to ISIS, rather than whether defendants culpably associated themselves with ISIS’ actions. For example, when applying the second factor (the amount and kind of assistance), the Ninth Circuit should have considered that defendants’ platforms and content-sorting algorithms were generally available to the internet-using public. That focus reveals that ISIS’ ability to benefit from these platforms was merely incidental to defendants’ services and general business models; it was not attributable to any culpable conduct of defendants directed toward ISIS. And, when considering the fourth and fifth factors (the defendants’ relationship to ISIS and the defendants’ state of mind), the Ninth Circuit should have given much greater weight to defendants’ arm‘s-length relationship with ISIS—which was essentially no different from their relationship
Taken as a whole, the Ninth Circuit‘s analytic approach thus elided the fundamental question of aiding-and-abetting liability: Did defendants consciously, voluntarily, and culpably participate in or support the relevant wrongdoing? As we have explained above, the answer in this case is no. Plaintiffs allege only that defendants supplied generally available virtual platforms that ISIS made use of, and that defendants failed to stop ISIS despite knowing it was using those platforms. Given the lack of nexus between that assistance and the Reina attack, the lack of any defendant intending to assist ISIS, and the lack of any sort of affirmative and culpable misconduct that would aid ISIS, plaintiffs’ claims fall far short of plausibly alleging that defendants aided and abetted the Reina attack.
C
That leaves the set of allegations specific to Google. As explained above, plaintiffs allege that Google reviewed and approved ISIS videos on YouTube as part of its revenue-sharing system and thereby shared advertising revenue with ISIS. The Ninth Circuit briefly mentioned those allegations when analyzing plaintiffs’ complaint here. However, in addressing another, materially identical complaint, the Ninth Circuit held that the same allegations “failed to state a claim for aiding-and-abetting liability” because they were “devoid of any allegations about how much assistance Google provided” and therefore did not plausibly allege “that Google‘s assistance was substantial.” Id., at 907.
We think that the Ninth Circuit was correct in that holding. The complaint here alleges nothing about the amount of money that Google supposedly shared with ISIS, the number of accounts approved for revenue sharing, or the content of the videos that were approved. It thus could be the case that Google approved only one ISIS-related video and shared only $50 with someone affiliated with ISIS; the complaint simply does not say, nor does it give any other reason to view Google‘s revenue sharing as substantial assistance. Without more, plaintiffs thus have not plausibly alleged that Google knowingly provided substantial assistance to the Reina attack, let alone (as their theory of liability requires) every single terrorist act committed by ISIS.
V
By their very nature, the concepts of aiding and abetting and substantial assistance do not lend themselves to crisp, bright-line distinctions. However, both the common law and Halberstam provide some clear guideposts: The point of aiding and abetting is to impose liability on those who consciously and culpably participated in the tort at issue. The focus must remain on assistance to the tort for which plaintiffs seek to impose liability. When there is a direct nexus between the defendant‘s acts and the tort, courts may more easily infer such culpable assistance. But, the more attenuated the nexus, the more courts should demand that plaintiffs show culpable participation through intentional aid that substantially furthered the tort. And, if a plaintiff‘s theory would hold a defendant liable for all the torts of an enterprise, then a showing of pervasive and systemic aid is required to ensure that defendants actually aided and abetted each tort of that enterprise.
Here, however, the nexus between defendants and the Reina attack is far removed. As alleged by plaintiffs, defendants designed virtual platforms and knowingly failed to do “enough” to remove ISIS-affiliated users and ISIS-related content
We therefore reverse the judgment of the Ninth Circuit.
It is so ordered.
JACKSON, J., concurring
SUPREME COURT OF THE UNITED STATES
No. 21-1496
TWITTER, INC., PETITIONER v. MEHIER TAAMNEH, ET AL.
ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
[May 18, 2023]
JUSTICE JACKSON, concurring.
I join the opinion of the Court with the understanding that today‘s decisions are narrow in important respects. In this case and its companion, Gonzalez v. Google, 598 U. S. 617 (2023) (per curiam), the Court has applied
The Court also draws on general principles of tort and criminal law to inform its understanding of
