The "Pumpkin Day Plot" in Detroit
Another FBI "Win" That Doesnโt Pass the Smell Test
Weโve been very vocal about the way the arrests were made in the โISISโ cell that was wrapped up in Detroit, and how it was mishandled.
Keep reading below โฆ
While we understand the FBI initiated the movement for the arrests, the local LEOs are credited for the actual arrest. Hereโs our problem with the entire thing:
Of 5 attackers (โConspiratorsโ in the FBI language), only 2 were wrapped up. Weโve heard that 2 additional attackers were swept up in New Jersey attempting to flee Syria via Turkey to join ISIS for training, but that makes the whole story more questionable
There was mention a โhandlerโ in New York City, that was visited by one of the attackers for his blessing to โcarry out the attack.โ He is still at large.
There was also mention of contacts with Syria and Iraq, including the fact that one of the attackers had recently returned from Syria. Those connections were not followed up on because the FBI didnโt coordinate with the ODNI, the NCTC, of the CIA, all of which are responsible for tracking and monitoring foreign terror groups. These will be lost in the shadows.
Itโs very odd for โterroristsโ to be using WhatsApp for communications. From al Qaeda to the Islamic State, the communication platform of choice nowadays is either Telegram or Sessions, both encrypted. WhatsApp has been a known security problem for many years, and the terror groups themselves donโt use them for communication, which makes us wonder - why were the Detroit attacker using it.
Additionally, when you read the indictment and see some of the โtranscribedโ message between the attackers - they look very scripted. The scripting makes us wonder if they are using the same strategy as the Taliban are using in Afghanistan - show what you arenโt going to do, and discuss in person what you are going to do. For online communications and telephonic (cell/mobile), have a script for the conversation, so if anyone is monitoring, they learn nothing about the real plan.
Looking at the pictures of the attackers, there is ZERO, and we mean ZERO operational security (OpSec) being practiced, meaning targeting and finding them would be very easy.
DISCLOSURE: This post contains affiliate links. If you make a purchase through them, we may earn a small commission at no extra cost to you. This helps keep our work independent. Thank you for your support.
From an intelligence point of view, there are too many questions that are raised, including the guns and ammo purchases, shooting ranges and basic behavior that would identify them as threats.
There is a lot more questionable information in the Department of Justice indictment below. Yes, the DoJ has taken this down from their website, so you can get a copy of the 73-page document below.
The attack model was exactly as we have been describing on our Survival Dispatch broadcasts at 7 pm EST every weekday.
When you read and start to connect the dots from the indictment, you will find more questions than answers.
If you rely on our briefings to stay ahead of whatโs coming, upgrade today. Your support keeps Dead Drop Intel independent and our intelligence flowing - no filters, no sponsors, no censorship.
Thanks for reading Overwatch with ๐๐ข๐ ๐ ๐๐ก๐๐๐๐๐ฉ๐๐ก! Subscribe for free to receive new posts and support our work.
You can follow us on X HERE or visit our corporate website HERE.
Regards,
Khalid Muhammad




