An Analysis of Some Suspect Drop-in Communications