Sarai Hannah Ajai's FCC Complaint | _eriz__’s Apple iPhone Possible eSim Add-on or Cloning Problems

       Redacted 
April 15, 2024

 

Re: _eriz__’s Apple iPhone  Possible eSim Add-on or Cloning Problems

 

Dear Sir/Madam:

 

I, Sarai Hannah Ajai, hereinafter referred to as "the Complainant," am writing to discuss a critical issue regarding my _eriz__ Communications Inc. (“_eriz__”) Apple iPhone cellular phone number, xxx-xxx-xxxx account. I have been consistently facing unauthorized takeovers and control of my digital eSIM from cloning methods or schemes, with individuals either individually or collectively, have used a[n] fictitious, similar, or identical names, and in some instances, have even changed their own legal names to match my [full] legal name who unlawfully and possibly installing additional digital eSIMs cloning capabilities without my consents or authorizations, and without me adding another eSim cellular phone number to my _eriz__’s Apple iPhone  account, as per my lawful authority. 

 

Even after, I have subscribed to an VPN services on a monthly basis for my _eriz__’s Apple iPhone  to enhance firewall protection, certain fictitious, similar, or identical named individuals unlawfully conspired to deactivate my VPN subscription by pressing the VPN button within the VPN web application. Their actions were intentionally, knowingly, and willfully as those fictitious, similar, or identical named individuals have sought to gain control of my _eriz__’s account associated with my Apple iPhone  cellular phone number, xxx-xxx-xxxx account through their remote viewing capabilities. These fictitious, similar, or identical named individuals interferences and harassments directly targeted my _eriz__’s account without any proper legal oversights’ jurisdictions or adjudications. It is perplexing, how this could occur without any legal warrants served to me or any summonses to appear in any court jurisdictional systems regarding my _eriz__’s Apple iPhone  cellular phone number, xxx-xxx-xxxx account nor have I signed any Powers of Attorney, Affidavits, Waivers of Rights documents or shared account contractual agreements with any person, which would undermine my property rights to my _eriz__’s Apple iPhone  prepaid monthly subscription, all of which I never authorized. 

 

Throughout the day, I endure deliberate emotional distress stemming from severe identity thefts problems, perpetrated by fictitious, similar, or identical named individuals who discriminate against me based on my color, female biological sex, female gender identity, and disability. These actions deliberately violate federal laws such as Title 47 U.S.C. § 202 (Discriminations and Preferences), 222 (Privacy of Customer Information), and 1754 (Digital Discrimination), severely compromising the security and privacy of my _eriz__’s Apple iPhone  cellular phone number, xxx-xxx-xxxx account and PIN number. Not only do these violations infringe upon my subscription property rights to security and privacy, but they also inflict significant psychological continuous distress that underscore the pressing necessity for _eriz__ to be held accountable and for my privacy rights to be safeguarded in _eriz__ digital spaces.

 

I am well-versed in all legal procedures, ensuring protection against malware, spoof attacks, and the clearance of cookies from my _eriz__’s iPhone  browsers. However, on April 10, 2024, I had diligently changed all passwords and PINs numbers associated with my _eriz__’s accounts, including my Midcontinent Communication Inc ("Midco") home internet service provider Wi-Fi, around 2:39pm. Subsequently, I had promptly updated all my devices with the new Wi-Fi credentials, completing this task by approximately 6:08pm. However, at precisely 6:08pm, my _eriz__’s Apple iPhone  cellular phone number, xxx-xxx-xxxx account fell victim to unlawful compromise, as these fictitious, similar, or identical named individuals gained remote access and viewing capabilities within a mere 3 hours and 29 minutes. And, in the last few months, I have been keeping track of how long those fictitious, similar, or identical named individuals gain unlawful control of my _eriz__’s Apple iPhone  on which had average over 3 hours once I had changed my Midco’s Wi-Fi passwords. These fictitious, similar, or identical named individuals intrusions constitute a breach of my _eriz__ account security and privacy rights, which I will take lawful civil cause of actions.

 

Furthermore, those fictitious, similar, or identical named individuals have been actively engaging in the unauthorized access of my United States Postal Service (“USPS”) Informed Delivery email account, thereby granting them a criminal advantage to commit identity thefts against me. This nefarious behavior underscores their malicious intent and premeditates criminal actions, aimed at remote viewing or eSim cloning and pilfering my contents from emails containing images of items delivered to my mailbox number,  from the USPS jurisdictional facility. These fictitious, similar, or identical named individuals’ actions occur without my consent or lawful authority, resulting in the unlawful confiscation of my USPS’ delivered mail letters items and parcels from my residential mailbox number,  causing me to experience absence from those fictitious, similar, or identical named individuals unwarrants adjudications without due process of law. In order to search and seize my USPS delivered mail letters items and parcels through their unlawful remote viewing and cloning capabilities from my Apple iPhone  cellular phone number, xxx-xxx-xxxx account unlawfully confiscations and infringement of my property rights in accordance with Title 47 U.S.C. § 222 (Privacy of Customer Information).

 

Those individuals, whether fictitious, similar, or identical in my name (Sarai Hannah Ajai), have engaged in a deliberate and unlawful endeavor. Specifically, they have unlawfully intercepted, disclosed, and utilized wire, oral, and electronic communications, such as those transmitted through _eriz__ services. Their actions have targeted my _eriz__ Apple iPhone , identified by the phone number xxx-xxx-xxxx, and redirecting both incoming and outgoing calls to various foreign third-party cellular phone services or forwarded to unknown overseas cellular numbers, all without my consents. These behaviors constitute a clear violation of Title 18 U.S.C. § 25, which prohibits the interceptions and disclosure of such communications without my authorizations. Furthermore, these third parties unlawfully assume control over my communications, masquerading as intended recipients of both incoming and outgoing calls. Their actions serve to obstruct, hinder, or impede my direct communications with governmental and nongovernmental agencies, effectively preventing me from addressing discrepancies, complaints, or other issues with my governmental and nongovernmental agencies accounts. These interferences not only infringe upon my constitutional rights but also contravenes Title 18 U.S.C. § 241, which prohibits conspiracies against my rights. It is deeply troubling that these individuals persist in intercepting my outgoing calls to governmental and nongovernmental agencies, even though I have not granted them authorizations through Powers of Attorney, Affidavits, or Waivers of Rights documents. Their actions demonstrate a blatant disregard for privacy laws and undermine the integrity of communications channels essential for addressing critical matters with these agencies.

 

Individuals with fictitious, similar, or identical names have carried out inconspicuous yet egregious actions. They deliberately conspired to alter my web application passwords, tamper with my credit files, delete surveillance camera videos captured by my web applications, and electronically manipulated my SwitchBot lock, all with the intent to trespass against me. These actions resulted in damages and property thefts at my Apartment unit . Those fictitious, similar, or identical named individuals accessed my Apple iPhone  cellular phone number, xxx-xxx-xxxx, using remote viewing or cloning capabilities, and then those fictitious, similar, or identical names have engaged in a negligent, false, and fraudulent misrepresentations’ statements by falsely claiming that I fabricated these privacy violations because those individuals think, I am a male from birth (perhaps, I am just a very ugly woman). These unauthorized actions clearly violate the Title 18 U.S.C. § 241 (Conspiracies Against Rights).

  

 

Respectfully Submitted,

 

 

 Sarai Hannah Ajai

Here are my Photographs Evidences Samples there are more photographs evidence.









Comments