SARAI HANNAH AJAI | FORMAL COMPLAINT & FORENSIC SUMMARY

VERIZON ACCOUNT, APPLE ECOSYSTEM, AND HOME-NETWORK COMPROMISE

Prepared by: Sarai Hannah Ajai

Date: December 02, 2025

I. Executive Overview

This formal complaint summarizes an extended pattern of unauthorized access, account manipulation, and device interference affecting my Verizon wireless lines (including *** *** 6195), Apple ecosystem devices (iPhone 11, iPhone 17, Apple Watch Series 7, Mac Mini M1), and my residential network infrastructure.

Between May 1, 2025 and November 30, 2025, I documented persistent account-takeover behavior requiring repeated resets of passwords, PINs, voicemail codes, eSIM/Apple ID credentials, Wi-Fi/router keys, and device passcodes. In several instances, resets were required multiple times within a single day.

My Excel forensic log workbook, attached with this report, contains timestamped, contemporaneous entries for each reset and recovery action performed. These logs form the quantitative foundation of this complaint.

**II. Quantitative Summary of Logged Credential Reset Events

(May—November 2025)**

Month Logged Credential Changes

May 2025 24

June 2025 30

July 2025 39

August 2025 30

September 2025 23

October 2025 32 (from Excel workbook)

November 2025 34 (from Excel workbook)

Total Recorded Reset/Recovery Events: 212 entries

(Reflects intensity of takeover pressure rather than unique devices; multiple categories were tracked in parallel.)

Each “entry” represents a discrete credential reset involving one or more of the following categories:

Apple ID / iCloud sign-ins

Apple device passcodes (iPhone 11/17, Watch Series 7, Mac Mini M1)

Verizon PINs and voicemail codes

Visual voicemail configuration

Wi-Fi security keys and router administrative passwords

eSIM/line authentication events

Device-level account re-enrollment or forced recovery modes

III. Key Incidents Already Documented

1. July 4, 2025 – Remote Voicemail Deletion (10:30 AM)

During a reboot on my iPhone 11, a voicemail from an unfamiliar 615 area code appeared and was visibly deleted from the screen without my interaction. This indicates carrier-side or remotely authenticated access.

2. June 27, 2025 – Admission of Apple Ecosystem Intrusion (8:30 AM)

In a hallway blind-spot outside my residence, neighbor (Unit 206, identity documented in prior filings) stated:

“You are sharing your Apple iPhone 11 and Apple ecosystem with me.”

A similar statement had been made days earlier by an unidentified male outside my window.

I have never granted consent to share, pair, or mirror any device.

3. September 21, 2025 – Temporary Disappearance of Line *** *** 6195

Verizon’s IVR reported the number “no longer exists with Verizon,” consistent with attempted:

SIM swap

Port-out fraud

Backend credential takeover

Service later restored without any action on my part.

**IV. Updated Summary Incident: Unauthorized Lockout of Apple Mac Mini M1

(November 25, 2025 – Critical Escalation Event)

Incident Overview

On November 25, 2025, I conducted a routine macOS password update at approximately 3:06 PM. The system confirmed the new password with no errors.

At approximately 8:45 PM, while preparing Quantaudio Studio content (“City on a Hill | Session II | Light in the Lord — Instrumental”), my Mac Mini M1 froze completely, displaying the persistent macOS “beach ball.” Keyboard and mouse input became disabled.

At approximately 8:55 PM, I heard the neighboring tenant in Unit 206 speaking loudly in the common hallway, stating:

“We locked you out of your computer because you have locked us out of your phone.”

Immediately following this statement, my legitimate password began failing, triggering escalating lockout timers (1 minute → 3 minutes → 15 minutes), which is consistent with unauthorized manipulation of authentication flows.

Forced Recovery Procedure

Because the correct password no longer worked, I was compelled to execute a full macOS Recovery Mode re-authentication, including:

1. Accessing Options → Forget All Passwords

2. Entering Apple ID/iCloud credentials

3. Passing “Authentication Succeeded” verification

4. Opening Utilities → Terminal

5. Running resetpassword

6. Completing:

o Deactivate Mac

o Activation Lock (requiring Apple ID again)

o Reset Password (final credential creation)

This procedure is not triggered during normal usage. It is consistent with:

Credential corruption

Remote interference

MitM-style Apple token manipulation

Unauthorized local network access

Tampering with device-level authentication states

I have retained photo evidence of each step of the forced recovery.

Federal Statutes Implicated

The events materially implicate:

18 U.S.C. § 1030 – Computer Fraud and Abuse Act (unauthorized access)

18 U.S.C. § 2511 – Wiretap Act (interference with electronic communications)

18 U.S.C. § 2261A – Interstate electronic stalking/harassment

Federal offenses relating to intentional tampering with digital credentials and personal computing systems

This incident demonstrates an escalating pattern of deliberate interference.

V. Technical Environment

Home Network Infrastructure

ISP: Mi*******ent Com********ons

Modem: Netgear Nighthawk CM1200

Router: ASUS AX1800 Dual Band RT-AX1800S (Wi-Fi 6)

Mac Mini: Ethernet-connected to router

iPhone 11, iPhone 17, Apple Watch 7: Wi-Fi/cellular hybrid connectivity

This topology assists in isolating potential LAN-side, Bluetooth, and Wi-Fi-based persistence mechanisms.

VI. Forensic Indicators

Based on accumulated evidence, the following indicators strongly suggest a multi-layered intrusion pattern:

Persistent credential resets (daily/multiple times per day)

Evidence of backend voicemail/line control

Unauthorized declarations by neighboring tenant(s)

Possible cloned eSIM or carrier-side session replication

Voicemail deletions during device reboot

SIM swap/port-out precursors

LAN-side or Bluetooth-based proximity exploitation

Corruption of Mac Mini login credentials on November 25, 2025

VII. Requested Actions & Data Preservation

To Verizon Wireless

1. Enable Number Lock / Do Not Port on all lines

2. Require Port-Out PIN + in-store ID verification

3. Provide written documentation of all changes to line *** *** 6195 on 9/21/2025:

o NPAC records

o Receiving carrier (if any)

o Authorization method used

o IP logs and representative/store ID numbers

To Apple

1. Invalidate all active device and iCloud session tokens

2. Force re-enrollment of trusted devices

3. Provide sign-in logs and device association history with:

o IP addresses

o User agents

o ASN/ISP metadata

4. Investigate potential unauthorized device mirroring or token cloning

To Mi*** & Network Equipment Vendors

1. Preserve DHCP, CMTS, and modem logs

2. Audit router for:

o Rogue SSIDs

o WPS event logs

o UPnP pinholes

o WAN admin exposure

3. Verify DNS integrity

To Law Enforcement / FTC

1. Record incident in Consumer Sentinel

2. Compare with local SIM-swap/port-out fraud patterns

3. Review available CCTV for June 27, July 4–5, and Sept. 21 time windows

4. Document the November 25, 2025 Mac Mini lockout as an escalation event

VIII. Methodology Behind This Report

All counts were derived from my Excel workbook forensic logs. Each row represents a recorded timestamp capturing a password reset, device passcode change, forced Apple re-authentication, voicemail PIN reset, router password rotation, Wi-Fi key update, or device recovery procedure.

For October and November, the workbook reflects:

October 2025: 32 qualifying credential-reset entries

November 2025: 34 qualifying credential-reset entries

These metrics corroborate the sustained account takeover behavior.

Submitted by:

Sarai Hannah Ajai

Date: December 02, 2025


































Comments