Sarai Hannah Ajai Alleged Unauthorized Device/Account Access, Work Desk Interference, Harassment/Threats, and Suspected Abuse of Judicial Process (Including Possible Malicious Service / Lack of Notice)

 INCIDENT REPORT COMPLAINT

Subject: Alleged Unauthorized Device/Account Access, Workdesk Interference, Harassment/Threats, and Suspected Abuse of Judicial Process (Including Possible Malicious Service / Lack of Notice)
Date Prepared: January 16, 2026
Incident Dates and Times: January 15, 2026 (late evening) from 11:05 PM  to 11:47 PM and January 16, 2026 (early morning) at 1:54 AM
Primary Locations: Inside Apt. 2** (bedroom work desk) and immediate common-area vicinity near Apt. 2** (including areas not covered by my Ring/Wyze camera detection)


1) Reporting Party

Name: Sarai Hannah Ajai
Address: 2*** **th ***** *****, Apt. 2**, *****, *D *****


2) Persons of Concern (As Reported / If Known)

  1. Ms. R*l*n**a B*k*r (tenant, Apt. 2*6) — referenced due to ongoing statements attributed to her and proximity.
  2. Female voice believed to be Ms. B*k*r’s daughter (name unknown).
  3. Unknown male voice in/near the common area.
  4. Other unknown persons (possible involvement based on repeated access/interference concerns).

Note: Identification of voices is based on my perception and is reported as such; I cannot confirm identity with certainty without investigation.


3) Systems / Property Involved

  • Computer: Apple Mac Mini M1 (primary development machine)
  • Internet Service: M*dc* (M*dc*n*in*nt Co**un*cat*ons) home internet service
  • Development Environment: IDE used for VaultInbox web application development
  • Project/Runtime: Node.js / NPM execution (VaultInbox application)
  • Related device previously reported (context): Apple iPhone 17 (security concerns referenced in prior incidents)

4) Summary of Complaint

While seated at my bedroom work desk working on software development for my business (VaultInbox web application), I heard multiple harassing statements from voices in or near the common area adjacent to my apartment. Immediately after certain statements, I experienced unusual and repeated technical failures in my development workflow, including NPM execution errors and backend/server errors while testing the “Compose” webpage.

I do not share my Apple Mac Mini M1, my M*dc* internet account, or my IDE credentials with Ms. B*k*r, her family, or any other tenants. I am concerned that unauthorized persons may be accessing my devices/accounts and interfering with my work without my knowledge or consent.

In addition, I am alleging that Ms. B*k*r (and/or persons acting with her) may be attempting to supersede my legal rights through “abuse of process”—including the possibility of court-related actions being pursued or represented as valid without my notice or presence, and without lawful service of process (summons/complaint) upon me. To my knowledge, I have never been legally served, have not received a lawful summons, and have not had an opportunity to appear before a judge regarding any alleged matters. If any documents exist claiming I was served, I am concerned about foul play, malicious service practices, or improper/false proof of service.


5) Detailed Narrative (Chronological)

A) January 15, 2026 — Approximately 11:05 PM (Late Evening)

  1. I was seated at my bedroom work desk inside Apt. 2**, actively writing and testing JavaScript codes for the VaultInbox web application.
  2. I heard an unknown male voice echoing from the common area area near/adjacent to my unit repeatedly saying:
    • “SPOILER ALERT.”
  3. Around the same time, I began experiencing persistent development failures: each time I executed the application using Node Package Manager (NPM), I received error messages in the IDE terminal. The errors interfered with my ability to run my application reliably.

B) January 15, 2026 — Approximately 11:56 PM (Late Evening; Near Front Door / Camera Blind Spot Area)

  1. Shortly thereafter, I heard a female voice near the common area by my front door region, in an area I believe may be outside the detection coverage or in a blind-spot relative to my Ring Doorbell/Wyze surveillance. The voice sounded consistent with Ms. B*k*r’s daughter and stated words substantially similar to:
    • “WE ARE USING YOUR IDENTITY TO RAISE MONEY FOR BASKETBALL BECAUSE YOU DO NOT WATCH BASKETBALL GAMES.”
  2. I perceived this statement as harassment and an implied admission of identity misuse.

C) January 16, 2026 — Approximately 1:54 AM (early-morning context also referenced)

  1. While still seated at my bedroom work desk programming VaultInbox web application, I again heard a female voice I believe to be Ms. B*k*r’s daughter stating words substantially similar to:
    • “I HAVE HACKED INTO YOUR COMPUTER BECAUSE I DID NOT LIKE YOUR ‘I NOT A BOY’ COMPLAINT.”
  2. Immediately after that statement—while running a test execution of the “Compose” webpage—I encountered a backend/server error I could not readily explain.
  3. After troubleshooting, I eventually located and identified error conditions within my VaultInbox project files consistent with a disruption to normal development operation (exact file names/log excerpts can be appended as evidence).

6) Key Assertions and Legal Concerns (Stated as Allegations)

I make the following allegations and concerns for investigation and documentation:

  1. Unauthorized Access / Intrusion Concern: I suspect unauthorized access to my computer, home network, and/or IDE environment due to repeated interference that coincides with targeted harassment statements.
  2. Harassment and Intimidation: Statements I heard appear intended to taunt, threaten, and intimidate me and disrupt my work inside my residence.
  3. Identity Theft / Identity Misuse References: The statement about “using [my] identity” is reported as a direct verbal claim and raises serious concern of identity misuse.
  4. Interference With Business Operations: The disruptions affected my ability to build and test my business VaultInbox software, creating professional and financial harm.
  5. Suspected Abuse of Process / Lack of Due Process: I allege Ms. B*k*r (and/or associates) may be attempting to assert “authority” over my devices and legal rights by misusing court-related processes, possibly including:
    • initiating or referencing legal actions without my knowledge;
    • proceeding without lawful service of process;
    • relying on improper/false proof of service or other malicious service schemes; and/or
    • attempting to obtain outcomes affecting my rights without my presence before a judge and without an opportunity to respond.
  6. Retaliation Concern: I am concerned these actions may be retaliatory and/or intended to force me to vacate my residence or silence my lawful filings/complaints, including matters I have pursued through formal legal channels (including a Petition for a Writ of Certiorari and related proceedings).

I request that any investigating authority treat these as serious allegations requiring verification through logs, recordings, witness interviews, and records checks.


7) Evidence to Preserve / Collect (Recommended)

Digital/Technical Evidence

  • IDE terminal logs and screenshots of NPM errors (with timestamps if possible)
  • Node/Express server logs (stdout/stderr output; debug logs)
  • “Compose” webpage error output and stack traces
  • Git history / git status output showing any file changes during the time window
  • macOS system logs (login events, security prompts, network changes)
  • M*dc* router/modem logs (connected devices, DHCP leases, connection history)
  • Password manager / account security logs (if applicable)

Surveillance / Premises Evidence

  • Ring Doorbell event timeline and any audio capture
  • Wyze event timeline and any audio capture
  • Property management common-area camera footage (if any) for the relevant times
  • Notes identifying camera blind spots near Apt. 2** entry area

Records Related to “Abuse of Process” Concern

  • Any docket entries, filings, or notices referencing my name
  • Any summons/complaint documents allegedly served
  • Any affidavit of service / proof of service (process server name, date/time, method, description)
  • Any orders entered without my knowledge (if applicable)

8) Impact Statement

These incidents have caused significant fear, disruption, and ongoing stress. I feel unable to safely and reliably use my devices in my own residence. The repeated interruptions also interfere with my ability to operate my business and complete time-sensitive programming work.


9) Requested Action

I respectfully request:

  1. Documentation of this report as a formal complaint.
  2. Investigation into potential unauthorized access to my computer/network and any related harassment.
  3. Preservation of any available surveillance footage and relevant service-provider logs.
  4. A records check for any court process purportedly involving me, including verification of lawful service.
  5. If appropriate, a safety assessment and guidance regarding protective measures and reporting pathways for harassment and threats.

10) Declaration

I declare under penalty of perjury that the above statements are true and correct to the best of my knowledge and belief.

Signature: _______________________________
Printed Name: Sarai Hannah Ajai

Comments