"Former friend sets up then does something to cpu. 1 year later find him scanning router in house he takes off.3 phones 5 phone numbers 3 routers 100'sof passwords several apple accounts google accounts emails. He's controlling my device from his devices and used me ruined my life and no matter what I do I can't stop it.in serious need of help before I lose everything including my life.got lots of evidence and it's a lot I just want my life back please help"
-------
Secure your Network:
For a personal, home network, log into your router, by using either of these two IP Addresses (192.168.0.0 or 192.168.1.1) in the address bar of your Web browser, and then pressing return. Log in using your administrator name and password for the router. Then, see what is connected. If you see something unfamiliar, then you should change the password to your network. You'll have to either log out of every device on your network, or share the network somehow. If it comes down to it, then cones a new router, perhaps having a third party come in a set it up.
Troubleshooting Compromised eMail Account:
Fir iCloud Mail, You can only have one iCloud eMail account. So, create an alias, as an alternative. Go Here: Add and Manage eMail Aliases for iCloud Mail on iCloud.com - Apple Support
Troubleshooting a Hacked Account:
I. Getting In to your Apple Account:
You need to get into your Apple Account. So, contact Apple Support. If you have a hacked iCloud account, then ask the Apple Rep if they can help you add Two-Factor Authentication. Ask them to assist you with changing your password to what it should be. Important: Perform a trial-&-error login session, prior to ending the call.
Apple Contact Info:
II. Secure your Info:
If concerned for device access, then (A)verify your devices, and (B)secure your account. Open a new eMail addressee d use that for your Apple ID.
1. Verify your Devices:
Verify that all devices are logged in to your account, by using this link: Check your Apple ID Device List to See where you're Signed in - Apple Support
then...
2. Modify your Credentials:
Having been stollen, someone lily has your credentials. So, by all means, modifying them.
III. Report Items to Apple:
So, report phone call's and messages info to Apple and modify. Use my User: Using the Photos App to Report Scams - User Tip