I have some major (weird) stuff going on, and local law won’t even investigate. Can someone tell me, specifically, what to look for on these devices.
What I KNOW:
My devices are spying on me because they take pics and videos of me. Even when I’m asleep.
Passwords are changed as soon as I set new ones.
Emulators/simulators are being used.
Cellphone and 3 laptops have been compromised.
Apple IDs were used for initial access.
Everything is being done remotely.