Microsoft and Google Maps
https://www.google.com/maps/timeline?ved=0ENaiAggAKAA&pb=!1m2!2m1!1s2020-05&pli=1
Find my device in Microsoft main screen accounts activity histories show my stationary devices all over Dearborn Michigan 48128 and across the country. Even unknown devices were connecting to my accounts for a long time. Changing passwords or security options are useless because the hackers use your internet and your devices to access connected accounts. 715 locations in one day showed in my history. Maps and GPS can be modified and traced by hackers. Google and Microsoft are my main platforms I have never investigated Yahoo due to my saving old accounts in Yahoo to preserve data from hackers completely erasing and scarmbing my accounts. They use a combination of commands, setting changes, networks made public, re-configuring adapters, WiFi broadband blue tooth Xbox Infrared and live active users combined with above allows administrative access and they create public folder from all your private folder. They become administrators by stealing or faking audit passable administrators that are able to take the privileges of all admins. And control a device or network and owners are helpless. Implanting these users in you infrastructure and ability to lock out admins poses a national security risk to all our infrastructure like electric water airports and dams if a across the USA all at once lockout could be devastating the the USA. I have informed all the federal agencies and the military. This is not a virus it is a complete operating system reconfiguration then live remote users connect to networks or devices. Facebook and Twitters domain keys are posted on a tone of global open sourced coding pages. The security trusts these users and setting changes are ignored
https://www.google.com/maps/timeline?ved=0ENaiAggAKAA&pb=!1m2!2m1!1s2020-05&pli=1
This item is a series of rejection and bouncing errors produced by a reply to a non reply email to the White House Hong Kong hacking the White House Servers. See the Chinese Military using Hong Kong as a proxy by using these networks and then the same networks were used to annex Hong Kong by China. Set up of issue then there to claim national security. This link network ring is exactly where and what kinds of networks that China is implanting administrative user access to be used at will.
https://drive.google.com/file/d/1-YnDiyiItAuW4a_yrFs87AqKO7cghpHj/view?usp=sharing