<p>In March 2012, the FBI surrounded a hurricane-rated steel door in Galveston, Texas. Behind it sat 30 year old Higinio Ochoa, drinking coffee in his boxers, flushing his one-time pad passwords down the toilet before letting federal agents inside. The operation to capture "w0rmer" had finally terminated.The process had initialized years earlier in childhood IRC rooms and 2600 chat channels. Ochoa taught himself to hack on dial-up connections, installing FreeBSD from thirty floppy disks at eleven years old. By his twenties, he was running cameras and internet infrastructure for Occupy Wall Street camps. When he witnessed police beating a woman having a seizure during a raid, something switched. The technical skills pivoted toward purpose.Cabin Crew launched with surgical precision. Ochoa mass-scanned police systems for SQL injections and admin pages, often not knowing which department he'd compromised until crafting the press release. He signed every hack, tagged every defacement, live-tweeted FBI taunts. His girlfriend posed in a bikini outside the Alabama Department of Public Safety holding signs that read "PwN3D by w0rmer" with GPS coordinates embedded in the photo metadata.Today he consults for governments and holds battlefield accommodations from Ukraine. The smooth hands that once broke into Secret Service-designed systems now defend critical infrastructure at levels where people could die if information leaks.</p><p>TIMSTAMPS</p><p>00:00 The Early Days of Hacking</p><p>04:22 From Hobbyist to Activist</p><p>08:30 The Shift to Purposeful Hacking</p><p>13:16 The Rise of Cabin Crew</p><p>17:58 The Psychology of Hacking and Branding</p><p>21:11 The Origins of Wormer: A Hacker's Journey</p><p>25:10 The FBI's Approach: How They Caught Me</p><p>27:50 The Day of Reckoning: My Arrest Experience</p><p>32:44 Life in the System: Mental Struggles and Adaptations</p><p>36:18 Navigating Post-Prison Life: Challenges and Restrictions</p><p>44:40 Navigating Life Post-Incarceration</p><p>47:27 The Struggles of Redemption</p><p>51:19 Finding Opportunities in a Stigmatized Field</p><p>55:23 The Evolution of a Hacker's Journey</p><p>58:46 Contributions to Information Security</p><p>01:01:19 Words of Wisdom for Aspiring Hackers</p><p>01:05:42 The Dream of a Cybersecurity Bar</p><p>[Higinio “w0rmer” Ochoa – LinkedIn] -<a href="https://www.linkedin.com/in/x0hig" target="_blank" rel="ugc noopener noreferrer"> https://www.linkedin.com/in/x0hig</a> Professional profile of Higinio Ochoa, a former Anonymous-affiliated hacktivist turned cybersecurity consultant, where he shares insights on security, research, and his work in the industry.</p><p>[DEF CON Hacker Conference] -<a href="https://defcon.org/" target="_blank" rel="ugc noopener noreferrer"> https://defcon.org/</a> One of the world’s largest and most influential cybersecurity and hacker conferences, referenced in the episode as a key part of early hacker culture and later professional engagement.</p><p>[Cybersecurity and Infrastructure Security Agency (CISA)] -<a href="https://www.cisa.gov/" target="_blank" rel="ugc noopener noreferrer"> https://www.cisa.gov/</a> A U.S. government agency focused on cybersecurity and infrastructure protection, mentioned in relation to responsible disclosure and ethical hacking initiatives.</p><p>[Cloudflare] -<a href="https://www.cloudflare.com/" target="_blank" rel="ugc noopener noreferrer"> https://www.cloudflare.com/</a> A global web infrastructure and cybersecurity company where the guest briefly worked after prison, playing a role in his transition into legitimate security work.</p><p>[The Pirate Bay] - https://thepiratebay.org/ A well-known file-sharing platform referenced in the discussion about monitored internet usage and security research environments post-release.</p><p><br></p>