<p>In March 2012, the FBI surrounded a hurricane-rated steel door in Galveston, Texas. Behind it sat 30 year old Higinio Ochoa, drinking coffee in his boxers, flushing his one-time pad passwords down the toilet before letting federal agents inside. The operation to capture &quot;w0rmer&quot; had finally terminated.The process had initialized years earlier in childhood IRC rooms and 2600 chat channels. Ochoa taught himself to hack on dial-up connections, installing FreeBSD from thirty floppy disks at eleven years old. By his twenties, he was running cameras and internet infrastructure for Occupy Wall Street camps. When he witnessed police beating a woman having a seizure during a raid, something switched. The technical skills pivoted toward purpose.Cabin Crew launched with surgical precision. Ochoa mass-scanned police systems for SQL injections and admin pages, often not knowing which department he&#39;d compromised until crafting the press release. He signed every hack, tagged every defacement, live-tweeted FBI taunts. His girlfriend posed in a bikini outside the Alabama Department of Public Safety holding signs that read &quot;PwN3D by w0rmer&quot; with GPS coordinates embedded in the photo metadata.Today he consults for governments and holds battlefield accommodations from Ukraine. The smooth hands that once broke into Secret Service-designed systems now defend critical infrastructure at levels where people could die if information leaks.</p><p>TIMSTAMPS</p><p>00:00 The Early Days of Hacking</p><p>04:22 From Hobbyist to Activist</p><p>08:30 The Shift to Purposeful Hacking</p><p>13:16 The Rise of Cabin Crew</p><p>17:58 The Psychology of Hacking and Branding</p><p>21:11 The Origins of Wormer: A Hacker&#39;s Journey</p><p>25:10 The FBI&#39;s Approach: How They Caught Me</p><p>27:50 The Day of Reckoning: My Arrest Experience</p><p>32:44 Life in the System: Mental Struggles and Adaptations</p><p>36:18 Navigating Post-Prison Life: Challenges and Restrictions</p><p>44:40 Navigating Life Post-Incarceration</p><p>47:27 The Struggles of Redemption</p><p>51:19 Finding Opportunities in a Stigmatized Field</p><p>55:23 The Evolution of a Hacker&#39;s Journey</p><p>58:46 Contributions to Information Security</p><p>01:01:19 Words of Wisdom for Aspiring Hackers</p><p>01:05:42 The Dream of a Cybersecurity Bar</p><p>[Higinio “w0rmer” Ochoa – LinkedIn] -<a href="https://www.linkedin.com/in/x0hig" target="_blank" rel="ugc noopener noreferrer"> https://www.linkedin.com/in/x0hig</a> Professional profile of Higinio Ochoa, a former Anonymous-affiliated hacktivist turned cybersecurity consultant, where he shares insights on security, research, and his work in the industry.</p><p>[DEF CON Hacker Conference] -<a href="https://defcon.org/" target="_blank" rel="ugc noopener noreferrer"> https://defcon.org/</a> One of the world’s largest and most influential cybersecurity and hacker conferences, referenced in the episode as a key part of early hacker culture and later professional engagement.</p><p>[Cybersecurity and Infrastructure Security Agency (CISA)] -<a href="https://www.cisa.gov/" target="_blank" rel="ugc noopener noreferrer"> https://www.cisa.gov/</a> A U.S. government agency focused on cybersecurity and infrastructure protection, mentioned in relation to responsible disclosure and ethical hacking initiatives.</p><p>[Cloudflare] -<a href="https://www.cloudflare.com/" target="_blank" rel="ugc noopener noreferrer"> https://www.cloudflare.com/</a> A global web infrastructure and cybersecurity company where the guest briefly worked after prison, playing a role in his transition into legitimate security work.</p><p>[The Pirate Bay] - https://thepiratebay.org/ A well-known file-sharing platform referenced in the discussion about monitored internet usage and security research environments post-release.</p><p><br></p>

BarCode

Chris Glanden

W0rmer

MAY 1, 202669 MIN
BarCode

W0rmer

MAY 1, 202669 MIN

Description

<p>In March 2012, the FBI surrounded a hurricane-rated steel door in Galveston, Texas. Behind it sat 30 year old Higinio Ochoa, drinking coffee in his boxers, flushing his one-time pad passwords down the toilet before letting federal agents inside. The operation to capture &quot;w0rmer&quot; had finally terminated.The process had initialized years earlier in childhood IRC rooms and 2600 chat channels. Ochoa taught himself to hack on dial-up connections, installing FreeBSD from thirty floppy disks at eleven years old. By his twenties, he was running cameras and internet infrastructure for Occupy Wall Street camps. When he witnessed police beating a woman having a seizure during a raid, something switched. The technical skills pivoted toward purpose.Cabin Crew launched with surgical precision. Ochoa mass-scanned police systems for SQL injections and admin pages, often not knowing which department he&#39;d compromised until crafting the press release. He signed every hack, tagged every defacement, live-tweeted FBI taunts. His girlfriend posed in a bikini outside the Alabama Department of Public Safety holding signs that read &quot;PwN3D by w0rmer&quot; with GPS coordinates embedded in the photo metadata.Today he consults for governments and holds battlefield accommodations from Ukraine. The smooth hands that once broke into Secret Service-designed systems now defend critical infrastructure at levels where people could die if information leaks.</p><p>TIMSTAMPS</p><p>00:00 The Early Days of Hacking</p><p>04:22 From Hobbyist to Activist</p><p>08:30 The Shift to Purposeful Hacking</p><p>13:16 The Rise of Cabin Crew</p><p>17:58 The Psychology of Hacking and Branding</p><p>21:11 The Origins of Wormer: A Hacker&#39;s Journey</p><p>25:10 The FBI&#39;s Approach: How They Caught Me</p><p>27:50 The Day of Reckoning: My Arrest Experience</p><p>32:44 Life in the System: Mental Struggles and Adaptations</p><p>36:18 Navigating Post-Prison Life: Challenges and Restrictions</p><p>44:40 Navigating Life Post-Incarceration</p><p>47:27 The Struggles of Redemption</p><p>51:19 Finding Opportunities in a Stigmatized Field</p><p>55:23 The Evolution of a Hacker&#39;s Journey</p><p>58:46 Contributions to Information Security</p><p>01:01:19 Words of Wisdom for Aspiring Hackers</p><p>01:05:42 The Dream of a Cybersecurity Bar</p><p>[Higinio “w0rmer” Ochoa – LinkedIn] -<a href="https://www.linkedin.com/in/x0hig" target="_blank" rel="ugc noopener noreferrer"> https://www.linkedin.com/in/x0hig</a> Professional profile of Higinio Ochoa, a former Anonymous-affiliated hacktivist turned cybersecurity consultant, where he shares insights on security, research, and his work in the industry.</p><p>[DEF CON Hacker Conference] -<a href="https://defcon.org/" target="_blank" rel="ugc noopener noreferrer"> https://defcon.org/</a> One of the world’s largest and most influential cybersecurity and hacker conferences, referenced in the episode as a key part of early hacker culture and later professional engagement.</p><p>[Cybersecurity and Infrastructure Security Agency (CISA)] -<a href="https://www.cisa.gov/" target="_blank" rel="ugc noopener noreferrer"> https://www.cisa.gov/</a> A U.S. government agency focused on cybersecurity and infrastructure protection, mentioned in relation to responsible disclosure and ethical hacking initiatives.</p><p>[Cloudflare] -<a href="https://www.cloudflare.com/" target="_blank" rel="ugc noopener noreferrer"> https://www.cloudflare.com/</a> A global web infrastructure and cybersecurity company where the guest briefly worked after prison, playing a role in his transition into legitimate security work.</p><p>[The Pirate Bay] - https://thepiratebay.org/ A well-known file-sharing platform referenced in the discussion about monitored internet usage and security research environments post-release.</p><p><br></p>