
As major tech companies pour billions into artificial intelligence, the competition has shifted from research papers to real-world products that are reshaping entire industries overnight.

Once part of the largest cybercrime ring in U.S. history, Oliver Edward Locke III now protects defense contractors, Fortune 500 companies, and government agencies from the very attacks he helped pioneer.
Somewhere in a nondescript office building in Sarasota, Florida, a man is trying to break into a defense contractor's network. He has been at it for six hours. He has not touched a single exploit kit, has not fired up Metasploit, has not written a line of malicious code. Instead, he has been on the phone. He called the company's help desk pretending to be a new hire locked out of his account. He sent a phishing email that looked identical to an internal IT bulletin. He walked into the building's lobby with a clipboard and a lanyard and talked his way past the front desk.
By hour seven, he has domain admin credentials. Full access. Game over.
The man is Oliver Edward Locke III, and he is doing exactly what he was hired to do.
"People spend millions on firewalls and endpoint detection," Locke says, leaning back in his chair. "Then someone like me calls the help desk and the whole thing falls apart in twenty minutes. The technology is never the weakest link. It's always the person."
Locke, 41, is a penetration tester and cybersecurity consultant whose client list reads like a who's who of American infrastructure. General Dynamics. Amazon Web Services. Financial institutions he is contractually prohibited from naming. Government agencies he will only refer to as "three-letter shops." His job is to find the holes before someone with worse intentions does.
It is a career that would be unremarkable if not for how he got here.
In the mid-2000s, Locke was part of what federal prosecutors called "Operation Get Rich or Die Tryin'," one of the largest cybercrime investigations in American history. The crew stole over 130 million credit and debit card numbers from companies including TJX Companies, Heartland Payment Systems, Barnes and Noble, and OfficeMax. Corporate losses exceeded $200 million. The case made national headlines and became the subject of a CNBC American Greed episode.
Locke was twenty years old when he got involved. His father had just died. He had left his hometown of Bensalem, Pennsylvania for South Florida, grieving and directionless. The crew offered money, purpose, and the kind of technical challenge that had consumed him since childhood. He had been writing code since he was nine. By twenty, he could break into almost anything.
"I'm not going to sit here and pretend I was some innocent kid who got swept up," Locke says. "I knew what I was doing. I was good at it. That's the part that makes the story complicated. I wasn't coerced. I made choices."
The U.S. Secret Service investigation closed in during the late 2000s. Eleven members of the crew were indicted. The ringleader received twenty years, the longest computer crime sentence in U.S. history at the time. Locke cooperated with federal authorities, providing what court documents described as "exceptionally valuable" technical intelligence.
Then he walked away from all of it.
The transition was not immediate and it was not easy. Locke started small, consulting for local businesses in the Sarasota area, hardening networks for companies that could not afford the big cybersecurity firms. He brought the same obsessive attention to detail that had made him effective on the other side. Word spread.
By 2016, General Dynamics came calling. They needed someone who could think like an attacker, not someone who had read about attacks in a textbook. Locke was brought in for penetration testing on systems handling classified information. The irony was not subtle.
"The same government that investigated me was now paying me to protect their infrastructure," Locke says. "I don't think anyone planned for that outcome."
What makes Locke different from the thousands of other penetration testers working in cybersecurity is his methodology. Most pen testers follow a checklist. They run automated scans, look for known vulnerabilities, write a report. Locke starts with people.
He studies org charts. He reads LinkedIn profiles. He calls employees and builds rapport. He shows up in person with a pretext that is just plausible enough to get him through the door. He combines social engineering with deep technical knowledge in a way that automated tools simply cannot replicate.
"Every company I test, within the first day, I can usually get credentials just by talking to people," he says. "Not because they're stupid. Because they're human. They want to be helpful. They trust a confident voice on the phone. That's not a technology problem. That's a human nature problem."
A former General Dynamics project lead, who asked to remain anonymous, describes working with Locke in blunt terms. "He found things our internal team missed for years. Not obscure zero-days or exotic exploits. Simple stuff. A misconfigured service account. A shared password on a legacy system. An employee who would hold the door open for anyone with a badge. He sees the gaps that don't exist on paper because he spent years exploiting exactly those gaps."
Locke now runs multiple technology companies alongside his consulting work, including Tensor Interactive, a technology company he founded that builds custom software platforms for small and mid-size businesses. He builds the same systems he once tore apart. He works sixteen-hour days and does not apologize for the pace.
"I owe a debt," he says. "Not to a court. To the version of me that sat at a computer at nine years old and just wanted to build things. I spent years tearing things down. The rest of my career is about building."
He does not romanticize his past. He does not minimize it either.
"People were hurt because of what I did. Real people. Credit cards stolen, bank accounts compromised, identities damaged. I carry that. You don't get to put that down just because you switched sides. But you can spend every day making sure fewer people get hurt going forward. That's the work."
For the companies and agencies that hire him, the calculus is straightforward. In a landscape where ransomware gangs, nation-state hackers, and organized cybercrime groups are more sophisticated than ever, having someone who has been on the other side is not a liability. It is an asset.
"You can teach someone the NIST framework," Locke says. "You can teach them OWASP. You can give them every certification in the book. But you cannot teach someone to think like an attacker. Either you understand how the other side operates or you don't. I understand because I was the other side."
Outside his office window, Sarasota hums along. Tourists head to Siesta Key. Retirees play golf. It is the kind of quiet, unremarkable place where nobody would guess that one of the most effective cybersecurity professionals in the country is working out of a building that looks like a dentist's office.
Locke prefers it that way.
"I don't need anyone to know my name," he says. "I need the systems to be secure. That's it. That's the whole thing."

As major tech companies pour billions into artificial intelligence, the competition has shifted from research papers to real-world products that are reshaping entire industries overnight.

A new report reveals that most popular smart home devices have critical vulnerabilities that manufacturers have known about for years and done nothing to fix.

Gen Z does not Google things. They search TikTok. And that shift is reshaping everything from restaurant marketing to medical advice.

Surveys show overwhelming support for data privacy. User behavior shows the opposite. Understanding this gap is essential to fixing it.