When the FBI released its final case files on Kevin Mitnick, it reignited memories of my early fascination with security, phreaking, and the evolution of telecommunications. Growing up in a household where CB radios, punch-down tools, and telecom equipment were common, I developed a curiosity for how systems worked and where their vulnerabilities lay. But always with a strong ethical foundation. Reading Mitnick’s FBI files today, I see how the social engineering tactics of the past have evolved into modern security threats like phishing and credential harvesting. Now, working in enterprise IT and media storage security, I apply the same systematic thinking that once fueled my interest in telecom exploits—except now, I build resilient systems instead of testing their limits.