Former L3Harris Cybersecurity Executive Pleads Guilty to Selling Trade Secrets to Russian Firm
In a shocking turn of events, Peter Williams, a 39-year-old former executive at L3 Harris Trenchant, the US-based defense contractor's cybersecurity division, has pleaded guilty to stealing trade secrets worth at least $1.3 million and selling them to a Russian software broker.
Williams, an Australia native who resides in the United States, faces two counts of theft of trade secrets and could be sentenced to up to 20 years in prison and fined up to $250,000. However, according to prosecutors, he is likely to receive a sentence between 87 and 108 months in prison and fines of up to $300,000.
As part of the plea agreement, Williams has agreed to pay restitution of $1.3 million. The deal was reached after investigators from the FBI interviewed Williams multiple times this summer and confronted him about his alleged crimes.
Williams worked for L3 Harris Trenchant for less than a year before resigning in August 2025. Prosecutors say he was employed by the company or its predecessor since at least 2016, when he reportedly worked for the Australian Signals Directorate, the equivalent of the US National Security Agency.
The allegations against Williams are serious, as L3 Trenchant develops hacking tools for the US government and its allies. According to prosecutors, Williams stole eight trade secrets from two companies and sold them to a buyer in Russia between April 2022 and August 2025. The Russian company is believed to be part of a zero-day purchasing platform called Operation Zero, which buys and sells vulnerabilities and exploits.
Prosecutors claim that Williams used encrypted email accounts under the name John Taylor to negotiate deals for the software secrets he sold to the Russian firm. He also agreed to provide three months' worth of support or software updates to the products, earning him additional payments.
The deal comes as L3 Harris Trenchant faces an investigation into an alleged leak of its hacking tools by employees. Williams was the general manager of the company at the time and oversaw the investigation, which included a video conference call with another employee suspected of leaking several zero-day exploits.
The case highlights the serious consequences of stealing trade secrets and selling them to foreign companies. It also underscores the efforts of law enforcement agencies to crack down on such activities and protect national security interests.
In a shocking turn of events, Peter Williams, a 39-year-old former executive at L3 Harris Trenchant, the US-based defense contractor's cybersecurity division, has pleaded guilty to stealing trade secrets worth at least $1.3 million and selling them to a Russian software broker.
Williams, an Australia native who resides in the United States, faces two counts of theft of trade secrets and could be sentenced to up to 20 years in prison and fined up to $250,000. However, according to prosecutors, he is likely to receive a sentence between 87 and 108 months in prison and fines of up to $300,000.
As part of the plea agreement, Williams has agreed to pay restitution of $1.3 million. The deal was reached after investigators from the FBI interviewed Williams multiple times this summer and confronted him about his alleged crimes.
Williams worked for L3 Harris Trenchant for less than a year before resigning in August 2025. Prosecutors say he was employed by the company or its predecessor since at least 2016, when he reportedly worked for the Australian Signals Directorate, the equivalent of the US National Security Agency.
The allegations against Williams are serious, as L3 Trenchant develops hacking tools for the US government and its allies. According to prosecutors, Williams stole eight trade secrets from two companies and sold them to a buyer in Russia between April 2022 and August 2025. The Russian company is believed to be part of a zero-day purchasing platform called Operation Zero, which buys and sells vulnerabilities and exploits.
Prosecutors claim that Williams used encrypted email accounts under the name John Taylor to negotiate deals for the software secrets he sold to the Russian firm. He also agreed to provide three months' worth of support or software updates to the products, earning him additional payments.
The deal comes as L3 Harris Trenchant faces an investigation into an alleged leak of its hacking tools by employees. Williams was the general manager of the company at the time and oversaw the investigation, which included a video conference call with another employee suspected of leaking several zero-day exploits.
The case highlights the serious consequences of stealing trade secrets and selling them to foreign companies. It also underscores the efforts of law enforcement agencies to crack down on such activities and protect national security interests.