Former L3Harris Trenchant boss pleads guilty to selling zero-day exploits toRussian broker

Peter Williams, the former general manager at defense contractor L3Harris, has pleaded guilty to selling surveillance technology to a Russian broker that buys cyber tools. The U.S. Department of Justice confirmed the news on Wednesday.

The material, stolen over a three-year period from the U.S. defense contractor where he worked, was comprised of national-security focused software. It included at least eight sensitive and protected cyber-exploit components. According to the DOJ, those components were meant to be sold exclusively to the U.S. government and select allies.

TechCrunch had previously reported, citing four former Trenchant employees, that the company was investigating a leak of its hacking tools. Prosecutors now say Williams exploited his access to the company’s secure network to steal the cyber exploit components.

Williams headed Trenchant, the division at L3Harris that develops spyware, exploits, and zero-days. Zero-days are security vulnerabilities in software that are unknown to its maker. Trenchant sells its surveillance technology to government customers in Australia, Canada, New Zealand, the United States, and the United Kingdom. These countries form the so-called Five Eyes intelligence alliance.

Trenchant was founded after L3Harris acquired two Australian sister startups, Azimuth and Linchpin Labs, in 2019. These startups developed and sold zero-days to the Five Eyes alliance of countries.

The DOJ said Williams, a 39-year-old Australian citizen who resides in Washington, D.C., sold exploits to an unnamed Russian broker. The broker promised Williams millions of dollars in cryptocurrency in exchange. The former Trenchant general manager allegedly signed contracts with the broker that stipulated an initial payment for the exploits, plus periodic payments for follow-on support.

Prosecutors did not name the Russian broker Williams sold to, but stated that the broker publicly bills itself as a reseller of exploits to several customers, including the Russian government.

U.S. Attorney Jeanine Pirro said Wednesday that the broker to whom Williams sold exploits is part of the next wave of international arms dealers. Pirro said Williams’ crimes caused over thirty-five million dollars in losses to Trenchant.

Williams betrayed the United States and his employer by first stealing and then selling intelligence-related software, said U.S. Assistant Attorney General for National Security John A. Eisenberg. He stated that Williams’ conduct was deliberate and deceitful, imperiling national security for the sake of personal gain.

L3Harris spokesperson Sara Banda declined to comment when reached by TechCrunch on Wednesday. Attorneys for Williams did not immediately respond to a request for comment.

On October 14, the U.S. government accused Williams, who is known in the industry as Doogie, of selling trade secrets to a buyer in Russia. That initial accusation did not specify what those trade secrets were nor what company he stole them from. According to a document filed in mid-October, Williams made one point three million dollars from the sale of the exploits.

Williams pleaded guilty to two charges of stealing trade secrets. Each charge can carry a sentence of ten years in prison. Prosecutors said he will be sentenced in January 2026.

According to Risky Business host and journalist Patrick Gray, Williams is currently under house arrest in the Washington D.C. area where he lives. Gray said Williams used to work at the Australian Signals Directorate, the country’s top signals intelligence and eavesdropping agency. When previously reached by TechCrunch, a spokesperson for the ASD would not comment on Williams, citing a law enforcement matter.

Last week, TechCrunch reported that Williams had fired a Trenchant developer earlier this year who was suspected of stealing Chrome zero-days. The former Trenchant employee told TechCrunch that he never had access to those tools, as he worked on developing iOS zero-days. Other former colleagues supported his account.

The exploit developer told TechCrunch that he knew he was a scapegoat and that he was not guilty. He said it was very simple, and that he did not do absolutely anything other than work very hard for the company.