A former official from a cybersecurity company has admitted to stealing trade secrets with the intention of selling them to a Russian buyer, according to a recent announcement from the U.S. Department of Justice. Peter Williams, a 39-year-old Australian, pleaded guilty to two counts of theft of trade secrets during proceedings at the U.S. District Court.
Williams’ guilty plea stems from allegations that he sold confidential information from his employer, which the Justice Department has identified as national-security focused software. This software reportedly includes at least eight sensitive cyber-exploit components obtained over a three-year span while he worked for a U.S. defense contractor. Although the Justice Department did not disclose the name of the company, sources suggest that Williams was a former director and general manager at L3Harris Trenchant, a firm engaged in vulnerability assessment and security work for governmental clients.
According to the Justice Department, the components stolen by Williams were intended to be sold exclusively to the U.S. government and its chosen allies. Instead, they were sold to a Russian cyber-tools broker that markets itself as a vendor of cyber exploits to a range of clients, including the Russian government.
Potential Consequences for the Accused
Each of the theft charges carries a statutory maximum penalty of 10 years in prison, as well as a potential fine of up to $250,000. In addition, Williams has been ordered to pay $1.3 million in restitution. The Justice Department emphasized the serious nature of these actions, stating that the total value of the stolen intellectual property is estimated at $35 million.
Repercussions on National Security
Assistant Director Roman Rozhavsky, from the FBI’s Counterintelligence Division, remarked on the implications of Williams’ actions, highlighting how his greed compromised national security. “Williams placed greed over freedom and democracy by stealing and reselling $35 million of cyber trade secrets from a U.S. cleared defense contractor to a Russian government supplier,” Rozhavsky explained. He asserted that the sale of these secrets would give Russian cyber operatives an unfair advantage in their ongoing efforts to target U.S. citizens and businesses.
Details surrounding the case indicate that from roughly 2022 through 2025, Williams misused his access to the defense contractor’s secure network to acquire the classified cyber exploit components. In exchange for these secrets, Williams arranged multiple contracts with the Russian broker, which involved compensation through cryptocurrencies. He transferred the sensitive components through encrypted channels to ensure confidentiality.
Background on Williams and Trenchant
Before his position with L3Harris Trenchant, Williams had experience working with the Australian Signals Directorate. Trenchant itself was formed following the mergers of Azimuth Security and Linchpin Labs into the larger defense contractor, L3Harris Technologies. The company specializes in providing vulnerability assessments and exploit research, as well as facilitating intelligence operations and computer network operations.
The Nature of Trenchant’s Work
On its web platform, Trenchant advertises a wide range of solutions, which include advanced capabilities in cybersecurity, particularly focusing on vulnerabilities and exploits. TechCrunch characterized Trenchant’s output as the development of spyware, exploit tools, and “zero-days,” which are security vulnerabilities unknown to the software developers. The firm’s clientele comprises governmental agencies from the Five Eyes intelligence alliance, which includes Australia, Canada, New Zealand, the United Kingdom, and the United States, revealing the sensitive nature of the work being conducted.


