Peter Williams, a 39-year-old Australian national and former general manager at defense contractor L3Harris, has pleaded guilty to stealing and selling sensitive surveillance technology to a Russian broker that traffics in “cyber tools,” the U.S. Department of Justice announced Wednesday.
According to prosecutors, Williams secretly exfiltrated national-security-focused software from L3Harris over a three-year period. The stolen material included at least eight protected cyber-exploit components designed exclusively for use by the U.S. government and its closest allies.
Williams headed Trenchant, L3Harris’s advanced cyber division specializing in spyware, exploits, and zero-days—software vulnerabilities unknown to their developers. Trenchant’s clients included the Five Eyes alliance countries: the United States, United Kingdom, Australia, Canada, and New Zealand. The division was formed in 2019 after L3Harris acquired two Australian startups, Azimuth and Linchpin Labs, both known for developing offensive cyber tools for Western intelligence agencies.
The DOJ said Williams sold the stolen exploits to an unnamed Russian broker who promised millions of dollars in cryptocurrency payments. Contracts between the two outlined initial payments for the zero-day exploits and additional “follow-on” support fees. Prosecutors confirmed that the broker publicly markets itself as a reseller of exploits to government clients, including those in Russia.
U.S. Attorney Jeanine Pirro described the broker as part of “the next wave of international arms dealers,” noting that Williams’ crimes caused over $35 million in losses to Trenchant. “Williams betrayed the United States and his employer by first stealing and then selling intelligence-related software,” said John A. Eisenberg, Assistant Attorney General for National Security. “His conduct imperiled national security for the sake of personal gain.”
Court filings show that Williams, known in cybersecurity circles as “Doogie,” earned approximately $1.3 million from the illegal sales. He pleaded guilty to two counts of stealing trade secrets, each carrying a potential 10-year prison sentence. His sentencing is scheduled for January 2026.
Williams, who previously worked at Australia’s top intelligence agency, the Australian Signals Directorate (ASD), is currently under house arrest in Washington, D.C. A spokesperson for the ASD declined to comment, citing ongoing law enforcement proceedings.
Neither L3Harris nor Williams’ attorney John Rowley provided statements following the plea announcement.
In a related twist, Williams had earlier fired a Trenchant developer accused of stealing Chrome zero-day exploits. The former employee denied the allegations, saying he only worked on iOS vulnerabilities and was used as a scapegoat. Several ex-colleagues backed his account.
This case highlights the increasing risk of insider threats within defense technology firms and the lucrative black market for zero-day exploits, which can command seven-figure sums from state-linked buyers.