Former L3 boss Harris Trenchant has pleaded guilty to selling zero-day vulnerabilities to a Russian broker


Peter Williams, former general manager of defense contractor L3Harris, has pleaded guilty to selling surveillance technology to a Russian intermediary who bought “electronic gadgets,” the US Department of Justice confirmed on Wednesday.

“The material stolen over a three-year period from the US defense contractor where he worked consisted of national security-focused software that included at least eight sensitive and protected components for cyber exploitation,” the statement read. Ministry of Justice press release Wednesday. “These components were intended to be sold exclusively to the United States government and selected allies.”

TechCrunch previously reported exclusivelyCiting four former Trenchant employees, the company was investigating the leak of its hacking tools. Prosecutors now say Williams exploited his access to the company’s “secure network to steal cyber exploitation components.”

Williams heads Trenchant, the division at L3Harris that develops spyware, exploits, and security vulnerabilities in software unknown to its creator. Trenchant sells its surveillance technology to government clients in Australia, Canada, New Zealand, the United States and the United Kingdom, the so-called Five Eyes intelligence alliance. Trenchant was founded by L3Harris in 2019 acquired two Sister Australian startupsand Azimuth and Linchpin Labs, which developed and sold Zero-Day to the Five Eyes alliance of countries.

The Department of Justice said Williams, a 39-year-old Australian citizen residing in Washington, D.C., sold exploits to an unnamed Russian intermediary, who promised Williams millions of dollars in cryptocurrency in exchange. The former general manager of Trenchant allegedly signed contracts with the broker that stipulated an initial payment for the exploit, and periodic payments for “subsequent support.”

Prosecutors did not name the Russian broker to whom Williams sold, but said the broker publicly presents himself as an exploit software vendor to several clients, including the Russian government.

Contact us

Do you have more information about this case and the alleged leak of Trenchant hacking tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, via Telegram, Keybase, Wire @lorenzofb, or By email.

US Attorney Jeanine Pirro said on Wednesday that the middleman to whom Williams sold the exploits is part of the “next wave of international arms dealers.” Perrault said Williams’ crimes caused Trenchant more than $35 million in losses.

“Williams betrayed the United States and his employer by stealing and then selling intelligence-related software,” said John Eisenberg, Assistant US Attorney for National Security. He added, “His behavior was deliberate and deceptive, putting our national security at risk for personal gain.”

Sarah Panda, a spokeswoman for L3Harris, declined to comment when contacted by TechCrunch on Wednesday.

Williams’ attorneys did not immediately respond to a request for comment.

On October 14, The US government charged WilliamsKnown in the industry as “Doggie,” he sold trade secrets to a buyer in Russia, without specifying who those trade secrets were or which company he stole them from. According to a document filed in mid-October, Williams earned $1.3 million from the sale of the exploit.

Williams pleaded guilty to two counts of theft of trade secrets, each of which could carry a penalty of up to 10 years in prison. He will be sentenced in January 2026, prosecutors said.

according to Risky Business host and journalist Patrick GrayWilliams is currently under house arrest in the Washington, D.C., area where he lives. Gray said Williams worked for the Australian Signals Directorate, the country’s top intelligence and eavesdropping agency.

When previously contacted by TechCrunch, an ASD spokesperson did not comment on Williams, citing a law enforcement matter.

last week, TechCrunch reported Williams fired a Trenchant developer earlier this year, who was suspected of stealing Chrome without days. The former Trenchant employee told TechCrunch that he never had access to these tools, as he was working on iOS Zero-days development. Other former colleagues corroborated his account.

“I know I was made a scapegoat. I was not at fault. It’s very simple,” the exploit developer told TechCrunch. “I never did anything but work for them.”

Leave a Reply

Your email address will not be published. Required fields are marked *