Former L3Harris Trenchant boss pleads guilty to selling zero-day exploits to Russian broker
Peter Williams, the former general manager at defense contractor L3Harris, has pleaded guilty to selling surveillance technology to a Russian broker that buys “cyber tools,” the U.S. Department of Justice confirmed Wednesday.  “The material, stolen over a three-year period from the U.S. defense contractor where he worked, was comprised of national-security focused software that included at least eight sensitive and protected cyber-exploit components,” read the DOJ’s press release on Wednesday. “Those components were meant to be sold exclusively to the U.S. government and select allies.” TechCrunch previously exclusively reported, citing four former Trenchant employees, that the company was investigating a leak of its hacking tools. Prosecutors now say Williams exploited his access to the company’s “secure network to steal the cyber exploit components.” Williams headed Trenchant, the division at L3Harris that develops spyware, exploits, and zero-days — security vulnerabilities in software that are unknown to its maker. Trenchant sells its surveillance tech to government customers in Australia, Canada, New Zealand, the United States, and the United Kingdom, the so-called Five Eyes intelligence alliance. Trenchant was founded after L3Harris in 2019 acquired two Australian sister startups, Azimuth and Linchpin Labs, which developed and sold zero-days to the Five Eyes alliance of countries.  The DOJ said Williams, a 39-year-old Australian citizen who resides in Washington, D.C., sold exploits to the unnamed Russian broker, who promised Williams millions of dollars in cryptocurrency in exchange. The former Trenchant general manager allegedly signed contracts with the broker that stipulated an initial payment for the exploits, and periodic payments “for follow-on” support.  Prosecutors did not name the Russian broker Williams sold to, but said that the broker publicly bills itself as a reseller of exploits to several customers, including the Russian government.  Contact Us Do you have more information about this case, and the alleged leak of Trenchant hacking tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email. U.S. Attorney Jeanine Pirro said Wednesday that the broker whom Williams sold exploits to is part of “the next wave of international arms dealers.” Pirro said Williams’ crimes caused over $35 million in losses to Trenchant.  “Williams betrayed the United States and his employer by first stealing and then selling intelligence-related software,” said U.S. Assistant Attorney General for National Security John A. Eisenberg. “His conduct was deliberate and deceitful, imperiling our national security for the sake of personal gain.” L3Harris spokesperson Sara Banda declined to comment when reached by TechCrunch on Wednesday. John Rowley, one of Williams’ attorneys, declined to comment. On October 14, the U.S. government accused Williams, who is known in the industry as “Doogie,” of selling trade secrets to a buyer in Russia, without specifying what those trade secrets were nor what company he stole them from. According to a document filed in mid-October, Williams made $1.3 million for the sale of the exploits.  Williams pleaded guilty to two charges of stealing trade secrets, which each can carry a sentence of 10 years in prison. He will be sentenced in January 2026, prosecutors said.  According to Risky Business host and journalist Patrick Gray, Williams is currently under house arrest in the Washington, D.C. area where he lives. Gray said Williams used to work at the Australian Signals Directorate (ASD), the country’s top signals intelligence and eavesdropping agency.  When previously reached by TechCrunch, a spokesperson for the ASD would not comment on Williams, citing a law enforcement matter.  Last week, TechCrunch reported that Williams had fired a Trenchant developer earlier this year who was suspected of stealing Chrome zero-days. The former Trenchant employee told TechCrunch that he never had access to those tools, as he worked on developing iOS zero-days. Other of his former colleagues supported his account. “I know I was a scapegoat. I wasn’t guilty. It’s very simple,” the exploit developer told TechCrunch. “I didn’t do absolutely anything other than working my ass off for them.”  This story was updated with the response from Williams’ attorney John Rowley. Topics cybercrime, cybersecurity, department of justice, L3Harris, Security, Spyware, Trenchant, U.S. Department of Justice, Zero-days Lorenzo Franceschi-Bicchierai Senior Reporter, Cybersecurity Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy. You can contact or verify outreach from Lorenzo by emailing lorenzo@techcrunch.com, via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram. View Bio October 27-29, 2025 San Francisco Save 50% on your Disrupt pass TechCrunch Disrupt 2025 is live! Join 10,000 founders, investors, and tech leaders — and save when you come together to the tech epicenter of the year. Save Now Most Popular VC Vinod Khosla says the US government could take 10% stake in all public companies to soften the blow of AGI Sarah Perez

OpenAI offers free ChatGPT Go for one year to all users in India Jagmeet Singh

OpenAI says over a million people talk to ChatGPT about suicide weekly Maxwell Zeff

Rivian will pay $250M to settle lawsuit over R1 price hike Sean O'Kane

20-year-old dropouts built AI notetaker Turbo AI and grew it to 5 million users Tage Kene-Okafor

Instagram users can now use Meta AI editing tools directly in IG Stories Lauren Forristal

Two days after OpenAI’s Atlas, Microsoft relaunches a nearly identical AI browser Russell Brandom