A high-ranking executive at a US-based defense contractor, L3Harris Trenchant, has pleaded guilty to selling sensitive trade secrets to a Russian firm. The defendant, Peter Williams, was the director of the company's cyber division before he resigned in mid-August.
According to prosecutors, Williams stole eight trade secrets from two companies and sold them to a buyer in Russia between April 2022 and August 2025, while employed at L3 Trenchant. The stolen secrets were worth at least $1.3 million, with Williams reportedly making significant profits from the sales.
The Russian company that bought the secrets was described as a software broker, purchasing zero-day vulnerabilities and exploits from researchers and selling them to other companies and "non-NATO countries." While prosecutors did not name the specific companies or whether the buyer was connected to the Russian government, they alleged that Williams used encrypted email accounts under a fake name to negotiate deals for the software secrets.
Williams' plea deal calls for him to face between 87 and 108 months in prison, fines of up to $300,000, and pay restitution of $1.3 million. As part of his sentence, he will remain on house confinement at his apartment, undergo electronic monitoring, and be allowed to leave his home for one hour each day.
L3Harris Trenchant, the company where Williams worked, faces no criminal liability in connection with the alleged leak of its hacking tools by employees. The investigation into the leak is ongoing, and Williams oversaw the initial investigation before he was questioned by FBI agents.
Williams' case highlights the growing concern about the theft of sensitive technology by US companies and their employees selling it to foreign firms. The incident also underscores the importance of robust cybersecurity measures and internal controls to prevent such leaks from occurring in the first place.
According to prosecutors, Williams stole eight trade secrets from two companies and sold them to a buyer in Russia between April 2022 and August 2025, while employed at L3 Trenchant. The stolen secrets were worth at least $1.3 million, with Williams reportedly making significant profits from the sales.
The Russian company that bought the secrets was described as a software broker, purchasing zero-day vulnerabilities and exploits from researchers and selling them to other companies and "non-NATO countries." While prosecutors did not name the specific companies or whether the buyer was connected to the Russian government, they alleged that Williams used encrypted email accounts under a fake name to negotiate deals for the software secrets.
Williams' plea deal calls for him to face between 87 and 108 months in prison, fines of up to $300,000, and pay restitution of $1.3 million. As part of his sentence, he will remain on house confinement at his apartment, undergo electronic monitoring, and be allowed to leave his home for one hour each day.
L3Harris Trenchant, the company where Williams worked, faces no criminal liability in connection with the alleged leak of its hacking tools by employees. The investigation into the leak is ongoing, and Williams oversaw the initial investigation before he was questioned by FBI agents.
Williams' case highlights the growing concern about the theft of sensitive technology by US companies and their employees selling it to foreign firms. The incident also underscores the importance of robust cybersecurity measures and internal controls to prevent such leaks from occurring in the first place.