An Australian national who previously served as a general manager at an American cybersecurity firm has been sentenced by the U.S. District Court for the District of Columbia to 87 months in prison for selling his employer’s trade secrets to a foreign nation. Peter Williams was charged last year with selling sensitive and protected cyber-exploit components to a Russian cyber-tools broker.

Williams, who pleaded guilty to two counts of theft of trade secrets last October, was previously a general manager of Trenchant, a subsidiary of U.S. defense contractor L3Harris. He had admitted to stealing eight cyber-exploit components between 2022 and August 2025.

“Williams exploited his senior role at a U.S. defense contractor to enrich himself at the expense of the United States and his employer,” said Assistant Attorney General for National Security John A. Eisenberg. “The tools he compromised were intended to protect this Nation; instead, he auctioned them off to a Russian bidder. We are committed to ensuring that those who abuse their access to sensitive information and thereby harm our national security face severe consequences.”

In addition to the 87-month prison term, U.S. District Court Judge Ali Khan for the District of Columbia also sentenced Williams to serve three years of supervised release with special conditions. In addition, the former cybersecurity manager will forfeit a money judgment of $1.3 million, cryptocurrency, and property, including a house and luxury items such as watches and jewelry.

A restitution hearing is scheduled for May 12.

Williams and Operation Zero

Although the DOJ didn’t disclose which companies’ trade secrets were stolen, TechCrunch reported that Williams was paid upwards of $1.3 million in crypto and had sold exploits to Operation Zero, described as “one of the world’s most nefarious exploit brokers.”

Operation Zero, which is also known as OpZero, is a Russia-based exploit broker network. The group, which is allegedly managed by Sergey Sergeyevich Zelenyuk, purchases and sells high-end zero-day vulnerabilities and spyware to intelligence agencies and other actors. It was sanctioned by the U.S. Treasury in February 2026 for threatening national security.

Yet, following William’s conviction, there are still unanswered questions.

Chief among them is whether Operation Zero even knew Williams’ actual identity. It also remains unclear which tools Williams had stolen and sold, even as Trenchant estimated it lost $35 million.

Williams’ lawyers claimed the stolen tools were not classified as a government secret, TechCrunch added.

The DOJ stated that Williams’ conduct impacted the U.S. government and allied government customers, including Australia.

“Peter Williams stole a U.S. defense contractor’s trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence and Espionage Division. “The FBI and our partners remain unwavering in our commitment to protecting America’s critical technologies, and we will ensure any who attempt to profit at our nation’s expense face the full weight of the criminal justice system. Let this be a clear warning to all who consider placing greed over country: If you betray your position of trust and sell sensitive American technology to our foreign adversaries, the FBI will not rest until you’re brought to justice.”

Williams and Trenchant

As previously reported last year, Williams was hired as the company’s general manager on October 23, 2024, and served until August 21, 2025.

He was reportedly known inside the company as “Doggie.”

Trenchant was founded following the 2018 L3Harris acquisitions of Azimuth Security and Linchpin Labs, a pair of Australian startups that developed zero-day software vulnerabilities and supplied them to the Five Eyes, the intelligence-sharing group comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. Such technologies are considered valuable assets within the intelligence community (IC) and are tightly controlled due to their national security implications.

TechCrunch previously reported that Trenchant has been investigating a leak of its hacking tools, but it is unclear if that is related to the accusations against Peter Williams. The hacking tools were described as being “capable of exploiting vulnerabilities in Google Chrome.”

Another Trenchant employee had been previously fired by Williams, reportedly for stealing and leaking code. Williams’ layers maintained the individual was fired for misconduct, but the DoJ has claimed “Williams stood idly by while another employee of the company was blamed for [his] own conduct.”

Neither Trenchant nor its parent company, the Melbourne, FL-based L3Harris, has been accused of any wrongdoing in the federal complaint.

 

Related News

Peter Suciu is a freelance writer who covers business technology and cyber security. He currently lives in Michigan and can be reached at petersuciu@gmail.com. You can follow him on Twitter: @PeterSuciu.