Peter Williams, a former general manager at U.S. defence contractor L3Harris, has been sentenced to seven years in prison for stealing and selling his company's sensitive hacking and surveillance tools to a Russian broker. The 39-year-old Australian citizen, who resides in Washington, D.C., pleaded guilty last year to selling seven Trenchant trade secrets.

The sentencing, first reported by Bloomberg and Cyberscoop, took place on Tuesday. The U.S. Treasury Department confirmed the recipient of the stolen tools was the Russian company Operation Zero, against which it simultaneously announced sanctions.

High-Value Tools for Global Surveillance

Williams was the general manager of Trenchant, a division of L3Harris that develops and sells advanced cyber tools, often called zero-days, exclusively to the U.S. government and its closest intelligence allies in the Five Eyes alliance. The U.S. Department of Justice stated the stolen software could have allowed the end user to "potentially access millions of computers and devices around the world."

According to court documents, Williams admitted to making approximately $1.3 million in cryptocurrency from the illicit sales, which occurred between 2022 and 2025. He previously worked for an Australian spy agency and the country's military before joining the private sector.

Operation Zero's Business Model

Operation Zero is a Moscow-based broker that offers millions of dollars for details of security vulnerabilities in major platforms, including Android and iPhone operating systems and apps like Telegram. The company claims to resell the acquired hacking tools exclusively to the Russian government and local companies, positioning itself as a conduit for state-aligned cyber capabilities.

The U.S. Treasury's sanctions announcement directly links the company to receiving the stolen Trenchant trade secrets, highlighting the national security implications of the breach.

Legal Proceedings and Company Response

Neither L3Harris nor Williams' legal representatives responded to immediate requests for comment following the sentencing. The case underscores ongoing concerns about the security of sensitive cyber weapons within the defence industrial base and the lucrative black market for such capabilities.

Prosecutors emphasised the severe risk posed by the theft, given the powerful nature of the tools designed for government intelligence operations. The seven-year sentence reflects the gravity of the offence in compromising U.S. and allied security assets.