An Australian cybersecurity executive has pleaded guilty in a US court to stealing and selling highly sensitive defence software to a Russian cyber-broker. The case, described by US authorities as a “betrayal of national security”, involves stolen cyber tools worth tens of millions of dollars and marks one of the most serious insider breaches in recent years.
Case overview
Peter Joseph Williams , 39, an Australian national and former executive at defense contractor L3Harris, pleaded guilty before the US District Court in Washington, D.C., to two counts of theft of trade secrets.
According to the US Department of Justice (DOJ), Williams “stole and resold” software components designed for national security purposes, including at least eight sensitive and protected cyber-exploit tools. These were meant to be sold “exclusively to the US government and select allies,” prosecutors said.
The material, stolen over a three-year period between 2022 and 2025, was sold to a Russian cyber-tools broker that publicly advertises itself as a reseller of exploits to various customers, including the Russian government.
Each charge carries a statutory maximum of 10 years in prison and a fine of up to $250,000 or twice the pecuniary gain or loss resulting from the offence.
How the espionage unfolded
According to court documents and Williams’s signed plea, he exploited his security clearance and access to his employer’s restricted digital infrastructure to copy classified material. He then sold the stolen components to a Russian broker in exchange for cryptocurrency, receiving around $ US 1.3 million (A$2 million) for his role in the scheme.
Prosecutors said Williams used an alias, John Taylor, to conceal his identity and maintain encrypted communication channels with the Russian buyer. The contracts he signed involved both upfront and periodic payments for continued technical support.
Assistant US Attorney Tejpal Chawla , one of the lead federal prosecutors handling the case in the District of Columbia, told the court that the stolen software “was supposed to be sold exclusively to the US government and select allies,” adding that Williams’s actions “ had affected intelligence communities in Australia and the United States.”
Court documents estimate the losses to the Washington D.C.–based defence company at $US35 million, with the stolen tools believed to have been resold to non-allied cyber actors “likely used against numerous unsuspecting victims.”
Court proceedings and prosecution’s argument
During the plea hearing, Williams appeared subdued, bowing his head as prosecutors detailed his actions. He admitted to stealing the data, transferring it via encrypted means, and using the proceeds to purchase high-value luxury items, including jewellery, watches, and designer accessories.
Authorities have since seized his Washington D.C. residence, funds from multiple accounts, and a collection of 22 watches — five of which were counterfeit Rolexes.
Judge Loren AliKhan , who presided over the hearing, warned Williams that “it’s very important no-one has promised you anything about what I’m going to do [in sentencing],” noting that deportation would follow any custodial sentence.
Williams remains under home detention in Washington D.C. until sentencing on 27 January, where he faces over a decade in prison. His lawyer, John Rowley, told ABC outside court: “Oh, he’s going to get a custodial sentence.”
Government reaction and statements
US government officials issued a series of forceful statements following Williams’s guilty plea, condemning his actions as a grave betrayal of national security.
US Attorney-General Pamela Bondi said:
“America's national security is NOT FOR SALE, especially in an evolving threat landscape where cybercrime poses a serious danger to our citizens. Thank you to all the attorneys who worked so hard to secure this guilty plea.”
Assistant Attorney General for National Security John A. Eisenberg added:
US Attorney for the District of Columbia Jeanine Ferris Pirro, in an official statement from the Justice Department, described the incident as part of a broader threat landscape.
FBI Counterintelligence Division Assistant Director Roman Rozhavsky said:
Separately, FBI agent Alexander Arnott added in a statement:
Who is Peter Williams
Williams has a long background in cybersecurity and intelligence, having previously worked for both public and private sector organisations in Australia and the United States. Multiple sources confirmed to ABC that he had worked for the Australian Signals Directorate (ASD) during the 2010s.
The ASD is responsible for foreign signals intelligence, cybersecurity, and offensive cyber operations under government direction.
Before his arrest, Williams served as general manager of Trenchant, a defence subcontractor that develops hacking tools and software for the Five Eyes intelligence network, comprising Australia, New Zealand, the United Kingdom, the United States, and Canada.
His crimes, prosecutors argued, represented a profound breach of trust, not only against his employer but also against the security partnership linking those allied nations.
Next steps and sentencing
Williams is scheduled for sentencing on 27 January 2026, with prosecutors recommending a sentence exceeding 10 years under US federal guidelines. The presiding judge has discretion to impose a longer term.
Authorities emphasised that the plea agreement ensures accountability for “insiders who compromise national security for profit,” with all proceeds of the crimes subject to seizure.
The case is being prosecuted by Assistant US Attorneys Tejpal Chawla and Jason McCullough for the District of Columbia, Trial Attorney Prava Palacharla for the National Security Division’s (NSD) National Security Cyber Section, and Trial Attorney Nicholas Hunter for NSD’s Counterintelligence and Export Control Section.
Case overview
Peter Joseph Williams , 39, an Australian national and former executive at defense contractor L3Harris, pleaded guilty before the US District Court in Washington, D.C., to two counts of theft of trade secrets.
According to the US Department of Justice (DOJ), Williams “stole and resold” software components designed for national security purposes, including at least eight sensitive and protected cyber-exploit tools. These were meant to be sold “exclusively to the US government and select allies,” prosecutors said.
The material, stolen over a three-year period between 2022 and 2025, was sold to a Russian cyber-tools broker that publicly advertises itself as a reseller of exploits to various customers, including the Russian government.
Each charge carries a statutory maximum of 10 years in prison and a fine of up to $250,000 or twice the pecuniary gain or loss resulting from the offence.
How the espionage unfolded
According to court documents and Williams’s signed plea, he exploited his security clearance and access to his employer’s restricted digital infrastructure to copy classified material. He then sold the stolen components to a Russian broker in exchange for cryptocurrency, receiving around $ US 1.3 million (A$2 million) for his role in the scheme.
Prosecutors said Williams used an alias, John Taylor, to conceal his identity and maintain encrypted communication channels with the Russian buyer. The contracts he signed involved both upfront and periodic payments for continued technical support.
Assistant US Attorney Tejpal Chawla , one of the lead federal prosecutors handling the case in the District of Columbia, told the court that the stolen software “was supposed to be sold exclusively to the US government and select allies,” adding that Williams’s actions “ had affected intelligence communities in Australia and the United States.”
Court documents estimate the losses to the Washington D.C.–based defence company at $US35 million, with the stolen tools believed to have been resold to non-allied cyber actors “likely used against numerous unsuspecting victims.”
Court proceedings and prosecution’s argument
During the plea hearing, Williams appeared subdued, bowing his head as prosecutors detailed his actions. He admitted to stealing the data, transferring it via encrypted means, and using the proceeds to purchase high-value luxury items, including jewellery, watches, and designer accessories.
Authorities have since seized his Washington D.C. residence, funds from multiple accounts, and a collection of 22 watches — five of which were counterfeit Rolexes.
Judge Loren AliKhan , who presided over the hearing, warned Williams that “it’s very important no-one has promised you anything about what I’m going to do [in sentencing],” noting that deportation would follow any custodial sentence.
Williams remains under home detention in Washington D.C. until sentencing on 27 January, where he faces over a decade in prison. His lawyer, John Rowley, told ABC outside court: “Oh, he’s going to get a custodial sentence.”
Government reaction and statements
US government officials issued a series of forceful statements following Williams’s guilty plea, condemning his actions as a grave betrayal of national security.
US Attorney-General Pamela Bondi said:
“America's national security is NOT FOR SALE, especially in an evolving threat landscape where cybercrime poses a serious danger to our citizens. Thank you to all the attorneys who worked so hard to secure this guilty plea.”
Assistant Attorney General for National Security John A. Eisenberg added:
“Williams betrayed the United States and his employer by first stealing and then selling intelligence-related software to a foreign broker that touted its ties to Russia and other foreign governments. His conduct was deliberate and deceitful, imperilling our national security for the sake of personal gain. Today’s guilty plea reflects our commitment to ensuring that insiders who abuse their positions of trust face serious consequences.”
US Attorney for the District of Columbia Jeanine Ferris Pirro, in an official statement from the Justice Department, described the incident as part of a broader threat landscape.
“We continue to vigorously investigate those who betray our national security by selling valuable US trade secrets to international cyber brokers who support foreign cyber actors. These international cyber brokers are the next wave of international arms dealers and we continue to be vigilant about their activities. The conduct here caused over $35 million of loss to a company in the District of Columbia and allowed non-allied foreign cyber actors to obtain sophisticated cyber exploits that were likely used against numerous unsuspecting victims.”
FBI Counterintelligence Division Assistant Director Roman Rozhavsky said:
“Williams placed greed over freedom and democracy by stealing and reselling $35 million of cyber trade secrets from a US cleared defence contractor to a Russian Government supplier. By doing so, he gave Russian cyber actors an advantage in their massive campaign to victimise US citizens and businesses. This plea sends a clear message that the FBI and our partners will defend the homeland and bring to justice anyone who helps our adversaries jeopardise US national security."
Separately, FBI agent Alexander Arnott added in a statement:
“Peter Williams betrayed the United States and our allies by selling trade secrets. The harm caused by his crimes cannot be undone. The FBI and our partners will aggressively investigate and hold accountable anyone who threatens US national security.”
Who is Peter Williams
Williams has a long background in cybersecurity and intelligence, having previously worked for both public and private sector organisations in Australia and the United States. Multiple sources confirmed to ABC that he had worked for the Australian Signals Directorate (ASD) during the 2010s.
The ASD is responsible for foreign signals intelligence, cybersecurity, and offensive cyber operations under government direction.
Before his arrest, Williams served as general manager of Trenchant, a defence subcontractor that develops hacking tools and software for the Five Eyes intelligence network, comprising Australia, New Zealand, the United Kingdom, the United States, and Canada.
His crimes, prosecutors argued, represented a profound breach of trust, not only against his employer but also against the security partnership linking those allied nations.
Next steps and sentencing
Williams is scheduled for sentencing on 27 January 2026, with prosecutors recommending a sentence exceeding 10 years under US federal guidelines. The presiding judge has discretion to impose a longer term.
Authorities emphasised that the plea agreement ensures accountability for “insiders who compromise national security for profit,” with all proceeds of the crimes subject to seizure.
The case is being prosecuted by Assistant US Attorneys Tejpal Chawla and Jason McCullough for the District of Columbia, Trial Attorney Prava Palacharla for the National Security Division’s (NSD) National Security Cyber Section, and Trial Attorney Nicholas Hunter for NSD’s Counterintelligence and Export Control Section.
You may also like

Who is the highest paid FaZe Clan member?

Mumbai hostage scare: What accused Rohit Arya said in chilling video — his demands & motive revealed

Labour deputy mayor caught attending 'intimidating' jihadi-style flag rally in London

PM Modi meets Sardar Patel's family ahead of 'Rashtriya Ekta Diwas' celebrations in Gujarat tomorrow

Rachel Reeves slammed ahead of Budget as Labour 'prey on the elderly'




