Tech

Former L3Harris Executive Accused of Selling U.S. Cyber Secrets to Russia for $1.3 Million

Former L3Harris Executive Accused of Selling U.S. Cyber Secrets to Russia for $1.3 Million
U.S. prosecutors have charged a former executive of a government-linked cybersecurity firm with selling trade secrets to a buyer in Russia for more than $1.3 million, raising fears of potential exposure of American cyber intelligence systems. According to court documents filed on October 14 in the U.S. District Court for the District of Columbia, Peter Williams is accused of stealing eight trade secrets belonging to two unidentified companies between April 2022 and June 2025. Prosecutors allege that the stolen data contained classified information about tools used by federal intelligence and defense agencies. While the filing did not identify where Williams was employed at the time of the theft, public records in the United Kingdom list him as the general manager of L3Harris Trenchant, a cyber intelligence subsidiary of the defense contractor L3Harris Technologies (NYSE: LHX). Williams served as general manager of L3Harris Trenchant from October 2024 until his resignation on August 21, 2025, according to British business filings. L3Harris Trenchant develops advanced cybersecurity and hacking tools used by U.S. government agencies to conduct national security operations, including counterintelligence and digital forensics. L3Harris Technologies confirmed that Trenchant is one of its subsidiaries but declined to comment on the allegations. The company, however, is reportedly conducting an internal investigation into a possible data leak involving some of its hacking technologies, according to a report from TechCrunch. The accusations have alarmed cybersecurity professionals and government officials, as they suggest that a Russian buyer may have obtained sensitive details about U.S. cyber capabilities. If proven true, the breach could enable foreign adversaries to reverse-engineer American cyber tools, uncovering weaknesses or even repurposing them for their own use. Experts warn that the case highlights the persistent challenge of insider threats—individuals with authorized access who exploit their positions for personal or financial gain. In industries tied to national defense, such actions can have long-lasting repercussions. Russia has a long history of involvement in cyber espionage targeting the United States and its allies. The potential transfer of such advanced cyber tools could bolster Moscow’s defensive posture or aid in future cyberattacks against Western networks. According to the court filing, Williams allegedly earned about $1.3 million from selling the stolen data to the Russian buyer. Federal authorities have requested the forfeiture of his assets, including a Washington, D.C. residence and several luxury watches and pieces of jewelry believed to have been purchased with proceeds from the illicit transactions. While prosecutors have not disclosed how Williams made contact with the buyer or the exact nature of the stolen information, the case falls under the Economic Espionage Act, which criminalizes the theft or sale of trade secrets for the benefit of a foreign government or entity.