1 / 6

National Security and Foreign Ownership

National Security and Foreign Ownership. Arun Sood. Types of companies. International companies Operations in multiple companies HQ in US, but foreign ownership Non-US citizens Foreign born US citizens HQ in an allied country. Why are companies interested?. Technology, access to capital

Download Presentation

National Security and Foreign Ownership

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. National Security and Foreign Ownership Arun Sood

  2. Types of companies • International companies • Operations in multiple companies • HQ in US, but foreign ownership • Non-US citizens • Foreign born US citizens • HQ in an allied country

  3. Why are companies interested? • Technology, access to capital • Exclusively focused on defense market • Growth potential • Promotes relationships • Small part of business • Usually through acquisition • Early adopters • Security hardening of apps • Helps in civilian government & commercial sales • Less travel

  4. Why does the government contract with such companies? • Access to tested technology • Best product at lowest cost • Increase competition • Build relationships with allies • Indirectly promotes US arms sales • Continuity of operations

  5. Organizational Issues • Clearances required • CEO, “n” members of board • Board given limited access to info • Disputes, mergers and acquisition • Most financial • No different than privacy constraints in HIPPA • Rigid firewalls

  6. Exports and Imports • Export Control regulations • International Trade in Arms Regulations (ITAR) • Imports • Outsourcing of HW and SW • Lenovo • Leaning towards COTS, but…

More Related