Back to news

January 31, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

‘The math doesn’t make sense’: Why venture capital firms are wary of defense-focused investments

By: Aaron Mehta

WASHINGTON — In American's technology marketplace, venture capital funds are crucial for pumping capital into small companies in need of cash infusions to keep operating. Part of the venture capital model is acknowledging that many of those businesses will fail, but if a few are successful, venture capitalists can make huge returns on their investments.

At a time when the Pentagon is working hard to entice small technology companies to work on defense projects, venture capital, or VC, funding could further mature technology and give entrepreneurs a chance to keep projects going. And yet, investors seem wary of putting forth cash to support companies with a defense focus.

Why? In the wake of the very public fight inside Google over working with the Pentagon — which ended with the company pulling the plug on its Project Maven participation — there was a consensus from the defense establishment that there may be a culture gap that is simply too large to overcome. But according to a trio of venture capitalists who spoke to Defense News in December, the reasons are simpler.

Katherine Boyle, with VC firm General Catalyst, said the culture issue is overblown for the VC community. The reluctance to work on defense programs comes down to a mix of “math and history," she said.

"The math is the reason why investors are hesitant to put a third of their fund into these types of technologies because history shows us that they haven't worked out well,” Boyle explained.

She said the math can be broken down into three factors: mergers, margins and interest rates.

On the first, she pointed to the fact that the defense sector has seen thousands of firms exit the market, sometimes because of acquisitions by primes. But, she argued, where mergers and acquisitions tend to occur in other parts of the world to acquire new technology or capability, in the defense realm it's all about contracting value. That makes it “very difficult for new technologies to enter the market and ultimately be acquired at the valuations that venture investors would need to see in order to have a return for their fund.”

In terms of margins, Boyle pointed out that defense firms are very focused on hardware, which requires a lot of investment upfront. That makes it “very difficult to invest in for venture capital firms because software has 80 percent margins, and it's much easier to build a company that can scale very quickly if it's software-based versus needing a lot of capital,” she said.

The third factor, interest rates, ties into the last two. For decades interest rates have allowed VC firms to expand dramatically — something that requires a constant flow of return from investments in order to turn around funds and quickly invest in another opportunity. In the world of defense, investors with $3 billion to $5 billion under management by the VC community will find it difficult to get the kind of returns investors are accustomed to from other markets.

All three of those factors come together in a mix that means there are very few chances for VC firms to invest in defense-related companies that match up with what a VC traditionally wants to see, said John Tenet, a partner with investment firm 8VC and vice chairman of the defense company Epirus.

“VC investors invest based on speed and scale and probability of a 10 to 20 times return. And so I think that's where you've seen a little bit of apprehension, at least in [Silicon] Valley,” Tenet said. “The exits haven't been that fast, and you sort of have these five big players on one side [that] sort of monopolize the market.”

From a pure numbers standpoint, a good benchmark for performance is to look at the S&P 500, according to Trae Stephens, co-founder and chairman of Anduril Industries and partner at Founders Fund. Over a 10-year period, an investor in the S&P can expect to get roughly 3 times their investment back. VC firms want to be able to beat that for an investment to be worth it.

To highlight the challenge of attracting VC funding to defense firms with potentially limited return, Stephens pointed to the case of Blackbird Technologies. A venture-backed player in specialized communications tech aimed at the defense market, Blackbird was bought in 2014 by Raytheon for about $420 million. That looks good on paper, but the reality is the churn isn't strong enough for a big, Silicon Valley-based venture capital group.

“A lot of times in the government, people say: ‘Oh, Blackbird is this, like, great example of a success story that was like a boost for venture.' It's actually not. It's not a venture scale of return for most funds,” he said. “There are some funds where the economics of [an exit that size] is really good, but for large, Silicon Valley tier-one funds, it doesn't move the needle. And so you have to have these multibillion-dollar opportunities in order for it to really make economic sense.”

Another issue raised by Stephens will be familiar to defense primes as well: concerns over sharing intellectual property with the Defense Department.

The department is essentially saying “you are the right product for us, now turn over your source code,” Stephens said. “It's crazy. We're literally doing to our companies in America what we're criticizing the Chinese for doing to their companies and to our companies when we enter that market. And so there has to be a better commercial practice for enabling companies to retain their IP and do business with the government without having to fight a legal battle every time they go through a contract.”

‘Knock down the doors'

Despite those concerns, all three venture capitalists that spoke to Defense News are involved in investments in defense-focused firms. So why are they spending their money in the sector? Mission is part of it — the belief that, as Americans, a stronger Defense Department benefits their firms.

But that only goes so far if dollars don't follow.

Once again, it comes down to math. Investing in a company focused on defense technologies, which may have to wait years to secure a contract with the Pentagon, isn't a great strategy for a VC firm looking for quick returns. But if a company is able to get government funding early on, the business suddenly becomes more worthy of investment, said Boyle.

“If the government is allocating capital in the right way, it will get VC dollars immediately. Like, it will follow so quickly,” Boyle said. “I see so many people come in to our office and they have an OTA [other transaction authority contract], and they're excited. It's a small, $1 million contract, and that is great for a seed company. But if that same company came in 18 months later and said, ‘Oh, by the way, the OTA has turned into a $10 million contract,' that would meet every milestone that I usually see to series A.” (An OTA is a type of contract that enables rapid prototyping; series A financing is the investment that follows growth from initial seed capital used to launch operations.)

“$10 million to the US government is nothing, but to [a] startup — $10 million is the best startup I've seen all year, if they're an 18-month-old startup and they're getting that kind of capital early on,” she said.

Added Stephens: “It means they're doing something right.”

That creates a chicken and egg scenario: Venture capitalists only want to invest in companies that already have a Pentagon contract, but small firms often can't keep the doors open long enough without external funding while waiting for the department's contracting processes to progress. While groups such as the Defense Innovation Unit — the Pentagon's technology hub — are helping speed along that process, it remains a problem with no easy solution, at a time when the Pentagon needs the nondefense technology community in ways it hasn't for decades.

Boyle believes there is a “growing group” of investors who see the strong success of a handful of companies like goTenna, Anduril or Shield AI that have managed to break through and become successful defense-focused investment vehicles. That means the next few years are going to be critical for everyone involved.

“None of us would be here if we weren't optimistic,” she said. “I actually think this is an incredible time to be investing in deep tech, particularly deep-tech companies that are selling to the Department of Defense because if it doesn't happen now, it never will.”

https://www.defensenews.com/smr/cultural-clash/2020/01/30/the-math-doesnt-make-sense-why-venture-capital-firms-are-wary-of-defense-focused-investments/

On the same subject

  • AUKUS countries update rules on sharing defense kit

    August 15, 2024 | International, Naval

    AUKUS countries update rules on sharing defense kit

    The new rules will make it easier for the U.S., U.K. and Australia to share vast amounts of defense equipment.

  • Slovenian firm quietly provides surveillance drones to Ukraine

    October 29, 2023 | International, Aerospace, C4ISR

    Slovenian firm quietly provides surveillance drones to Ukraine

    Slovenian drone maker C-Astral recently provided Belin or Bramor C4EYE drones to Ukrainian troops, Defense News has learned.

  • Cyber Command will get a new version of its training platform this fall

    July 9, 2020 | International, C4ISR, Security

    Cyber Command will get a new version of its training platform this fall

    Mark Pomerleau U.S. Cyber Command's new training platform is slated to deliver the second iteration this fall providing additional capabilities and user capacity, program officials said. The Persistent Cyber Training Environment (PCTE) is an online client that allows Cyber Command's warriors to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal. The program is being run by the Army on behalf of the joint cyber force and Cyber Command. Officials delivered the first version of the program to Cyber Command in February and the environment was used for the first time in Cyber Command's premier annual tier 1 exercise Cyber Flag in June. The second version is expected to include additional capabilities, including allowing more users to conduct team or individual training. “Things like to be able to schedule, have a calendar to be able to auto-schedule things, to be able to allocate resources because right now it's you can get in and you can do it but how do you deconflict? If you're running a team based event across x number of services how does somebody else come in and do an individual training,” Amit Kapadia, chief engineer for the program, told C4ISRNET in an interview. “Do you have the right infrastructure underneath?” Kapadia added that during the COVID-19 pandemic, there was a surge in platform use due to the remote working, thus, by the end of this year, the program seeks to push additional compute and network capabilities. Leaders are targeting final testing in September and then a roll out in late fall for version 2.0. The program has also sought to deliver incremental capability along the way through what it calls cyber innovation challenges. These are competitions to awards and layer new technologies onto the platform. There was a notice informing industry of the fourth such innovation challenge released recently. Officials told C4ISRNET they expect to release a formal solicitation around August, with plans to award contracts by the end of the year or early next year. The officials noted that just like with the previous innovation challenges, there could be multiple vendors awarded and specifically non-traditional defense vendors. Moreover, they also anticipate to continue these challenges for the foreseeable future even when a vendor is selected to be the integrator for PCTE through what's known as the Cyber Training, Readiness, Integration, Delivery and Enterprise Technology (TRIDENT), a contract vehicle to offer a more streamlined approach for procuring the military's cyber training capabilities. The contract is valued at up to $957 million. This approach, officials said, prevents vendor lock and ensures the program is at the tip of the technological spear. The fourth cyber innovation challenge seeks to ask industry for assistance in traffic generation – which means emulating fake internet traffic on the platform – and assessment, which was a key requirement directly from Cyber Command. “I would say what we've been driven towards right now are high priorities coming down from [Cyber Command commander] Gen. [Paul] Nakasone and Cyber Command for things like CMF assessment,” Kapadia said. “They want to be able now ... all these reps and sets that are happening within PCTE, how am I assessing the performance of the individuals in my teams.” An integrated and agile approach Since the platform was delivered to Cyber Command in February, command leaders have officially taken the burden of running training exercises from the program office, freeing it up to focus on pursuing new technologies and fixes as well as the overall acquisition. In the past, the program office worked with specific units to conduct training events in order to stress the platform and gain valuable feedback. Now, Cyber Command has created what is called the Joint Cyber Training Enterprise, which is the non-material companion to the PCTE platform and seeks to operate and synchronize training hosted by PCTE for the joint force. “The JCTE is a lot like the combat training center ops group where they are managing the platform, they are running the platform, they are running the training,” Lt. Col. Thomas Monaghan, product manager of cyber resiliency and training at Program Executive Office Simulation, Training and Instrumentation, told C4ISRNET. “So we delivered the platform to them and they're using it I would probably say on a weekly basis. They're doing cyber training events that we don't manage that anymore. We don't stand them up. The platform is being used, we're able to concentrate on specific capability, platform enhancements.” JCTE has formalized the cyber training and use of the environment while also coordinating which cyber mission force units need to conduct which types of training, something the program office wasn't equipped to do. Monaghan said his office is in almost hourly, or at least daily, contact with JCTE to better understand what users like, don't like or needs to be fixed. “We've got the program office, we've got the user community, we've got the operational arm of the user community, which is JCTE, we've got the Army capability manager codifying the requirements all working together. We literally talk to each other at least daily,” Monaghan said. “That direct feedback loop is one continuous circle of information. That's the only way a program this robust can be successful.” Program officials said they gained valuable insights from the recently concluded Cyber Flag, which created roughly six months worth of data. They explained that while not every element worked exactly as planned, the nature of the program allows for incremental and ongoing adjustments to be made. By leveraging specific flexible acquisition tools, the program is not as rigid as other typical military platforms, such as tanks. “It's a perfect one for PCTE because it created that box basically saying in laymen's terms we have no idea what this specifically looks like but we have some eye level things that it should do,” Liz Bledsoe, deputy product manager, told C4SIRNET, regarding the types of acquisition mechanisms PCTE is being run under. Monaghan added: “That's the way the platform and the program were structured when the requirements were written, some of them were listed as evolving or threat based or capability ... They're ever evolving, ever enhancing based off the needs of the cyber mission force.” https://www.c4isrnet.com/cyber/2020/07/07/cyber-command-will-get-a-new-version-of-its-training-platform-this-fall/

All news