Feeds

Lenovo hires ex-CIA bod to push through Moto deal

Lobby, lobby, lobby!

High performance access to file storage

Lenovo has hired former CIA and Homeland Security legal wonks to help push through its deals to buy Motorola Mobility and IBM’s x86 server business with US regulators, according to Bloomberg.

The Chinese outfit is spending $US5 billion on the two big name acquisitions to become a top three player in both markets.

People familiar with the matter told the newswire that it has acquired the services of Steptoe & Johnson LLP to deal with the Motorola purchase and guide it through the Committee on Foreign Investment in the US (CFIUS).

Partners Stewart Baker, who was apparently at the department for Homeland Security and Stephen Heifetz, who’s held positions at the Justice Department, Homeland Security and the CIA, will be taking a lead role.

Meanwhile, Covington & Burling LLP partners David Fagan and Mark Plotkin will be advising Lenovo in its bid to get the IBM server buy approved by the CFIUS – an influential agency which investigates the national security implications of foreign purchases of US firms.

Plotkin is well versed in this area, having represented IBM when it sold its PC division to Lenovo.

Lenovo will want to avoid the kind of negative scrutiny that scuppered proposed purchases by Chinese telecoms kit-maker Huawei for server firm 3Leaf and network infrastructure biz 3Com.

Congress has also effectively barred the firm and its neighbour ZTE from competing in the US network infrastructure market over “national security” concerns.

However, Lenovo is at an advantage – at least with the Motorola deal – in that mobile handsets are considered critical national infrastructure and are therefore less likely to attract government scrutiny.

IDC senior research manager, Melissa Chau, told The Reg that both proposed acquisitions should get the green light without any major issues.

“Lenovo is in quite a different position from Huawei in that some US government departments already use ThinkPads, so it has a proven track record of trustworthiness,” she argued.

However, Lenovo has not been always been able to avoid controversy.

Last year an Australian Financial Review story claimed that intelligence agencies in the "Five Eyes" countries of the US, UK, Australia, New Zealand and Canada have banned the use of Lenovo products since the mid-2000s after tests found serious backdoor vulnerabilities.

Lenovo couldn’t immediately be reached for comment. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.