No items found.
MAY 19th, 2022
It’s time for new M&A ideas to bloom, register for the M&A Science Spring Summit on May 19th!
Register Now!

Hostile Takeovers: The Dark Side of M&A

Nitin Kumar
Chief Executive Officer at Appnomic
Nitin Kumar
Chief Executive Officer at Appnomic

Hostile M&A has been part of the transaction space for decades and was especially popular in the late 1900s.

In fact, perhaps you have heard the sometimes soap-opera- like stories behind the AOL-Time Warner hostile takeover, or the InBev and Anheuser-Busch hostile takeover, or more recently the Sanofi-Aventis takeover of Genzyme Corp.

While these takeovers gather a lot of media attention, hostile takeover is generally a space in the M&A world not well understood.

Usually, large companies flush with cash will attempt to take over a promising company to enhance their own position or to simply kill competition.

However, companies and practitioners must remember the intent, be it hostile or friendly, must ultimately create shareholder value.

Together with DealRoom in this article we will explore several attack and defense strategies deployed during hostile M&A.

Introduction

There are multiple mechanisms, such as proxy fights and tender offers, that the Acquirer will leverage during a hostile takeover.

Conversely, there are multiple mechanisms, such as poison pills and the crown jewel, the Target will use as defenses in attempt to thwart hostile takeovers.

What is Hostile Takeover?

A hostile takeover occurs when an acquirer takes over a company without the consent of its management, instead side-stepping the management team to negotiate directly with the company’s shareholders. Hostile takeovers are generally launched after the formal offer has been rejected, and they are mostly applicable to  larger public companies.

what is hostile takeover

Understanding Hostile Takeovers

Hostile takeovers have probably gained an undeserved reputation owing to their name. If the same transaction was termed ‘Direct Shareholder Approach’ (which is effectively what a hostile takeover is), people might view them differently.

There is some debate over whether hostile takeovers add value or not, but one thing is certain: They increase focus.

A hostile takeover forces management and shareholders alike to focus and possible rethink some issues they may have been taking for granted. Questions that can arise during the process include: “are we implementing the wrong strategy?”; “is the company undervalued, and why?” and“could the situation be improved management team?”

The nature of hostile takeovers is that the target company is typically public. Over the past decade or so, they have gained some acceptance among activist shareholders - themselves avowed critics of company management - as they believe the hostile takeover will better reflect the company’s true value.

The operating reality

Even a potential threat of a hostile takeover causes the Target’s board to deploy “killer bees” and develop anti-takeover defences. However, clarity on who to protect, when and how is a key consideration. Courts typically want to balance shareholder and management interest, but this is not possible all the time and often things skew to protecting management at the expense of shareholders.

Shareholders have also pressurized boards of companies like Hewlett-Packard and Bristol-Myers Squibb to weaken their anti-takeover defenses to ensure the balance does not tilt only towards the company management.

All publicly traded companies generally deploy at least one anti-takeover mechanism by adopting shareholder rights plans.

Attack Strategies in Hostile Takeovers

There are a few well known attack techniques when it comes to hostile takeovers.

Typically, the Acquirer begins by sending a letter of intent to buy the company at a higher than market price, commonly called a “bear hug.”

Let us examine a few takeover techniques that tend to follow the “bear hug:”

Dawn raids

A Dawn Raid is the sudden entry into the stock market by the predator Acquirer at a price above the prior market level with the objective to acquire a major stake in a very short time. Often a Dawn Raid leads to further takeover offers or actions within a few days. 

Toehold acquisition

A Toehold Acquisition allows the Acquirer opportunities, such as the opportunity to sue the Target if the takeover attempt derails, through the purchase of the Target’s shares on the open market. 

Tender offer

A premium price offer to the Target’s shareholders is referred to as a tender offer. Tender offers entail a two-trajectory attempt: one front-loaded offer and a second intended offer for acquisition. Furthermore, they are publicly announced. While a tender offer is generally considered a hostile takeover technique, it is not hostile if oriented to create shareholder value, which would often lead to deal approval. 

Creeping tender offer

There is a variant of the tender offer referred to as the “creeping tender offer” during which the Acquirer starts buying stock of the Target at market value until the threshold of control is reached. It is a more gradual process than a tender offer or dawn raid. Additionally, it is cheaper to implement (i.e. no premium purchase price), but  has a higher risk of failure if the controlling threshold is not reached.

Proxy Fight

This technique solicits shareholder’s proxies to vote for insurgent directors on the board or even vote out the current board with the intention of eventually appointing new management and board members who favour the deal. A Proxy Fight is typically accomplished by approaching shareholders owning large blocks of shares individually. Proxy fights can also increase the number of board members who can then sway the voting decisions.

Designing an Effective Attack Strategy

An effective attack strategy for a hostile takeover entails organizing yourself, understanding the Target, evaluating legal pitfalls, preparing the arsenal, disarming defenses, and finally launching the attack using one of the methods mentioned above.

1. Organizing yourself

One must first ask the most important question - have all approaches outside of a costly and time-consuming hostile takeover been explored and exhausted? Compromises, trade-offs, risks, and opportunities all need to be well understood, and clear plans must be drafted to address the inability to conduct proper diligence and/or gain Target cooperation.

2. Understanding opponents

An intricate understanding of the Target needs to be mapped (e.g., shareholders, management, board members, defense mechanisms, public sentiment, and killer bee capabilities). This will help determine the time, cost, and resources of a potential attack  and identify the attack vector to be deployed.

3. Evaluating legal pitfalls

All other things being in place, a deep understanding of restrictions around legal, regulatory, investment, export, and country specific matters must be mapped; tactical mitigation plans must also be created to address items such as change of controls and accelerated options.

4. Preparing the arsenal

The bid arsenal is informed by all the prior stages. It is comprised of designing an effective PR/media campaign, mobilizing professionals required (i.e. lawyers and consultants), and stress testing the timing of the bid. A common practice is to either fully or partially lock-in support agreements as early as possible.

5. Disarming defenses

How do you disarm the Target’s potential defenses? Best practices include: taking steps to maximize shareholder value, tightening arrangements to avoid violating fiduciary duties of the Target board, wargame tripping of each defence mechanism and creating counter strategies. In addition, it is wise to create anti-dilution provisions and test them. 

Designing an Effective Attack Strategy

Finally, pick the right attack strategy for your deal and run a wargaming exercise to test all assumptions at play.

Integration of Hostile Takeovers

However hostile the intent and the transaction process, post-deal is a whole different ball game. The shareholders from both sides want the company to work and generate value.

The new board and shareholders want to create a good foundation for the future. Given the above there are select differences on where integration efforts focus to generate value.

A non-exhaustive list is outlined below:

  • Lack of sufficient pre-deal due diligence presents unknown risks, a rigorous confirmatory due diligence process is a very important step
  • The focus is on generating shareholder value rather than just synergies. While focus on traditional cost and revenue synergies is a given, integration teams must focus on Beta synergies i.e., those value drivers directly impacting the stock price
  • Executive and employee engagement become much more critical than friendly acquisitions; all aspects from training, communication, incentives, retention must have adequate rigor, KPIs and be very outcome focused
  • Communication workstreams need to focus 360 degrees i.e., employees, customers, shareholders, partners, regulators etc.
  • All KPIs and metrics are execution oriented rather than financial e.g., synergies should be tracked on run rate costs rather than EBIT given the former is much more execution oriented
  • When it comes to the integration, prioritize first, stabilize next, revitalize thereafter and continuously evangelize
  • M&A integration efforts are geared towards rigor and execution rather than just speed. For example, one does not measure time to full integration, but KPIs are oriented towards time to shareholder value

Related: Learn all you need to know about post M&A integration. (+Checklist)

Hostile Takeover Vulnerability

Assessment

While a comprehensive vulnerability assessment can be a daunting task, corporate vulnerabilities toward a hostile takeover are also constantly shifting, requiring constant analysis.

They largely fall into three areas:

  • Strategic Attractiveness. A company’s strategic attractiveness is dependent upon several factors, ranging from changing industry dynamics (consolidation), economic cycles, timing, attractiveness of disruptive technology or IP owned, other potential bidders, strategic fit with the Acquirer and/or weak management teams. Of course, there are other factors, such as limited need for due diligence, which can become vulnerabilities. As you can see, the strategic aspects need to be constantly monitored and understood in the context of the possible hostile approaches.
  • Valuation Weakness. The lower valuation compared to peers or own history coupled with credit impact, capital structure, weaker management teams and macro-economic conditions can leave the Target vulnerable to hostile takeovers. Other factors such as currency fluctuations and increased supplier risk also cause valuation related vulnerabilities.
  • Weak Defense Architecture. The obvious aspects of weak defense hinge on the following: existing shareholder mix, defense mechanisms (e.g., change control clauses and shark repellents to name a few), and inadequate response capability to hostile takeovers; these factors can leave companies vulnerable to hostile takeovers.

In addition to the above areas, companies should pay attention to the specific hostile takeover patterns in the market. Many times, these are early warning signs of emerging hostile takeovers.

A non-exhaustive list is as follows:

  • Massive increase in number of small stock transactions
  • Company executives or board become victims of negative publicity
  • Sudden increase of minority shareholders seeking documents
  • Other companies have faced hostile bids or dawn raids
  • Increase in unsolicited offers to sell shares
  • Random rise in inspections seeking customer, creditor, and shareholder information
  • Specific activity in activist investor circles, well known Raiders etc.

Hostile Takeover Defense

In general, there are fewer companies that embark on hostile takeover attempts than companies who have been on the receiving end; therefore, there are historically more avenues to deploy towards defending against these attempts. Defense mechanisms are designed and deployed by organizations by using specialty killer bees and testing periodically.

There are multiple kinds of defensive strategies and tactics deployed in tandem or independently; they can be categorized into preventive defense, active defenses, evasive maneuvers, suicidal defenses, and offensive defenses. While each one has varying degrees of risk, impact, and survival odds,  organizations often enlist a combination of these.

Hostile Takeover Defense

1. Preventive Defense

Preventive defenses are designed to reduce the likelihood of a financially successful hostile takeover, making it more difficult.

They are a combination of early warning signs, tight controls or agreements, and event-based triggers called poison pills. Let us examine a few of them in a bit more detail to understand them better.

1.1 Corporate charter amendments

  • Use staggered board agreements, outlining provisions whereby only one third of the board of directors may be elected each year. This requires shareholder approval to implement and classified directors cannot be removed before their term expires.
  • Design supermajority provisions requiring at least 80% of voting shareholders to approve the takeover, as opposed to a simple 51% majority. This is effective as it can make hostile takeover an uphill battle for predators.
  • Use a fair price provision as a weaker defense through a modification of a corporation’s charter, requiring the Acquirer to pay minority shareholders at least a fair market price for the company’s stock, typically as P/E ratio.

1.2 Tight controls

  • Use clauses called “shark repellents” to trigger change control on stock exchanges as a deterrent.
  • Manage and monitor shareholder mix and trading patterns or anomalies as an early warning sign.
  • Deploy tighter controls on register and debt.
  • Design golden parachutes i.e., change of stock ownership triggers benefits for executives.
  • Deploy dual cap structure,  i.e. different voting rights for different types of stock 

1.3 Poison pills

These are designed by corporations to “poison” the deal and discourage hostile Acquirers by making stock less attractive to Acquirers.

Poison pills were first invented in 1982 to defend El Paso Electric from General American Oil; in fact, the first pill was used by Brown Forman against Lenox in 1983. Subsequently, many variants of poison pills have evolved and been deployed.

The below table outlines key characteristics, execution conditions and impact of these pills.


Hostile Takeover Defense

2. Active Defense

The active defenses are triggered only after the bid has been made. With this timing in mind, they are more reactive, expensive, and risky.

Active defenses also come with higher opportunity costs, making them a significant distraction for executives and boards.

2.1 Litigation

Initiate court proceedings against the hostile Acquirer to stall the bid, increase bid costs, and buy more time to activate other defenses.

To deploy this active defense,Targets must find skeletons in the Acquirer’s closet related to legal, regulatory or securities laws.

2.2 Propaganda

Activate media to trigger public sentiment around opposition rationale; this helps create negativity around the Acquirer’s takeover tactics. We suggest highlighting your country/region specificity and any grey areas as you bring in the media.

2.3 Self-Tender

Self-Tender is, as the name describes, the Target purchasing paid up shares from other shareholders by sums exceeding share capital to increase the relative voting power of friendly shareholders.

2.4 Scorched Earth

Scorched earth is a self-tender offer by the Target, burdening itself with debt.

2.5 Greenmail

Greenmail refers to the payment of a substantial premium for large shareholder stock in return for not initiating a bid for company control. The tax aspects present obstacles for this, as the statute also warrants shareholder approval to repurchase beyond a certain number of shares.

2.6 Standstill Agreement

Standstill agreement is an undertaking by the Acquirer not to acquire any more shares of the Target within a certain time. It should be noted the Standstill Agreement is usually deployed with Greenmail.

3. Evasive Maneuvers

The evasion and negotiation techniques are usually applied along with active defenses; some literature even considers them a subset of active defenses. However, they are applied differently and need bidders, allies, and favorable scenarios to play out.   Let us explore the theory of Knights below.

3.1 White Squire 

A White Squire is a company consenting to purchase a large block of the Target company’s stock. White Squires are typically not interested in acquiring management control of the Target, but are interested in the Target either as an investment or to gain board seats at the Target company. 

3.2 White Knight 

A company which is a more favorable acquirer compared to the Hostile company (Dark Knight). 

3.3 Yellow Knight 

A company once attempting a takeover, but comes back now proposing a merger of equals.

3.4 Grey Knight 

New entrant hostile takeover candidate in addition to the Target firm and first bidder, perceived as more favorable than the Black Knight (remember Black Night  = unfriendly bidder), but less favorable than the White Knight (friendly bidder). 

3.5 Lady Macbeth 

A corporate-takeover strategy by which a third party poses as a white knight to gain trust, but then turns around and joins with unfriendly bidders.

Suicidal Defense

These sort of poison pill defenses are used as deterrents, but are rarely deployed. You can think of suicidal defenses as part of the arsenal, but seldom executed given their destruction of value.

  • People Mail. A blackmail strategy where executives of the Target threaten to resign together if the Raider takes over the company. 
  • Crown Jewel Defense. A strategy where the Target company sells off its most attractive assets to a friendly third party or spins off the valuable assets in a separate entity, thus reducing interest of the hostile entity. 
  • Jonestown Defense. In this extreme version of the “poison pill,” also called the “suicide pill,” the Target undertakes activities that might threaten its own existence to fend off the hostile takeover.

Offensive Defense

These are counterattack moves from the Target aimed at the hostile Acquirer to surprise the Acquirer and thwart its intention.

  • Pac Man Defense. As the name implies, this defense is based on the game “Pac Man” and  the theme of “eat or be eaten.” It occurs when the Target makes an offer to buy the hostile company in response to the hostile bid for the Target.
  • Fat Man Defense. Here the Target company acquires a third company to make the hostile Acquirer’s bid more expensive.
  • Capital Structure Clog. With this strategy, the target corporation initiates various changes to its capital structure to ward off a hostile bidder, e.g. recapitalization, assuming more debt (bonds or bank loans), issuing more shares (ESOP, general shares, white squires) and/or initiating buybacks (self-purchase or open market).

Rapid Defense Response Process

Hostile Takeovers responses need to be rapid, methodical, and timed- they must be undertaken with all stakeholders involved and the first phase of these responses occur within 24 hours.

It is also important that the first few steps of response are not necessarily aimed at defense but acknowledgement.

The first line of approach is the investor relations who will then rally the executives, board, and other supporting professionals.

Rapid Defense Response Process hostile takeover

The above example is merely aimed at education on how a rapid response process works within hours of receiving a bear hug.

A more elaborate response ensues, typically along the layers of the defense architecture outlined before running for weeks, months or even more.

Risks with Defenses

While most, if not all, defenses can counter deals driven by power and greed, they do not necessarily create shareholder value.

If outright hostile takeover has grey areas and questionable ethics, so do many of the defenses involved. I have outlined a select few, which are met with stronger resistance than the others.

  • Capital Structure Clog. High leverage can stress the cash flows of the company, depriving it of financial resources needed to counter unexpected situations, invest in growth, or return shareholder value.
  • Supermajority Provisions. Although they can help in fending off hostile bids, supermajority provisions can also apply to friendly acquisitions, making them difficult to discern; therefore, special clauses need to be built to ease this form of defense. 
  • Golden Parachutes. These are usually met with strong shareholder resistance as they are uncovered through compensation disclosures. Pac Man Defense. A key downfall of this strategy is that it creates no premium to original Target’s shareholders. Moreover,  it is very expensive and can even damage the company. 
  • Crown Jewel Defense. Finally, here you might cause courts to disfavor an asset or crown jewel, locking it up, which will impact the bidding process.

How Can Management Prevent Hostile Takeovers

The best way that management can prevent (rather than respond to) hostile takeovers is strong management, which is focused on generating long-term shareholder value. Many of the hostile takeover defense methods outlined above are self-serving for the managers and unlike strong management, will do little to win the backing of the company’s existing shareholders.

Some aspects of good management in this context include:

  • Well-developed corporate strategy: If the company’s strategy is strong, it minimizes the chances of an outsider coming along with a better one.
  • Fair remuneration: If the current management team are paid in line with their peers, there’s much less scope for an outsider to use their salaries against them.
  • Steady growth: Sluggish share growth is usually used as leverage by hostile bidders. By steadily growing income, share prices will inevitably move, protecting incumbent management.

Examples of Hostile Takeovers

There are many examples of hostile takeovers; in some cases, the bids were successful, while others were fended off due to good defense strategy and execution.

Cadbury Hostile Takeover

Cadbury PLC (“Cadbury’s”) was the darling of the UK confectionary industry when it received a $16.3 billion bid from American conglomerate Kraft Foods Inc. in 2009. Perhaps sensing (correctly) that its hegemony in the UK market was about to be challenged, Cadbury’s chair RogerCarr rejected the offer and immediately put together an in-house defense team. Workers at the company also backed their management against the hostile takeover.

The defense included a presentation made to shareholders shortly after Kraft’s initial bid which outlined why the bid‘ fundamentally undervalued’ the company. Kraft relented, and raised its bid to just under $20 billion in 2010, ultimately managing to bring the company under its portfolio of brands, and gaining huge distribution access to the UK market.Their success ultimately led to an overhaul of the terms under which foreign companies could acquire companies in the UK.

  • Xerox and HP Inc. In November 2019, Xerox (a much smaller company) commenced its hostile takeover bid on HP Inc (considered competition). Xerox made its hostile takeover intention public to confirm its seriousness; HP Inc rejected this offer in March 2020, stating uncertainties and unacceptable conditions. Xerox also stepped back due to the COVID-19 situation; this situation will likely play out sometime in future. 
  • AOL and Time Warner. Generally considered the poster child of failed M&A from every standpoint. The hostile takeover was consummated in 2000 (valued at $164 billion), but the subsequent dot com and telecom bubble bursting led the company to lose $200 billion in value within 24 months.
  • Air Products & Chemicals Inc. and Airgas Inc. The hostile takeover attempt commenced in 2009 and dragged on for two years with Air Products & Chemicals finally ending their attempt in 2011. The court upheld Airgas’s use of a poison pill, but the onus shifted to Airgas to prove it was indeed worth the valuation it claimed. Its performance waned during the great recession and came under considerable media fire. Airgas ultimately exited for 2X the value offered by the hostile bid. Wall Street now holds Airgas as one of the best arguments for management’s right to defend its company.
  • Sanofi Aventis and Genzyme. In 2010, Sanofi’s bid for Genzyme turned hostile after the latter’s board refused the initial terms. Sanofi tendered > $237 m worth of Genzyme shares, resulting in equity ownership of 90%. The deal was eventually consummated in 2011. 
  • KKR and RJR Nabisco. This transaction occurred in 1988 and, at the time, was the largest hostile takeover bid at $25 billion. The fight was bitter and made media headlines regularly;  this was also a leveraged buyout adding to the deal’s complexity. With the takeover, the company was saddled with a huge debt load on their balance sheet. 

Related: Top 5 Hostile Takeover Examples: How it Happened?

Enterprise Defense Architecture

A good defense is built on high valuation, engaged shareholders, and an active board with competent management.

However, there are times even in these cases when systems get out of sync, creating vulnerabilities and distractions.

Hostile takeover attacks or defenses are expensive, time consuming, resource intensive and distracting. The art and science of effective defense is to create more impact or deterrence with limited effort.

A modular defense architecture always helps scale your defenses, one layer at a time. A company should always evaluate the risks, opportunities, and tradeoffs before treading from one layer to the other since both the stakes and risks increase as you go up the stack. 

Companies also fall prey to the classic dilemma that hostile takeovers are not frequent events and hence not worth investing time or money into robust defense mechanisms to combat them.

However, hostile takeover defenses cannot be built or strengthened overnight; rather, this is an ongoing process given the dynamic business environment.

Enterprise Defense Architecture

Based on experience, observation, and analysis, I have developed a framework architecture for defending against hostile takeovers.

While this architecture will not perfectly fit every scenario, it generally works well and is flexible enough to respond to differences within a process given the proper rigor and structure.

I have had the good fortune to implement and test this framework through wargaming at a few corporations in the United States and Canada; however, I believe it can also be adapted to other parts of the world.

Each layer can be considered a standalone lever to employ, or can be used interdependently with other incremental steps towards creating more rigorous defensive positions against hostile takeover intent.

As one moves from the independence layer towards the offensive layer, the process gets more complicated, expensive and resource consuming. 

Hostile Takeovers: Ethical Considerations

The hostile M&A actions and consequences have multiple grey areas and require tighter scrutiny with respect to ethics.

On the acquirer side, there is nothing illegal about a hostile takeover. In fact, from a utilitarian point of view, it could be seen that the bidders are doing a service to the company shareholders by offering them more for their shares.

On the other hand, from the incumbent management perspective, there are a series of ethical issues that arise from what effectively amounts to protecting their own positions at the expense of the shareholders.

Many of the defense strategies outlined above can be located on a spectrum somewhere between unethical and illegal, on the basis that they go against good fiduciary management - a legal responsibility of company management. Thus, incumbent management teams are walking a delicate tightrope in their attempts to fend off a bidder who believes they can generate more value for shareholders than they can, whilst simultaneously using the company’s own assets as a tool in that defense.

A few (non-exhaustive list) ethical considerations are:

  • All forms of suicidal defense result in destruction of shareholder value and are considered unethical 
  • Fiduciary duties of the Target board must always be respected 
  • All decisions must be taken in good judgment and only to protect or enhance shareholder value 
  • One must abide by all laws and regulations, be they corporate, environmental, labor, or international 
  • The board of directors may not receive any form of payment or unjustified benefits of tangible or intangible monetary value 
  • The board should not obtain golden shares

Conclusion

Hostile takeovers are here to stay, and businesses need to understand the drivers behind them and invest in proactive management of shareholder value, assessing their vulnerabilities and investing in their defense mechanisms.

Decimating smaller companies for power, greed and growth will always remain questionable, and many corporations will likely succumb to these.

Not all hostile takeovers are bad, some of them do return higher shareholder value, and it is important to separate the value creating ones from the ones trying to destroy value.

dealroom


Hostile M&A has been part of the transaction space for decades and was especially popular in the late 1900s.

In fact, perhaps you have heard the sometimes soap-opera- like stories behind the AOL-Time Warner hostile takeover, or the InBev and Anheuser-Busch hostile takeover, or more recently the Sanofi-Aventis takeover of Genzyme Corp.

While these takeovers gather a lot of media attention, hostile takeover is generally a space in the M&A world not well understood.

Usually, large companies flush with cash will attempt to take over a promising company to enhance their own position or to simply kill competition.

However, companies and practitioners must remember the intent, be it hostile or friendly, must ultimately create shareholder value.

Together with DealRoom in this article we will explore several attack and defense strategies deployed during hostile M&A.

Introduction

There are multiple mechanisms, such as proxy fights and tender offers, that the Acquirer will leverage during a hostile takeover.

Conversely, there are multiple mechanisms, such as poison pills and the crown jewel, the Target will use as defenses in attempt to thwart hostile takeovers.

What is Hostile Takeover?

A hostile takeover occurs when an acquirer takes over a company without the consent of its management, instead side-stepping the management team to negotiate directly with the company’s shareholders. Hostile takeovers are generally launched after the formal offer has been rejected, and they are mostly applicable to  larger public companies.

what is hostile takeover

Understanding Hostile Takeovers

Hostile takeovers have probably gained an undeserved reputation owing to their name. If the same transaction was termed ‘Direct Shareholder Approach’ (which is effectively what a hostile takeover is), people might view them differently.

There is some debate over whether hostile takeovers add value or not, but one thing is certain: They increase focus.

A hostile takeover forces management and shareholders alike to focus and possible rethink some issues they may have been taking for granted. Questions that can arise during the process include: “are we implementing the wrong strategy?”; “is the company undervalued, and why?” and“could the situation be improved management team?”

The nature of hostile takeovers is that the target company is typically public. Over the past decade or so, they have gained some acceptance among activist shareholders - themselves avowed critics of company management - as they believe the hostile takeover will better reflect the company’s true value.

The operating reality

Even a potential threat of a hostile takeover causes the Target’s board to deploy “killer bees” and develop anti-takeover defences. However, clarity on who to protect, when and how is a key consideration. Courts typically want to balance shareholder and management interest, but this is not possible all the time and often things skew to protecting management at the expense of shareholders.

Shareholders have also pressurized boards of companies like Hewlett-Packard and Bristol-Myers Squibb to weaken their anti-takeover defenses to ensure the balance does not tilt only towards the company management.

All publicly traded companies generally deploy at least one anti-takeover mechanism by adopting shareholder rights plans.

Attack Strategies in Hostile Takeovers

There are a few well known attack techniques when it comes to hostile takeovers.

Typically, the Acquirer begins by sending a letter of intent to buy the company at a higher than market price, commonly called a “bear hug.”

Let us examine a few takeover techniques that tend to follow the “bear hug:”

Dawn raids

A Dawn Raid is the sudden entry into the stock market by the predator Acquirer at a price above the prior market level with the objective to acquire a major stake in a very short time. Often a Dawn Raid leads to further takeover offers or actions within a few days. 

Toehold acquisition

A Toehold Acquisition allows the Acquirer opportunities, such as the opportunity to sue the Target if the takeover attempt derails, through the purchase of the Target’s shares on the open market. 

Tender offer

A premium price offer to the Target’s shareholders is referred to as a tender offer. Tender offers entail a two-trajectory attempt: one front-loaded offer and a second intended offer for acquisition. Furthermore, they are publicly announced. While a tender offer is generally considered a hostile takeover technique, it is not hostile if oriented to create shareholder value, which would often lead to deal approval. 

Creeping tender offer

There is a variant of the tender offer referred to as the “creeping tender offer” during which the Acquirer starts buying stock of the Target at market value until the threshold of control is reached. It is a more gradual process than a tender offer or dawn raid. Additionally, it is cheaper to implement (i.e. no premium purchase price), but  has a higher risk of failure if the controlling threshold is not reached.

Proxy Fight

This technique solicits shareholder’s proxies to vote for insurgent directors on the board or even vote out the current board with the intention of eventually appointing new management and board members who favour the deal. A Proxy Fight is typically accomplished by approaching shareholders owning large blocks of shares individually. Proxy fights can also increase the number of board members who can then sway the voting decisions.

Designing an Effective Attack Strategy

An effective attack strategy for a hostile takeover entails organizing yourself, understanding the Target, evaluating legal pitfalls, preparing the arsenal, disarming defenses, and finally launching the attack using one of the methods mentioned above.

1. Organizing yourself

One must first ask the most important question - have all approaches outside of a costly and time-consuming hostile takeover been explored and exhausted? Compromises, trade-offs, risks, and opportunities all need to be well understood, and clear plans must be drafted to address the inability to conduct proper diligence and/or gain Target cooperation.

2. Understanding opponents

An intricate understanding of the Target needs to be mapped (e.g., shareholders, management, board members, defense mechanisms, public sentiment, and killer bee capabilities). This will help determine the time, cost, and resources of a potential attack  and identify the attack vector to be deployed.

3. Evaluating legal pitfalls

All other things being in place, a deep understanding of restrictions around legal, regulatory, investment, export, and country specific matters must be mapped; tactical mitigation plans must also be created to address items such as change of controls and accelerated options.

4. Preparing the arsenal

The bid arsenal is informed by all the prior stages. It is comprised of designing an effective PR/media campaign, mobilizing professionals required (i.e. lawyers and consultants), and stress testing the timing of the bid. A common practice is to either fully or partially lock-in support agreements as early as possible.

5. Disarming defenses

How do you disarm the Target’s potential defenses? Best practices include: taking steps to maximize shareholder value, tightening arrangements to avoid violating fiduciary duties of the Target board, wargame tripping of each defence mechanism and creating counter strategies. In addition, it is wise to create anti-dilution provisions and test them. 

Designing an Effective Attack Strategy

Finally, pick the right attack strategy for your deal and run a wargaming exercise to test all assumptions at play.

Integration of Hostile Takeovers

However hostile the intent and the transaction process, post-deal is a whole different ball game. The shareholders from both sides want the company to work and generate value.

The new board and shareholders want to create a good foundation for the future. Given the above there are select differences on where integration efforts focus to generate value.

A non-exhaustive list is outlined below:

  • Lack of sufficient pre-deal due diligence presents unknown risks, a rigorous confirmatory due diligence process is a very important step
  • The focus is on generating shareholder value rather than just synergies. While focus on traditional cost and revenue synergies is a given, integration teams must focus on Beta synergies i.e., those value drivers directly impacting the stock price
  • Executive and employee engagement become much more critical than friendly acquisitions; all aspects from training, communication, incentives, retention must have adequate rigor, KPIs and be very outcome focused
  • Communication workstreams need to focus 360 degrees i.e., employees, customers, shareholders, partners, regulators etc.
  • All KPIs and metrics are execution oriented rather than financial e.g., synergies should be tracked on run rate costs rather than EBIT given the former is much more execution oriented
  • When it comes to the integration, prioritize first, stabilize next, revitalize thereafter and continuously evangelize
  • M&A integration efforts are geared towards rigor and execution rather than just speed. For example, one does not measure time to full integration, but KPIs are oriented towards time to shareholder value

Related: Learn all you need to know about post M&A integration. (+Checklist)

Hostile Takeover Vulnerability

Assessment

While a comprehensive vulnerability assessment can be a daunting task, corporate vulnerabilities toward a hostile takeover are also constantly shifting, requiring constant analysis.

They largely fall into three areas:

  • Strategic Attractiveness. A company’s strategic attractiveness is dependent upon several factors, ranging from changing industry dynamics (consolidation), economic cycles, timing, attractiveness of disruptive technology or IP owned, other potential bidders, strategic fit with the Acquirer and/or weak management teams. Of course, there are other factors, such as limited need for due diligence, which can become vulnerabilities. As you can see, the strategic aspects need to be constantly monitored and understood in the context of the possible hostile approaches.
  • Valuation Weakness. The lower valuation compared to peers or own history coupled with credit impact, capital structure, weaker management teams and macro-economic conditions can leave the Target vulnerable to hostile takeovers. Other factors such as currency fluctuations and increased supplier risk also cause valuation related vulnerabilities.
  • Weak Defense Architecture. The obvious aspects of weak defense hinge on the following: existing shareholder mix, defense mechanisms (e.g., change control clauses and shark repellents to name a few), and inadequate response capability to hostile takeovers; these factors can leave companies vulnerable to hostile takeovers.

In addition to the above areas, companies should pay attention to the specific hostile takeover patterns in the market. Many times, these are early warning signs of emerging hostile takeovers.

A non-exhaustive list is as follows:

  • Massive increase in number of small stock transactions
  • Company executives or board become victims of negative publicity
  • Sudden increase of minority shareholders seeking documents
  • Other companies have faced hostile bids or dawn raids
  • Increase in unsolicited offers to sell shares
  • Random rise in inspections seeking customer, creditor, and shareholder information
  • Specific activity in activist investor circles, well known Raiders etc.

Hostile Takeover Defense

In general, there are fewer companies that embark on hostile takeover attempts than companies who have been on the receiving end; therefore, there are historically more avenues to deploy towards defending against these attempts. Defense mechanisms are designed and deployed by organizations by using specialty killer bees and testing periodically.

There are multiple kinds of defensive strategies and tactics deployed in tandem or independently; they can be categorized into preventive defense, active defenses, evasive maneuvers, suicidal defenses, and offensive defenses. While each one has varying degrees of risk, impact, and survival odds,  organizations often enlist a combination of these.

Hostile Takeover Defense

1. Preventive Defense

Preventive defenses are designed to reduce the likelihood of a financially successful hostile takeover, making it more difficult.

They are a combination of early warning signs, tight controls or agreements, and event-based triggers called poison pills. Let us examine a few of them in a bit more detail to understand them better.

1.1 Corporate charter amendments

  • Use staggered board agreements, outlining provisions whereby only one third of the board of directors may be elected each year. This requires shareholder approval to implement and classified directors cannot be removed before their term expires.
  • Design supermajority provisions requiring at least 80% of voting shareholders to approve the takeover, as opposed to a simple 51% majority. This is effective as it can make hostile takeover an uphill battle for predators.
  • Use a fair price provision as a weaker defense through a modification of a corporation’s charter, requiring the Acquirer to pay minority shareholders at least a fair market price for the company’s stock, typically as P/E ratio.

1.2 Tight controls

  • Use clauses called “shark repellents” to trigger change control on stock exchanges as a deterrent.
  • Manage and monitor shareholder mix and trading patterns or anomalies as an early warning sign.
  • Deploy tighter controls on register and debt.
  • Design golden parachutes i.e., change of stock ownership triggers benefits for executives.
  • Deploy dual cap structure,  i.e. different voting rights for different types of stock 

1.3 Poison pills

These are designed by corporations to “poison” the deal and discourage hostile Acquirers by making stock less attractive to Acquirers.

Poison pills were first invented in 1982 to defend El Paso Electric from General American Oil; in fact, the first pill was used by Brown Forman against Lenox in 1983. Subsequently, many variants of poison pills have evolved and been deployed.

The below table outlines key characteristics, execution conditions and impact of these pills.


Hostile Takeover Defense

2. Active Defense

The active defenses are triggered only after the bid has been made. With this timing in mind, they are more reactive, expensive, and risky.

Active defenses also come with higher opportunity costs, making them a significant distraction for executives and boards.

2.1 Litigation

Initiate court proceedings against the hostile Acquirer to stall the bid, increase bid costs, and buy more time to activate other defenses.

To deploy this active defense,Targets must find skeletons in the Acquirer’s closet related to legal, regulatory or securities laws.

2.2 Propaganda

Activate media to trigger public sentiment around opposition rationale; this helps create negativity around the Acquirer’s takeover tactics. We suggest highlighting your country/region specificity and any grey areas as you bring in the media.

2.3 Self-Tender

Self-Tender is, as the name describes, the Target purchasing paid up shares from other shareholders by sums exceeding share capital to increase the relative voting power of friendly shareholders.

2.4 Scorched Earth

Scorched earth is a self-tender offer by the Target, burdening itself with debt.

2.5 Greenmail

Greenmail refers to the payment of a substantial premium for large shareholder stock in return for not initiating a bid for company control. The tax aspects present obstacles for this, as the statute also warrants shareholder approval to repurchase beyond a certain number of shares.

2.6 Standstill Agreement

Standstill agreement is an undertaking by the Acquirer not to acquire any more shares of the Target within a certain time. It should be noted the Standstill Agreement is usually deployed with Greenmail.

3. Evasive Maneuvers

The evasion and negotiation techniques are usually applied along with active defenses; some literature even considers them a subset of active defenses. However, they are applied differently and need bidders, allies, and favorable scenarios to play out.   Let us explore the theory of Knights below.

3.1 White Squire 

A White Squire is a company consenting to purchase a large block of the Target company’s stock. White Squires are typically not interested in acquiring management control of the Target, but are interested in the Target either as an investment or to gain board seats at the Target company. 

3.2 White Knight 

A company which is a more favorable acquirer compared to the Hostile company (Dark Knight). 

3.3 Yellow Knight 

A company once attempting a takeover, but comes back now proposing a merger of equals.

3.4 Grey Knight 

New entrant hostile takeover candidate in addition to the Target firm and first bidder, perceived as more favorable than the Black Knight (remember Black Night  = unfriendly bidder), but less favorable than the White Knight (friendly bidder). 

3.5 Lady Macbeth 

A corporate-takeover strategy by which a third party poses as a white knight to gain trust, but then turns around and joins with unfriendly bidders.

Suicidal Defense

These sort of poison pill defenses are used as deterrents, but are rarely deployed. You can think of suicidal defenses as part of the arsenal, but seldom executed given their destruction of value.

  • People Mail. A blackmail strategy where executives of the Target threaten to resign together if the Raider takes over the company. 
  • Crown Jewel Defense. A strategy where the Target company sells off its most attractive assets to a friendly third party or spins off the valuable assets in a separate entity, thus reducing interest of the hostile entity. 
  • Jonestown Defense. In this extreme version of the “poison pill,” also called the “suicide pill,” the Target undertakes activities that might threaten its own existence to fend off the hostile takeover.

Offensive Defense

These are counterattack moves from the Target aimed at the hostile Acquirer to surprise the Acquirer and thwart its intention.

  • Pac Man Defense. As the name implies, this defense is based on the game “Pac Man” and  the theme of “eat or be eaten.” It occurs when the Target makes an offer to buy the hostile company in response to the hostile bid for the Target.
  • Fat Man Defense. Here the Target company acquires a third company to make the hostile Acquirer’s bid more expensive.
  • Capital Structure Clog. With this strategy, the target corporation initiates various changes to its capital structure to ward off a hostile bidder, e.g. recapitalization, assuming more debt (bonds or bank loans), issuing more shares (ESOP, general shares, white squires) and/or initiating buybacks (self-purchase or open market).

Rapid Defense Response Process

Hostile Takeovers responses need to be rapid, methodical, and timed- they must be undertaken with all stakeholders involved and the first phase of these responses occur within 24 hours.

It is also important that the first few steps of response are not necessarily aimed at defense but acknowledgement.

The first line of approach is the investor relations who will then rally the executives, board, and other supporting professionals.

Rapid Defense Response Process hostile takeover

The above example is merely aimed at education on how a rapid response process works within hours of receiving a bear hug.

A more elaborate response ensues, typically along the layers of the defense architecture outlined before running for weeks, months or even more.

Risks with Defenses

While most, if not all, defenses can counter deals driven by power and greed, they do not necessarily create shareholder value.

If outright hostile takeover has grey areas and questionable ethics, so do many of the defenses involved. I have outlined a select few, which are met with stronger resistance than the others.

  • Capital Structure Clog. High leverage can stress the cash flows of the company, depriving it of financial resources needed to counter unexpected situations, invest in growth, or return shareholder value.
  • Supermajority Provisions. Although they can help in fending off hostile bids, supermajority provisions can also apply to friendly acquisitions, making them difficult to discern; therefore, special clauses need to be built to ease this form of defense. 
  • Golden Parachutes. These are usually met with strong shareholder resistance as they are uncovered through compensation disclosures. Pac Man Defense. A key downfall of this strategy is that it creates no premium to original Target’s shareholders. Moreover,  it is very expensive and can even damage the company. 
  • Crown Jewel Defense. Finally, here you might cause courts to disfavor an asset or crown jewel, locking it up, which will impact the bidding process.

How Can Management Prevent Hostile Takeovers

The best way that management can prevent (rather than respond to) hostile takeovers is strong management, which is focused on generating long-term shareholder value. Many of the hostile takeover defense methods outlined above are self-serving for the managers and unlike strong management, will do little to win the backing of the company’s existing shareholders.

Some aspects of good management in this context include:

  • Well-developed corporate strategy: If the company’s strategy is strong, it minimizes the chances of an outsider coming along with a better one.
  • Fair remuneration: If the current management team are paid in line with their peers, there’s much less scope for an outsider to use their salaries against them.
  • Steady growth: Sluggish share growth is usually used as leverage by hostile bidders. By steadily growing income, share prices will inevitably move, protecting incumbent management.

Examples of Hostile Takeovers

There are many examples of hostile takeovers; in some cases, the bids were successful, while others were fended off due to good defense strategy and execution.

Cadbury Hostile Takeover

Cadbury PLC (“Cadbury’s”) was the darling of the UK confectionary industry when it received a $16.3 billion bid from American conglomerate Kraft Foods Inc. in 2009. Perhaps sensing (correctly) that its hegemony in the UK market was about to be challenged, Cadbury’s chair RogerCarr rejected the offer and immediately put together an in-house defense team. Workers at the company also backed their management against the hostile takeover.

The defense included a presentation made to shareholders shortly after Kraft’s initial bid which outlined why the bid‘ fundamentally undervalued’ the company. Kraft relented, and raised its bid to just under $20 billion in 2010, ultimately managing to bring the company under its portfolio of brands, and gaining huge distribution access to the UK market.Their success ultimately led to an overhaul of the terms under which foreign companies could acquire companies in the UK.

  • Xerox and HP Inc. In November 2019, Xerox (a much smaller company) commenced its hostile takeover bid on HP Inc (considered competition). Xerox made its hostile takeover intention public to confirm its seriousness; HP Inc rejected this offer in March 2020, stating uncertainties and unacceptable conditions. Xerox also stepped back due to the COVID-19 situation; this situation will likely play out sometime in future. 
  • AOL and Time Warner. Generally considered the poster child of failed M&A from every standpoint. The hostile takeover was consummated in 2000 (valued at $164 billion), but the subsequent dot com and telecom bubble bursting led the company to lose $200 billion in value within 24 months.
  • Air Products & Chemicals Inc. and Airgas Inc. The hostile takeover attempt commenced in 2009 and dragged on for two years with Air Products & Chemicals finally ending their attempt in 2011. The court upheld Airgas’s use of a poison pill, but the onus shifted to Airgas to prove it was indeed worth the valuation it claimed. Its performance waned during the great recession and came under considerable media fire. Airgas ultimately exited for 2X the value offered by the hostile bid. Wall Street now holds Airgas as one of the best arguments for management’s right to defend its company.
  • Sanofi Aventis and Genzyme. In 2010, Sanofi’s bid for Genzyme turned hostile after the latter’s board refused the initial terms. Sanofi tendered > $237 m worth of Genzyme shares, resulting in equity ownership of 90%. The deal was eventually consummated in 2011. 
  • KKR and RJR Nabisco. This transaction occurred in 1988 and, at the time, was the largest hostile takeover bid at $25 billion. The fight was bitter and made media headlines regularly;  this was also a leveraged buyout adding to the deal’s complexity. With the takeover, the company was saddled with a huge debt load on their balance sheet. 

Related: Top 5 Hostile Takeover Examples: How it Happened?

Enterprise Defense Architecture

A good defense is built on high valuation, engaged shareholders, and an active board with competent management.

However, there are times even in these cases when systems get out of sync, creating vulnerabilities and distractions.

Hostile takeover attacks or defenses are expensive, time consuming, resource intensive and distracting. The art and science of effective defense is to create more impact or deterrence with limited effort.

A modular defense architecture always helps scale your defenses, one layer at a time. A company should always evaluate the risks, opportunities, and tradeoffs before treading from one layer to the other since both the stakes and risks increase as you go up the stack. 

Companies also fall prey to the classic dilemma that hostile takeovers are not frequent events and hence not worth investing time or money into robust defense mechanisms to combat them.

However, hostile takeover defenses cannot be built or strengthened overnight; rather, this is an ongoing process given the dynamic business environment.

Enterprise Defense Architecture

Based on experience, observation, and analysis, I have developed a framework architecture for defending against hostile takeovers.

While this architecture will not perfectly fit every scenario, it generally works well and is flexible enough to respond to differences within a process given the proper rigor and structure.

I have had the good fortune to implement and test this framework through wargaming at a few corporations in the United States and Canada; however, I believe it can also be adapted to other parts of the world.

Each layer can be considered a standalone lever to employ, or can be used interdependently with other incremental steps towards creating more rigorous defensive positions against hostile takeover intent.

As one moves from the independence layer towards the offensive layer, the process gets more complicated, expensive and resource consuming. 

Hostile Takeovers: Ethical Considerations

The hostile M&A actions and consequences have multiple grey areas and require tighter scrutiny with respect to ethics.

On the acquirer side, there is nothing illegal about a hostile takeover. In fact, from a utilitarian point of view, it could be seen that the bidders are doing a service to the company shareholders by offering them more for their shares.

On the other hand, from the incumbent management perspective, there are a series of ethical issues that arise from what effectively amounts to protecting their own positions at the expense of the shareholders.

Many of the defense strategies outlined above can be located on a spectrum somewhere between unethical and illegal, on the basis that they go against good fiduciary management - a legal responsibility of company management. Thus, incumbent management teams are walking a delicate tightrope in their attempts to fend off a bidder who believes they can generate more value for shareholders than they can, whilst simultaneously using the company’s own assets as a tool in that defense.

A few (non-exhaustive list) ethical considerations are:

  • All forms of suicidal defense result in destruction of shareholder value and are considered unethical 
  • Fiduciary duties of the Target board must always be respected 
  • All decisions must be taken in good judgment and only to protect or enhance shareholder value 
  • One must abide by all laws and regulations, be they corporate, environmental, labor, or international 
  • The board of directors may not receive any form of payment or unjustified benefits of tangible or intangible monetary value 
  • The board should not obtain golden shares

Conclusion

Hostile takeovers are here to stay, and businesses need to understand the drivers behind them and invest in proactive management of shareholder value, assessing their vulnerabilities and investing in their defense mechanisms.

Decimating smaller companies for power, greed and growth will always remain questionable, and many corporations will likely succumb to these.

Not all hostile takeovers are bad, some of them do return higher shareholder value, and it is important to separate the value creating ones from the ones trying to destroy value.

dealroom


Join 2,000+ Forward-Thinking M&A Practitioners

Sign up to be on the M&A Science email list and receive notifications on the latest publications

Subscribe for free
Join 2,000+ forward-thinking M&A practitioners

Get weekly updates about M&A Science upcoming webinars, podcasts and events!

7
Subscribe for free
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.