Browse Definitions :
Definition

vulture capital

Vulture capital is funds invested to exploit and profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success.

The term is derogatory wordplay referencing venture capitalism (VC), which is not by definition exploitative. The vulture analogy likens the behavior of vulture capitalists to the iconic carrion-eating raptors that prey on the weak.

Here’s one example of how vulture capitalism works:
Vulture capitalists often purchase a controlling interest in a distressed company through what is known as a leveraged buyout (LBO), with as much as 90 percent financing. The purchase may be a hostile takeover, which means that the business’ owners have not consented. Another approach is buying off corporate management with large bonuses. The purchaser uses the target company’s own assets as collateral for the loan used to purchase it and typically charges the company a large management fee in addition. In the attempt to cover the loan interest and management fee, the company must cut its workforce and benefits. Usually, the vulture capitalist then sells the company at a profit.

Coinage of the term vulture capital is often attributed to either Mitt Romney or his advisor because of Romney’s claim to know the difference between venture capitalism and vulture capitalism. However, although Romney himself could arguably be described as a vulture capitalist for his activities on behalf of Bain Capital (a private equity firm), the term is much older than 2010 when he made that claim – most likely originating post-dot.com bubble to refer to venture capitalists who began buying up failing dot-com enterprises at rock-bottom prices.

The activist Malcolm X may have inspired the term, in a Young Socialist interview published shortly before his assassination in 1965:

“Capitalism used to be like an eagle, but now it’s more like a vulture. It used to be strong enough to go and suck anybody’s blood whether they were strong or not. But now it has become more cowardly, like the vulture, and it can only suck the blood of the helpless.”

This was last updated in April 2016

Continue Reading About vulture capital

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close