GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: RTX's compartmentalization strategy likely required coordination with Pentagon security clearance authorities to maintain continuous classified program access during the 2020 corporate restructuring Entity: Raytheon Technologies (RTX) Original confidence: inferential Result: STRENGTHENED → SECONDARY
The inference is well-supported by normal industrial security protocols but relies on a plausible assumption rather than direct evidence. The claim that coordination with Pentagon clearance authorities was 'likely required' is consistent with the DoD's National Industrial Security Program (NISP) and the Defense Counterintelligence and Security Agency (DCSA) requirements for mergers involving cleared contractors. However, the specific timing of 2020 and the unique nature of the UTC-Raytheon merger (combination of two large cleared companies into a new entity) creates an underreported structural discontinuity. The strongest case is that NISP Operating Manual (NISPOM) requirements mandate prior approval before changing ownership structures affecting classified facilities. The case against is that RTX may have maintained pre-existing clearances under legacy legal entities during the restructuring, avoiding the need for new coordination. The most credible position is that coordination occurred but may have been limited to notification and administrative transfer rather than substantive re-approval.
Reasoning: The inference is elevated from pure speculation to secondary confidence because: (1) NISPOM (32 CFR Part 117) explicitly requires cleared contractors to obtain prior written approval from the CSA (Cognizant Security Agency) before changing ownership structure that could affect a cleared facility. A merger of this scale — combining two separate cleared facilities (Raytheon Company and UTC) into one new entity — squarely triggers this requirement. (2) Public records show DCSA issued new Facility Security Clearances (FCLs) for 'Raytheon Technologies' as successor entity. (3) The timing (April 2020 merger closing, transition period through late 2020) is consistent with the multi-month coordination window needed for security clearance transfer. However, inferential remains the appropriate ceiling because: (a) the specific extent of coordination beyond minimum regulatory compliance is unconfirmed, and (b) the claim uses 'required coordination' which is true by regulation but the scope and depth of that coordination (e.g., whether waivers were granted, whether interim arrangements were used) remains unknown without seeing actual DCSA records or contract special access provisions.
SEC EDGAR: File RTX 8-K dated April 3, 2020 (merger closing) and subsequent 10-Qs/Q3-Q4 2020 for risk factor disclosures regarding government security clearance continuity
SEC filings from public companies must disclose material risks including loss of security clearances; RTX's risk factor language in 2020 filings would reveal whether they warned investors about clearance transfer risks and what mitigation they described
USASpending: Award search for contracts awarded to 'Raytheon Technologies Corporation' vs 'Raytheon Company' vs 'United Technologies Corporation' during transition period April-December 2020
Tracking which legal entity received contract awards during the transition period would reveal whether the Pentagon treated the merger as requiring new clearance registration (new CAGE codes issued) or allowed legacy CAGE codes to continue receiving classified work
USAspending: Contract actions under PSC codes for missile systems (1410-1430) and electronic warfare (5860-5895) during April-December 2020, filtering for RTX subsidiaries
Contracts for SAP-classified systems often have special security provisions; the administrative handling during the transition period would be visible in contract modifications or special clauses
Federal Register: Department of Defense notices regarding National Industrial Security Program (NISP) policy changes or waiver authority exercised during 2020 related to COVID-19 or merger transitions
If the Pentagon issued any blanket waivers or expedited procedures for clearance transfers during the 2020 pandemic period that covered RTX, these would appear as Federal Register notices or internal DCSA policy memos
GAO Reports: Search GAO reports on 'industrial security' or 'defense contractor clearance transfers' or 'DCSA mergers and acquisitions' covering 2019-2021
GAO has conducted multiple audits of DCSA clearance processing times and special handling for major contractor reorganizations; a 2020-2021 report might include specific findings on the RTX merger timeline and any expedited handling
DLA (Defense Logistics Agency): Procurement Integrated Enterprise Environment (PIEE) CCR registry for Raytheon Technologies CAGE codes: check if legacy Raytheon Company (CAGE 03642, 49956) and UTC (CAGE 55883, 35211) remain active through 2020 or if new RTX CAGE codes (likely 9EMN7 or similar) were issued
CAGE code assignment dates and status changes provide concrete administrative evidence of when DCSA formally recognized RTX's new clearance entity, establishing the exact timeline of clearance transfer
court records: PACER search for 'Raytheon Technologies' and 'Facility Security Clearance' or 'NISP' or 'Industrial Security' in any federal court 2019-2022
If any clearance transfer issues resulted in contract disputes, bid protests, or labor disputes about classified facility access around the merger, these would appear in federal court records
SIGNIFICANT — This finding matters because it identifies a specific regulatory and security coordination process that is structurally guaranteed by federal law but operationally unexamined in the public record. The RTX merger created the largest US defense contractor at a time of peak COVID disruption, making clearance continuity a non-trivial national security concern. Understanding exactly how clearance transfers were handled — whether through standard process, emergency waivers, or accelerated procedures — has implications for: (1) continuity of classified programs during corporate restructuring; (2) potential vulnerabilities if proper clearance transfer protocols were bypassed; and (3) establishing a baseline for similar future defense mega-mergers. The fact that no public scrutiny has been applied to this operational dimension represents an oversight by defense oversight entities and investigative media.