It turns out that Theranos has systematically destroyed incriminating evidence.
This appears to be deliberate obstruction of the investigation:
Failed blood-testing unicorn Theranos trashed vital incriminating evidence of its fraud, prosecutors said on Monday.
The imploded startup's extensive testing data over three years, including its accuracy and failure rate, was “stored on a specially-developed SQL database called the Laboratory Information System (LIS),” according to a filing [PDF] in the fraud case against Theranos's one-time CEO Elizabeth Holmes and COO Sunny Balwani.
The reality, however, was that for one set of tests, the failure rate was 51.3 per cent. What does that mean? Prosecutors explain: “In other words, Theranos’s TT3 blood test results were so inaccurate, it was essentially a coin toss whether the patient was getting the right result. The data was devastating.”
From the filing: “On or about August 31, 2018 - three months after a federal grand jury issued a subpoena requesting a working copy of this database - the LIS was destroyed. The government has never been provided with the complete records contained in the LIS, nor been given the tools, which were available within the database, to search for such critical evidence as all Theranos blood tests with validation errors. The data disappeared.”
When a grand jury issued a subpoena for the database, Theranos’s lawyer came up with a strategy to supply the info without exposing the company’s appalling test results: hand over a backup of the database to the government and fail to provide the necessary materials to reconstruct it.
How do we know this? Because prosecutors said they have the internal emails showing staff discussing exactly that: how the backup wouldn’t come with the “layers of applications and data.” Its VP of Operations emailed an internal lawyer: “If we are just handing over a database, I’m not sure it will meet the needs.”
If that wasn’t enough, all three versions of the backup provided to the US government came with a password that was necessary to open it up. And no one was able to remember it, at least according to the various internal emails flying around. After some discussion, it was agreed that Theranos’s former head of IT, Antti Korhonen, was the only one with the password. But then Korhonen wasn’t able to find it either.
Unable to get at the database, Uncle Sam put an expert on the case: “The government retained a computer forensic expert to assist in retrieving this data, who found that the ‘key’ file on the hard drive, required to reconfigure the SQL database, is itself encrypted by a distinct password (not the one provided with the transmittal letter to open the hard drive), and cannot be opened.”
While all this was going on, Theranos decided to shut down the facility that housed the database in Newark, New Jersey. Execs were warned that if the hardware and servers were taken apart “it would be almost impossible to recreate the database” by Theranos IT contractor Michael Chung. But they shut it down anyway, and any access to the database from that point was lost – both for Theranos and government investigators.
Uncle Sam's legal eagles are not convinced this was an innocent mistake. Referring to the IncRev’s CEO, they note: “Even though Chandrasekaran knew the LIS hardware would be coming apart on Friday, August 31, 2018, and even though he was on an email chain in which the ‘all clear’ was given to take apart the hardware, he waited until two days later, September 2, 2018, to email a senior Theranos official with a list of items he would need from the database in order to reconstruct the LIS.
Its conclusion? “It does not appear from the timing of Chandrasekaran’s requests that he, in fact, intended to successfully copy the database before it shutdown.”
There is plenty of other evidence that, despite Theranos’s repeat claims, its machines were so inaccurate that they were fundamentally worthless. But the database would have provided clear proof that the company had to be aware that its entire testing system was fundamentally flawed, which itself supports the argument that the startup knowingly misled investors. While lying in press releases and interviews is reprehensible, it’s not necessarily a crime. However, lying in presentations to people in order to pull in investment is.
The failure to retain a working copy of a database that the company had paid millions to build and maintain, and which contained critically important information for the functioning of the business, is, let’s say, suspicious. Sufficiently suspicious that prosecutors wrote an entire filing about it.
Other filings reveal that Holmes would often personally handle complaints about how inaccurate its tests appeared to be, something that prosecutors says is evidence that the CEO knew that its testing machines didn’t work while at the same time continuing to claim the opposite in public. Holmes and Balwani face a dozen criminal wire fraud charges apiece, and up to 20 years in prison if found guilty.
Throw the book at them.
There are way too many unicorns out there who are little more than fraud, and we need to start throwing their founders in jail.