Elizabeth Holmes found guilty of fraud and conspiracy in blockbuster Silicon Valley trial

It took more than 50 hours of deliberations over seven days, but yesterday a jury found Theranos founder Elizabeth Holmes guilty on four charges of criminal fraud. Basically, they concluded that Holmes intentionally lied to investors to raise gobs of money for her company, a blood testing startup that promised to revolutionize health care.

Spoiler alert: It didn’t. And according to the jury, Holmes knew that it wouldn’t work out even as she touted the company’s tech capabilities to raise nearly $1 billion from the likes of Rupert Murdoch, the DeVos family, and the Waltons of Walmart fame.

The details: Holmes was convicted of three counts of wire fraud and one count of conspiracy to commit wire fraud. She was found not guilty on four other charges and the jury couldn’t agree on a verdict for three charges. So Holmes went 4/11.

How long will Holmes be behind bars? Each of those guilty counts could carry a sentence of 20 years in prison, but legal experts say she’ll probably serve less time than that, given typical sentences in white-collar fraud cases like hers.

How we got here

When she was 19, Holmes dropped out of Stanford to build a device that could perform hundreds of diagnostic tests more cheaply and more accurately than anything on the market. She was labeled the youngest female self-made billionaire by Forbes and drew comparisons to Steve Jobs.

But things unraveled when WSJ investigations in 2015 and 2016 exposed Theranos’s vaunted technology for not actually working. Then came a slew of lawsuits and an indictment, and in 2018 the company dissolved in a thundercloud of disgrace.

Big picture: To many, Holmes’s story reflects the excesses of a venture capital industry that will plug any charismatic founder with a geyser of cash despite their ideas being untested. But Silicon Valley insiders told Bloomberg that, despite Holmes’s conviction, that faucet won’t be turned off anytime soon. The lure of exponential returns is that powerful.

Hot this week

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

When More Security Tools Create More Risk

Adding security tools often increases risk through complexity. Learn how consolidation and staff training create stronger defenses than endless tool accumulation.

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Topics

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

When More Security Tools Create More Risk

Adding security tools often increases risk through complexity. Learn how consolidation and staff training create stronger defenses than endless tool accumulation.

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Why Passwords Alone Fail Us

Passwords alone cannot protect our digital lives anymore. Discover why password managers and two-factor authentication are non-negotiable tools for true security.

The Quiet Strength of Cyber Resilience

Building cyber resilience involves layered strategies like multi factor authentication, reliable backups, and incident planning - practical steps any organization can implement immediately.

Practical Cybersecurity Habits for Everyday Protection

Essential cybersecurity habits everyone can implement today including password managers multi-factor authentication and phishing awareness with global resource examples.
spot_img
Exit mobile version