A 21,000 Car Parking Lot

As part of the settlement after it got caught cheating on its emissions tests, Volkswagen has bought back about 350,000 of its U.S. diesel vehicles. The automaker so far has spent more than $7.4 billion on the cars, according to court filings seen by Reuters.

Where does VW put all those cars? Wherever it can find the space.

The German automaker has 37 remote storage facilities across the U.S., and they’re not just parking lots. The sites include a former football stadium in the Detroit suburbs, an old paper mill in Minnesota and a giant patch of land in the California desert.

A court filing seen by Reuters said that, “Volkswagen had reacquired 335,000 diesel vehicles, resold 13,000 and destroyed about 28,000 vehicles. As of the end of last year, VW was storing 294,000 vehicles around the country.”

The Southern California Logistics Airport in Victorville, Calif., is already well-known as an “aircraft boneyard” — a sort of desert purgatory for old airplanes.

Now VW has made it a major place to store its diesel VWs and Audis.

“These vehicles are being stored on an interim basis and routinely maintained in a manner to ensure their long-term operability and quality, so that they may be returned to commerce or exported once U.S. regulators approve appropriate emissions modifications,” VW spokeswoman Jeannine Ginivan said in a statement to Reuters about the Victorville facility.

VW reportedly leased 134 acres at the site. That is enough to hold 21,000 cars while the company decides their fate: whether to be fixed — or scrapped for parts.

The aircraft area



The Museum of Failures

Every successful product launch is usually preceded by a string of failures, but we only remember the winners and ignore the failures and pretend they never happened. A new museum is set to open in Sweden that hopes to make this right.

The “Museum of Failures” is the brainchild of Dr. Samuel West, an organizational psychologist, who has spent the last seven years studying failure and success and what people say about both.


Dr. Samuel West holding the Nokia N-Gage.

“I got tired of all of this glorifying of success, especially within the domain of innovation where 80 to 90 percent of all projects fail,” Dr. West said.

Then, he stumbled into the Museum of Broken Relationships—which collects mementos from failed romances and displays them under glass—while he was on a family trip to Zagreb, Croatia, and he had a light bulb moment.

“I rushed out, and I had this sort of eureka moment that I’m going to start the Museum of Failures. Like, there’s no going back,” Dr. West told NPR.

The purpose of the museum, Dr.West says, is to show that innovation requires failure. “If you are afraid of failure, then we can’t innovate,” he said.

Scheduled to open in June this year, the museum will showcase over sixty failed products and services from around the world. “Every item provides unique insight into the risky business of innovation,” the museum’s website says.

Some of the products that will be on display includes —Harley-Davidson perfume; Bic pens made especially for women; Coca-Cola Blak, a coffee-inspired drink; Nokia N-Gage that was a mobile phone and a gaming console in one; Apple Newton, a personal digital assistant; beef lasagna from Colgate; and more recent products such as Amazon Fire Phone and Google Glass.


The Twitter Peek, a device for tweeting, launched in 2008.


Frozen beef lasagna from a toothpaste company.


The Harley-Davidson’s fragrance, according to Dr. Samuel West, was a “total flop.


Apple Newton, an early PDA.


Trump: The Game was released in 1989, based on buying and selling properties.


The Sony Betamax video cassette player, which lost the format war to its rival, VHS.


Coca-Cola BlaK was a coffee-flavored version of the soft drink, launched in 2006.


Bic for Her pen, which was discontinued at the end of 2016.


Google Glass.


Kodak pioneered the digital camera in the 1990s but failed to market it.



THIS YEAR THANKFULLY avoided any world-breaking ransomware attacks like NotPetya. It even had some small victories, like GitHub beating back the biggest DDoS attack in history. Still, online threats are manifold, lurking and evolving, making the internet a more hostile place than ever.

The biggest threats online continued to mirror the biggest threats in the real world, with nation states fighting proxy battles and civilians bearing the brunt of the assault. In many cases, the most dangerous people online are also the most dangerous in the real world. The distinction has never mattered less.

Donald Trump
On January 3 of 2018, at the height of tensions with North Korea, Donald Trump saw fit to send the following tweet:
Donald J. Trump

North Korean Leader Kim Jong Un just stated that the “Nuclear Button is on his desk at all times.” Will someone from his depleted and food starved regime please inform him that I too have a Nuclear Button, but it is a much bigger & more powerful one than his, and my Button works!

6:49 PM – Jan 2, 2018

Set aside, if you can, the deep absurdity of the language. The episode was a reminder that Trump is perhaps the only human on Earth who could quite literally start a nuclear war with a tweet, and that he seems decidedly not to care. While tensions with North Korea have subsided—for now—Trump has used the internet to other ill effects, from potential witnesses tampering in federal investigations, to constantly undermining the credibility of the media, to announcing unilateral military action without any apparent thought for the consequences. Trump has shown in 2018 that he doesn’t need to cause Armageddon in a single tweet to do damage. He can simple use his social pulpit to whittle away at democratic norms, 280 characters at a time.

Vladimir Putin
Let the Russian president stand in for any number of his country’s adept hackers. The country may have been relatively quiet—though not inactive—during the midterm elections, but Russia’s hackers still caused all manner of trouble throughout the world. Upset over a doping-related ban, they hacked and released emails of the International Olympic Committee in January, then attacked the Pyeongchang Olympics themselves, wreaking havoc during the opening ceremonies with so-called Olympic Destroyer malware. When a lab investigated the nerve agent used in the attempted murder of former Russian double agent Sergei Skirpal, Russia tried to hack it, too. They continue to probe the US power grid for weaknesses. And on and on, all before you even get to Putin’s continued, unprecedented cyberaggression against Ukraine. Russia has spent this year actively, opening lashing out at the world online—with Putin at the command.

Min Aung Hlaing
Facebook was tragically slow to recognize that its platform was being used in service of genocide in Myanmar. Indeed, it took a UN report before the company finally took action against the military leaders behind the most blatant abuses. Among the 20 individuals and organizations Facebook banned in that first wave was Min Aung Hlaing, head of the armed forces, who both used his personal account to spread hate speech and led a military that surreptitiously ran at least 425 Facebook pages, 17 Facebook groups, 135 Facebook accounts, and 15 Instagram accounts. “We want to prevent them from using our service to further inflame ethnic and religious tensions,” Facebook wrote at the time. As The New York Times reported, it was quite a bit more serious than that: Myanmar military personnel, under Min Aung Hlaing’s command, “turned the social network into a tool for ethnic cleansing.”

Mark Zuckerberg
Min Aung Hlaing and his subordinates were the ones using Facebook in the service of genocide. But it was Facebook that let them get away with it for so long, just as it was Facebook that was slow to recognize Russian efforts to destabilize US democracy in 2016, and Facebook that let 30 million users get hacked with a vulnerability that took a year and a half to discover and fix. In fairness, many of the woes Facebook has faced in 2018 consist of revelations and repercussions of how the platform operated years ago, rather than today.

But from his initial dismissiveness of the fake news problem to his company’s opposition research against George Soros, it seems as though Facebook CEO Mark Zuckerberg still hasn’t grasped the enormous responsibility that comes with a platform as all-encompassing as Facebook, nor the extent of the damage. He and his deputies continue to insist that they’ll do better, but some things can’t be fixed retroactively.

The SamSam Hackers
The SamSam ransomware strain had already had a remarkable run, targeting hospitals and universities and other victims with reason to pay up fast. Then it hit Atlanta. The attack hobbled the city, hampering payments and communications and all manner of municipal necessities. The hackers had demanded $52,000; Atlanta spent $2.6 million to clean up the mess. In November, the Justice Department [brought charges against two Iranian nationals](https://www.wired.com/story/doj-indicts-hackers-samsam-ransomware/%5D in connection with the hacking spree, alleging that they took in $6 million while causing $30 million of damage along the way. While they don’t seem connected to the Iranian government, the two alleged perpetrators seem unlikely to be arrested, or even chastened, by the indictment. Expect SamSam to continue to plague the internet well beyond 2018.

In 2015, the US and China came to an historic agreement: The two superpowers would stop hacking each others’ private sector interests. Miraculously, it worked, sort of, for at least a few years. China didn’t stop hacking altogether, but it at least ramped down its efforts against the US. But with trade tensions between the two countries, the truce appears increasingly to have been short lived. China has increased its hacking campaigns against the US Navy and other government-adjacent entities, and the recent revelation of a devastating, years-long Marriott breach showed just how long-lasting some of its apparent heists have been. Leading the charge for China is APT10, an elite hacker group whose thefts of the world’s most closely held intellectual property has made it a top priority for law enforcement from not just the US, but multiple victim countries. A recent indictment shows just how active—and effective—the group has been.

Christian Porter
As Australia’s attorney general, Porter has pushed for, and gotten, a law that threatens to undermine encryption not just Down Under, but around the world. As written, the law gives Australian authorities the right to compel tech companies to put backdoors in their encrypted messaging platform. It also lets officials target specific individual with those requests, under a veil of secrecy, rather than the company itself. It’s a concerning development on multiple levels. You can’t weaken encryption piecemeal; if you make a backdoor for WhatsApp, it will apply not just to Australians but to all users. You also can’t guarantee that hackers unauthorized nation state spies wouldn’t find their way in as well. In short, it’s a law that threatens encryption protections for everyone, whether the Australian government has targeted them or not—a dangerous development on a global scale.

Credit card skimming hacks were popular this year; Ticketmaster, British Airways, Newegg, and more all got hit. In fact, they all got compromised by the same group: Magecart. Well, technically an umbrella under which several groups coexist. According to research from security firm RiskIQ, Magecart has hit at least 6,400 sites in its long history. Compared to nation state groups, its activities may seem relatively mundane. But it’s still one of the most active hacking consortiums out there, ready and waiting to lift your credit card number in 2019.