recommended reading

Americans Think Drones Are Creepier Than Google Glass

A drone flies at the International Consumer Electronics Show in Las Vegas.

A drone flies at the International Consumer Electronics Show in Las Vegas. // Jae C. Hong/AP

Americans are, unsurprisingly, distrustful of unmanned aerial vehicles, or drones, according to new data from Pew Research Center. When asked about the possibility of drones (commercial and personal) being allowed to fly in most US airspace, 63% of adults surveyed said such a policy would be a change for the worse; only 22% thought it would be for the better.

Pew asked its survey sample about four hypothetical future technologies. The least upsetting turned out to be the prospect of people walking around with devices or implants drip-feeding them information. Robot caregivers for the elderly and infirm, and “designer babies” with altered DNA, had more naysayers than drones, but the aircraft also had the fewest outright supporters:

Screen Shot 2014-04-16 at 3.56.40 PM

Also unsurprisingly, older Americans were more suspicious of drones than younger ones. While only 16% of those 65 and older could see benefits to drone ubiquity, 30% of 18-29 year olds predicted positive effects. Women had greater hesitation as well: Only 18% of female respondents said that drone use in the US would be a positive thing, compared to 27% of men. A 2013 Pew survey found a similar gap in global approval of US drone strikes.

Screen Shot 2014-04-16 at 3.57.31 PM

While men are often more likely to approve of military violence than women, the gap was considered unusually large. It’s not clear why women are more anti-drone than men, but it shouldn’t come as a surprise that Americans as a whole are down on drones—there aren’t a lot of friendly drones around to make a good impression.

For now, most drone use in the US is strictly personal: Until the Federal Aviation Administration releases guidelines for commercial drone use, their legality is up for debate. But with FAA regulations expected in 2015 and several companies already poised to take advantage of the tech, Americans may soon have a better idea of the positive changes that drones could bring.

Reprinted with permission from Quartz. The original story can be found here

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.