FAA (Finally) Eases Restrictions on Gadgets


Responding to a federal advisory committee report issued last month, the Federal Aviation Administration announced Thursday that it "can safely expand passenger use of Portable Electronic Devices (PEDs) during all phases of flight." FAA Administrator Michael Huerta said the agency is already working with airlines to implement the long-standing policy that has drawn ire from fliers for decades.

When the overdue changes take place will depend on the airline, but Delta is already out with a press releasesaying that it'll try to allow passengers to use their gadgets as soon as tomorrow.

The FAA policy was based more on caution than hard facts. According to The New York Times, the regulations were put into place during the 1950s when FM transmitters actually could interfere with communications. But current aircraft have more-advanced systems. In 2006, a study found no evidence in either direction that consumer electronics could cause a disruption. "There was no evidence saying these devices can't interfere with a plane, and there was no evidence saying that they can," a FAA spokesman told The Times in 2011.  The Times' tech columnist Nick Bilton has made a bit of a crusade of the matter, even commissioning an independent test of the electrical emissions of a Kindle. They were found to be "minuscule."

This is obviously great news for Alec Baldwin and other electronic-obsessives. But airplanes aren't just going to be a free-for-all now that you can read your Kindle during takeoff. The FAA still prohibits a huge list of items from entering the plane. Some are plenty obvious, like firearms, hand grenades and meat cleavers. Some are already obviously annoying for fliers, such as liquid restrictions. Others are just a bit odd. You can't bring pool cues, cricket bats, cattle prods, kubatons (which are real things), vehicle airbags (???), and certain snow globes (because of the liquid) on board.

Also, to the people now lamenting that this will bring the end to the tech-sabbath refuge of the fuselage—be assured not much will really change. People were always allowed to use electronics after takeoff, and cell phones still cannot be used to make calls in the air. Also, no citizen of the civilized world should ever use electronic devices without headphones on public transportation. The only difference now is that you can continue using your laptop or iPad during takeoff. So please, attempt to work through the sometimes startling changes in G-forces as the plane accelerates down the runway.

Although, we can all agree that a particularly nefarious snow globe poses more of a public-safety threat than an e-reader ever did.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.