Airport scanners are a joke. Unless they can detect anything in and out of a person's body they can and will be bypassed when needed. So here's the plan, rather than creating a softcore security theater, we copy the security methods of countries that do it effectively. Namely, Israel.
Of course we could just keep doing crazier and crazier scans as people progressively game the system, only to fail because their devices are faulty, not because they really had any trouble getting on the plane.
The Israeli security methods have been incredibly successful, but the methods employed are much easiest to institute on a small scale. The sheer number of flights and travelers in the US make a lot of the Israeli techniques impractical.
A great vacation spot for diving, but flight testing?
They were testing the DARPA developed Forester foliage-penetrating radar over Belize's dense jungle canopies. They needed a stable platform, so it had to be a rotorcraft. Not sure why they chose a a fairly new unmanned aircraft as the test bed. Aviation Week has been covering the A160T and the testing down there pretty extensively.
According to Wikipedia: "In August 2010 the A160 Hummingbird is undergoing jungle test flights in Belize". So it wasn't just having a joy ride in open skies, it was in a tricky terrain to navigate, for *any* kind of autonomous vehicle.
Aviation Week reported on its blog that that the A160T crashed on approach, close to the landing site.
Link to Original Source
My assertion that "Given enough time, this most likely *will* happen" stands by the law of probability that given enough time/opportunity even unlikely events become probable. Even if the likelihood of malware for macs is low, with every day the chances of it happening increases.
I am also claiming that the inspiration for malware writers to target Macs may not be as small as you would think. Apple currently has a non-negligible number of installed users, so even if the percentage of total users is low, Apple provides a significant number of targets to malware writers which to this point have been overlooked.
As far as the security concerns with local admin rights, I consider allowing users to have local admin rights in an enterprise setting to be an implementation flaw. Microsoft implementations do not need to have users as local admins (and neither do Mac implementations). The local admin rights under Microsoft do not only grant the permission to install software, but also modify the OS files, security settings, manage users/passwords, etc. Giving users the ability to make these types of significant changes to their own machine, regardless of platform (or use of sudo or direct access), can only lead to weakened stability and security.
To sum up, chances are Mac users will be a target, this eventuality must be planned for, and lessening user privileges (taking away local admin rights) is one way in which security can be improved and this threat partially mitigated.