Issues of Bioterrorism: Analysis of Bio Terrorist Attack and RAID Applications

Readiness for bioterrorist attacks and early acknowledgment of explicit operators are basic for general wellbeing. Crisis divisions may assume a significant job in this field. The enormous range of bioterrorism includes appalling fear-based oppression with mass losses, yet additionally miniaturized scale occasions utilizing low innovation yet creating common distress, interruption, illness, incapacities, and demise (Tewari, Rashi, Sharma, and Jain, 2013). It points not exclusively to cause mortality and grimness yet in addition to prompt social and political disturbance. Readiness gives off the impression of being the most intense barrier against conceivable bioterrorist occasions. In this article, we expect to make mindfulness against natural specialists and underline the significance of crisis offices in this general medical issue.

Bioterrorism is a term utilized for the purposeful utilization of pathogenic strains of organisms to cause illness or demise in living things or potentially to offer mischief to the earth. These operators can normally be found in nature; however, it is conceivable that they could be adjusted to expand their capacity to cause illness, upgrade their protection from current meds, or increment their capacity to be spread into the earth. Bioterrorism covers a huge range of worries, from calamitous fear-based oppression with mass setbacks to smaller-scale occasions utilizing low innovation however delivering common distress, interruption, infection, incapacities, and demise (Woods, 2005). The point of bioterrorism isn’t just to cause mortality and grimness, yet in addition to prompt a social and political breakdown. Since it is a danger of the 21st century, it is essential to know about the organic highlights of the instruments of the war. The most significant guarded measure that can be taken appears to instruct bleeding-edge medicinal services suppliers including attendants, specialists, and clinicians. There is a requirement for a fast reconnaissance framework between medical clinics, crisis rooms, research facilities, and general wellbeing divisions (Pinto, 2013). As the people on a call, a well-prepared staff, productive information frameworks, and adequate research center limits in the ED are the fundamentals for a fitting reaction.

RAID 0: In a RAID 0 framework, information is separated into hinders that get composed over every one of the drives in the array. By utilizing various disks (at any rate 2) simultaneously, this offers quick read and compose speeds. All stockpiling limits can be completely utilized with no overhead (DataPlugs, 2018). The drawback to RAID 0 is that it isn’t redundant, the loss of any individual plate will cause total information misfortune. In this way, it isn’t prescribed to utilize except if the information has no incentive to you.

RAID 1: RAID 1 is an arrangement of at any rate two drives that contain similar information. If a driver comes up short, the others will in any casework. It is suggested for individuals who need high unwavering quality. An extra advantage of RAID 1 is the high understood exhibition, as information can be perused off any of the drives in the array (DataPlugs, 2018). Be that as it may since the information should be kept in touch with every one of the drives in the array, the compose speed is slower than a RAID 0 array. Additionally, the main equipped for a solitary drive is accessible to you.

RAID 5: RAID 5 requires the utilization of at any rate 3 drives, striping the information over various drives like RAID 0, yet additionally has an ‘equality’ appropriated over the drives. In case of a solitary drive disappointment, information is sorted out utilizing the equality data put away on different drives. There is zero personal time. Peruse speed is quick however composes speed is to some degree slower because of the equality that must be determined (DataPlugs, 2018). It is perfect for document and application servers that have a predetermined number of information drives. RAID 5 loses 33 percent of extra room (utilizing three drives) for that equality, however, it is as yet a savvier arrangement than RAID 1. The most mainstream RAID 5 designs utilize four drives, which brings down the lost extra room to 25 percent. It can work with up to 16 drives.

RAID 6: RAID 6 resembles RAID 5, yet the equality information is kept in touch with two drives. That implies it requires at any rate 4 drives and can withstand 2 drives biting the dust at the same time. Peruse speed is as quick as RAID 5, yet compose speed is slower than RAID 5 because of the extra equality information that must be determined. RAID 6 is an awesome alternative for a standard web server, where the greater part of the exchanges is perused (DataPlugs, 2018). However, it isn’t suggested for a substantial compose condition, for example, a database server.

RAID 10: RAID 10 comprises of a base for four drives and joins the upsides of RAID 0 and RAID 1 out of one single framework. It gives security by reflecting all information on optional drives while utilizing striping over each arrangement of drives to accelerate information moves. This implies RAID 10 can furnish the speed of RAID 0 with the excess of RAID 1. You can lose any single drive, and potentially even a second drive without losing any information (DataPlugs, 2018). Much the same as RAID 1, just 50% of the complete drive limit is accessible, however, you will see improved read and compose execution and furthermore have the quick reconstruct time of RAID 1. Contrasted with enormous RAID 5 or RAID 6 arrays, this is a costly method to have repetition, however.

References

  1. Woods, B. (2005). Restorative Management of Biological Casualties Handbook. U.S. Armed force Medical Research, Institute of Infectious Diseases.
  2. Tewari, K., Rashi, G., Sharma, K., and Jain, K. (2013). Bioterrorism Information Retrieval System.
  3. Pinto, V. (2013). Bioterrorism: Health part sharpness. Diary of Natural Science, Biology and Medicine.
  4. DataPlugs, (2018). RAID Level Comparison: RAID 0, RAID 1, RAID 5, RAID 6 and RAID 10. Recovered from https://www.dataplugs.com/en/raid-level-correlation raid-0-raid-1-raid-5-raid-6-raid-10/

Food Safety and It´s Issues Nowadays: Bioterrorism and Tampering Risks

Food Safety is the proper handling, cooking, and preservation of food to protect people from foodborne illnesses. Preparing and cooking food properly is key to preventing foodborne illness and loss of income from missing work. Food Safety also contributes to health care, millions are spent each year form infections from food. Many people suffer from a lack of knowledge and proper food handling procedures.

Tampering

Food tampering is the deliberate contamination of food with the intent to cause harm. Tampering can take place during the processing stage; the FDA has made rules to prevent the deliberate degradation of food during the production process. Tampering also takes place during food storage such as food stored in unsanitary warehouses are unsafe. The storage facility must be clean and maintained, separate from raw products in processing, and the storage must always have a stable temperature condition. During food, retail tampering is evident and is constantly being inspected for signs of contamination or corruption. Detailed analysis of food products includes stained, damaged packaging, and resealed labels. Food products can be contaminated at any point during the food supply from process to retail store it is the job of many people to ensure this does not occur.

Bioterrorism

Bioterrorism is a form of terrorism where the purpose is to release biological agents such as bacteria, and viruses. There are many reasons biological agents are selected to use for terrorist attacks. These agents are very pathogenic, and a small dose can have a huge impact on an infection. Biological agents are easy to weaponize, inexpensive and are difficult to detect since they are odorless. By harming our agricultural system terrorists attack our livestock and crops. Terrorists can target food in the processing, storage, and distribution phases. An epidemic that could spread across a country could even cripple its military. A Bioterrorism Act was established in 2002 to improve the United States’ capacity to prevent bioterrorism.

Food Safety Standards

Food safety standards in all parts of the world affect everyone as trade is conducted between different countries. Many counties haven’t developed reporting regulations to identify or track foodborne illness. Data on the foodborne diseases are unavailable and this needs to improve to better identify different pathogens. In the United States, an estimate of seven foodborne pathogens cost between 5.6 billion to $9.4 billion in lost work and medical expenses.

Food Safety Barriers

Barriers to safe food handling for businesses and consumers include handling and preparing food safely without cross-contamination, proper food temperatures, and to divert from health-threatening food. Some barriers that occur with businesses are that restaurants lose sight of focusing on food safety and focus on their revenue. Food safety checks to some workers are a burden and a busy restaurant puts them behind. The management plays a vital role in sustaining employee food safety training. Digital technology can help managers when they need to keep employees up to date on safety standards. Computer-based training can help employees to emphasize how important it is that they don’t cut corners while preparing food. Consumers are overconfident and uneducated on proper food safety when storing their food anywhere in the fridge. Food preparation is overlooked with cross-contamination rinsing meat off in the sink and using the same cutting board for meat and vegetables. Storage of food is usually overlooked, and food is left out for more than 2 hours. The food is still stored in the refrigerator after being free to open air in the temperature danger zone. Proper training and recertification to ensure safety standards are utilized in the workplace and at home will diminish food safety barriers and combat the spread of pathogens.

Inspecting food from the production stage to the retail stage safeguards everyone thought the process to prevent tampering. These efforts will keep us safe from bioterrorism the easiest, deadliest way for a terrorist to inflict harm on most people. Foodborne illnesses are a worldwide health issue that needs to continually be trained, inspected, and practiced. The barriers that keep food employees and household cooks from properly preparing, cooking, and storing food put to sunder the process of food safety from beginning to end.

Epidemiology and Bioterrorism: Steps Necessary to Secure National Well-Being

According to Saddling data (Pinto, 2013), which are viewed as epidemiologic intimations of a conceivable natural fighting Epidemiologic pieces of information of a biologic fighting or psychological oppressor assault .The event of a scourge with a comparative sickness or disorder, particularly in a discrete populace. Numerous instances of unexplained maladies or passings. More serious sickness than is generally expected for a particular pathogen or inability to react to standard treatment. Irregular courses of presentation for a pathogen, for example, the inhalational course for sicknesses that ordinarily happen through different exposures.

A sickness that is bizarre for a given geographic zone or transmission season. Sickness ordinarily transmitted by a vector that is absent in the neighbourhood Various synchronous or sequential scourges of various illnesses in a similar populace. A solitary instance of malady by an extraordinary specialist (smallpox, some popular haemorrhagic fevers) A malady that is irregular for an age gathering Surprising strains or variations of living beings, or antimicrobial opposition designs not the same as those flowing. Comparable hereditary sort among operators secluded from particular sources at various occasions or areas. Higher assault rates in those uncovered in specific regions, for example, inside a structure whenever discharged inside, or lower rates in those inside a fixed structure whenever discharged outside. Ailment flare-ups of a similar disease happening in non-adjoining territories. An illness flare-up with zoonotic effect. Insight of a potential assault, guarantees by a psychological oppressor or assailant of a discharge, and disclosure of weapons or altering. Numerous ailment elements in a single patient, showing that blended operators have been utilized in the occasion Check, vaccination, and affirmation. Inception of suitable anticipation and control measures In India, the Integrated Disease Surveillance Project (IDSP), a decentralized and state-based observation program, was presented in November 2004. It coordinates the open division, private part, country and urban well-being framework, and has fuse of transferable and non-transmittable frameworks (uncommon clinical disorders might be incorporated amid general well-being crises). There is additionally joining of restorative universities (both private and Government) and International Health Agencies (WHO, CDC, NIC, and so forth). Its real segments incorporate combination and decentralization of reconnaissance exercises, fortifying of general wellbeing labs, human asset improvement, and utilization of data innovation for gathering, assemblage, aggregation, investigation, and dispersal of data.

According to Erenler, Guzel & Baydin (2018) readiness seems, by all accounts, to be the most strong barrier against conceivable bioterrorist occasions. Reports uncover that we are not decidedly ready to manage a fear monger assault that utilizes natural weapons. As was done in light of the atomic danger, the medicinal network ought to teach people in general and arrangement creators about the risk. In the more extended term, we should be set up to identify, analyse, describe epidemiologically, and react suitably to natural weapons use and the risk of new and reemerging contamination. On the prompt skyline, it can’t postpone the improvement and usage of key designs for adapting to non military personnel bioterrorism. Therefore, instruction and preparing of the human services suppliers, particularly crisis doctors, are the pillar of the fight against bioterrorism. Crisis offices must be developed in a manner appropriate for a conceivable turmoil and congestion that may happen when a genuine occasion occurs. Mindfulness and readiness to natural fighting specialists must be acknowledged as a piece of national biodefense strategy.

Recommendations

According to Pinto (2013) effectively meeting the difficulties of bioterrorism requires a multifaceted reaction. No single methodology will without anyone else be effective. According to Erelner,Guzel & Baydin (2018) surveillance frameworks can likewise be created to give significant new abilities in reacting to general well-being crises. In any case, these endeavors may result in false cautions and related expanded expense. Measures to upgrade symptomatic and helpful capacities and limits nearby preparing and training are thought to improve the capacity of society to battle ‘normal’ irresistible illnesses episodes, just as moderating the impacts of bioterrorist assaults. At the point when a general well-being crisis is recognized, it might be savvy to divert assets, e.g., subsidizing, staff, and space from center general well-being projects to add to the general well-being crisis reaction. There are likewise ponders in the writing recommending well ordered measures to address bioterrorist occasions. Current patterns in biosecurity and cybersecurity incorporate (1)the wide accessibility of innovation and particular information that already were accessible just to governments; (2)the worldwide monetary subsidence, which may build the spread of radical non-state on-screen characters; and (3)late US and EU commission reports that reflect worries about non-state entertainers in awry dangers.

The idea of bioterrorism dangers requires joint effort over a few areas including insight, police, crime scene investigation, traditions, and other law implementation associations who must cooperate with open and creature well-being associations just as natural and sociology associations. Coordination in basic leadership among these associations is required, in light of learning and data sharing. A ‘data sharing danger advantage investigation’ might be comprised to decide the danger of not sharing data among associations contrasted with the advantage of sharing data so as to avert a fear based oppressor assault and to improve a fast reaction capacity on the off chance that it happens. In work bundle 3 of the EU venture AniBioThreat, early cautioning is the fundamental point. A technique has been produced dependent on an iterative way to deal with bring law requirement organizations and human and creature well-being foundations together. Workshops and activities were included amid the primary portion of the undertaking, and turn off exercises incorporate new readiness plans for organizations and the development of a legitimate counsel arrange for basic leadership. Moreover, in Stockholm, Sweden, in 2012, a class on significant learning was held, which recognized the need to unite different organization societies to take a shot at building up a strong capacity to distinguish early indications of bio-and agroterrorism dangers.

The workshop inferred that there are various difficulties in structure a community culture, including building up instruction program that supports coordinated effort and shared situational mindfulness . Strategy creators should likewise concentrate on antibody generation since immunizations are the best security against irresistible illnesses. There is a progressing scholarly discussion on utilization of immunizations in natural fighting. Vulnerability of the dangers is the major testing issue in antibody advancements. Strategy detectors should concentrate on broad strategy on immunizations covering both military staff and regular folks. According to Sharma et al. (2016) to battle a bioterrorism assault spotlight ought to be laid on growing full universal participation among countries for managing this issue since formal global logical coordinated efforts should be made and worldwide laws against utilization of natural weapons should be confined. Reaction against any bioterrorist occasion will require co-ordinated endeavors of general wellbeing divisions (observation, research facility reaction arrange, sharpness of therapeutic and paramedical resources) and managerial frameworks including insight organizations, armed force, law implementation hardware and common organization for ensuring people in general and advancing its welfare.

Conclusion

From the above data it tends to be presumed that there is need of readiness in the affected districts because of bioterrorism to stay away from dependable ailment and make spot secure.

Bioterrorism: Issues Related to US National Food Security

Contemporary Issues Dealing With Food Safety

The augmentation of food protection consideration manifests an in depth all-around notion of nourishment’s in global transactions. Foodborne diseases are increasing worldwide, particularly in the developing countries, due to neglect of personal hygiene and food hygiene (Yilmaz & Çakıroğlu, 2016). Alongside the expanding measure of tour, migration and trade, the progression at which threatening impurities and microorganisms penetrating through the boundary lines has also sold interest to public safety globally. During this exposition, readers will acquire records on modern-day problems related to food protection, tampering, bioterrorism, specific meal protection requirements throughout the globe, and food protection limitations which could propose problems with food safety in a worldwide, interconnected environment.

Tampering

According to the Canadian Food Inspection Agency, Food tampering is the intentional contamination of a food product, with the intent to cause harm to the consumer or to a private company (Inspection.gc.ca, 2019). Sarah Lustbader, article writer for The Appeal stated, “the internet seemed to explode after a Twitter user posted a video depicting a young woman licking a tub of Blue Bell ice cream and putting it back in a supermarket freezer” (Lustbader, 2019). The premeditated tinkering of food to induce sizable epidemic plague is usually extraordinary in the United States, but moments after this video was posted it caused vigorous reencounters that had young adults licking ice cream all throughout the nation. Corresponding to the outbreak, The United States Food & Drug Administration (FDA) is enhancing its surveillance of foodborne disease and increasing the inspection of domestic and foreign food-processing plants (U.S. Food and Drug Administration, 2019).

Bioterrorism

A bioterrorism attack is the deliberate release of viruses, bacteria, or other germs to cause illness or death (Medlineplus.gov, 2019). Although terrorists may use any germs, bacteria, or virus, there are a number of biological agents that have been established as being more likely to be used. The reason that many are worried about these agents is concentrated on their accessibility to incendiaries and efficiency in which they can be circulated. At several points along the food chain, terrorists can target our food supply by vilifying animals and crops in manufacturing, processing, repository or transportation. This very same method of bioterrorism is called agro-terrorism which is aimed at wildlife and agricultural production. The intrusion on agro-terrorism in the U.S. is vital to the success of an economic war.

References

  1. Yilmaz, M. V., & Çakıroğlu, F. P. (2016, April 13). Food Safety – Problems and Solutions. Retrieved from https://www.intechopen.com/books/significance-prevention-and-control-of-food-related-diseases/food-safety-problems-and-solutions
  2. Inspection.gc.ca. (2019). Food Tampering – Canadian Food Inspection Agency. Available at: https://www.inspection.gc.ca/food/information-for-consumers/fact-sheets-and-infographics/food-handling/food-tampering/eng/1331585126472/1331585217459
  3. Lustbader, S. (2019). Spotlight: Ice Cream Licking, Corporate Negligence, and What Constitutes a Crime. The Appeal. Available at: https://theappeal.org/spotlight-ice-cream-licking-corporate-negligence-and-what-constitutes-a-crime/
  4. U.S. Food and Drug Administration. (2019). Food Tampering, An Extra Ounce of Caution. Available at: https://www.fda.gov/food/buy-store-serve-safe-food/food-tampering-extra-ounce-caution
  5. Medlineplus.gov. (2019). Biodefense and Bioterrorism: MedlinePlus. Available at: https://medlineplus.gov/biodefenseandbioterrorism.html

Analysis around Effectiveness of Biometric State in War on Terror

I conclude the biometric state is playing a role in the War on Terror by exploiting the morality of the target via biometric technology governing through risk, and simultaneously converting the opportunity, to channels of survival and security. In the War on Terror, the target of opportunity is portrayed in the media as mobile targets, and in that sense, the depiction of mobile targets are operating through civil spaces of society in anticipation of a future strike. Nonetheless, to identify targets, they must be localized, named, and depicted, therefore, targeting the mobility of individuals within governable space present wide-ranging surveillance for mobile bodies.

The Highway Watch was founded in 1998 to guide truck drivers on preparing and assisting possible road accidents. I contend the Highway Watch symbolizes contemporary U.S homeland security because it serves the basis for anticipatory governance and watchful politics. Amoore defines watchful politics using the sovereign sense of sight as the main source for gathering information and thus is dominating the visual sense of the War on Terror via representations of sight and seeing. Ewald defines watchful politics as a mechanism to govern through the suspicion of potential threats. Through a mobile, the screen allows for rational, and data-led seeing that is integral to the visual sense and is thus helping to capture a moment that would typically go unnoticed. I contend visual culture embodies everyday practices of seeing and showing therefore, contemporary state sovereignty is re-articulated in such a way that is central to particular modes of visuality. The watchful politics of the War on Terror in the biometric state are using images of individuals, scenery, collections of data, and algorithms for security and social control. In this sense, the constant mode of observing is resulting in a ubiquitous border, and the role of the biometric state in the War on Terror is subject to everyday securitization.

The precautionary principle is central to watchful politics because political decisions are based on the mode of visuality that is subjugated via biometric surveillance technologies targeting the totality of the population to establish norms and detect anomalies. Homeland Security Market In direct response to the 9/11, the Bush administration established the Department Homeland Security as the predominant security apparatus to prevent terrorism in the U.S. Consequently, the state distributed billions of dollars in re-configuring American surveillance programs that offered the private sector an operational role in the War on Terror. To illustrate this, private employment in the security industry grew 1.7 times the level in the public security sector and security spending doubled from $52 billion in 1990, to $103 billion in 2002. For example, pharmaceutical companies recognized the opportunity in homeland security market, announcing to stockpile on drugs and vaccines in an effort to counter bio-terrorism, reinforcing a survivor society.

The project, BioShield, was signed by President Bush in 2004 including a series of bio-terrorism countermeasures. This legislation reinforces the logic of preemption and an inevitable future that requires additional effort beyond government agencies because this bill was put forward in advance of a potential bio-attack thus preventing a threat before it occurs. To illustrate skyrocketing security expenditures, Pennsylvania station in New York City was offered additional security measures in reconstruction; however, Senator Schemer requested for an additional $450 million, despite increased policing, K-9, vehicle barricades, and several types of bomb sensors that detect radioactive materials— are just to name a few. This represents the urgency in security after 9/11, especially the rise of biometric technology to asset the fight against terrorism. Additionally, The Transportation Security Administration (TSA) emerged as a new federal branch to strengthen the security of the nation’s transportation system. This significantly widens the scope of security because rather than governing bodies at the physical border, surveillance extends to road and major commuting systems to now govern the mobility of people.

Policy Analysis Market (PAM)

Terrorist Futures Market The DARPA-supported PAM was designed for the U.S to exercise biometric technologies, such as methods of intelligence-gathering and surveillance techniques over area the U.S lacked control over. As a result, an insider trading market was founded upon market logic that offered digital and real-time waging on the chances of a future terror attack. Considering the biometric state is not restricted to the physical boundaries of the state, power is not limited to the security apparatus, but is circular— seeking insights from the general public based on information propagated from the government. Nonetheless, PAM was immediately ceased due to public backlash on inaccurate predications, thus Net Exchange, a privatized version for DARPA emerged.

Net Exchange embraces a market system and a new tool to collect valuable information in the war against terrorism. Unlike the traditional marketplace that is fueled by rational judgement and intelligence, Net Exchange is driven by fear in the survivor society and relies on social control. Algorithms The biometric state is indicative to homeland securitization of War on Terror because biometric technology deploy algorithmic calculations that are used for encoding patterns of behaviour and identifying transgression. Algorithmic calculations for surveillance is not new, though, in the wake of 9/11 it became a technological solution and the dominate method to state security. Agglomeration is an attractive mechanism for security in neoliberal societies as it can market judgements from a distance in urban areas to generate patterns of normal and atypical consumer behaviour, that is valuable information to verify and identify bodies.

The role of the biometric state in the War on Terror is thus changing security practices, blurring the lines between military, public, and commercial domains as security practices are not exclusive to the military. Traditionally, practices of security are deployed in areas war is prevalent, however, as the biometric state is concerned about mobility of individuals, biometric technology is accepted as a mechanism for surveillance and has the ability to target urban spaces as site of war. Bigo reinforces this as “everyday securitization from the enemy within” because urban spaces are rearranging into the “battle field, social arena, and marketplace”. Katz argues this is a circular process that is domesticating terrorism, and is accepting it constitutive of society. Arguably, terrorism corresponds too, and is secured in, the performance of security in everyday environment. Nonetheless, the biometric state becomes the means of securitization in the War on Terror.

Biometric Border The US VISIT programme emerged as a new process of authorization acquiring the capacity to trace and identify any movement across the border. The biometric border is thus drawing life into the exercise of power in which Foucault termed a ‘normalizing society’ — calculating the administration of life as the central technology of power. The biometric state is thus enhancing state authority through revitalizing power within the field of governmentally. For example, Accenture exemplifies the state harnessing power of best minds in private sector to enhance security in the nation and increasing efficiency of border power via governing mobility of bodies. The founder, Eric Stange, revealed a cultural change is required in the War on Terror because biometric technology for surveillance is employed outside the reach of the state and into private firms, saturating individual’s perception and role in the War on Terror. I can conclude then, the biometric border is representing a ubiquitous frontier to the War on Terror as the supreme force to identify and track movement across the border, and is operating beyond the scope of traditional boundaries.

Conclusion

In conclusion, I undertook a bold approach in exploring a number of ways in which the biometric state is playing a role in the War on Terror in American society. The biometric state is emerging as a new form of authority in the United States, and is combining a panoply of surveillance technology that is not limited to the physical border, but is bleeding into social spaces and institutions that previously were not constitutive of homeland security. As a result, the biometric state is relying on biometrics to govern the mobility of bodies, thus sovereignty is extended to control the movement of people in everyday spheres of life. I have argued the Bush administration adopted governing through risk using the a precautionary principle, an approach to risk management, and in that sense, naturalized terrorism in politics as an inevitable event. Thus the effort to prevent a threat before it occurs has resulted in a survivor society— or a risk society, where the citizen is drawn into the war against terrorism by actively participating in preparing for a future attack. The biometric state is continuing to facilitate the homeland security citizen, and the homeland security market in which I provide examples to illustrate the overlapping of public and private companies in the War against Terror. It is difficult to predict the future for the biometric state, however, at the rate of technological advancement and rising rate of human error, along with increasingly complex security threats, I am not optimistic the biometric state will succeed in preventing future strikes.