. . . "Existing technology for tagging and verification of the identity and integrity of containers and other items offers insufficient security against sophisticated adversaries." .