UNDERSTANDING VULNERABILITIES RELATED TO USB DRIVES AND OTHER ELECTION SOFTWARE