Discuss the vulnerabilities along the chain-of-custody of person’s vote.