Is this more secure than sneakernetting a memory card of some type?
At least for the Dominion machines the tabulator writes the ballot and vote counts to an encrypted memory card. It seems that a proprietary device to read that card and physically transfer the data to a compatible reader on the server would both preserve the original data and isolate and protect the tabulator.
USB access by definition is a pathway to introduce malware, spyware, viruses both intentional and unintentionally, even boot a separate operating system then mounting the host device to access its files. Once a USB is then separated, it can be substituted or edited in another device or have malware, spyware, viruses introduced during transport.
How many people had the knowledge of the encryption keys? Encryption is not the end all when physical access is possible and especially so when the encryption keys could be compromised.