For the past two decades, the Election Commission of India has used Electronic Voting Machines for polling. However, it is only in the last couple of years that doubts have been raised about whether EVMs can and have been manipulated by the ruling Bharatiya Janata Party to rig elections. Quite often we hear that since many countries have rejected EVMs, why should India use them at all? Is this not a threat to our democracy?
Many are sceptical of using such machines in elections, arguing that India, like many other countries, should return to paper ballots. The Election Commission of India has categorically rejected a return to paper ballots, and has said that taking all procedures into account, it is sure that fixing the elections by tampering with the EVMs cannot happen.
While any machine can be hacked, we believe that with the technological safeguards –in the design of EVMs and the processes followed during the design, coding and manufacturing of EVMs – along with the elaborate system of procedural checks in place that include the participation of political parties, it is unlikely that large-scale EVM rigging can be done.
This article describes and discusses both these aspects: the technical design of the EVM and the procedures in place that ensure that large-scale rigging of these voting machines is improbable. We also discuss the validity of the allegations and experiments made to demonstrate that the EVMs can be hacked.
Finally, we discuss the importance of conducting meaningful Voter Verified Paper Audit Trail that has been mandated by the Supreme Court to be used in the elections along with the EVMs. What should be a realistic approach to tallying these paper slips with the EVM vote count? Demands that a more extensive Voter Verified Paper Audit Trail be carried out are now being heard in the Supreme Court.
Types of voting machines
There are two types of electronic voting (e-voting) machines: direct recording electronic voting machines, and remote electronic voting using the internet (also called i-voting).
Why have EVMs been opposed in other countries, and why do we feel that India’s case of EVMs is different?
A number of countries are introducing or are thinking of introducing what they call “internet voting”. This means that voters can vote in the elections without going to the booth – they will be able to access the voting system through the internet. As we now know, any connection to the internet will not only allow the person to vote, but also provide an entry point for hackers. Therefore, no EVM that connects to the internet is ever going to be a safe system for the elections.
The second issue is that again in most countries where EVMs have been sought to be introduced, they have been designed using a standard personal computer as the base machine with custom coding for converting it into an EVM. Worse, most of these machines, even when they do not allow internet voting, allow internet connectivity for various purposes, including remote initialising and tallying of votes. Further, such machines are well known, and so are their security holes. Any hacker worth the name can hack into these machines relatively easily.
The Dutch machine – NEDAP/Groenendaal ES3B – has been extensively studied by researchers Rop Gonggrijp and Willem-JanHengeveld. Gonggripp is the founder of the group, “We don’t trust voting machines.”
These machines were extensively used in various countries including Germany. They have all the problems that we have identified here – they have a MS-Windows operating system, have external serial and printer ports, and a maintenance mode to access virtually anything in the machine. They even emitted radio waves that could be detected from a distance of a few metres and used to find out who was voting for which candidate.
Obviously such a machine is easy to hack. After the entire software toolkits of National Security Agency and the Central Intelligence Agency have been dumped on the internet, backdoors to systems with standard operating systems like MS-Windows, and the ability to hack them is that much easier.
However, the criticism of these machines cannot automatically be translated to the Indian EVMs because the Indian machines neither have an operating system nor are they connected to the internet.
It is instructive to note that even when the German court struck down the use of NEDAP EVMs, it said that it was open to an EVM that would meet the explicit criteria in German law that is required for verification of voting.
It is also not true that EVMs are used only in India. There are a few countries that use EVMs – Brazil, Estonia, and Venezuela – being among them. Estonia uses internet voting, while Brazil and Venezuela have voting based on direct recording electronic voting machines. Venezuela also uses a voter verified paper audit trail with its EVMs. But as is argued below, the Indian EVM is a unique machine.
The US uses EVMs too, though only in some states and local levels. The election processes in the US are controlled at the local and state levels, and there is no uniformity in these processes. What is far more prevalent in the US is for voters to bring their printouts of the ballot including their votes as cast, and then optically scan these printouts. These optically scanned votes are then automatically tallied and the results declared based on this tallying of the scanned printouts. However, the physical ballots are also preserved and can be counted in case of disputes.
Unlike in India, in the US, there is no uniformity in either the election procedures across the country nor is there an authority like India’s Election Commission that oversees the entire election process from the local to the country level.
The key feature of the EVMs in India is that in essence they are giant calculators. They do not have programs that can be changed without physically altering the machine; they do not even have an operating system. Therefore, one major pre-requisite for hacking – of being able to change the program externally – does not exist in the system.
The second important feature is that there is no internet connection in the system. Therefore, the EVMs cannot be manipulated either through the internet or as is being argued with a WiFi device.
In this sense, Indian EVMs are different from most other voting machines being sought to be introduced, particularly in the western world, where labour saving in the elections and ease of voting, have been the major consideration. A discussion of the design and technical safeguards in the design and manufacture will help explain the special nature of Indian EVMs
The design of the EVMs used in India is based on some key design principles that make the usual modes of attack on such machines unachievable. The Election Commission mandated that the EVMs should be stand-alone and “one time-programmable” machines, which are neither computer controlled nor connected to the internet or any network at any point of time.
The EVMs used in India are therefore quite unique in this fashion as compared to EVMs used in various western countries. The Indian EVMs can be categorised as a special class of direct recording electronic voting machines that are not connected to the internet.
The fact that the Indian EVMs are standalone with no provision of connecting them to the internet or any external network by itself prevents any kind of “networked” attacks on them. This category of attacks is the most common one faced by electronic or digital equipment since connection to an external network of any kind allows attackers to hack machines remotely without direct physical access.
As Indian EVMs do not have any wired network connectors such as RJ-45 connectors and also do not have wireless receivers/transmitters such as WiFi, mobile signals or Bluetooth, potential attackers cannot remotely connect to these machine and hack them.
The other key design principle is that the software used in these machines is burnt into a “One Time Programmable” chip that makes it impossible to alter or tamper with the software on these machines. As its name implies, a One Time Programmable chip can only be programmed once at the time of manufacture and cannot be reprogrammed subsequently. So the software programmed in the chip cannot be modified without replacing the physical chip itself by another.
This is unlike regular personal computers or servers where the operating systems and other software running on the computers are stored on drives that can be rewritten. Viruses and other malicious software often modify the original software stored in these drives in order to “hack” the machines. Hence the only way these machines can be hacked is if the original software programmed into these EVMs itself was compromised or hardware components of the EVMs are replaced in the field.
We argue that there is a rigorous set of processes that is followed during the design, coding and manufacturing of the Indian EVMs, which ensures the sanctity of the design, and manufacturing processes of the hardware and software. Also, the elaborate administrative procedures mandated for the transport, handling and operations of EVMs before, during and after elections make it very unlikely for the hardware to be replaced on a scale large enough to effect state and national elections.
Figure 1 shows the deployment of the various components of an EVM. The EVM consists of a control unit or CU that is placed on the presiding officer’s desk. This control unit is connected to the voter verifiable paper audit trail printer that is then connected to the ballot unit, or BU.
The voter verifiable paper audit trail printer and the ballot unit are kept in the voter booth. The voter verifiable paper audit trail status display unit is kept with the presiding officer and displays the status of the printer. With the latest version, the voter verifiable paper audit trail status display unit is no longer required as its functionality has been incorporated into the voter verifiable paper audit trail printer unit.
In order for a vote to be cast, the presiding officer must first enable the ballot unit by pressing a button on the control unit. The ballot unit becomes active only after this is done and the voter can cast their vote by pressing a button for a candidate once on the ballot unit. Once the button is pressed, the light next to the button comes on and a long beep can be heard indicating that the vote has been recorded. The voter verifiable paper audit trail simultaneously prints a small slip of paper that carries the symbol, name and serial number of the candidate chosen by the voter. This slip is visible for seven seconds in the machine’s viewing window.
Once one vote has been cast, the ballot unit becomes inactive and does not respond to any more button presses till the presiding officer schedules the next vote by again, enabling the ballot unit from the control unit.
Vote stuffing is not possible due to the feature that the control unit cannot accept another vote in less than 12 seconds. Votes are date and time stamped, and no votes can be cast before or after the poll. These safeguards contain the likelihood of booth capture and ballot stuffing, which used to be a problem before EVMs were introduced. Since the ballot unit becomes unresponsive once one button is pressed, it is not possible to send secret codes to the control unit using a series of button presses as was suggested during a demo organised by the Aam Aadmi Party in Delhi in May 2017.
It is not that just because of the 12-second delay, booth capture cannot happen. Now, it is just that the speed at which the “ballot stuffing” occurs will be slower. Earlier, one gang could go around from booth to booth serially capturing booths and stuffing the ballot boxes. The delay between successive button presses makes this process longer and therefore more difficult.
The Election Commission over time has added new features to the EVMs to further enhance their security and integrity. These include features like time stamping of ballot unit key presses, digital certificates that are used by the different components of the EVM – control unit, ballot unit and voter verifiable paper audit trail – to authenticate each other and which would stop working if paired with a fraudulent component.
The communication between these components is encrypted in the M2 and M3 versions of EVMs that are currently in use . This renders very unlikely attacks on the EVMs by tapping into the connecting wires between the components and inserting digital signals to change votes.
Design, engineering and manufacturing
The design, engineering and manufacturing processes are such that it is quite difficult for a single person or a small group of people to compromise the integrity of the software or the EVM machines as a whole at the engineering or manufacturing stage.
The software of EVMs is developed in-house by a selected group of engineers in two public sector units, independently of each other. These are the defence ministry public sector unit, Bharat Electronics Ltd, and the public sector unit under the Department of Atomic Energy, Electronic Corporation of India Ltd.
After completion of software design and development, testing and evaluation of the software is carried out by an independent testing group as per the software requirements specifications. This ensures that the software has been written to meet only the requirements laid down for its intended use.
Typically, programs are written by engineers in a programming language. This is called the source code that is human readable. Thereafter, the program is converted (“compiled” in technical parlance) into machine code which actually runs on the machine and is not human readable.
The “source code” for the EVMs is stored under controlled conditions at all times. Checks are in place to ensure that it is accessible only to authorised personnel. This is not to argue that such machine codes cannot be converted back to source form (or “decompiled” as it is called in technical language), but it is an additional barrier to hacking of the EVMs.
After completion of successful testing, only the machine code is given to the micro-controller manufacturer for writing it in the micro-controllers. (The micro-controllers effectively constitute the central processing unit of the EVM.) The source code is never handed over to anyone outside the software group of the public sector units.
The micro-controller manufacturer initially provides engineering samples to public sector units for evaluation. These samples are then assembled into the EVM, evaluated and verified for functionality. Bulk production clearance by the public sector units is given to the micro-controller manufacturer only after successful completion of this verification.
During production in the factory, functional testing is done by the production group according to the Quality Assurance plan that has been laid down. Samples of EVMs from production batches are regularly checked for functionality by the Quality Assurance group, which is an independent unit within the public sector units.
After production, the EVMs are shipped to states for storage as directed by the Election Commission. All movement of EVMs is done through an EVM tracking software. Containerised trucks or sealed trucks with proper locking arrangements that are sealed using paper seals are used for transporting EVMs and voter verifiable paper audit trail machines. These trucks are tracked using GPS. On receipt of the EVMs, the district election officers are supposed to video-graph the process of receipt of EVMs and then store them in strong rooms at the district headquarters.
The Election Commission has put in place a detailed set of administrative procedures for the handling of EVMs before, during and after the elections. It is the combination of the technical design of the EVMs along with these processes that have to be examined when we talk of the low likelihood of EVM hacking. Without these physical checks in which political parties are also expected to participate, we cannot talk about the safety or otherwise of electronic voting.
Pre-election procedures for EVMs start around 200 days before elections are held. As can be seen in Table 1, there is a comprehensive set of pre-election procedures to ensure that there is no tampering with the EVMs.
However, ensuring the integrity of the EVMs does require the political parties and their representatives to play an active role at many of the crucial stages.
An example is the set of preparations that happen three to six months before the polling date, depending on whether elections are being held for state or national elections. These procedures are critical for verifying the integrity of the EVMs and are therefore held in the presence of representatives of political parties.
The first of these procedures is the First Level Checking of EVMs that is done at the district level by the engineers of the manufacturers. This is held in the presence of political parties’ representatives. Since this happens some months before the state and national elections, political parties are often not aware of, or even if they are aware, they are not geared towards meaningfully participating at this stage of the process.
However, this is the only stage where it is possible to examine the internal parts of the EVMs to examine if suspicious modifications have been done to them. So it is crucial to send trained representatives at this stage.
After this, around three weeks before the polling date, the randomisation process of EVMs is done to allocate EVMs to constituencies. Since, the position of a political party in the ballot unit is done alphabetically by candidate names, the position of the party on the ballot unit is different for each constituency. The randomisation process ensures that any conspiratorial attempt to favour a particular political party by hacking EVMs and fixing a particular slot in the ballot unit will be thwarted.
EVM preparation procedures prior to elections
|Allocation of EVMs||200 days before polling||EC orders and allocates EVMs to States where elections are to be held.|
|Dispatch of EVMs||180 days before polling||EVMs are shipped in sealed trucks & tracked using GPS & EVM Tracking Software.|
|First level checking||3 to 6 months before polling||EVM internal parts are examined by engineers of manufacturers. Mock poll conducted & control unit sealed.|
|1st stage randomisation||3 weeks before polling||EVMs are assigned to constituencies using EVM Tracking Software.|
|2nd stage randomisation||2 weeks before polling||EVMs are assigned to polling booths.|
|Candidate setting||After last day of candidate withdrawal||Ballot paper is fixed on ballot unit. Candidate names are ordered in alphabetical order. Mock poll conducted & ballot unit sealed.|
There are likewise elaborate sets of protocols that govern operations on the polling day, then for storage and finally on counting day.
Polling day procedures for EVMs
|EVM serial numbers||Candidates should share the machine serial number of the EVMs (control unit, ballot unit & voter verifiable paper audit trial machine) allotted to the specific polling station with their polling agents so that they can inspect the EVM/VVPAT to their satisfaction before the commencement of mock poll. Presiding officers should be asked to show the machine number to the agents present before the commencement of the mock poll.|
|Mock poll||Mock poll is conducted at every polling station by the presiding officer by casting at least 50 votes in the presence of the polling agents. After which the presiding officer tallies the result in the control unit with the count of the VVPAT paper slips in the presence of the polling agents and confirms that the results tally for each candidate.|
|Actual polling||After the mock poll is over, paper seals are put on the control unit to block access to all buttons on the control unit except those that are used for the conduct of the poll. These paper seals are allowed to be signed by the polling agents. It is only after this that polling can commence.|
|Close of polling||After the close of polling, the presiding officer presses the “close” button on the control unit in the presence of polling agents. No votes can be polled after that in the EVM. The entire EVM is sealed. Polling agents are allowed to put their signatures on the seals. Candidate representatives travel behind vehicles carrying EVMs from polling stations to counting storage rooms. In addition to this, the strong rooms where EVMs are stored for counting are also sealed and secured fully by Central Armed Reserve Police Force guards round-the-clock. Additionally, candidates are allowed to put their own seals on the strong rooms and keep a around the clock watch.|
Counting day procedures
|Serial number and seal checks||Before the start of counting, the control unit serial number & the unique ID of the various paper seals are verified from records and shown to the counting agents. In EVMs, the poll start & end date, and time displayed on the control unit should be verified from the record and shown to the polling agents.|
|Non-display of result due to the presiding officer not pressing the “close” button.||In case any control unit does not display the result due to the presiding officer in the polling station not pressing the “close” button at the close of poll, the control unit should not be included in counting and a report filed for these control units.|
|Mismatch of total votes tally||In case the total votes polled as displayed by the control units does not tally with the total votes polled mentioned in the form filed by the presiding officer, the matter should be referred by the returning officer to the Election Commission for its decision.|
|Application for VVPAT paper slip counting||After the announcement of the results, any candidate or their counting agents may make an application for counting the printed voter verifiable paper audit trial paper slips in any or all polling stations. The returning officer then passes an order on whether or not the VVPAT paper slips should be counted.|
Claims of hacking
In spite of the many safeguards that are in place – in design, manufacture and administrative – there have been claims that the Indian EVMs can be tampered with
A number of claims of EVMs being hacked have been made in India. It started in 2010 with J Alex Halderman of the University of Michigan in the US and his students replacing parts of the machine and showing that it was possible – by changing the hardware – to change either the voting or the vote counts stored in the EVM. This could also be done remotely.
A similar exercise was shown by Aam Aadmi Party in May, 2017. In a demo, they showed essentially what Halderman and his team had done: change the hardware and then used the changed hardware to “hack” the EVM.
There has never been any doubt that if the EVM hardware can be changed, of course it becomes a different machine. In such a machine, it is easy to provide an external wireless interface through which results can be altered. Or pre-program a result, say, of transferring 10% votes from the number 1 position to, say, the number 3 position on the voting pad of the ballot unit of the EVM.
In the Indian EVMs, we vote by pressing a key on the keypad that has the name of the candidate and her party symbol displayed on that particular key. As the names on the keypad are allocated alphabetically, the position of the parties is not fixed on the voting pad. It changes from constituency to constituency based on the initials of the candidate.
That means the BJP could be in third position in one constituency on the voting keypad, and on the first position in another. For a hack by a particular political party to succeed, the hardware has to be first custom re-configured to match the constituency-wise position of that political party. Or the machine must have a wireless interface that can be dynamically controlled during or before the voting.
That a physical hack of the Indian EVM can achieve this has never been disputed by anybody, including the Election Commission of India. The question is whether a large scale physical hacking of 1.6 million EVMs – the numbers involved in the Lok Sabha elections – is possible. Even if 10% of such EVMs are physically hacked, that still means physically tampering with as many as 160,000 EVMs.
After the AAP demonstration of “hacking” , the Election Commission issued a challenge to political parties to show that the EVM could indeed be hacked. They set out very restrictive conditions, virtually saying, “Hack the EVM without touching it”. By posing a “challenge” and talking about “hackathons”, the Election Commission unnecessarily created an adversarial relationship between itself and the political parties.
The issue is not whether or not EVMs can be hacked. The issue – as some of the parties have argued – is the need to examine the system in entirety, including the EVMs, the physical and human checks, to be certain of its integrity. This should have been done in a cooperative manner and not in the way the Election Commission conducted its so-called EVM hackathon challenge.
A history of EVM hacking will not be complete without mentioning the recent fiasco involving a shadowy figure who claimed that there was a criminal conspiracy in the public sector Bharat Electronics Ltd to modify the software/hardware of the EVM. According to this claim, a wireless processor had been incorporated into the EVM and a low frequency wireless signal could be used to change the election results. This was initially touted as a high-profile press event in London, where “experts” would bring an EVM and show how it could be hacked.
The event turned into a fiasco. There were no EVMs. The US “expert” was not there in person. Instead, we had a person on video conference, most of whose face was covered as he spoke to the camera from a dark room. It had all the makings of a cheap B-grade Bollywood movie.
This “expert” then claimed that 12 of his team were gunned down in Hyderabad so as to keep this hacking mode secret, and he went on to say that this hacking could be done by using a low frequency signal in the range of 7-390 Hz.
Just to understand how absurd this claim is, we need to know that a signal in this range would need an antennae of several kilometres to process the wireless signal and get information. This is as absurd as the claims of some of our ministers – including the prime minister – of genetic engineering, and flying rockets and aircrafts in the age of the Mahabharata.
There has been a serious debate regarding verifiability of electronic voting, both from legal and technical considerations. Most of the legal challenges have hinged on the issue of verifiability under the law. While the laws may vary from country to country, the technical issue of computer security is common to all countries. Even though Indian EVMs are much more difficult to hack, no one can argue that they are completely hack proof. So the issue of verifiability that EVMs have not been hacked should be a consideration in Indian elections as well.
However, the way the voter verifiable paper audit trail is being treated by the Election Commission is as if it is a legal burden they are carrying, and they are taking token measures to fulfil the letter of the law, and not its real content.
Why is verifiability important? Bruce Scehneier, a well-known security expert states the problem quite well. He says:
“Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose.It is not enough that justice – in the elections – is done, it must be seen verifiably to be done. And this includes a paper audit capability as well.”
The voter verifiable paper audit trail was introduced in 2013 to essentially serve this purpose. Several political parties and civil society groups had demanded the ability to validate EVM results and also create a paper trail to record the voting preferences of voters so that in case of a dispute over the EVM or their tallies, the paper trail could be used in a court of law.
In 2013, the Supreme Court ruling on a writ petition directed the Election Commission “to incorporate a system of paper trail/paper receipt in the Electronic Voting Machines (EVMs) as a convincing proof that the EVM has rightly registered the vote cast by a voter in favour of a particular candidate.”
Currently, the Election Commission mandates the physical tallying of voter verifiable paper audit trail paper slips with the EVM results of only one EVM per Assembly constituency.
We feel this is inadequate to detect EVM discrepancies or rigging, were they to actually happen. Nor does this suffice to show transparency and establish the credibility of the voting process. We believe that the demand made by different political parties and other organisations to count a certain percentage of voter verifiable paper audit trail in each Assembly constituency is correct. Demands have been made to count anywhere between 10% to 50% of voter verifiable paper audit trail machines.
We feel that as an alternative, a statistical sampling principle could also be considered to come up with a percentage of EVMs that should be counted in each Assembly constituency to ensure that the probability of detecting rigging is, say, more than 99%.
However, such a method should be discussed and the final decision should be seen to be credible. It is not enough to submit an affidavit by, say, a professor in Indian Statistical Institute, to the Supreme Court and shelter behind an authority figure.
As we have said, the issue of the voter verifiable paper audit trail is as much about verification as of the credibility of the electoral process. So tallying of voter verifiable paper audit trail should be such that the parties and the electorate are convinced of the integrity of the electoral process. The Election Commission has to understand the need for this, instead of standing on its prestige.
Additionally, close elections, for example, elections where the winning margin is less than 1% of the total votes polled, all voter verifiable paper audit trail slips of that particular constituency should be physically tallied with the EVM counts.
Adopting such steps will go a long way in alleviating the fears in people’s minds about EVMs. Tallying of votes in a certain number of voter verifiable paper audit trail machines is as much about the optics of a fair elections and the confidence of the people in its fairness.
It is not our argument that Indian EVMs are hack proof. No machine built by anybody, however competent they are, can be made free from hacking by skilled hackers. We have argued that it will require physical access to the machines – whether in the factory or outside – to carry out this hacking.
As we have described in detail while discussing the administrative procedures, the EVMs have to pass the various verification procedures that involve representatives of political parties. These checks require that political parties understand and have an informed participation in these processes. Apart from physically verifying the EVMs, there are also randomisation procedures that involve the presence and participation of political party representatives.
Therefore, hacking such a system can be done only with a massive conspiracy, and with either the wilful participation of the Opposition parties in this conspiracy, or their complete ignorance of what is going on.
That is why we believe that to keep the elections and our EVMs free from hacking are not only the task of the Election Commission, but also of the political parties. This is where we need an informed Opposition to play its due role in the process.
Finally, elections must not only be fair but also seen to be fair. Therefore, our argument is that the Election Commission must not use the voter verifiable paper audit trail as just an ornament forced on it by the Supreme Court, and do a token verification. It should do a real verification by tallying the paper slips of the voter verifiable paper audit trail machines with the electronic count in the EVM. Only then will the Election Commission be able to put to bed the suspicions people have of their votes being hijacked by a ghost in the machine.
Prabir Purkayastha is an engineer and a science activist. He is President of Free Software Movement of India and Editor, Newsclick. Bappa Sinha is a technologist with over 25 years of experience in embedded systems and software, and a member of the Free Software Movement of India.
This article first appeared on The India Forum.