Electronic Voting Machines (EVMs) in Elections

 
PRESENTATION ON EVM
  
EVM= Ballot Unit + Control Unit + VVPAT 
Unit + VVPAT
 
1
 
S
e
p
t
e
m
b
e
r
 
2
0
2
1
 
TOPICS
 
2
 
1.
What is EVM (Ballot Unit + Control Unit + VVPAT)
2.
History
3.
Technical Expert Committee (TEC)
4.
Technical Security
5.
Administrative safeguards
6.
Debate around EVMs- Explained
7.
Court Judgements on EVM
8.
Why Going Back to Ballot not a Solution
 
1. What is EVM?
 
(Ballot Unit + Control Unit + VVPAT)
 
3
 
 
EVM (Ballot Unit + Control Unit + VVPAT)
 
4
 
B
a
l
l
o
t
 
U
n
i
t
 
V
V
P
A
T
 
C
o
n
t
r
o
l
 
U
n
i
t
 
EVM consists of Ballot Unit, Control Unit
and VVPAT
Polling Officer presses the Ballot Button of
Control Unit which  enable the voter to cast
his vote using Ballot Unit
When a voter presses a button against the
candidate of his  choice in Ballot Unit, red
light glow against candidate of his choice in
Ballot Unit.
A paper slip 
showing the 
serial no
, 
name
 and the
symbol
 of the candidate of his choice is generated
and visible for about 7 seconds through
transparent window of VVPAT
 
Control Unit
 
5
 
Ballot Unit
 
6
 
VVPAT
 
7
 
POLLING STATION LAYOUT
 
8
 
P
o
l
l
i
n
g
 
A
g
e
n
t
s
 
V
o
t
i
n
g
 
C
o
m
p
a
r
t
m
e
n
t
 
B
U
 
&
 
V
V
P
A
T
 
P
r
e
s
i
d
i
n
g
 
O
f
f
i
c
e
r
w
i
t
h
 
C
U
 
V
o
t
e
r
 
P
o
l
l
i
n
g
O
f
f
i
c
e
r
s
 
2. HISTORY OF EVM
 
Four Decades and more
 
9
 
 
HISTORY OF EVM – 40 YEARS  (1/2)
 
10
 
RP Act amended: enabling use EVMs w.e.f. 15.03.1989.
 
C
E
C
-
 
S
 
L
 
S
h
a
k
d
a
r
 
t
a
l
k
e
d
 
a
b
o
u
t
 
i
n
t
r
o
d
u
c
i
n
g
 
a
n
 
E
l
e
c
t
r
o
n
i
c
 
m
a
c
h
i
n
e
.
 
EVMs developed and demonstrated by ECIL and BEL.
 
EVMs used first time in 50 polling stations of Parur AC in Kerala.
   
And then in 11
Assembly Constituencies: 8 states, 1UT.
 
SC suspends EVM usage: cannot be used till RP Act is amended.
 
1977
 
1980-81
 
1982-83
 
1984
 
1988
 
EVM has been used continuously since 2000
 
SC dismissed petition asking for return to Ballot papers!
 
1
9
7
7
 
1
9
8
0
-
8
1
 
1
9
8
2
-
8
3
 
1
9
8
4
 
1
9
8
8
 
2
0
0
0
 
2
0
1
8
 
HISTORY OF VVPAT   (2/2)
 
11
 
100% deployment of VVPATs in Lok Sabha 2019.
 
In All Political Party Meeting held on 04.10.2021 agreed to incorporate VVPAT with
EVM
 
 
14
th
 August 2013-The Conduct of Elections Rules 1961 amended to use VVPAT &
First used in Bye-election for 51-Noksen AC in Nagaland
 
SC allowed ECI to introduced VVPAT system in phased manner
 
In all party meeting, the Commission committed to ensure 100% coverage of VVPATs
in all future elections.
 
SC directions for verification of VVPAT slips of 5 polling stations per AC or
AS in a PC for greater satisfaction.
 
S
i
n
c
e
 
2
0
0
0
,
 
E
V
M
s
 
h
a
v
e
 
b
e
e
n
 
u
s
e
d
 
i
n
 
a
l
l
 
e
l
e
c
t
i
o
n
s
:
 
4
 
L
o
k
 
S
a
b
h
a
 
a
n
d
 
1
3
2
 
S
t
a
t
e
 
L
e
g
i
s
l
a
t
i
v
e
A
s
s
e
m
b
l
i
e
s
.
 
 
T
i
l
l
 
d
a
t
e
,
 
>
3
4
0
 
c
r
o
r
e
 
v
o
t
e
s
 
c
a
s
t
 
o
n
 
E
V
M
s
.
 
2
0
1
0
 
2
0
1
3
 
O
c
t
 
-
 
2
0
1
3
 
2
0
1
7
 
2
0
1
9
 
A
p
r
i
l
 
-
 
2
0
1
9
 
3. TECHNICAL EXPERT COMMITTEE
 
INDEPENDENT EVALUATION
 
12
 
 
T E C- HISTORY & ROLE (1/3)
 
13
 
J
a
n
u
a
r
y
,
 
1
9
9
0
1st Technical Expert
Committee (TEC)
formed
 
A
p
r
i
l
 
1
9
9
0
TEC constituted for evaluation of
upgraded EVMs Submitted an
Evaluation Report in 2006
Recommended use of the
EVMs unanimously
 
D
e
c
e
m
b
e
r
 
2
0
0
5
 
N
o
v
e
m
b
e
r
 
2
0
1
0
Current TEC
Approves EVM Design
Vets and seals the software
Recommends continuous design improvement
Recommends improvements in the
manufacturing process
 
Past TECs (2/3)
 
14
 
Composition of First Technical Expert Committee on EVMs – 1990
 
1.
Professor S. Sampath, Chairman Technical Advisory Committee, Defence Research & Development
Organization DRDO), Ministry of Defence.
2.
Professor PV Indiresan of the IIT Delhi.
3.
Dr. Rao C. Kasarabada, Director, Electronic Research & Development Centre (ERDC), Trivandrum.
 
      Composition
 of Second Technical Expert Committee – Dec 2005
    1. Prof P.V. Indiresan, Ex-Director, IIT Madras as Chairman of TEC.
    2. Prof. D.T. Shahani of IIT Delhi.
    3. Prof. A.K. Agarwala of IIT Delhi.
 
PRESENT TEC COMPOSITION  (3/3)
 
15
 
4 Eminent Professors from IITs: Renowned Experts in their Fields.
 
Prof D T Shahani,
Prof Emeritus, IIT-Delhi
 
Prof Rajat Moona,
Director IIT Bhilai,
Former Director General CDAC
 
Prof Dinesh K Sharma
,
Prof Emeritus, IIT Bombay
 
Prof A K Aggarwala
,
IIT Delhi
 
4. TECHNICAL SECURITY
 
SECURE DESIGN AND MANUFACTURING
 
16
 
 
SECURE DESIGN AND MANUFACTURING
(1/5)
 
17
 
 
Real Time Clock
for date and time
stamping key
presses
 
Standalone
Machine
 
Population
 
No Radio Frequency
transmission or
reception capability
 
One Time
Programmable
(OTP)
 
 
Dynamic Coding
of Key Presses
 
 
 
Strong “mutual
authentication
capability”
Most
advanced
Encryption
techniques
Automated self
diagnostics at
every switch ON
 
 
Unauthorised Access Detection
Module
 
 
S
e
c
u
r
e
d
D
e
v
e
l
o
p
m
e
n
t
 
a
n
d
M
a
n
u
f
a
c
t
u
r
i
n
g
 
SECURE DESIGN AND MANUFACTURING (2/5)
 
18
 
 
 
Standalone Machine
: 
EVM is a machine not connected with external world through wire or
wifi or blue tooth or any network.
 
 
Unauthorised Access Detection Module (UADM)
: UADM embedded in the machine disables EVM
permanently, if any attempt made to access microcontroller or memory.
 
 
Most Advanced Encryption Techniques
: Encrypted communication between Control Unit, Ballot Unit
and VVPAT cannot be deciphered by tapping cables
.
 
SECURE DESIGN AND MANUFACTURING (3/5)
 
19
 
 
Automated self diagnostics at every switch ON
: It checks EVM’s standard features each time it is
Switched ON.
 
Strong Mutual Authentication Capability
: 
The strong mutual authentication capability ensures
that any unauthorised devices cannot interact with EVMs.
 
N
o
 
R
a
d
i
o
 
F
r
e
q
u
e
n
c
y
 
T
r
a
n
s
m
i
s
s
i
o
n
 
o
r
 
R
e
c
e
p
t
i
o
n
 
C
a
p
a
b
i
l
i
t
y
:
 
A
n
y
 
t
a
m
p
e
r
i
n
g
 
o
f
 
E
C
I
-
E
V
M
 
b
y
 
c
o
d
e
d
 
s
i
g
n
a
l
s
 
b
y
 
w
i
r
e
l
e
s
s
,
 
B
l
u
e
t
o
o
t
h
 
o
r
 
W
i
F
i
 
i
s
 
r
u
l
e
d
 
o
u
t
 
a
s
 
E
V
M
 
d
o
e
s
 
n
o
t
 
h
a
v
e
a
n
y
 
r
a
d
i
o
 
f
r
e
q
u
e
n
c
y
 
(
R
F
)
 
c
o
m
m
u
n
i
c
a
t
i
o
n
 
c
a
p
a
b
i
l
i
t
y
,
 
h
e
n
c
e
,
 
c
a
n
n
o
t
 
c
o
m
m
u
n
i
c
a
t
e
 
t
h
r
o
u
g
h
a
n
y
 
w
i
r
e
l
e
s
s
 
p
r
o
t
o
c
o
l
.
 
 
SECURE DESIGN AND MANUFACTURING
(4/5)
 
20
 
 
O
n
e
 
T
i
m
e
 
P
r
o
g
r
a
m
m
a
b
l
e
 
(
O
T
P
)
:
 
T
h
e
 
p
r
o
g
r
a
m
m
e
 
(
s
o
f
t
w
a
r
e
)
 
u
s
e
d
 
i
n
 
t
h
e
s
e
 
m
a
c
h
i
n
e
s
 
i
s
b
u
r
n
t
 
i
n
t
o
 
a
 
O
n
e
 
T
i
m
e
 
P
r
o
g
r
a
m
m
a
b
l
e
 
(
O
T
P
)
 
c
h
i
p
 
a
t
 
t
h
e
 
t
i
m
e
 
o
f
 
m
a
n
u
f
a
c
t
u
r
i
n
g
 
s
o
 
t
h
a
t
 
i
t
c
a
n
n
o
t
 
b
e
 
a
l
t
e
r
e
d
 
o
r
 
t
a
m
p
e
r
e
d
 
w
i
t
h
.
 
D
y
n
a
m
i
c
 
C
o
d
i
n
g
 
o
f
 
K
e
y
 
P
r
e
s
s
e
s
:
 
E
v
e
r
y
 
k
e
y
 
p
r
e
s
s
 
i
s
 
c
o
d
e
d
 
d
y
n
a
m
i
c
a
l
l
y
 
m
a
k
i
n
g
 
i
t
i
m
p
o
s
s
i
b
l
e
 
f
o
r
 
a
n
y
o
n
e
 
t
o
 
d
e
c
o
d
e
 
t
h
e
 
s
i
g
n
a
l
s
 
b
e
t
w
e
e
n
 
C
o
n
t
r
o
l
 
U
n
i
t
 
o
r
 
B
a
l
l
o
t
i
n
g
 
U
n
i
t
 
o
r
V
V
P
A
T
.
 
R
e
a
l
 
T
i
m
e
 
C
l
o
c
k
 
f
o
r
 
d
a
t
e
 
a
n
d
 
t
i
m
e
 
s
t
a
m
p
i
n
g
 
k
e
y
 
p
r
e
s
s
e
s
:
 
E
v
e
r
y
 
a
u
t
h
o
r
i
s
e
d
 
o
r
u
n
a
u
t
h
o
r
i
s
e
d
 
k
e
y
 
p
r
e
s
s
 
i
s
 
r
e
c
o
r
d
e
d
 
w
i
t
h
 
d
a
t
e
 
a
n
d
 
t
i
m
e
 
s
t
a
m
p
 
o
n
 
r
e
a
l
 
t
i
m
e
 
b
a
s
i
s
.
 
SECURE DESIGN AND MANUFACTURING (5/5)
 
21
 
 
S
e
c
u
r
e
d
 
D
e
v
e
l
o
p
m
e
n
t
 
&
 
M
a
n
u
f
a
c
t
u
r
e
:
 
o
Manufactured by Premium PSUs- BEL & ECIL: Both 
deal with manufacturing of sensitive equipment critical to the safety
and security of the Nation and have strong security protocols.
 
o
SOFTWARE Developed in-house by BEL/ECIL. Fully vetted by TEC. Never sub-contracted.
 
o
Secure Manufacturing: 4-level Physical/Process access Control, Regular frisking, Outside e-gadgets prohibited, CCTV
Coverage,
 Access Data and Process Data logging, Alarm and Alert generation.
 
o
Third Party Testing by Directorate of 
Standardisation Testing and Quality Certification (STQC)
 
as per Standards &
Quality Process set by TEC. Software is also tested & checked by STQC for authenticity.
 
5. ADMINISTRATIVE
SAFEGUARDS
 
SECURE PROCESS ON HANDLING &
MANAGEMENT OF EVMs
 
22
 
 
ADMINISTRATIVE SAFEGUARDS
 
23
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
 
S
t
a
k
e
h
o
l
d
e
r
P
a
r
t
i
c
i
p
a
t
i
o
n
 
 
A
l
l
o
c
a
t
i
o
n
 
a
n
d
M
o
v
e
m
e
n
t
 
 
F
i
r
s
t
 
L
e
v
e
l
C
h
e
c
k
i
n
g
 
(
F
L
C
)
 
 
R
a
n
d
o
m
i
z
a
t
i
o
n
s
 
 
 
C
a
n
d
i
d
a
t
e
 
S
e
t
t
i
n
g
 
 
M
u
l
t
i
p
l
e
 
M
o
c
k
P
o
l
l
s
 
 
P
o
l
l
 
D
a
y
C
h
e
c
k
s
 
 
P
o
l
l
 
C
l
o
s
u
r
e
 
&
T
r
a
n
s
p
o
r
t
a
t
i
o
n
 
 
 
S
t
o
r
a
g
e
 
a
n
d
S
e
c
u
r
i
t
y
 
 
C
o
u
n
t
i
n
g
 
D
a
y
P
r
o
t
o
c
o
l
 
 
E
V
M
 
M
a
n
a
g
e
m
e
n
t
S
y
s
t
e
m
 
(
E
M
S
)
 
STAKEHOLDER PARICIPATION
 
24
 
Active Participation of & Witness by Political-
Parties/Candidates in
 All Processes
 
Participation During FLC
 
Opening & Sealing of
EVM Warehouses &
Strong-rooms
 
First Level Check (FLC)
 
List of EVMs after 1
st
 & 2
nd
randomization shared to
political parties/candidates
 
Candidate Setting
 & Symbol
loading-
Sign on Paper Seals on
EVMs after all processes
 
Conduct mock poll and
receive mock poll results
 
Counting Process
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
ALLOCATION & MOVEMENT
 
25
 
Planned Allocation
 
Secured Transportation
EVMs are allocated to poll going State by the
Commission.
Received by District Election Officer (DEO) who is
personally responsible for secured storage.
EMS used for inventory management of all
EVMs nationwide for the sake of
transparency.
 
Movement of EVMs mandatorily managed through EVM
Management System (EMS).
Only Containerized/Sealed Trucks used.
All Trucks sealed with Lock and Paper Seals.
Mandatory GPS tracking of EVM vehicles.
All movement under 24X7 Police Escort.
Videography done of shifting process.
Political parties informed in advance about the opening,
stocking and sealing of warehouses while moving EVMs.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
FIRST LEVEL CHECKING (FLC)
 
26
 
FLC is mandatorily done in the presence of
representatives of political parties.
Fully sanitized hall under videography and full security.
Full functionality and behavioural check is done on every
EVM.
Defective (non-functional) EVMs are kept aside and not
used in election.
FLC status captured in EMS.
Introduction of Pre-FLC unit on pilot basis to mitigate
human errors during FLC
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
FLC PROCESS
 
Complete physical
check up (switches,
cable, latches etc)  &
functional test
 
Mock Poll on All
EVMs/VVPATs
 
Mock Poll on randomly selected 5%
EVMs for higher votes (1200 votes
in 1%, 1000 in 2% & 500 in 2%)
 
Electronic Result in CU is
tallied with VVPAT Slip
count and results shared
with representatives
 
CU sealed after FLC
using ‘Pink Paper
Seal’
 
Signing on seals
by Engineers and
representatives
 
EVMs/VVPATs stored in
Strong Room under
24X7 security
 
Photocopies of record registers
shared with political party
representatives
 
27
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
RANDOMIZATION 
  
            (1/4)
 
28
AC 1
AC 2
AC (n)
PS1
PS2
 
2
nd
 Randomization
 
1
st
 Randomization
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
FIRST  RANDOMIZATION 
  
            (2/4)
 
29
 
1st
 Randomization
 
EVMs are 
Randomized twice
 using EMS.
No human intervention in randomisation.
Only FLC approved EVMs as per EMS get picked up for first randomisation.
Done after FLC
To allocate EVMs from district, randomly, to a particular AC/AS.
In presence of representatives of political parties.
List of AC/AS-wise Randomized EVMs shared with political parties.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
SECOND RANDOMIZATION 
  
(3/4)
30
1st
 Randomization
2
nd
 
Randomization
EVMs are 
Randomized twice
 using EMS.
No human intervention in randomisation.
Only FLC approved EVMs recorded in EMS get picked up for first randomisation.
Done just before ‘candidate setting’.
To allocate EVMs available in an AC/AS to polling stations.
In presence of candidates/election agents and list shared.
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
RANDOMIZATION-  THE FOUNDATION  OF EVM SECURITY
  
           (4/4)
 
31
 
Till first randomization- no one knows
 
which EVM is going to which Constituency.
 
Till  nomination finalization- no one knows
 
the sequence of names on the ballot paper.
 
Hence, till candidate setting 
no one (not even RO/DEO/CEO/Commission) knows which button on which
BU will be assigned to which candidate
, 
making even an attempt to tamper absolutely futile.
 
Till 2nd Randomization- no one knows
 
which EVM will go to which PS.
 
Added to this is the
 
3 stage Randomization 
 
of polling officials to different polling stations.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
CANDIDATE SETTING (1/2)
 
32
Insert ballot paper in the
Ballot Unit & Set Number
of Candidates
   Seal Ballot Unit
Mock Poll on Every EVM
with VVPAT +
1000 vote on 5% EVMs  with
VVPATs
 
The Process
Symbol loading in VVPAT
   Seal VVPAT
Candidate Setting in
Control Unit
   Seal Candidate Set of
CU
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
CANDIDATE SETTING (2/2)
 
33
 
Fully sanitized hall 
under videography and full security.
 
Done only
 
after
 
finalization
 of the names of contesting candidates.
 
1
 
3
 
Done in the 
presence of candidates 
or their agents.
 
Security Measures
 
Introduction of 
new SLUs 
for loading symbols in VVPATs, and enabling
simultaneous live viewing on TV monitor by all stakeholders
 
4
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
MULTIPLE MOCK POLLS
 
34
 
Each EVM & VVPAT undergoes mock poll during FLC, and
again during Candidate Setting. In addition 10% EVMs are
randomly picked up for higher vote (500-1200) mock poll.
Electronic result count is verified with paper slips count.
 
10% EVMs randomly taken out for Training and Awareness
undergo Mock Polls several times.
 
Before start of actual poll, Mock poll  on each EVM alongwith
VVPAT with at least 50 votes in the presence of polling agents.
Electronic result count is verified with paper slips count.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
POLL DAY CHECKS
 
35
 
Polling Agents
Central Armed Police Force (CAPF) and Micro
Observers deployed at poling stations.
Web Casting/CCTVs
Frequent visits (Sector Officers /Senior officers/
Observers)
2 hourly reporting of votes polled
Media vigil
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
POLL CLOSURE & TRANSPORTATION
 
36
Poll Closed on EVM by pressing CLOSE button – EVM  cannot accept
any further vote.
EVMs sealed in the respective carrying cases & polling agents sign on them.
EVMs transported back to the reception centres under armed escort.
Candidates’ representatives are allowed to follow them.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
STORAGE & SECURITY                  (1/5)
 
37
 
 
EVM Warehouse/Strong-room with 
only One Entry Point.
Entry secured by a 
Double Lock System
 with DEO & Dy. DEO, each having custody of  keys of one
lock each.
24X7 Armed security.
The opening & closing of EVM warehouse ONLY in presence of Political party representatives-
advance written intimation mandatory.
Every EVM moved is managed by ECI through EMS.
 
  Post Polling:
 
Polled EVMs are stored in strong room having double lock system.
Candidates allowed to put their 
own seals on locks.
 
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
STORAGE & SECURITY                  (2/5)
 
38
 
Various layers of security of polled EVMs
 
1.
Unique ID of BUs, CUs & VVPATs 
shared with political parties/candidates.
 
2.
Sealing of CU and BU with Pink Paper Seals 
during FLC and commissioning respectively on
which political parties and candidates put their signatures.
 
3.
Sealing of EVMs 
before starting actual poll on which polling agents also put their signatures.
 
4.
Seals on carrying cases 
of EVMs after closing of poll on which polling agents also put their
signatures.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
STORAGE & SECURITY                  (3/5)
 
39
 
 
5.
Double lock system 
at the door of strong room on which candidates also put their own seals.
 
6.
CCTV f
eed to Candidates Camping Area to monitor strong room.
 
7.
Two Cordoned 
round-the-clock security (Inner perimeter manned by CAPF and Outer perimeter
by State Armed Police.
 
8.
Log-book and videography 
of officers inspecting the two cordons daily.
 
9. 
 
Candidates/their representatives are allowed to watch the strong room 24x7
 
10.
 
24/7 security arrangement 
for unused EVMs also.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
SECURE STORAGE IN STRONGROOMS TILL
COUNTING (4/5)
 
40
Polled EVMs kept in strong room, sealed in
the presence of the Candidates and
Observer.
Facilitation for Candidates to watch the
Polled EVM Strong Room 
24/7.
 
Starting from FLC of EVMs to Counting of
votes, EVMs are kept in Strong-room with
full 24/7 security.
 
S
A
P
-
 
S
t
a
t
e
 
A
r
m
e
d
 
P
o
l
i
c
e
 
C
A
P
F
-
 
C
e
n
t
r
a
l
 
A
r
m
e
d
 
P
o
l
i
c
e
 
F
o
r
c
e
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
STORAGE DURING ELECTION PETITION PERIOD
(5/5)
 
41
 
Election Petitions can be filed within 45 days of result declaration.
 
EVMs (BU+CU) & VVPATs remain under sealed conditions till EP position is ascertained.
 
EVMs and VVPATs under EP, are kept under safe custody of DEO (Strong Room) till final disposal of
EP.
 
Print on VVPAT Slips remains for 5 years.
 
Remaining EVMs and VVPATs not in EP are now free for re-use.
 
 
 
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
COUNTING DAY PROTOCOL
 
42
 
On the day of counting, strong room opened in the presence of Candidates, RO
and Observer under videography.
 
Round-wise 
CUs are brought to the counting tables from Strongrooms 
under
CONTINUOUS CCTV Coverage.
 
Unique ID number of the CU & the signed seals are verified and shown to the
polling agents.
 
EVMs are stored back in Strong Room in the presence of candidates/their
representatives till the completion of the Election Petition period.
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
EVM Management System (EMS)
 
43
 
 
In house EVM Stock Management Software
 
Barcode of every EVM is scanned into EMS every time it moves from one Warehouse to another
 
All EVM Allocations done on EMS
 
FLC status(OK/Rejected) captured in EMS
 
EVMs Randomisation twice on EMS
 
EVM sent for repair captured in EMS
 
EVMs under EP marked in EMS
 
A
D
M
I
N
I
S
T
R
A
T
I
V
E
 
S
A
F
E
G
U
A
R
D
S
P
r
e
s
e
n
c
e
 
o
f
 
p
o
l
i
t
i
c
a
l
 
p
a
r
t
i
e
s
/
c
a
n
d
i
d
a
t
e
s
/
t
h
e
i
r
 
r
e
p
r
e
s
e
n
t
a
t
i
v
e
s
 
i
n
 
e
v
e
r
y
 
e
l
e
c
t
i
o
n
 
r
e
l
a
t
e
d
 
p
r
o
c
e
s
s
 
i
s
 
m
a
n
d
a
t
o
r
y
 
6. DEBATE AROUND
EVMs-EXPLAINED!
 
CLARIFICATION ON ALL ISSUES
 
44
 
 
DOUBTS CREATED AROUND EVM
 
45
International
Comparison
EVM Challenges
Defective Vs
Tampered
 
NO POSSIBILITY OF EVM HACKING
 
46
 
‘Hacking’
 
is unauthorised access to or control over computer network security
systems for some illicit purpose.
 
In the case of ECI EVMs, the word ‘
Hacking’ is not applicable
 for following
reasons:
The EVM is a 
stand-alone
 machine and is not connected to any network
through wire or wirelessly.
The SW programme in the OTP Microcontroller can 
neither be read nor
modified.
 
 
 
NO POSSIBILITY OF REMOTELY ALTERED DISPLAY THROUGH
WIRELESS COMMUNICATION
 
47
 
It is alleged this can be done by either replacing the original display module
with another display fitted with a wireless device or inserting an extra circuit
board which can communicate with an external unit via a wireless device and
tamper the result by controlling the CU display used for declaring the result.
 
Such a modification would require  unfettered access to the EVM after FLC
Ruled out.
 
In M3 EVMs the display is mounted in the UADM. Any attempt to open the
UADM will send the EVM into Factory Mode-
 
Ruled out.
 
MEMORY MANIPULATION RULED OUT
 
48
 
It is alleged that voting data can be altered by clipping a Memory
Manipulator IC to the memory chip where Vote data is stored.
 
This would need,
Full and free access to CUs after the Polling is over- 
Ruled Out !!
Breaking
 the seals and locks of the strong room in the presence of
two layers of security plus the representatives of the candidates
camping  near the strong room- 
Ruled Out !!
The memory is inside the microcontroller which itself is inside the
UADM- 
Ruled Out !!
 
REPLACEMENT OF MICROCONTROLLER/MEMORY CHIP or
MOTHERBOARD IMPOSSIBLE (1/2)
 
49
 
Administrative Safeguards
Chip replacement would require access to EVM Warehouses 
Ruled Out.
Any chip replacement before FLC will get caught during FLC.
Chip Replacement  after FLC would require access to Strong Rooms and breaking of EVM
Pink Paper seals
Ruled Out.
Microcontroller is inside the UADM and cannot be accessed without putting the EVM in
Factory Mode
- 
Ruled Out.
 
 
REPLACEMENT OF MICROCONTROLLER/MEMORY CHIP or
MOTHERBOARD IMPOSSIBLE (2/2)
 
50
 
 
Technical Security
 
BUs and CUs communicate only amongst themselves after mutual authentication and
cannot be connected to any other machine. Thus, 
any modified EVM (with microcontroller
/memory changed) would not be usable
 
even if someone is able to hypothetically bypass
security arrangements and modify EVM.
 
TAMPERED SOURCE CODE “TROJAN” RULED OUT
 
51
 
It is alleged that Trojan can be introduced in the following
manner
by reprogramming the chip, or
by the chip manufacturer during fusing of the software.
 
Re-programming 
Ruled Out
 
as these are OTP chips.
Code tampering by the chip manufacturer 
Ruled Out
 
as the
software is ported by BEL/ECIL in their factories in the highest
security environment.
 
NO POSSIBILITY OF VOTE STUFFING AFTER POLL
CLOSURE
 
52
 
Administrative safeguards
Poll closed by pressing the “CLOSE” button on the CU after last vote, Representatives of
candidates who are present signs on the seals.
EVM seals checked on counting day.
 
What if seals broken and votes stuffed while transporting?
EVM does not accept any votes after CLOSE button pressed in CU.
 
What if CLOSE button not properly pressed and Votes Stuffed while transporting?
Poll Closure time recorded in the PO’s diary and any votes polled in the EVM after this time can be
identified due to time stamping of key presses.
 
DEFECTIVE/NON-FUNCTIONING VS
MANIPULATION/TAMPERED      (1/2)
 
53
 
Tampered 
machine is one which would behave in a predefined biased manner to favor someone.
 
Malfunctioning
 machine is one which would randomly behave erroneously, but without a predefined
biased manner.
 
Defective or Non-functioning 
machine is one which becomes inoperative.
 
While 1-2% EVMs may become Defective/Non-functional (and are replaced with good EVMs), 
no case of
Malfunctioning EVM (i.e. one recording wrong vote) ever reported.
 
Question of Tampering absolutely ruled out 
due to several layers of technical and administrative
safeguards.
 
DEFECTIVE/NON-FUNCTIONING VS
MANIPULATION/TAMPERED      (2/2)
 
54
 
However, 
No incident of EVM tampering ever found
.
 
DEFECTIVE EVM PROTOCOL
 
55
 
Defective EVMs
EVMs that fail to function  due to any mechanical, structural or physical defect like faulty
switches, broken button, faulty connections etc.
However, these 
NEVER record Wrong Vote
.
 
EVMs are checked for defects 3 times -  during FLC, candidate setting, before start of poll.
 
Serial Numbers and defects of these EVMs are noted and EVMs are sent to the manufacturers
for analysis and repair.
 
Manufacturers follow same security protocols during repair as they do for manufacturing new
EVMs.
 
VARIOUS FORMS OF ELECTRONIC VOTING IN OTHER
COUNTRIES
 
56
 
Country Specific Details
 
57
 
Other countries using EVMs (DRMs):
 
USA, Australia, Belgium, Bulgaria, Italy, Switzerland, Canada, Mexico, Argentina, Brazil, Chile, Peru, Venezuela,
Namibia, Nepal, Bhutan, Armenia, Bangladesh.
 
Currently, in the 
USA
, 
the Direct Recording Machines are used in 27 states
, among which 
paper audit
trails are used in 15 states
.
 
The other voting methods include: 
Optical Scan Paper Ballot Systems, Ballot Marking Devices, and the
Punch Card Ballot.
 
 
 
58
 
58
 
EVM CHALLENGE- 2009
 
59
 
Commission organized an 
EVM Challenge 
w.e.f. 
3
rd
 – 8
th
 August 2009.
 
Political Parties, Petitioners before various Courts and some individuals, who had alleged
tamperability of ECI-EVM, invited to participate in the Challenge.
 
100 EVM brought from 10 States were offered for demonstration of alleged tamperability
in presence of technical expert group, representative of manufacturers and ECI Officers.
 
None of the persons could actually demonstrate any tamperability of the ECI-EVM.
 
EVM CHALLENGE- 2017 
 
            (1/2)
 
60
 
Commission organized an 
EVM Challenge 
on 
3
rd
 June 2017.
 
All National and State Political Parties invited to participate in the Challenge.
 
Parties allowed to pick EVMs of their choice from the 5 poll-gone States (UP, Punjab, UK,
Goa, Manipur), which were securely held in the Strong rooms under 24*7 armed security.
 
Parties given opportunity to demonstrate EVM manipulation/tampering in the votes
recorded in the EVMs of their choice, as variously alleged earlier.
 
EVM CHALLENGE- 2017 
 
            (2/2)
 
61
 
NO Political Party participated 
in the Challenge.
 
Only 2 parties i.e. NCP & CPI-M reported to venue, ONLY TO UNDERSTAND THE
EVM PROCESS BETTER and were given detailed briefing.
 
The credibility and integrity of ECI-EVMs has always remained perfectly intact and
unscathed.
 
7. PAST JUDGEMENTS
 
62
 
Hon’ble High Courts: JUDGEMENTS
 
63
 
 Karnataka High Court 1999
This invention is undoubtedly a great achievement in the electronic and computer
technology and a national pride
’.
 
 Madras High Court 2001
 
There is also no question of introducing any virus or bugs for the reason that the EVMs
cannot be compared to personal computers.
 
 Kerala High Court 2002
The High Court recorded its appreciation on the efficiency of the mechanism of
detecting votes cast by impersonators. Upheld by the Hon’ble Supreme Court in 2003.
 
Hon’ble High Courts: JUDGEMENTS
 
64
 
 Bombay High Court: Order dated 23.02.2018:
 
T
he Bombay High Court ordered a detailed 
Forensic Examination 
of the EVMs from CFSL,
Hyderabad for checking any manipulation etc. 
The CFSL report clearly ruled out any tampering,
alteration or manipulation in the EVMs.
 
 High Court of Madhya Pradesh: Order dated 05.12.2018:
 
In Writ Petition (Civil) No. 28016/2018 Naresh Saraf Vs ECI & Anr, Hon’ble High Court of Madhya
Pradesh expressed satisfaction at the 
Security and Storage Protocols 
for EVMs and VVPATs
established by the ECI and rejected petition to give directions for any changes.
 
Hon’ble High Courts: JUDGEMENTS
 
65
 
H
i
g
h
 
C
o
u
r
t
 
o
f
 
G
u
j
a
r
a
t
:
 
O
r
d
e
r
 
d
a
t
e
d
 
1
9
.
0
3
.
2
0
1
9
:
 
.
.
.
.
a
s
 
w
i
l
l
 
b
e
 
e
v
i
d
e
n
t
 
f
r
o
m
 
t
h
e
 
e
x
t
e
n
s
i
v
e
 
r
e
p
r
o
d
u
c
t
i
o
n
 
o
f
 
t
h
e
 
s
t
a
t
u
s
 
r
e
p
o
r
t
 
o
n
E
V
M
s
/
V
V
P
A
T
s
,
 
t
h
e
 
s
y
s
t
e
m
 
o
f
 
r
e
g
i
s
t
e
r
i
n
g
 
v
o
t
e
 
o
f
 
t
h
e
 
v
o
t
e
r
 
a
n
d
 
r
e
f
l
e
c
t
i
o
n
 
o
f
 
h
i
s
 
v
o
t
e
h
a
s
 
b
e
c
o
m
e
 
m
o
r
e
 
t
r
a
n
s
p
a
r
e
n
t
 
a
n
d
 
a
p
p
a
r
e
n
t
 
t
o
 
r
e
g
a
i
n
 
t
h
e
 
v
o
t
e
r
s
 
c
o
n
f
i
d
e
n
c
e
 
i
n
 
t
h
e
s
y
s
t
e
m
.
 
W
h
a
t
 
e
s
s
e
n
t
i
a
l
l
y
 
w
a
s
 
t
h
e
 
o
b
j
e
c
t
 
o
f
 
i
n
t
r
o
d
u
c
t
i
o
n
 
o
f
 
t
h
e
 
V
V
P
A
T
s
 
w
a
s
 
t
h
e
r
e
s
t
o
r
i
n
g
 
o
f
 
t
h
e
 
v
o
t
e
r
s
 
c
o
n
f
i
d
e
n
c
e
 
b
y
 
l
o
g
g
i
n
g
 
a
n
d
 
r
e
g
i
s
t
e
r
i
n
g
 
o
f
 
h
i
s
 
v
o
t
e
 
c
o
r
r
e
c
t
l
y
 
i
n
t
h
e
 
E
V
M
.
 
T
h
e
 
V
o
t
e
r
 
V
e
r
i
f
i
e
r
 
A
u
d
i
t
 
T
r
a
i
l
 
a
s
 
t
h
e
 
n
a
m
e
 
s
u
g
g
e
s
t
s
 
a
s
s
u
r
e
s
 
t
h
e
 
v
o
t
e
r
 
o
f
 
h
i
s
v
o
t
e
 
h
a
v
i
n
g
 
b
e
e
n
 
c
o
r
r
e
c
t
l
y
 
r
e
c
o
r
d
e
d
 
i
n
 
t
h
e
 
s
y
s
t
e
m
.
.
 
O
n
c
e
 
t
h
e
 
o
b
j
e
c
t
 
o
f
 
t
h
e
 
a
u
d
i
t
 
o
f
t
h
e
 
v
o
t
e
r
s
 
v
o
t
e
,
 
f
r
o
m
 
h
i
s
 
p
e
r
c
e
p
t
i
o
n
 
i
s
 
a
c
h
i
e
v
e
d
,
 
w
h
o
 
i
s
 
t
h
e
 
e
n
d
 
c
o
n
s
u
m
e
r
 
o
f
t
h
e
 
f
r
a
n
c
h
i
s
e
,
 
t
h
e
 
m
e
r
e
 
a
p
p
r
e
h
e
n
s
i
o
n
 
v
o
i
c
e
d
 
b
y
 
t
h
e
 
c
a
n
d
i
d
a
t
e
,
 
p
a
l
e
s
 
i
n
t
o
i
n
s
i
g
n
i
f
i
c
a
n
c
e
 
Hon’ble High Courts: JUDGEMENTS
 
66
 
H
i
g
h
 
C
o
u
r
t
 
o
f
 
D
e
l
h
i
:
 
O
r
d
e
r
 
d
a
t
e
d
 
0
3
.
0
8
.
2
0
2
1
:
 
 Dismissed plea seeking to stop the use of EVMs
 
 Imposed a fine of Rs. 10,000 on the petitioner terming the petition as a ‘Publicity
Interest Litigation’ based on hearsay and ‘baseless allegations and averments’.
 
Hon’ble Supreme Court: Dismissed Ballot Paper
Request  (1/2)
 
67
 
 Order dated 22.11.2018:
 
In Writ Petition (Civil) No. 1332/2018, Nyaya Bhoomi & Anr Vs ECI, Hon’ble Supreme Court
dismissed the petition requesting for return to Ballot paper system.
 
Upon hearing the counsel the court made the following 
ORDER-
 
“Having heard learned counsel for the petitioners and upon perusing the relevant
material, we are not inclined to entertain the writ petition. The same is, accordingly,
dismissed.”
 
The Hon’ble Supreme Court on VVPAT counts (2/2)
 
68
 
 Order dated 08.04.2019:
 
“We are certain that the system ensures accurate electoral results.”
 
“Verification of VVPAT slips of 5 Polling Stations per Assembly Constituency or Assembly Segment in a
Parliamentary Constituency would lead to greater satisfaction.”
 
Review Petition 
against above order dismissed on 07.05.2019.
 
 Order dated 21.05.2019:
 
The Supreme Court on 21.05.2019 dismissed a PIL seeking counting of VVPAT slips of all EVMs while 
rebuking
the petitioner NGO  
for making a “mockery of democracy”
 by moving the court despite a clear ruling by the apex
court directing counting of VVPAT slips of five Polling Stations per assembly segment.
 
Why Going Back to Ballot not a Solution (1/2)
 
69
 
1.
Average around 2000 invalid votes in each Constituency when ballots used.
 
2.
Vote stuffing was very easy with Ballot papers. EVMs designed to allow only 4 votes per minute ruling out
vote stuffing.
 
3.
Counting of Ballot Papers was always prone to manual errors. EVM counting both quick and accurate.
 
4.
Retrograde step in the era of Technology when even financial transactions done electronically.
 
5.
Ballot papers are made of wood pulp and hence made at a cost to environment.
 
6.
India is the largest democracy in the world with about 93.7 crore registered voters unmatched in scale
and complexity.
 
Why Going Back to Ballot not a Solution (2/2)
 
70
 
7.
There is a clear need to leverage on technology to make the voting process more efficient and accurate
compared to the manual ballots.
 
8.
Since the introduction of VVPATs, more than 
113
 crore voters have cast their votes with full
satisfaction & 
ONLY 
25
 (twenty-five) complaints 
received u/r 49MA, which were all FOUND TO BE
FALSE.
 
9.
Till date, in 
61 (Sixty-one)
 instances RO has allowed slip counting since 2017. 
All counts matched.
 
10.
In Mandatory Verification of VVPAT slips count no case of a vote cast for Candidate ‘A’ getting
transferred to candidate ‘B’.
 
 
THANK YOU
 
71
Slide Note
Embed
Share

Electronic Voting Machines (EVMs) consist of Ballot Unit, Control Unit, and VVPAT Unit. This technology enables voters to cast their votes securely and efficiently. Explore the history, technical details, security measures, and the debate surrounding EVMs in this insightful presentation.

  • EVM
  • Voting Machines
  • Elections
  • Technology
  • Security

Uploaded on Jul 22, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. PRESENTATION ON EVM EVM= Ballot Unit + Control Unit + VVPAT Unit + VVPAT September 2021 1

  2. TOPICS 1. 1. 2. 2. 3. 3. 4. 4. 5. 5. 6. 6. 7. 7. 8. 8. What is EVM (Ballot Unit + Control Unit + VVPAT) What is EVM (Ballot Unit + Control Unit + VVPAT) History History Technical Expert Committee (TEC) Technical Expert Committee (TEC) Technical Security Technical Security Administrative safeguards Administrative safeguards Debate around EVMs Debate around EVMs- -Explained Explained Court Judgements on EVM Court Judgements on EVM Why Going Back to Ballot not a Solution Why Going Back to Ballot not a Solution 2

  3. 1. What is EVM? (Ballot Unit + Control Unit + VVPAT) (Ballot Unit + Control Unit + VVPAT) 3

  4. EVM (Ballot Unit + Control Unit + VVPAT) EVM consists of Ballot Unit, Control Unit and VVPAT Polling Officer presses the Ballot Button of Control Unit which enable the voter to cast his vote using Ballot Unit When a voter presses a button against the candidate of his choice in Ballot Unit, red light glow against candidate of his choice in Ballot Unit. A paper slip showing the serial no,name and the symbol of the candidate of his choice is generated and visible for about transparentwindow ofVVPAT 7 seconds through Control Unit Ballot Unit VVPAT 4

  5. Control Unit CONTROL UNIT- enables the Ballot Unit to accept vote from the voter and stores the vote cast . 5

  6. Ballot Unit BALLOT UNIT- the voter can franchise his/her pressing a button against the candidate of his/her choice vote by 6

  7. VVPAT VVPAT- allows the voters to verify that their votes are cast as intended. 7

  8. POLLING STATION LAYOUT Polling Agents Voting Compartment Polling Officers BU & VVPAT Presiding Officer with CU Voter 8

  9. 2. HISTORY OF EVM Four Decades and more Four Decades and more 9

  10. HISTORY OF EVM 40 YEARS (1/2) 1977 1977 1977 CEC- S L Shakdar talked about introducing an Electronic machine. EVMs developed and demonstrated by ECIL and BEL. 1980-81 1980 1980- -81 81 EVMs used first time in 50 polling stations of Parur AC in Kerala. AssemblyConstituencies:8states,1UT. And then in 11 1982-83 1982 1982- -83 83 1984 1984 1984 SC suspends EVM usage: cannot be used till RP Act is amended. 1988 RP Act amended: enabling use EVMs w.e.f. 15.03.1989. 1988 1988 EVM has been used continuously since 2000 2000 SC dismissed petition asking for return to Ballot papers! SC dismissed petition asking for return to Ballot papers! 2018 10

  11. HISTORY OF VVPAT (2/2) In All Political Party Meeting held on 04.10.2021 agreed to incorporate VVPAT with EVM 14thAugust 2013-The Conduct of Elections Rules 1961 amended to use VVPAT & First used in Bye-election for 51-Noksen AC in Nagaland 2010 2013 Oct - 2013 SCallowedECIto introducedVVPATsystem inphasedmanner In all party meeting, the Commission committed to ensure 100% coverage of VVPATs in all future elections. 2017 2019 100% deployment of VVPATs in Lok Sabha 2019. SC SC directions directions for for verification verification of of VVPAT AS AS in in a a PC PC for for greater greatersatisfaction VVPAT slips slips of of 5 5 polling polling stations stations per per AC AC or or April - 2019 satisfaction. . Since Since 2000 Assemblies Assemblies. Till date, >340 crore votes cast on EVMs. 2000,, EVMs EVMs have have been been used used in in all all elections elections:: 4 4 Lok Lok Sabha Sabha and and 132 132 State State Legislative Legislative 11

  12. 3. TECHNICAL EXPERT COMMITTEE INDEPENDENT EVALUATION INDEPENDENT EVALUATION 12

  13. T E C- HISTORY & ROLE (1/3) TEC constituted for evaluation of upgraded EVMs Evaluation Report in 2006 1st Technical Expert Committee formed Submitted an (TEC) January, 1990 December 2005 November 2010 Current TEC Approves EVM Design Vets and seals the software Recommends continuous design improvement Recommends improvements manufacturing process Recommended use of the EVMs unanimously April 1990 in the 13

  14. Past TECs (2/3) Compositionof First Technical ExpertCommitteeon EVMs 1990 1. Professor S. Sampath, Chairman Technical Advisory Committee, Defence Research & Development Organization DRDO),MinistryofDefence. Professor PV Indiresan of theIIT Delhi. Dr.Rao C.Kasarabada, Director,Electronic Research &Development Centre(ERDC),Trivandrum. 2. 3. Compositionof Second Technical Expert Committee Dec 2005 1. Prof P.V. Indiresan, Ex-Director, IIT Madras as Chairman of TEC. 2. Prof. D.T. Shahani of IIT Delhi. 3. Prof. A.K. Agarwala of IIT Delhi. 14

  15. PRESENT TEC COMPOSITION (3/3) 4 4 Eminent Eminent Professors Professorsfrom fromIITs IITs::Renowned RenownedExperts Experts in in their theirFields Fields. . 1 Prof Rajat Moona, Director IIT Bhilai, Former Director General CDAC 2 Prof D T Shahani, Prof Emeritus, IIT-Delhi 3 Prof A K Aggarwala, IIT Delhi Prof Dinesh K Sharma, Prof Emeritus, IIT Bombay 4 15

  16. 4. TECHNICAL SECURITY SECURE DESIGN AND MANUFACTURING SECURE DESIGN AND MANUFACTURING 16

  17. SECURE DESIGN AND MANUFACTURING (1/5) Most advanced Encryption techniques Automated self diagnostics at every switch ON Population Secured Standalone Machine Unauthorised Access Detection Module Development and Manufacturing No Radio Frequency transmission or reception capability Dynamic Coding of Key Presses Real Time Clock for date and time stamping key presses One Time Programmable (OTP) Strong mutual authentication capability 17

  18. SECURE DESIGN AND MANUFACTURING (2/5) Standalone Machine: EVM is a machine not connected with external world through wire or wifi or blue tooth or any network. Unauthorised Access Detection Module (UADM): UADM embedded in the machine disables EVM permanently, ifany attempt made toaccess microcontroller or memory. Most Advanced Encryption Techniques: Encrypted communication between Control Unit, Ballot Unit and VVPAT cannot bedeciphered by tapping cables. 18

  19. SECURE DESIGN AND MANUFACTURING (3/5) Automated self diagnostics at every switch ON: It checks EVM s standard features each time it is Switched ON. Strong Mutual Authentication Capability: The strong mutual authentication capability ensures that any unauthorised devices cannot interact with EVMs. No Radio Frequency Transmission or Reception Capability: Any tampering of ECI- EVM by coded signals by wireless, Bluetooth or WiFi is ruled out as EVM does not have any radio frequency (RF) communication capability, hence, cannot communicate through any wireless protocol. 19

  20. SECURE DESIGN AND MANUFACTURING (4/5) One Time Programmable (OTP): The programme (software) used in these machines is burnt into a One Time Programmable (OTP) chip at the time of manufacturing so that it cannot be altered or tampered with. Dynamic Coding of Key Presses: Every key press is coded dynamically making it impossible for anyone to decode the signals between Control Unit or Balloting Unit or VVPAT. Real Time Clock for date and time stamping key presses: Every authorised or unauthorised key press is recorded with date and time stamp on real time basis. 20

  21. SECURE DESIGN AND MANUFACTURING (5/5) Secured Development & Manufacture: Manufactured by Premium PSUs- BEL & ECIL: Both deal with manufacturing of sensitive equipment critical to the safety and security of the Nation and have strong security protocols. o SOFTWARE Developed in-house by BEL/ECIL. Fully vetted by TEC. Never sub-contracted. o Secure Manufacturing: 4-level Physical/Process access Control, Regular frisking, Outside e-gadgets prohibited, CCTV Coverage, AccessDataandProcessDatalogging,AlarmandAlertgeneration. o Third Party Testing by Directorate of Standardisation Testing and Quality Certification (STQC) as per Standards & QualityProcessset byTEC.Softwareisalsotested &checkedbySTQCfor authenticity. o 21

  22. 5. ADMINISTRATIVE SAFEGUARDS SECURE PROCESS ON HANDLING & MANAGEMENT OF EVMs 22

  23. ADMINISTRATIVE SAFEGUARDS First Level Checking (FLC) Allocation and Movement Stakeholder Participation Randomizations Candidate Setting Counting Day Protocol Multiple Mock Polls Poll Day Checks EVM Management System (EMS) Poll Closure & Transportation Storage and Security 23 Presence of political parties/candidates/their representatives in every election related process is mandatory

  24. ADMINISTRATIVE SAFEGUARDS STAKEHOLDER PARICIPATION Active Participation of & Witness by Political- Parties/Candidates in All All Processes Processes 1 Strong-rooms 6 Opening & Sealing of EVM Warehouses & FirstLevel Check(FLC) 2 List of EVMs after 1st& 2nd randomization political parties/candidates 3 shared to Counting Process 5 Conduct mock poll and receive mock poll results 4 Candidate Setting & Symbol loading-Sign on Paper Seals on EVMs after all processes Participation During FLC 24 Presence of political parties/candidates/their representatives in every election related process is mandatory

  25. ADMINISTRATIVE SAFEGUARDS ALLOCATION & MOVEMENT Planned Allocation EVMs are allocated to poll going State by the Commission. Secured Transportation Movement of EVMs mandatorily managed through EVM Management System (EMS). Only Containerized/Sealed Trucks used. All Trucks sealed with Lock and Paper Seals. Mandatory GPS tracking of EVM vehicles. All movement under 24X7 Police Escort. Videography done of shifting process. Political parties informed in advance about the opening, stocking and sealing of warehouses while moving EVMs. Received by District Election Officer (DEO) who is personally responsible for secured storage. EMS used for inventory management of all EVMs nationwide for the sake of transparency. 25 Presence of political parties/candidates/their representatives in every election related process is mandatory

  26. ADMINISTRATIVE SAFEGUARDS FIRST LEVEL CHECKING (FLC) FLC representatives ofpolitical parties. Fully sanitized hallunder videography and full security. Full functionality and behavioural check is done on every EVM. Defective (non-functional) EVMs are kept aside and not used in election. FLC status captured in EMS. Introduction of Pre-FLC unit on pilot basis to mitigate human errorsduring FLC is mandatorily done in the presence of 26 Presence of political parties/candidates/their representatives in every election related process is mandatory

  27. ADMINISTRATIVE SAFEGUARDS FLC PROCESS Presence of political parties/candidates/their representatives in every election related process is mandatory Mock Poll on randomly selected 5% EVMs for higher votes (1200 votes in 1%, 1000 in 2% & 500 in 2%) EVMs/VVPATs stored in Strong Room under 24X7 security Complete physical check up (switches, cable, latches etc) & functional test CU sealed after FLC using Pink Paper Seal Mock Poll on All EVMs/VVPATs Electronic Result in CU is tallied with VVPAT Slip count and results shared with representatives Signing on seals by Engineers and representatives Photocopies of record registers shared with political party representatives 27

  28. ADMINISTRATIVE SAFEGUARDS RANDOMIZATION (1/4) PS1 2ndRandomization 1stRandomization AC 1 PS2 District AC 2 PS(n) AC (n) 28 Presence of political parties/candidates/their representatives in every election related process is mandatory

  29. ADMINISTRATIVE SAFEGUARDS FIRST RANDOMIZATION (2/4) EVMs are Randomized Randomized twice No human intervention in randomisation. Only FLC approved EVMs as per EMS get picked up for first randomisation. twice using EMS. 1 1st stRandomization Randomization Done after FLC To allocate EVMs from district, randomly, to a particular AC/AS. In presence of representatives of political parties. List of AC/AS-wise Randomized EVMs shared with political parties. 29 Presence of political parties/candidates/their representatives in every election related process is mandatory

  30. ADMINISTRATIVE SAFEGUARDS SECOND RANDOMIZATION (3/4) EVMs are Randomized Randomizedtwice No human intervention in randomisation. Only FLC approved EVMs recorded in EMS get picked up for first randomisation. twice using EMS. 2 2nd ndRandomization Randomization 1 1st stRandomization Randomization Done just before candidate setting . To allocateEVMsavailablein an AC/AStopollingstations. In presence of candidates/election agents and list shared. 30 Presence of political parties/candidates/their representatives in every election related process is mandatory

  31. ADMINISTRATIVE SAFEGUARDS RANDOMIZATION- THE FOUNDATION OF EVM SECURITY (4/4) Till first randomization- no one knows which EVM is going to which Constituency. Till nomination finalization- no one knows the sequence of names on the ballot paper. Hence, till candidate setting no one (not even RO/DEO/CEO/Commission) knows which button on which BU will be assigned to which candidate,making even an attempt to tamper absolutely futile. Till 2nd Randomization- no one knows which EVM will go to which PS. Added to this is the 3 stage Randomization of polling officials to different polling stations. 31 Presence of political parties/candidates/their representatives in every election related process is mandatory

  32. ADMINISTRATIVE SAFEGUARDS CANDIDATE SETTING (1/2) The Process Insert ballot paper in the Ballot Unit & Set Number of Candidates Seal Ballot Unit Mock Poll on Every EVM with VVPAT + 1000 vote on 5% EVMs with VVPATs Symbol loading in VVPAT Seal VVPAT Seal Candidate Set of CU Candidate Setting in Control Unit 32 Presence of political parties/candidates/their representatives in every election related process is mandatory

  33. ADMINISTRATIVE SAFEGUARDS CANDIDATE SETTING (2/2) Security Measures Done only after afterfinalization finalization ofthe names of contesting candidates. 1 Fully Fully sanitized sanitizedhall hallunder videography and full security. 2 Done in the presence presenceof of candidates candidatesor their agents. 3 Introduction of new SLUs for loading symbols in VVPATs, and enabling simultaneous live viewing on TV monitor by all stakeholders 4 33 Presence of political parties/candidates/their representatives in every election related process is mandatory

  34. ADMINISTRATIVE SAFEGUARDS MULTIPLE MOCK POLLS Each EVM & VVPAT undergoes mock poll during FLC, and again during Candidate Setting. In addition 10% EVMs are randomly picked up for higher vote (500-1200) mock poll. Electronic result count is verified with paper slips count. 10% EVMs randomly taken out for Training and Awareness undergo Mock Polls several times. Before start of actual poll, Mock poll alongwith VVPAT with at least 50 votes in the presence of polling agents. Electronic result count is verified with paper slips count. on each EVM 34 Presence of political parties/candidates/their representatives in every election related process is mandatory

  35. ADMINISTRATIVE SAFEGUARDS POLL DAY CHECKS Polling Agents Central Armed Police Force (CAPF) and Micro Observers deployed at poling stations. Web Casting/CCTVs Frequent visits (Sector Officers /Senior officers/ Observers) 2 hourly reporting of votes polled Media vigil 35 Presence of political parties/candidates/their representatives in every election related process is mandatory

  36. ADMINISTRATIVE SAFEGUARDS POLL CLOSURE & TRANSPORTATION Poll Closed on EVM by pressing CLOSE button EVM cannot accept anyfurther vote. EVMs sealed in the respective carrying cases & polling agents sign on them. EVMs transported back to the reception centres under armed escort. Candidates representativesare allowedto follow them. 36 Presence of political parties/candidates/their representatives in every election related process is mandatory

  37. ADMINISTRATIVE SAFEGUARDS STORAGE & SECURITY (1/5) EVM Warehouse/Strong-room with only One Entry Point. Entry secured by a Double Lock System with DEO&Dy.DEO,each having custody of keys of one lockeach. 24X7 Armed security. The opening & closing of EVM warehouse ONLY in presence of Political party representatives- advance written intimation mandatory. Every EVMmoved is managed by ECIthrough EMS. Post Polling: Polled EVMs arestoredin strong room having double locksystem. Candidates allowed toput their own seals on locks. 37 Presence of political parties/candidates/their representatives in every election related process is mandatory

  38. ADMINISTRATIVE SAFEGUARDS STORAGE & SECURITY (2/5) Various layers of security of polled EVMs 1. Unique ID of BUs, CUs & VVPATs shared withpolitical parties/candidates. 2. Sealing of CU and BU with Pink Paper Seals during FLC and commissioning respectively on which political parties and candidates puttheir signatures. 3. Sealing of EVMs before starting actualpoll on which polling agents also puttheir signatures. 4. Seals on carrying cases of EVMs after closing of poll on which polling agents also put their signatures. 38 Presence of political parties/candidates/their representatives in every election related process is mandatory

  39. ADMINISTRATIVE SAFEGUARDS STORAGE & SECURITY (3/5) 5. Double lock system atthedoor ofstrong room on which candidates also puttheir own seals. 6. CCTV feed toCandidates Camping Area to monitor strong room. 7. Two Cordoned round-the-clock security (Inner perimeter manned by CAPF and Outer perimeter by StateArmed Police. 8. Log-book and videography ofofficers inspecting thetwocordons daily. 9. Candidates/their representatives are allowed to watch the strong room 24x7 10. 24/7 security arrangement for unused EVMs also. 39 Presence of political parties/candidates/their representatives in every election related process is mandatory

  40. ADMINISTRATIVE SAFEGUARDS SECURE STORAGE IN STRONGROOMS TILL COUNTING (4/5) SAP- State Armed Police CAPF- Central Armed Police Force Polled EVMs kept in strong room, sealed in the presence of the Candidates and Observer. Facilitation for Candidates to watch the PolledEVMStrong Room 24/7. Starting from FLC of EVMs to Counting of votes, EVMs are kept in Strong-room with full24/7security. 40 Presence of political parties/candidates/their representatives in every election related process is mandatory

  41. ADMINISTRATIVE SAFEGUARDS STORAGE DURING ELECTION PETITION PERIOD (5/5) Election Petitions can befiled within45days ofresult declaration. EVMs (BU+CU) &VVPATs remain under sealed conditions tillEPposition isascertained. EVMs and VVPATs under EP, are kept under safe custody of DEO (Strong Room) till final disposal of EP. Print on VVPAT Slips remains for 5years. Remaining EVMs and VVPATs not in EParenow freefor re-use. 41 Presence of political parties/candidates/their representatives in every election related process is mandatory

  42. ADMINISTRATIVE SAFEGUARDS COUNTING DAY PROTOCOL On the day of counting, strong room opened in the presence of Candidates, RO and Observer under videography. Round-wise CUs are brought to the counting tables from Strongrooms under CONTINUOUS CCTV Coverage. Unique ID number of the CU & the signed seals are verified and shown to the polling agents. EVMs are stored back in Strong Room in the presence of candidates/their representatives tillthecompletion oftheElection Petition period. 42 Presence of political parties/candidates/their representatives in every election related process is mandatory

  43. ADMINISTRATIVE SAFEGUARDS EVM Management System (EMS) In house EVM Stock Management Software Barcode of every EVM is scanned into EMS every time it moves from one Warehouse to another All EVM Allocations done on EMS FLC status(OK/Rejected) captured in EMS EVMs Randomisation twice on EMS EVM sent for repair captured in EMS EVMs under EP marked in EMS 43 Presence of political parties/candidates/their representatives in every election related process is mandatory

  44. 6. DEBATE AROUND EVMs-EXPLAINED! CLARIFICATION ON ALL ISSUES 44

  45. DOUBTS CREATED AROUND EVM Defective Vs Tampered Remotely Altered Control Unit Display Vote Stuffing after Poll Closure Hacked EVM Altered software code International Comparison Replaced Microcontroll er or Memory chips Memory EVM Challenges Manipulation 45

  46. NO POSSIBILITY OF EVM HACKING Hacking Hacking is unauthorised access to or control over computer network security systems for some illicit purpose. In the case of ECI EVMs, the word Hacking reasons: The EVM is a stand stand- -alone through wire or wirelessly. The SW programme in the OTP Microcontroller can neither modified modified. . Hacking is is not not applicable applicable for following alone machine and is not connected to any network neither be be read read nor nor 46

  47. NO POSSIBILITY OF REMOTELY ALTERED DISPLAY THROUGH WIRELESS COMMUNICATION It is alleged this can be done by either replacing the original display module with another display fitted with a wireless device or inserting an extra circuit board which can communicate with an external unit via a wireless device and tamperthe resultbycontrollingtheCU displayused for declaringtheresult. Such a modification would require unfettered access to the EVM after FLC Ruled out. In M3 EVMs the display is mounted in the UADM. Any attempt to open the UADMwillsend theEVMintoFactory Mode-Ruled out. 47

  48. MEMORY MANIPULATION RULED OUT It is alleged that voting data can be altered by clipping a Memory ManipulatorIC to thememory chip where Votedata isstored. Thiswouldneed, Fulland freeaccess to CUs after thePollingisover-Ruled Out !! Breaking thesealsand locksofthe strong room in the presenceof two layers of security plus the representatives of the candidates camping nearthestrong room-Ruled Out !! The memory is inside the microcontroller which itself is inside the UADM-Ruled Out !! 48

  49. REPLACEMENT OF MICROCONTROLLER/MEMORY CHIP or MOTHERBOARD IMPOSSIBLE (1/2) Administrative Safeguards Chipreplacement would requireaccess toEVMWarehouses Ruled Out. Anychip replacementbeforeFLC willget caught duringFLC. Chip Replacement after FLC would require access to Strong Rooms and breaking of EVM PinkPaperseals Ruled Out. Microcontroller is inside the UADM and cannot be accessed without putting the EVM in FactoryMode-Ruled Out. 49

  50. REPLACEMENT OF MICROCONTROLLER/MEMORY CHIP or MOTHERBOARD IMPOSSIBLE (2/2) Technical Security BUs and CUs communicate only amongst themselves after mutual authentication and cannot be connected to any other machine. Thus,any modified EVM (with microcontroller /memory changed) would not be usable even if someone is able to hypothetically bypass securityarrangements and modifyEVM. 50

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#