advertisement
Video editor: Purnendu Pritam
The voter-verified paper audit trail or VVPAT machine was included in the election process by the Supreme Court in 2013 to assure voters that their vote has been correctly registered by the electronic voting machine (EVM). The Supreme Court, in its order, had said:
But since then, has the VVPAT made our election process foolproof?
The ANSWER is NO.
Can the EVM-VVPAT combination be MANIPULATED?
The ANSWER, unfortunately, is YES.
When you voted during the 2019 Lok Sabha elections, you must have noticed the VVPAT placed next to the Ballot Unit (BU) of EVM, on which you pressed a button to cast your vote.
To explain this in simple words – think of the EVM as a computer, think of its ballot unit as a keyboard, and its control unit as the computer’s hard drive. And think of the VVPAT machine as a printer connected to the computer.
Each time a vote is punched in the ballot unit, it should get stored in the memory of the EVM’s control unit.
And then, a printout from the VVPAT machine should confirm that the vote has been cast as per the button pressed by the voter on the EVM.
The information should go from the ballot unit to the control unit to the VVPAT machine.
The Quint, however, has found out that this is not how the EVMs and VVPATs are connected.
So, the ballot unit transmits the vote first to the VVPAT machine, which gives a printout of the vote, and then that information is electronically recorded in the memory of the control unit.
Now, you may ask, WHY IS THIS SIGNIFICANT?
Well, in earlier elections, before the VVPAT was introduced, the EVM only recorded the information of which button was pressed on its ballot unit. It did not know which party that button stood for. However, for the VVPAT machine to do its job, it has to be told which party and candidate each button on the ballot unit stands for.
Now, the software containing the party symbol and the candidate name is uploaded via laptops into the VVPAT machines. This is done by engineers working for EVM manufacturing companies, like BEL and ECIL, over a period of two weeks before the polling dates.
The Quint spoke to former IAS officer Kannan Gopinathan, who was an election officer in the 2019 Lok Sabha elections and has a BTech in Electrical Engineering. He explained to us how malware can manipulate EVM votes:
Because, as a story published by The Quint has already shown, the engineers who upload this sensitive information into VVPAT machines are from private companies. In fact, the private company that provided engineers to the Election Commission for elections during 2017-18 was not even empanelled with the EVM manufacturing company ECIL.
Can we still consider our election process to be safe and secure? The answer is a clear NO.
Another defence offered by the EC is that of randomisation – that nobody knows which EVM-VVPAT is headed to which constituency, so they can’t be manipulated.
BUT, this argument now falls flat! WHY?
Because for the VVPAT machine to do its job, it has to be given the candidate and party names specific to each constituency, which means, this data can only be uploaded into a VVPAT machine after it is decided WHICH constituency it is being sent to.
We have asked the Election Commission these key questions:
Why does the VVPAT machine control the information reaching the control unit?
Why isn’t it the other way around?
And doesn’t this flaw make the VVPAT-EVM combination vulnerable to manipulation?
The Election Commission has not answered any of these questions yet.
As a voter, each one of us has the right to know that our election process is safe and our democracy is not at risk. We wonder why the EC is silent.
(At The Quint, we question everything. Play an active role in shaping our journalism by becoming a member today.)