• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  Can EVMs get hacked? We tell you the truth
Can EVMs get hacked? We tell you the truth
04 February 2019

Can EVMs get hacked? We tell you the truth

Written by Sanjay Katkar
Sanjay Katkar
News
420
Shares

It is the season of elections. The New Year of 2019 will see elections in countries from as varied as Nigeria to Israel to the European Union. But closer home, the Indian General Elections which will be held in the summer months will probably be the most significant. Elections in the world’s largest democracy have always captured world attention and this election promises to be no different.

Elections in India can get controversial and nothing exemplifies this more than the tool used for voting in the first place – the Electronic Voting Machines (EVMs). A simple electronic device for counting votes, an EVM consists of a control and balloting unit, joined by a cable. Powered by an alkaline battery, voters press labeled buttons of candidates to indicate their choice which is tabulated by the ballot unit. The process sounds simple, but since their implementation in 1999, it has been mired in controversy.

Suspicion and questions

Recently, there was a lot of controversy surrounding the tampering of EVMs in the 2014 general elections. Political parties, depending on the result of the election, are always quick to raise suspicion about EVMs’ security. On the macro level, this can have a discouraging effect on voting as a whole as aspiring voters can often be discouraged about this constructed lack of credibility and choose not to vote.

But is there any truth to these claims?

For what it is worth, the Election Commission of India has studiously rejected claims that EVMs can be tampered with. They have backed up their statement by pointing to various features of an EVM and measures used during polling which prevent tampering. Some of these include:

  • A vote is counted only once for a person on the press of a button. Multiple presses of a button cannot lead to multiple votes.
  • The operating program of an EVM is etched permanently in silicon after manufacturing and no one, not even the manufacturer, can change the program once the unit is manufactured.
  • Polling officers control the balloting unit and can press the “close” button, if they sense any trouble, ensuring that the system does not accept any more votes.
  • Votes are recorded in a randomized fashion in an EVM, hence making it impossible to program an EVM to receive votes to one particular candidate
  • Many other checks and balances are provided for EVM voting

Additional measures

Despite the number of ways in which EVMs are manufactured and designed to prevent tampering, questions continued to be raised about EVM tampering. The Election Commission of India decided to introduce another layer of security in the 2010s called the Voter-Verified Paper Audit Trail (VVPAT). The VVPAT allows each EVM to record each vote by generating a voter slip which is displayed to the voter. This serves two purposes: voters are immediately assured that their voting choice has been registered while these slips are collected and can be tabulated at the end of the voting process.

Of course, in a country with a breadth and width as large as India, lakhs of EVMs are pressed into operation during a General Election and invariably, there will be some that glitch and may not work properly. But that cannot be termed as proof of EVM tampering – it basically means the machines did not work properly and the ECI tries to replace these machines on the spot. Reports of EVM machines being hacked continue to be unfounded with no specific proof of these being hacked.

Since EVM design does not support usage of any wireless technology (like WiFi, Bluetooth etc.) it cannot be hacked remotely over wireless technology. Thus, we can rule out the possibility of a remote hacking of the EVM. It is difficult to hack the EVM, unless one obtains physical access to it and tampers its build and contents. Poor physical security can also be a possibility for tampering paper ballots. Thus, physical security of the voting centers and EVMs is of utmost importance. In conclusion while one cannot say with utmost certainty that EVMs cannot be hacked, it is true that EVMs are possibly the best voting system in existence currently. While they may have their flaws, their in-built checks-and-balances provide for a system which makes it extremely hard to tamper or hack them.

Seqrite is the enterprise security brand of Quick Heal Technologies Ltd., which offers
world-class enterprise cybersecurity solutions.

This is the third article in the #SeqriteonElectionSecurity series. Watch this space to get more updates on the protection of elections, citizens, and voting infrastructure from cyber attacks or cyber threats.

 Previous PostThis is how hackers can invade your system without installing mal...
Next Post  Artificial Intelligence – its use and misuse
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has...

Articles by Sanjay Katkar »

Related Posts

  • CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

    June 10, 2022
  • Zero-day Vulnerability

    Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

    June 3, 2022
  • Advisory on Russia-Ukraine Conflict-Related Cyberattacks

    March 15, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies