Search

Cookies

We use cookies to improve your experience. By continuing, you accept our use of cookies.

World

India's EVM Security: What Happens Between Voting & Vote Counting?

· · 4 min read

Recent allegations of electronic voting machine (EVM) tampering in West Bengal have brought India's election security protocols into sharp focus. The Election Commission details the multi-layered process, from sealing after polls to secure strong room storage and counting day verification, designed to prevent manipulation.

Tensions escalated in Kolkata following allegations from the Trinamool Congress (TMC) regarding the movement of eight electronic voting machines (EVMs) into a strong room without adequate supervision. This incident, just before the May 4 election results, sparked renewed concerns over potential tampering and prompted questions about the Election Commission's (EC) handling of the electoral process.

The EC swiftly dismissed these claims, clarifying that CCTV footage confirmed the authorized segregation of postal ballots, a standard procedure communicated to all political parties. The commission reaffirmed its commitment to stringent, multi-layered protocols for EVM storage and transit, explicitly designed to prevent any form of manipulation. This controversy has once again highlighted the critical question of how EVMs are secured from the moment polling concludes until votes are counted.

Understanding EVMs and Their Components

Electronic Voting Machines (EVMs) are integral to Indian elections, designed to electronically record and count votes. The ECI-EVM system, adhering to Election Commission guidelines, comprises three key units: the Ballot Unit (BU), the Control Unit (CU), and the Voter Verifiable Paper Audit Trail (VVPAT). As Direct Recording Electronic (DRE) systems, EVMs aim to enhance efficiency and accuracy by eliminating invalid votes and significantly reducing counting time. Each vote is securely recorded for a single candidate within the machine's memory.

Immediate Steps After Polling Concludes

Once voting officially ends, EVMs are powered off and sealed in the presence of polling agents representing various candidates. Multiple physical seals are applied, and these are signed by both election officials and the candidates' representatives. This creates a verifiable chain of custody; any attempt to tamper with the machine would necessitate breaking these seals, making any interference immediately apparent.

Following sealing, the machines are transported to designated storage centers under stringent security measures. These convoys are typically escorted and sometimes employ GPS tracking. Candidates or their authorized agents are permitted to follow these convoys, ensuring continuous oversight during transit and preventing the machines from being out of sight.

Security Within Strong Rooms

Upon arrival, EVMs are stored in highly secure facilities known as strong rooms. These specially designated spaces boast multiple layers of protection against unauthorized access. The security architecture is typically three-tiered:

  • Innermost Layer: The sealed strong room is guarded by central armed police forces and monitored 24/7 via CCTV surveillance.
  • Second Layer: Managed by paramilitary forces, this layer includes dedicated areas where candidates' representatives can monitor live CCTV feeds of the strong room.
  • Outermost Layer: Secured by state police, with strict entry controls, including required approval letters and QR code-based identity cards.

Beyond official security, political parties actively participate in oversight. Candidates can station their representatives outside strong rooms around the clock, establishing continuous multi-party monitoring. Every movement or access is meticulously logged, and a strong room can only be opened under exceptional circumstances, always in the presence of authorized officials and observers.

Legal Frameworks and Safeguards

The entire process of handling EVMs is governed by rigorous legal and procedural frameworks outlined in the Representation of the People Act. Transparency begins even before polling, with mock polls conducted in the presence of candidates' representatives to verify machine functionality. Essential details, such as serial numbers, are meticulously recorded in Form 17A.

After polling, the sealing process is again carried out in the presence of agents, who sign off on the procedure. During transportation and storage, EVM numbers are cross-verified against official records, establishing a comprehensive documented chain of custody and ensuring traceability at every stage.

What Happens on Counting Day?

On counting day, strong rooms are opened in the presence of candidates and their authorized agents. The initial step involves thorough verification: seals are checked, and machine serial numbers are matched against official documentation. Only after this rigorous validation does the vote counting commence. Votes are retrieved from the Control Unit, and results are tabulated.

Furthermore, VVPAT slips from a randomly selected set of polling stations are manually counted and cross-matched with the electronic results. This serves as an independent audit mechanism, providing an additional layer of verification to confirm the accuracy of the electronic vote count.

Can EVMs Be Tampered With?

The Election Commission consistently asserts that EVMs are inherently “secure, standalone, and tamper-proof by design.” Crucially, they are not connected to any network or the internet, rendering remote hacking impossible. Votes are stored in non-rewritable memory, ensuring they cannot be altered or deleted once recorded.

Beyond the technological safeguards, the system relies heavily on layered protections: physical sealing, controlled transportation, secure strong room storage, continuous surveillance, and multi-party oversight. Any attempt at interference would invariably leave visible evidence, such as broken seals or mismatched official records. While the Supreme Court has upheld the use of EVMs, acknowledging theoretical vulnerabilities, there has been no proven instance of large-scale tampering in Indian elections.

Related