Attack on EVMs Resumes After Mid-Day Claimed a Phone Was Used to Unlock EVMs: A Report

Paromita Das

GG News Bureau

New Delhi, 17June.  Electronic Voting Machines (EVMs) have been a cornerstone of Bharat’s electoral process, lauded for their efficiency, accuracy, and security. After the opposition parties achieved better-than-expected results in the Lok Sabha elections, attacks on Electronic Voting Machines have mostly ceased. However, some factions continue to raise doubts about Bharat’s secure electronic voting method. On June 16, Mid-Day published a shocking allegation saying that a cousin of freshly elected Shiv Sena MP Ravindra Waikar was able to access EVMs via his mobile phone.

This sensational claim has sparked outrage and calls for an investigation. However, upon closer examination, it becomes evident that the report is not only misleading but also potentially harmful to public trust in the electoral process. Here’s a breakdown of why this report is completely fake and misleading.

According to the investigation, a cell phone was used to generate the OTP that opened the EVM machine inside the NESCO Centre during vote counting on June 4. According to the article, authorities have initiated an investigation and submitted the phone to the Forensic Science Laboratory (FSL).

Notably, the article did not specify what Mangesh Pandilkar, Ravindra Waikar’s relative, did after ‘unlocking the EVM by creating an OTP on his phone’. It simply stated that Waikar won by 48 votes and made no mention of Pandilkar using his phone to enhance votes in the EVM. On the other hand, near the end of the report, it states that an Electronically Transmitted Postal Ballot System (ETPBS) for Service Voters was available at the centre. It claims that another accused, Dinesh Gurav, used the same phone to create an OTP to access the postal ballot system. Mid-Day claimed, “During the counting of votes through the EVM machine,the candidate Amol Kirtikar was ahead but when the votes on the Electronically Transmitted Postal Ballot System were counted, Kirtikar lagged behind, eventually losing the race to Waikar.”

The article said that the Shiv Sena candidate won because his relatives used a phone to generate OTPs to unlock an EVM and an ETPBS.

Following the publishing of the report, attacks on EVMs resumed on social media. As expected, Congress MP Rahul Gandhi used the findings to renew his assaults on EVMs.

 

Understanding EVMs and Their Security

Before delving into the specifics of the report, it’s essential to understand how EVMs work and their security features. EVMs used in Bharatiya elections consist of two main units: the Control Unit and the Ballot Unit. These units are connected by a secure cable and operate in a stand-alone, non-networked environment, meaning they are not connected to the internet or any other external devices.

EVMs are designed with multiple layers of security, including:

  1. Tamper-Evident Seals: Each EVM is sealed with tamper-evident seals that would show any sign of unauthorized access.
  2. One-Time Programmable Chips: The microcontrollers used in EVMs are one-time programmable, ensuring that the software cannot be altered once programmed.
  3. Physical Security Measures: EVMs are stored and transported under stringent security measures, including escort by security personnel and constant monitoring.

The Mid-Day Report: Claims and Reality

The Mid-Day report claims that a phone was used to unlock EVMs, suggesting a significant breach in the system’s security. Here are the main points of contention with the report:

  1. Lack of Technical Feasibility: EVMs are not designed to be connected to any network or external device, including phones. The machines operate in a completely isolated environment, making it technically impossible for a phone to interface with them.
  2. Absence of Evidence: The report fails to provide any concrete evidence or technical details to support the claim. No photographs, videos, or credible testimonies have been presented to substantiate the allegation.
  3. Misleading Terminology: The report uses vague and sensational terminology, such as “hacking” and “unlocking,” without explaining how these processes could occur within the highly secure EVM infrastructure. This language is designed to incite fear and suspicion rather than provide factual information.
  4. Contradictory Statements: The report contains several inconsistencies and contradictions. For instance, it suggests that EVMs can be tampered with remotely, which contradicts the fundamental design principle of EVMs being stand-alone devices.

Expert Opinions

Several experts have weighed in on the report, debunking the claims made by Mid-Day:

  • Technical Experts: Renowned cyber-security professionals and engineers have dismissed the report as baseless, pointing out the robust security features of EVMs that prevent such breaches.
  • Election Commission of India (ECI): The ECI has reiterated the security of EVMs, emphasizing that they have undergone rigorous testing and validation processes to ensure their integrity.

Impact of Misinformation

Reports like the one published by Mid-Day can have severe consequences:

  • Eroding Public Trust: Such misinformation can undermine public confidence in the electoral process, leading to unwarranted skepticism and distrust.
  • Political Exploitation: Sensational and unfounded claims can be exploited by political entities to create confusion and unrest among the electorate.

Conclusion

The Mid-Day report alleging that a phone was used to unlock EVMs is a classic example of misinformation that can cause significant damage to the democratic process. It is crucial for media outlets to adhere to ethical journalism standards, ensuring that they provide accurate and verified information to the public. As citizens, we must critically evaluate such reports and rely on credible sources and expert opinions to form our understanding.

In conclusion, the integrity of EVMs remains intact, and the claims made by Mid-Day are unfounded and misleading. By staying informed and vigilant, we can protect the sanctity of our electoral process and maintain confidence in the systems that uphold our democracy.

 

Comments are closed.