Skip to main content

How exactly EVMs were hacked in Gujarat to get BJP elected? EVM machine has firmware inside the hardware...

By Amaresh Misra*
In 'Security Analysis of India’s Electronic Voting Machines', authors Hari K Prasad, J Alex Halderman and Rop Gonggrijp state clearly that "the Election Commission of India developed the country’s EVMs in partnership with two government-owned companies, the Electronics Corporation of India (ECIL) and Bharat Electronics Limited (BEL)...second-generation models were introduced in 2000...these machines moved the firmware into the CPU (Control Processing Unit) and upgraded...other components..."
Wikipedia defines Firmware as "a specific class of computer software...that provides both standardized operating environment for the device's more complex software (allowing more hardware-Independence), or, for less complex devices, act as the device's complete operating systems, performing all control, monitoring and data manipulations functions..."
Consider this: Firmware is a basic code written in C to do operations.
Is this code vulnerable to manipulation?
Yes it is. How?
The code doesnt change anything while voting or at any stage before counting. So, if you look at flaws in any process you wont find any. The code runs only during counting of total votes.
So, if the code is manipulated, it tries to favour, say, ' party X', over other parties... when the counting begins, it checks for party X versus votes other parties.
The code is usually manipulated or set to start working only if the margin of difference between X and other parties is say 10% or 15% ... or else, it will not do anything.
The margin is decided by the hacker’s boss and can be any number.
Also, there is a threshold limit, set say, above 20,000 votes. The code is set in a manner that it gets activated only when it reaches the threshold level. This way the code escapes detection at the trial level when few votes are cast and their total is tallied to test the machines.
The threshold level works in a way that if 'party X' is not near the threshold level, the code does not start working! This answers queries of those who say, if EVMs are being hacked, why doesn't 'party X' win all seats!
If the margin condition is met, the manipulated code does the following: reduce votes of others in proportion and add to party X.
First, it reduces votes of Independents to make party X win...
If party X is still losing, the manipulated code can take votes from others contenders.
Now, this explains why Independents lose maximum votes, and some even get zero, in such a scenario. 'Getting zero' is actually a bug in the code. Here, the 'if' condition has not been programmed fully to check that the code doesn't reduce vote of the party it attacks to zero.
The C code firmware is present in all machines before they are sent to polling booths. So the hacking is done at the level of manufacture.
Surprisingly, Election Commission (EC) verifications confirm only that all machines are using the same software version. It is not EC's job to check the firmware code.
EC just uses the machine as supplied to them with whatever code inside!
EVM firmware is stored in masked, read-only memory inside the microcontroller chips, and there is no provision for extracting it or verifying its integrity. This means that if the firmware code was modified before it was built into the CPUs, the changes would be very difficult to detect.
The software/firmware is integrated into the CPU by the manufacturer, Renesas, a Japanese company (other EVM models use CPUs made by Microchip, an American company). The afore-mentioned scholarly paper states that "consider the engineer responsible for compiling the source code and transmitting it to the CPU manufacturer. He or she could substitute a version containing a back door with little chance of being caught. This fact alone would be great temptation for fraud!"
Scholars go on to add that "similarly, employees at the chipmakers could alter the compiled program image before burning it into the chips. While more involved than modifying source code, reverse engineering firmware of such low complexity is not difficult and has been done (sometimes within a few weeks) with other voting systems in the context of academic research..."
Now, let's take the case of Rajkot West where BJP chief minister Vijay Rupani was contesting. At around 10-10.30 am the Congress candidate was leading by exactly 15% margin over Rupani! This is where the firmware code began attacking votes of independents and other smaller parties, taking them towards the BJP candidate. Suddenly, Rupani started getting votes, while other candidates began losing votes. My sources inside the Rajkot counting room say that after each hour, 15% votes were added to Rupani's kitty.
What do you see in the screenshot below that gives you the results of Rajkot West? That there were 5 Independent candidates -- three of them polled less than 1,000. One polled less than 2,000. BSP, the only recognized party, polled 1,400 votes. Other, obscure, small parties got less than 1000 votes.
The NOTA mystery also gets solved in Rajkot West. With all parties barring Congress and BJP getting minuscule votes, NOTA polled 3,251, second only to the Bahujan Mukti Party, which polled 4,122 votes. If you see the pattern of NOTA votes overall, they are significantly higher in areas from where the Congress has won.
NOTA votes dip when BJP wins!
So, a pattern emerges; in about 26 seats where BJP feared losing, the number of Independent candidates is high. In the early stages of counting, these independents got good votes. Then their votes started getting reduced!
NOTA votes seem to increase where BJP is seen in the beginning of counting as doing badly!
This explains several mysteries:
a). Why the BJP vote share is abnormally high? How is it that had Congress got 3,000 more votes in 16 seats where it lost by a margin less than 3000, it would have, while still at a vote share of 41.4% roughly, and 8% behind BJP, got 93 seats, and formed the Government!
b). Remember, the EVM is hacked not through bluetooth or at the polling stage; the scenario that machines showing the BJP symbol when voters are pressing Congress symbol is not covered in this schematics! EVMs are hacked only during counting, through pre-determined setting of codes in firmware.
c). Was the EVM hacked in the 16 seats where Congress lost by less than 3000 votes? No, EVMs were not hacked through pre-determined codes in those 16 seats. The manipulation on these seats was done manually, on the counting day, by scaring counting agents and making BJP win by force!
d). EVMs were hacked through predetermined codes in constituencies where BJP votes are abnormally high, like above 80,000. In these seats, invariably, BJP candidates started winning after trailing by 15% margin! See the Surat seats... and Mehsana!
e). Arvind Kejriwal knows the truth. But his demonstration of EVM hacking, conducted inside the Delhi assembly, did not address the firmware issue...and how hacking takes place only on counting day!
f). The book written by BJP's Narsimha Rao also avoids the issue.
g). It is now clear that international forces are involved in EVM hacking in India!
h). It is not Pakistan but the US lobby, including Japan and Israel, that is subverting Indian democracy!
i). So the EVM hacking thing is not just a technical problem. It is not a live political issue. Congress is the only party that is standing up to US pressure. But the rider is that with the whole Indian establishment infiltrated by the US-Israel-RSS triad, Congress has to compromise and step back from confrontation at intervals.
j). The real problem is the lack of a real civil society movement, of people hitting the streets on this issue. But people are unaware. With all propaganda channels blocked, there is no way things can be put across to the people of India.
---
* For source click HERE

Comments

TRENDING

From plagiarism to proxy exams: Galgotias and systemic failure in education

By Sandeep Pandey*   Shock is being expressed at Galgotias University being found presenting a Chinese-made robotic dog and a South Korean-made soccer-playing drone as its own creations at the recently held India AI Impact Summit 2026, a global event in New Delhi. Earlier, a UGC-listed journal had published a paper from the university titled “Corona Virus Killed by Sound Vibrations Produced by Thali or Ghanti: A Potential Hypothesis,” which became the subject of widespread ridicule. Following the robotic dog controversy coming to light, the university has withdrawn the paper. These incidents are symptoms of deeper problems afflicting the Indian education system in general. Galgotias merely bit off more than it could chew.

Covishield controversy: How India ignored a warning voice during the pandemic

Dr Amitav Banerjee, MD *  It is a matter of pride for us that a person of Indian origin, presently Director of National Institute of Health, USA, is poised to take over one of the most powerful roles in public health. Professor Jay Bhattacharya, an Indian origin physician and a health economist, from Stanford University, USA, will be assuming the appointment of acting head of the Centre for Disease Control and Prevention (CDC), USA. Bhattacharya would be leading two apex institutions in the field of public health which not only shape American health policies but act as bellwether globally.

The 'glass cliff' at Galgotias: How a university’s AI crisis became a gendered blame game

By Mohd. Ziyaullah Khan*  “She was not aware of the technical origins of the product and in her enthusiasm of being on camera, gave factually incorrect information.” These were the words used in the official press release by Galgotias University following the controversy at the AI Impact Summit in Delhi. The statement came across as defensive, petty, and deeply insensitive.

Growth without justice: The politics of wealth and the economics of hunger

By Vikas Meshram*  In modern history, few periods have displayed such a grotesque and contradictory picture of wealth as the present. On one side, a handful of individuals accumulate in a single year more wealth than the annual income of entire nations. On the other, nearly every fourth person in the world goes to bed hungry or half-fed.

Thali, COVID and academic credibility: All about the 2020 'pseudoscientific' Galgotias paper

By Jag Jivan   The first page image of the paper "Corona Virus Killed by Sound Vibrations Produced by Thali or Ghanti: A Potential Hypothesis" published in the Journal of Molecular Pharmaceuticals and Regulatory Affairs , Vol. 2, Issue 2 (2020), has gone viral on social media in the wake of the controversy surrounding a Chinese robot presented by the Galgotias University as its original product at the just-concluded AI summit in Delhi . The resurfacing of the 2020 publication, authored by  Dharmendra Kumar , Galgotias University, has reignited debate over academic standards and scientific credibility.

Conversion laws and national identity: A Jesuit response response to the Hindutva narrative

By Rajiv Shah  A recent book, " Luminous Footprints: The Christian Impact on India ", authored by two Jesuit scholars, Dr. Lancy Lobo and Dr. Denzil Fernandes , seeks to counter the current dominant narrative on Indian Christians , which equates evangelisation with conversion, and education, health and the social services provided by Christians as meant to lure -- even force -- vulnerable sections into Christianity.

'Serious violation of international law': US pressure on Mexico to stop oil shipments to Cuba

By Vijay Prashad   In January 2026, US President Donald Trump declared Cuba to be an “unusual and extraordinary threat” to US security—a designation that allows the United States government to use sweeping economic restrictions traditionally reserved for national security adversaries. The US blockade against Cuba began in the 1960s, right after the Cuban Revolution of 1959 but has tightened over the years. Without any mandate from the United Nations Security Council—which permits sanctions under strict conditions—the United States has operated an illegal, unilateral blockade that tries to force countries from around the world to stop doing basic commerce with Cuba. The new restrictions focus on oil. The United States government has threatened tariffs and sanctions on any country that sells or transports oil to Cuba.

Development at what cost? The budget's blind spot for the environment

By Raj Kumar Sinha*  The historical ills in the relationship between capital and the environment have now manifested in areas commonly referred to as the "environmental crisis." This includes global warming, the destruction of the ozone layer, the devastation of tropical forests, mass mortality of fish, species extinction, loss of biodiversity, poison seeping into the atmosphere and food, desertification, shrinking water supplies, lack of clean water, and radioactive pollution. 

When a lake becomes real estate: The mismanagement of Hyderabad’s waterbodies

By Dr Mansee Bal Bhargava*  Misunderstood, misinterpreted and misguided governance and management of urban lakes in India —illustrated here through Hyderabad —demands urgent attention from Urban Local Bodies (ULBs), the political establishment, the judiciary, the builder–developer lobby, and most importantly, the citizens of Hyderabad. Fundamental misconceptions about urban lakes have shaped policies and practices that systematically misuse, abuse and ultimately erase them—often in the name of urban development.