By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
foej.infoej.in
  • Home
  • Opinion
  • Polity
  • FOEJ Original
  • Culture
  • Human Rights
  • Videos
  • More
    • Environment
    • World
    • Business
Search
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Bihar Becomes Tested for E-Voting – But Is Democracy at Risk?
Share
Sign In
Notification Show More
Latest News
Nine Bengali Muslim Migrant Workers Detained in Chhattisgarh, TMC Raises Alarm
Human Rights
Thousands Displaced as Assam Continues Eviction Drives in Reserve Forests
Thousands Displaced as Assam Continues Eviction Drives in Reserve Forests
India
Kashmiri Leaders Decry House Arrests, Restrictions on Martyrs’ Day Observance
India
UN: 150,000 Rohingya Flee to Bangladesh as Violence Escalates in Myanmar
150,000 Rohingya Flee to Bangladesh as Violence Escalates in Myanmar
International
Mahmoud Khalil Sues Trump Officials over $20M for Wrongful Detention Claim
Mahmoud Khalil Sues Trump Officials over $20M for Wrongful Detention Claim
Protest
Aa
foej.infoej.in
Aa
  • Home
  • Opinion
  • Polity
  • FOEJ Original
  • Culture
  • Human Rights
  • Videos
  • More
Search
  • Home
  • Opinion
  • Polity
  • FOEJ Original
  • Culture
  • Human Rights
  • Videos
  • More
    • Environment
    • World
    • Business
Have an existing account? Sign In
Follow US
  • Advertise
© 2023 Foundation For Ethical Journalism. All Rights Reserved.
foej.in > Blog > Politics > Bihar Becomes Tested for E-Voting – But Is Democracy at Risk?
Politics

Bihar Becomes Tested for E-Voting – But Is Democracy at Risk?

FOEJ DESK
Last updated: 2025/07/07 at 11:19 AM
FOEJ DESK
Share
5 Min Read
SHARE

On June 27, 2025, an experimental phone-based voting system was deployed across six municipal councils in three districts of Bihar—State Election Commissioner Deepak Prasad said  “This facility is for those unable to reach the polling station due to physical or locational reasons… like senior citizens, disabled persons, those who are pregnant and migrant voters.”

Contents
The Hidden Dangers of Invisible ManipulationOpaque Backend ArchitectureAuthentication VulnerabilitiesCall Spoofing and Systematic FraudLack of Verifiable Paper TrailReal-World Scenarios of Possible Manipulation

While the move was hailed by some as a technological leap, and the casting of votes through E- voting has been 70.20% more than booth voting, many experts,  political observers, public, and netizends  are sounding alarms. The reason? The very mechanism that was supposed to ensure ease, inclusivity, and transparency may instead have silently opened a door to undetectable electoral rigging.

The Election Commission’s pilot project allowed eligible voters in selected municipal councils to cast their vote. How does it work? The voters have to download the E- SECBHR app. This is only available for the Android users. 

The phone number mentioned in the voter list has to be linked to the app. Following this verification will be done. 

Superficially, the system seemed secure. It involved biometric-linked voter registration, encryption of transmitted data, and limited-time OTP-based access. Yet beneath the surface,  massive vulnerabilities could be exploited with minimal chances of detection.

The Hidden Dangers of Invisible Manipulation

Let’s unpack how such a phone-based voting system could be manipulated and why such manipulation would be hard—if not impossible—to detect:

Opaque Backend Architecture

Unlike traditional EVMs (Electronic Voting Machines), which are standalone and auditable, phone-based systems rely on a complex chain of digital infrastructure: servers, software code, telecom channels, databases, and encryption keys. This backend is entirely hidden from voters and even from polling agents. If even a small part of this system such as the vote-mapping algorithm or the final tallying script were tampered with, it could reassign votes or discard some entirely without any visible trace.

Authentication Vulnerabilities

The reliance on Aadhaar or voter ID-based authentication assumes the integrity of those databases. However, fake or duplicate Aadhaar entries are not unheard of. Further, if the system allowed call-in voting from any phone (as long as the credentials matched), vote buying or coercion becomes simple. However, according to Prasad,  the validity of every vote will be cross-checked against individual IDs.

Call Spoofing and Systematic Fraud

Telecom-level attacks such as SIM swapping or call spoofing could allow large-scale automated voting from a central hub. With modest resources, an actor could place thousands of spoofed calls, mimicking legitimate voters and casting ballots systematically. 

Lack of Verifiable Paper Trail

Perhaps the most disturbing feature of the system is its lack of verifiability. In traditional elections, votes are either cast physically on ballot papers or digitally on EVMs, both of which leave a retrievable trail. In contrast, phone-based votes are ephemeral, transmitted as data packets and stored in databases that are accessible only to election authorities and technology vendors.

What if someone changes the vote database after voting closes? What if there’s a script that biases the tally subtly—say, redirecting 2% of all votes to a preferred candidate? 

Real-World Scenarios of Possible Manipulation

Consider the following hypothetical, yet entirely plausible, scenario:

1)A candidate has access to local voter rolls.

2)His party operatives contact elderly or illiterate voters, offering to help them vote over the phone.

3) These operatives then obtain the voters’ credentials, generate OTPs, and vote on their behalf.

4)Alternatively, a malicious actor within the IT vendor’s team tweaks the backend to count every third vote for Candidate X, regardless of input.

In both cases, the final tally would appear mathematically plausible and face little to no resistance—because there’s no audit trail, no paper ballots, and no means for the voter to verify whether their vote was recorded as intended.

Even if a political party suspects foul play, how would they prove it? Would the Election Commission allow forensic inspection of its servers and vote logs? Would the telecom partners reveal call data records to independent investigators? 

FOEJ DESK July 3, 2025
Share this Article
Facebook Twitter Copy Link Print
Previous Article Sharjeel Imam Writes From Tihar Jail: On Jinnah, Islam, and the Place of Muslims in Indian Democracy Sharjeel Imam Writes From Tihar Jail: On Jinnah, Islam, and the Place of Muslims in Indian Democracy
Next Article President Donald Trump has announced that Israel has agreed to a 60-day ceasefire in Gaza – a development that mirrors previous proposals floated but never fully realised. A similar truce plan was discussed in May, and before that, in March, when a short-lived agreement fell apart after just one phase. Hamas had earlier dismissed the idea as a ploy to prolong the war under the guise of a temporary pause. Another Ceasefire Proposal for Gaza — What’s Different This Time?
foej.infoej.in
Follow US

© 2023 Foundation For Ethical Journalism. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?