Thursday, May 7, 2026

Subversion of Indian Elections — Vulnerabilities, Fixes & Debates for Election Reforms

  


By Anil Srivastava | Full Blog Post | November 8, 2025 – Updated May 7, 2026

Overview

Indian elections are beset with serious problems at multiple levels — ironically, all of these can be fixed. The biggest reason reforms haven't happened is the lack of public pressure. Some fixes require constitutional amendments with a 2/3rd majority, a few require legislative amendments with a simple majority, and others require only a procedural change which could be mandated by ECI (Election Commission of India) or forced by SCI (Supreme Court of India).

ECI, once a reputed independent institution, is today seen as a government agent. SCI has been generally dismissive of activists' challenges against ECI's processes and conduct. Therefore, it is only public pressure that can save India's democracy.


Reform Table: All 11 Vulnerable Stages

(S=Short-term, M=Medium-term, L=Long-term | E=Essential, D=Desirable)


Sr. 1 [L & E] — Political Funding & Accountability of Contestants

Vulnerability: Unrealistically low expense caps force candidates to mobilise funds under the table, entailing quid pro quos. Honest candidates are sidelined. Wild promises are made with no accountability. Humongous election rallies cause public inconvenience.

Fix: Expense caps to be raised 10x with full transparency in disclosures. Political parties must disclose 100% of funds. Donors above a threshold must disclose all government contracts. State to provide broadcast time and organise moderated debates. Physical rallies capped at two per candidate and five per party. ECI to publish candidate statements of objects and past performance in easy-to-read searchable tables.

🔗 Deep dive: World's biggest election | Costliest election | Political party proliferation


Sr. 2 [L & D] — First-Past-The-Post (FPTP) System

Vulnerability: With multiple parties, FPTP distorts representation — winning parties often have minority voter support. Dummy candidates are propped up with slush funds to split opposition votes.

Fix: India should replace FPTP with a Two-Round System (TRS) or Proportionate Representation System, ensuring winning candidates always have >50% vote share.

🔗 Deep dive: FPTP vs TRS which is better for India?


Sr. 3 [M & E] — Scheduling of Elections (Phase-wise)

Vulnerability: ECI announces election phases without consulting major parties and appears to follow the ruling party's demands. The last General Election stretched to 42 days.

Fix: ECI must adopt a transparent, consultative approach to phase scheduling with all major parties.


Sr. 4 [M & E] — ECI Appointment of Election Commissioners & Immunity

Vulnerability: All three ECs are appointed by PM & Cabinet with little say for the Leader of Opposition (LOP). ECI becomes partisan and beholden to the ruling party. ECs face no accountability for their conduct or violations of the Model Code of Conduct (MCC).

Fix: Appointment committee should comprise PM + Chief Justice of India (CJI) + LOP. ECs must be made accountable and prosecutable for acts of both commission and omission.

🔗 Deep dive: ECI beholden to Government  LOP has little say


Sr. 5 [S & E] — Electoral Rolls Preparation & EPIC (Electors Photo ID Card) Issuance

Vulnerability: Very poor system design with no use of India's DPI (Digital Public Infrastructure). Huge errors — ~17% dubious additions in one Assembly Constituency; 6,000 names attempted to be programmatically deleted in another. Duplicate EPICs and entries in Electoral Rolls without EPICs abound. ECI refuses to release digital searchable rolls citing false legal reasons (it releases scanned pdf files for no good reason).

Fix:

  1. Aadhaar must be mandatorily linked with EPIC (legislative support needed; ~650 million already seeded).
  2. EPIC generated only after biometric Aadhaar authentication; both EPIC & Aadhaar numbers must be printed in Electoral Roll.
  3. EPIC to carry current address (determining constituency), separate from permanent address. This will enable migrant workers (tens of millions) to vote from their current addresses.
  4. Deletion process made rigorous: requester identity authenticated biometrically; ID & IP stored; suspicious high-speed deletion attempts referred to NIA (National Investigation Agency).

🔗 Deep dive: Wrongful additions & deletions | Indian Citizen vs Voter explainer | Linking Aadhaar with Voter Card |  


Sr. 6 [S & E] — Polling Booth Voter Identification

Vulnerability: Photos in Electoral Rolls are of very poor quality and miniscule size, allowing impersonators to pass scrutiny of Polling Assistants (PAs) and Presiding Officer (PO).

Fix: Identity must be established via biometric Aadhaar authentication. All booths to be equipped with fingerprint scanners and facial recognition (ECI to develop an app). At least one iris scanner per polling station. Satellite phones/VSAT kits for remote areas. Two fallback biometric methods to ensure no genuine voter is excluded.

🔗 Deep dive: Voting system before and after EPIC linked with Aadhaar


Sr. 7 [S & E] — Physical Electoral Roll & Ink-Smearing Process

Vulnerability: Errors occur in manually marking voters on physical rolls and recording serialised numbers. The process is antiquated and error-prone.

Fix: Eliminate physical Electoral Rolls entirely. ECI's Voter Management System (VMS) to provide booth-specific electronic voter lists to logged-in PAs (Polling Agents) and POs (Presiding Officer) on smartphones/tablets. PO/PA to mark authenticated voters electronically; VMS records EPIC in a "Votes Cast" table. Indelible ink smearing becomes unnecessary as the system prevents double-voting automatically.

🔗 Deep dive: Voting system before and after EPIC linked with Aadhaar


Sr. 8 [S & E] — Voting with the EVM System

Vulnerability: EVM is a "black box" — source code and technical design not revealed. The dark glass + 7-second lamp design of VVPAT means voters cannot reliably verify their vote slip being printed and dispensed. A gamed VVPAT can steal votes with no proof, as the malware self-erases before poll closing leaving no audit trail. ECI has also ordered CCTV footage deleted after 45 days.

 

Fix:

  1. VVPAT must have transparent glass with the inside lamp constantly lit so voters can see the slip printing and being dispensed into the ballot box.
  2. On polling day, in 2% of booths per constituency (chosen by contestants), EVMs to be removed for Black Box Testing (BBT) — simulated voting at real pace, with worksheet results compared against CU display and printed slip count. Discrepancies to trigger investigation or countermanding of election. A pattern favouring one party may lead to disqualification.
  3. CCTV footage must be shareable with contestants to verify the maximum 4-votes-per-minute EVM rule. ECI's deletion policy is described as mala fide.

🔗 Deep dive: EVM usage & vulnerabilities | Voting system overview


Sr. 9 [S & E] — Poll Closing Processes & Form 17-C

Vulnerability: After polling closes, the PO is supposed to record in Form 17-C, total votes as displayed on CU, timestamp and serial numbers of CU, BU and VVPAT.  The filled-up Form-17C is supposed to be signed by PO and PAs. If fraudulently, higher vote count and timestamp is recorded on Form-17C then the extra votes could be cast by the PO; as a precaution, to escape audit enquiry, the PO could tick off names of those who had not voted, on physical electoral roll. Delays and fudging in manual submission, without a photograph of CU display of vote count and poll closure time, undermine integrity.

Fix:

  1. CU display fields (total votes, serial number, date-time stamps) and VVPAT serial number to be photographed and uploaded to ECI portal immediately.
  2. Form 17-C, signed by all present, to be photographed and uploaded to ECI portal.
  3. Total booth votes with CU & VVPAT serial numbers to be input online on ECI portal (with male-female breakup).

🔗 Deep dive: Form 17-C, process modifications for preventing fraud


Sr. 10 [S & E] — DEO Submission to ECI After Form 17-C Collection

Vulnerability: The District Election Officer (DEO) compiles booth-wise votes from Form 17-C and files on ECI portal — but there is inadequate verification of accuracy.

Fix:

  1. DEO to verify booth-wise votes by cross-checking physical Form 17-C against PO-uploaded photos.
  2. ECI's VMS to generate a digitally signed (DSC) statement of booth-wise votes within 24 hours of poll closing.
  3. All contestants to be able to view booth-wise totals with filters on ECI portal.

Sr. 11 [S & E] — Vote Counting in the Counting Room

Vulnerability: In the counting room, booth-wise candidate results are read off each CU. There is currently no systematic check that the physical CU being counted is the same machine used at the booth — creating a window for EVM substitution or tampering.

Fix: Before reading results from each CU, contestants' representatives must be given an opportunity to verify the CU's displayed serial number against Form 17-C, the tamper-proof sticker with serial number on VVPAT, and uploaded photos. Any discrepancy must halt counting for that constituency and trigger an investigation.


Most Important Short-Term & Essential (S & E) Reforms

As concluded in the blog, the following items can significantly reduce risks to India's democracy quickly and should be prioritised:

Sr. 5 — Electoral Roll cleanup via mandatory Aadhaar-EPIC linking and biometric-authenticated deletions (especially sub-action 5.4)

Sr. 6 — Biometric voter authentication at booths using Aadhaar

Sr. 7 — Replace physical Electoral Rolls with electronic VMS-based system; eliminate ink smearing

Sr. 8 — Fix VVPAT transparent glass; introduce Black Box Testing in 2% of booths; share CCTV footage with contestants (especially action 8.2 to thwart EVM hacks)

Sr. 9, 10 & 11 — Digital upload of Form 17-C, DEO verification, and serial number cross-check before counting — to thwart all post-poll gaming

By utilising India's excellent Digital Public Infrastructure (DPI) coupled with tweaking the Aadhaar Act and making minor changes in VVPATs, India's democracy can be quickly secured. Subversion of Indian elections is a high-stakes game — if hacking/manipulation is being done, it is likely done by top-drawer hackers who will not leave an audit trail.


The two longer-term structural reforms — Sr. 1 (political funding transparency) and Sr. 2 (replacing FPTP) — remain critical but require much broader public debate and constitutional/legislative action over time.

 

Sunday, February 1, 2026

Building a New World Order: Why Military Supremacy is a Bankrupt, Dangerous Delusion

 


The advocates for unrestrained military buildup are not just wrong—they are peddling a catastrophic anachronism. Their arguments crumble under the weight of modern technological, economic, and strategic reality. Here is the systematic demolition.

 

I. The Fatal Flaws of the "Hard Power" Fantasy

1. The Speed & Agility Myth: Alliances vs. Algorithms

Their Claim: "Military alliances ensure security and enable swift action." The Demolition: Military coalitions are geologically slow. They require treaty debates, parliamentary approvals, complex logistics, and risk-sharing negotiations that take months or years. By contrast, a digital sanctions regime can be activated in one day. When a transgression occurs, the global community can, by a simple majority vote in a 194-member (Palestine to be 194th nation) body, trigger an automated system that:

  • Imposes escalated tariffs on trades with the defaulter nation
  • Instantly freeze target-nation assets in participating banks.
  • Revoke international payment processing (SWIFT access).
  • Cancel visas for its elite.
  • Place an embargo on essential supplies (e.g. Pharmaceuticals, Rare Earths).

This is not a future concept; it is a technological and administrative (implementable) reality. The above responses can be graded (i.e. calibrated) according to the nature and severity of transgression. Why wait for an aircraft carrier group to sail when you can collapse a regime's financial system with a keyboard command?

2. The Sovereignty Shield: The UN Charter is Their Worst Enemy

Their Claim: "National sovereignty justifies any military buildup for self-defense." The Demolition: They selectively ignore the UN Charter's core principles they claim to defend:

  • Article 2(1): Sovereign equality of all members.
  • Article 2(4): Prohibition of the threat or use of force.
  • Article 2(7): Non-interference in domestic jurisdiction.

A world order based on "Right is Might" enforces these very rules. It protects sovereignty by making foreign invasion and electoral interference unthinkably costly through collective non-military retaliation. The militarist's path—forcible regime change, covert ops, and pre-emptive strikes—is itself the greatest violation of the sovereignty they pretend to cherish. Our system actually upholds the Charter; theirs blatantly shreds it.

 

II. Why Military Force is Futile in the 21st Century

The militarist's mind is trapped in the past, extrapolating from eras where the strong could crush the weak on a battlefield. That world is gone. Modern threats have decentralized and democratized destruction, making traditional armies like expensive, slow dinosaurs.

Ancient/Industrial Age Threat

21st Century Equivalent

Why Military Power Fails Against It

Invading Army

Cyber Attack

Can't bomb a server in another country's basement. Attribution is slow; response is disproportionate. Cyber Attack can knock out entire city’s or country’s power grid, communication system, central bank etc.

Battleship Fleet, Iron/Golden Dome

Swarm of AI-Enabled Drones, Hypersonic Missiles

A 175-billion-dollar air defense system can be overwhelmed by $500 - $10,000 drones. Fibre-linked drone with 10Kg payload emerging from a truck can fly up to 50Km and take out any military or target asset. Hypersonic Missiles can do worse at long range. Cost-exchange ratio is fatal.

Nuclear Superpower

Rogue State/NGO with a "Dirty Bomb"

Deterrence fails against non-state actors. A crude radiological device, built with stolen material, can paralyze a global city.

Fortified Bunker

Engineered Pathogen

Borders and missiles are irrelevant. A bio-weapon, potentially AI-designed, requires a global public health response, not an army.

The Inescapable Conclusion: Pouring trillions into carriers, jets, and tanks is like building a magnificent castle wall while your enemy has already invented the airplane and the virus. You are fortifying against the last war.

 

III. The Superior System: Pre-Announced, Inescapable Existential Cost

What we need is not a bigger hammer, but a smarter system of consequences. The principle is simple and must be communicated in advance to any potential defaulter or terrorist:

"The global order will not meet your aggression with a symmetrical military response you might hope to survive or exploit for propaganda. It will respond asymmetrically, by dissolving the economic, digital, and social foundations of your power. Your regime will not be toppled by invasion; it will be suffocated by the collective will of humanity, expressed through rules you agreed to."

The Operational Blueprint: The United Nations General Assembly - UNGA or UN2.0 or a New Accountability World Association - as the Core Engine

  1. Principle: One-Nation-One-Vote in the 194-member Assembly.
  2. Mechanism:
    • A simple majority (50%+) triggers Tier 1 measures: Targeted travel bans, asset freezes on leadership, and light trade tariffs.
    • A super-majority (66%+) triggers Tier 2 measures: Comprehensive financial sanctions, full trade embargoes on strategic goods, and blockage of profit repatriation or expropriation of assets.
  3. Calibration: Measures are automatically graduated and can be lifted by the same voting thresholds upon compliance. This is transparent, rules-based, and predictable. It can be enforced within 24 hours of voting.

Why This is an Existential Threat to Aggressors: A regime can survive a battlefield loss and spin it as a heroic stand. It cannot survive its central bank being frozen, its global supply chains severed, and its political elite unable to access their overseas wealth or send their children to foreign universities. This creates immediate, powerful internal pressure for change from the very people who prop up the regime.

 

The Final, Unanswerable Argument: Cost-Effective Righteousness

The choice is now starkly clear:

  • Path A (Militarist Delusion): Spend $2.x Trillion on a new generation of weapons systems (according to SIPRI the world spent $2.4 trillion in 2025 which was 9.4% above the previous year-spend). Create a more dangerous world, trigger arms races (Trump is forcing UK and NATO bloc to up their military budgets from 2.5% of GDP to 5%; New START treaty expires 5-Feb-26 and Trump said let it lapse), divert funds from climate (Trump calls the fight against climate change the biggest scam in history) and health, and still be vulnerable to a drone swarm or a cyber-attack or a virus attack from a non-state actor.

  • Path B (Rational Order): Invest a fraction of that cost in strengthening global institutions, monitoring systems, and rapid sanction mechanisms. Achieve greater security by making aggression futile from the start. Preserve resources for actual human advancement. Contrast this with the unfortunate spectacle – the heads of UK and EU are scurrying like headless chickens after Trump has threatened annexation of Greenland whereas these leaders were complicit with USA in the genocidal war Israel (so determined by ICC) inflicted upon Palestine; PM Modi has been mocked and insulted by Trump - he is being ordered to buy or not buy oil from specified countries, withdraw from investing or operating a port in another country (according to Epstein he even sang and danced to please Trump). If members of BRICS, NAM, OIC, G77, ASEAN, G7 and other blocs speak in unison they can force the glacial pace of reform of UNSC to create UN 2.0, alternatively (if P5 nations don't get aligned) they can forge, “Accountability World Association” and borrow the UN Charter and tweak the existing punitive actions framework.

Self-preservation and righteousness are no longer conflicting goals. In a world where a single hacker or a vial of engineered virus can pose an existential threat, our only viable "defense" is a universal, cooperative system that makes such acts obviously self-destructive. Investing in that system is the most cost-effective, humane, and strategically brilliant form of patriotism possible.

The advocates of endless military buildup are not strong. They are terrified—terrified of a future they cannot control with old tools. Our vision offers control, not through brute force, but through the irresistible, collective power of a connected world. That is true strength.

We are no longer in the world of Genghis Khan, Alexander the Great, Timur, Attila the Hun, Napoleon Bonaparte, Julius Caesar or Ashoka the Great. We are also not in the world of Joseph Stalin, Pol Pot, Idi Amin, Mao Zedong or Adolf Hitler. Are these people revered today? All contemporary leaders, includng known autocrats, seek and claim legitimacy through popular mandates. Without popular mandate, in today's world, no autocrat can last long. Wily politicians manufacture public consent by arousing tribalism but dressing it as nationalism. Fortunately, in an inter-connected world, it is difficult to fool people for too long. Unfortunately, though, the risk of a rogue leader becoming an existential threat to humanity has increased alarmingly. The doomsday clock was recently set to 85 seconds to mid-night.

Militarists and ultra nationalists are two faces of the same beast. Unless people are re-educated, the doomsday will arrive before super abundance arrives with the help of AGI and ASI (most experts believe this is no more than 10 to 20 years away). We should take advantage of the digital world which can invert the rising "might is right" tide. We have discussed above the power and efficacy of a non-military world order. What is lacking is intellectual leadership.     

We should reflect on thoughts about Nationalism these leaders expressed:

Nationalism is an infantile disease. It is the measles of mankind.” 
—Albert Einstein

Patriotism is when love of your own people comes first; nationalism, when hate for people other than your own comes first. 

Nationalism is good in its place, but it is an unreliable friend and an unsafe historian. It blinds us to many happenings, and sometimes distorts the truth, especially when it concerns our own history.
--Jawaharlal Nehru

Nationalism is a great menace… It is the particular thing which for years has been at the bottom of India's troubles… It is my conviction that my countrymen will gain truly their India by fighting against that education which teaches them that a country is greater than the ideals of humanity.
--Rabindranath Tagore

Antithesis of above ideas are today’s tribalistic slogans:

“Make America Great Again”, Donald Trump (deserves credit for incentivizing formation of a new   non-military world order)

“Atmanirbhar Bharat”, Narendra Modi. Modi's is actually an empty slogan coined for electioneering to inflate his chest size to 56". Reality check: India's trade deficit with China grew from $38 billion in 2014 to $116 billion in 2025. [आत्मनिर्भर भारत frames the nation as a closed, muscular, self-contained body, the conceptual opposite is not “weak” or “dependent”, but open, networked, and mutually enabling.  à¤ªà¤°à¤¸्परनिर्भर भारत - means Interdependent India - this should have been the slogan if Modi had any trace of Nehru's intellectual heft and, he could have added a tag line, “समृद्धि सहयोग से आती है, अलगाव से नहीं”! When you build global supply chains, you spread prosperity, the interdependence disincentivises conflicts - it can buy you leverage just as, at times, it creates vulnerabilities. It works when you have an enforceable world order. - Notes]

“Take Back Control” UK’s Brexit campaign

“The Chinese Dream”, Xi Jinping

Other similar slogans invoking Nationalism, Revivalism, Protectionism

“Saudi Arabia, the heart of the Arab and Islamic worlds”,

“Fortress Russia”