Government / Elections / Politics
Related Stories
Voices from the "Dark Side": The CIA Torture Debate
A Senate investigation has prompted new debate on the CIA's use of "enhanced interrogation" in the aftermath of 9/11. So what did key players who helped shape the policy think at the time?
December 10, 2014
The CIA Torture Report: What You Need To Know
The CIA's use of enhanced interrogation practices was worse and more widespread than the CIA admitted, according to a Senate investigation. Also: it didn't work.
December 9, 2014
What Will Obama Do on Immigration?
The president has promised to take action on immigration by year’s end. What will it look like?
November 12, 2014
Why Doesn't Everybody Have a Voter ID?
FRONTLINE's Sarah Childress answers your questions about voting.
November 4, 2014
Most of the Country is Already Voting in the Midterm Elections
As of today, 31 states have started early voting for the Nov. 4 midterm elections.
October 22, 2014
Why Voter ID Laws Aren’t Really about Fraud
Proponents say these laws ensure election integrity, but a FRONTLINE analysis found that ID requirements aren't applied equally to all voters.
October 20, 2014
Courts Block Texas, Wisconsin Voter ID Laws
The decisions come amid a flurry of court challenges to laws that will affect how people vote in the November election.
October 10, 2014
Introducing "Ballot Watch"
Who's allowed to vote? And when? As the November midterms approach, find out how voting laws are changing state-by-state in our interactive database.
October 1, 2014
Where is Voter Discrimination the Worst?
Voting discrimination persists nationwide, but the worst offenders today are still southern states with a history of blocking minorities' access to the ballot, according to a new study by the National Commission on Voting Rights.
August 6, 2014
How the NSA's Secret Elite Hacking Unit Works
The NSA is thought to deploy the Tailored Access Operations (TAO) unit for specific hard-to-get targets.
May 29, 2014
How the NSA Can Get Onto Your Computer
Security expert Ashkan Soltani explains how the NSA can get onto a user's computer via the web browser.
May 23, 2014