Sara Sorcher on Muck Rack

Sara Sorcher Verified

Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering security & privacy in the digital age. Former National Journal nat'l security correspondent

Sara Sorcher's Biography

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?


What's your favorite social network?

Twitter for news, Facebook for sharing.

US government not invited to Facebook’s ThreatExchange party — Turns out, many in the private sector are actually on board with the idea of information sharing - just not, necessarily, with the government. Facebook announced Thursday that more than 90 companies have joined its online community ThreatExchange to trade information about threats facing their networks
Aug 21, 2015

US government not invited to Facebook’s ThreatExchange party

Aug 21, 2015

RT @WeldPond: While Govt debates threat sharing, industry groups get it done without Govt.…

US government not invited to Facebook’s ThreatExchange party — For months, senior Obama administration officials have been on a charm offensive to convince business leaders and security professionals to share more information about the cyberthreats with the government, trying to convince often-skeptical audiences at major industry conferences this year in San Francisco and Las Vegas.
Aug 20, 2015

US govt, despite pushing for info-sharing, not invited to @Facebook’s ThreatExchange party…

Aug 20, 2015

RT @peterwsinger: InfoNotSharing: US government not invited to Facebook’s ThreatExchange Party by podcast partner @SaraSorcher…

Aug 21, 2015

CSO of Palo Alto Networks on threat sharing: “Private companies can do this on our own. We don’t need...the gov't."

Show 2 more tweets from Jim Finkle, Michael B. Farrell

Podcast: Half-life of secrets, golden age of surveillance, and the US military's Starship Enterprise — Is law enforcement "going dark" in its pursuit of criminals and terrorists as default security protections for consumer devices get stronger, or does the proliferation of technology and expansion of online communications mean we're living in a Golden Age of Surveillance? What more could the US do to reform its surveillance practices?

FTC: Bridging the divide between hackers and the ‘flip phone caucus’ — Ashkan Soltani, chief technologist of the Federal Trade Commission, and commissioner Terrell McSweeny spoke with Passcode while in Las Vegas for the Black Hat and DEF CON hacker conferences. LAS VEGAS - Ashkan Soltani and Terrell McSweeny have big jobs: Protecting the nation's consumers from deceptive or unfair business practices.

How this hacker can virtually 'kill' you, and what to do about it — At the DEF CON hacker conference, Kustodian CEO Chris Rock demonstrated how fraudsters could artificially 'kill' someone for a profit or prank due to vulnerabilities in most countries' death registration processes. Anyone with a keyboard and a cause can have a living person declared legally dead by taking advantage of security weaknesses in the online death registration process, says Chris Rock, chief executive officer of Australian-based security company Kustodian.
Aug 10, 2015

At #defcon, Rock demo'd how fraudsters could artificially ‘kill’ someone for profit or prank:…

Aug 10, 2015

RT @SaraSorcher: How this hacker can virtually 'kill' you & what to do about it. @CSMPasscode intv at #defcon:… http…

Show 9 more tweets from Sara Sorcher, Zack Whittaker and others...

OPM breach a shadow over Homeland Security's appeals to security pros — The Deputy Homeland Security Secretary urged attendees of the Black Hat conference not to let the massive government breach foil plans for improving information sharing about cybersecurity threats between the private sector and the government. The Department of Homeland Security's No.
Aug 07, 2015

DHS #2: "I’ve heard...about the OPM breach & its impact on confidence in sharing w/gov" #BHUSA…

Show 6 more tweets from Michael B. Farrell, Sara Sorcher and others...

Jeep hackers: Only a dramatic stunt could force a Chrysler recall (+video) — By now, more than 1 million people have seen the video of two hackers seizing control of a Jeep Cherokee as Wired reporter Andy Greenberg drove down a St. Louis highway at 70 miles per hour. The video was visual evidence hackers could kill the car's engine from miles away.
Aug 07, 2015

RT @taosecurity: "The recall was worth the risk of using Greenberg and themselves as guinea pigs." Maybe them, but not other drivers.…

Aug 08, 2015

RT @taosecurity: "The recall was worth the risk of using Greenberg and themselves as guinea pigs." Maybe them, but not other drivers.…

Jeep hackers: Only a dramatic stunt could force a Chrysler recall — At this week's Black Hat security conference, researchers Charlie Miller and Chris Valasek said hacking a reporter's car on a highway - which some called needlessly reckless - was the only real way to effect change.

Podcast: Katie Moussouris on bug bounties and stunt hacking — On the Cybersecurity Podcast, HackerOne's Chief Policy Officer Katie Moussouris discusses ways to incentivize hackers to report security problems and Brunswick Group's Siobhan Gorman reveals the "golden rule" of breach disclosures.

The battle between Washington and Silicon Valley over encryption — Tech titans are pushing back against Obama's national security officials over strong security on consumer devices, strengthened after the Snowden leaks. The outcome could impact the future of the Internet - and your privacy. When Homeland Security Secretary Jeh Johnson arrived in San Francisco for one of the world's largest technology conferences, it was almost like a foreign emissary entering enemy territory.
Jul 07, 2015

It’s the best deadbolt that’s ever been made. No one can break in." Encryption vs security - great story…

Jul 27, 2015

If you're worried that Washington wants backdoors in encryption, read @SaraSorcher's blockbuster DC insider story…

Jul 27, 2015

RT @JackSmithIV: If you're worried that Washington wants backdoors in encryption, read @SaraSorcher's blockbuster DC insider story…

More Articles →
Aug 27, 2015

RT @Robyn_Greene: This should be a great event. Anyone who is in DC should attend. And check out @OTI's great work on crypto policy.…

Aug 27, 2015

RT @EricWenger: Looks like another thought-provoking discussion from @CSMPasscode. I'll be there.

Aug 27, 2015

RT @StaySafeOnline: Join @csmpasscode for The Encryption Debate on 9/15 9AM EDT, vital 4 national security & consumer #privacy…

Are You a Journalist?

Make a Portfolio

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.