Sara Sorcher on Muck Rack

Sara Sorcher Verified

Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering security & privacy in the digital age. Former National Journal nat'l security correspondent

Sara Sorcher's Biography

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?


What's your favorite social network?

Twitter for news, Facebook for sharing.

Podcast: Congressman Hurd on why it's 'outrageous' OPM never apologized — Cybersecurity pro and undercover CIA officer-turned-Republican Rep. Will Hurd, and Chris Valasek of recent car-hacking fame, join New America's Peter Singer and Passcode's Sara Sorcher on The Cybersecurity Podcast. Rep. Will Hurd (R) of Texas felt the sting of the Office of Personnel Management breach first hand.

NSA chief admits risk in decrypting smartphone data — Adm. Mike Rogers has long posited that strong encryption on consumer devices hampers law enforcement and intelligence work. But on Thursday he acknowledged the possible security downside of one proposed way for the government to decrypt data on consumer devices. National Security Agency Director Adm.
Sep 25, 2015

NSA chief Rogers acknowledges creating multiple keys in encryption could open door for malicious or foreign hackers…

Sep 26, 2015

RT @SaraSorcher: NSA chief Rogers acknowledges creating multiple keys in encryption could open door for malicious or foreign hackers…

Report: The $120 trillion gap between a safe and insecure future Internet — The economic difference between the best and worst forecasts of the Internet could be as high as $120 trillion over the next 15 years, according to a new report from the Atlantic Council think-tank and Zurich Insurance. Will the future Internet be a utopia where cybersecurity is considered a human right - or so plagued by cybercrime that security becomes a luxury good?

US government not invited to Facebook’s ThreatExchange party — Turns out, many in the private sector are actually on board with the idea of information sharing - just not, necessarily, with the government. Facebook announced Thursday that more than 90 companies have joined its online community ThreatExchange to trade information about threats facing their networks
Aug 21, 2015

US government not invited to Facebook’s ThreatExchange party

Aug 21, 2015

RT @WeldPond: While Govt debates threat sharing, industry groups get it done without Govt.…

US government not invited to Facebook’s ThreatExchange party — For months, senior Obama administration officials have been on a charm offensive to convince business leaders and security professionals to share more information about the cyberthreats with the government, trying to convince often-skeptical audiences at major industry conferences this year in San Francisco and Las Vegas.
Aug 20, 2015

US govt, despite pushing for info-sharing, not invited to @Facebook’s ThreatExchange party…

Aug 20, 2015

RT @peterwsinger: InfoNotSharing: US government not invited to Facebook’s ThreatExchange Party by podcast partner @SaraSorcher…

Aug 21, 2015

CSO of Palo Alto Networks on threat sharing: “Private companies can do this on our own. We don’t need...the gov't."

Show 2 more tweets from Jim Finkle, Michael B. Farrell

Podcast: Half-life of secrets, golden age of surveillance, and the US military's Starship Enterprise — Is law enforcement "going dark" in its pursuit of criminals and terrorists as default security protections for consumer devices get stronger, or does the proliferation of technology and expansion of online communications mean we're living in a Golden Age of Surveillance? What more could the US do to reform its surveillance practices?

FTC: Bridging the divide between hackers and the ‘flip phone caucus’ — Ashkan Soltani, chief technologist of the Federal Trade Commission, and commissioner Terrell McSweeny spoke with Passcode while in Las Vegas for the Black Hat and DEF CON hacker conferences. LAS VEGAS - Ashkan Soltani and Terrell McSweeny have big jobs: Protecting the nation's consumers from deceptive or unfair business practices.
Aug 12, 2015

RT @CSMPasscode: .@FTC at #BHUSA #defcon Bridging the divide between hackers & the ‘flip phone caucus’……

Aug 12, 2015

.@ashk4n: "People brag they dont have any technical expertise–but they’re still making policy"…

Show 2 more tweets from Michael B. Farrell, Sara Sorcher

How this hacker can virtually 'kill' you, and what to do about it — At the DEF CON hacker conference, Kustodian CEO Chris Rock demonstrated how fraudsters could artificially 'kill' someone for a profit or prank due to vulnerabilities in most countries' death registration processes. Anyone with a keyboard and a cause can have a living person declared legally dead by taking advantage of security weaknesses in the online death registration process, says Chris Rock, chief executive officer of Australian-based security company Kustodian.
Aug 10, 2015

At #defcon, Rock demo'd how fraudsters could artificially ‘kill’ someone for profit or prank:…

Aug 10, 2015

RT @SaraSorcher: How this hacker can virtually 'kill' you & what to do about it. @CSMPasscode intv at #defcon:… http…

Aug 10, 2015

Me: U could give birth to 1000 babies tmrw, wait 18 yrs & be super rich? Rock: Correct… #defcon

Show 9 more tweets from Zack Whittaker, Sara Sorcher and others...

OPM breach a shadow over Homeland Security's appeals to security pros — The Deputy Homeland Security Secretary urged attendees of the Black Hat conference not to let the massive government breach foil plans for improving information sharing about cybersecurity threats between the private sector and the government. The Department of Homeland Security's No.
Aug 07, 2015

DHS #2: "I’ve heard...about the OPM breach & its impact on confidence in sharing w/gov" #BHUSA…

Show 6 more tweets from Michael B. Farrell, Sara Sorcher and others...

Jeep hackers: Only a dramatic stunt could force a Chrysler recall (+video) — At this week's Black Hat security conference, researchers Charlie Miller and Chris Valasek said hacking a reporter's car on a highway - which some called needlessly reckless - was the only real way to effect change.
Aug 07, 2015

RT @taosecurity: "The recall was worth the risk of using Greenberg and themselves as guinea pigs." Maybe them, but not other drivers.…

Aug 08, 2015

RT @taosecurity: "The recall was worth the risk of using Greenberg and themselves as guinea pigs." Maybe them, but not other drivers.…

More Articles →
Oct 05, 2015

RT @_decius_: I'm speaking on Oct 21st in DC at @CSMPasscode's event on policy issues in IOT security:…

Oct 05, 2015

@AaronsonSusan We're always happy to look at pitches! Can you pls e-mail @mikebfarrell and me at & Thx!

Oct 05, 2015

MOAR EVENTS!!! Happy #NCSAM everyone. Join us, DARPA, IARPA, NIST, DHS on Thurs. Bring your Qs. We'll bring lunch:…

Are You a Journalist?

Make a Portfolio

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.