Sara Sorcher on Muck Rack

Sara Sorcher Verified

Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering security & privacy in the digital age. http://csmpasscode.com. Former National Journal nat'l security correspondent

Sara Sorcher's Biography

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?

E-mail.

What's your favorite social network?

Twitter for news, Facebook for sharing.

Podcast: Katie Moussouris on bug bounties and stunt hacking

csmonitor.com — On the Cybersecurity Podcast, HackerOne's Chief Policy Officer Katie Moussouris discusses ways to incentivize hackers to report security problems and Brunswick Group's Siobhan Gorman reveals the "golden rule" of breach disclosures.

The battle between Washington and Silicon Valley over encryption

csmonitor.com — Tech titans are pushing back against Obama's national security officials over strong security on consumer devices, strengthened after the Snowden leaks. The outcome could impact the future of the Internet - and your privacy. When Homeland Security Secretary Jeh Johnson arrived in San Francisco for one of the world's largest technology conferences, it was almost like a foreign emissary entering enemy territory.
Jul 07, 2015

It’s the best deadbolt that’s ever been made. No one can break in." Encryption vs security - great story csmonitor.com/World/Passcode…

Jul 27, 2015

If you're worried that Washington wants backdoors in encryption, read @SaraSorcher's blockbuster DC insider story csmonitor.com/World/Passcode…

Jul 27, 2015

RT @JackSmithIV: If you're worried that Washington wants backdoors in encryption, read @SaraSorcher's blockbuster DC insider story csmonitor.com/World/Passcode…

Influencers: OPM chief should be held responsible for breach

csmonitor.com — The Office of Personnel Management chief should be held responsible for the lapse in security that led to the breach of millions of personal records, a whopping 84 percent of Passcode's pool of security and privacy experts said.

Peter Singer: How a future World War III could be a cyberconflict

csmonitor.com — Peter Singer, strategist at New America think tank, is coauthor of forthcoming novel 'Ghost Fleet,' which explores what would happen if digital warfare erupts between nations. What could World War III look like? If the growing spate nation-state hacks is any indication, it'll be waged by computers and over networks.
Jun 24, 2015

"Digital warfare may have the end result of taking parts of the fight back to a pre-digital age" -@peterwsinger csmonitor.com/World/Passcode…

Jun 24, 2015

"You may have cyberstrikes & drones, but...you may also see their fleets fighting like its 1944 again" -@peterwsinger csmonitor.com/World/Passcode…

Jun 24, 2015

RT @CSMPasscode: In technothriller "Ghost Fleet," @peterwsinger explores how global conflicts might play out in the 2020s. Q/A: csmonitor.com/World/Passcode…

Jun 24, 2015

RT @CSMPasscode: In technothriller "Ghost Fleet," @peterwsinger explores how global conflicts might play out in the 2020s. Q/A: csmonitor.com/World/Passcode…

Show 2 more tweets from Michael B. Farrell, toomas hendrik ilves

Podcast: Cory Doctorow on science fiction, surveillance and World War III

csmonitor.com — On The Cybersecurity Podcast, Passcode's Sara Sorcher and New America's Peter Singer interview science fiction author Doctorow and DARPA's Dan Kaufman about the surveillance state and futuristic new technology in anticipation of future cyberconflicts. With Internet technology advancing so quickly, what could a future World War III look like?

Security pros: Cyberthreat info-sharing won’t be as effective as Congress thinks

csmonitor.com — Though there's renewed momentum in Congress to finally pass a cybersecurity information-sharing bill, technology industry professionals say the proposals will primarily help government and won't aid the private sector. Members of Congress have renewed interest in passing a cybersecurity bill after hackers breached the Office of Personnel Management and compromised the personal information of millions of federal employees.
Jun 12, 2015

RT @CSMPasscode: .@alexstamos: @Yahoo reports crimes to govt but "very rarely get info back that then helps us find other attackers" csmonitor.com/World/Passcode…

Jun 12, 2015

RT @CSMPasscode: Infosharing "greasing the skids" for cos to provide govt info "not the other way around" @PaloAltoNtwks @raceBannon99 csmonitor.com/World/Passcode…

Show 4 more tweets from Sara Sorcher, Sara Sorcher and others...

Influencers: US plan to limit export of software vulnerabilities a bad idea

csmonitor.com — Three-quarters of Passcode's Influencers worry that changes to the Wassenaar Arrangement could hinder legitimate analysis of computer security weaknesses. A strong majority of Passcode's Influencers oppose a new proposal by the US Commerce Department to further restrict the export of most software vulnerabilities.
Jun 12, 2015

RT @PaloAltoNtwks: .@CSMPasscode Influencers, including @raceBannon99, comment on US plan to limit export of software vulnerabilities bit.ly/1MOaYjm

Jun 12, 2015

RT @ColumbiaSIPA: Would proposed U.S. policy hinder analysis of computer security weaknesses? @Jason_Healey weighs in: @csmonitor ow.ly/OdZpi

Influencers oppose US plan to limit export of software flaws

passcode.csmonitor.com — A strong majority of Passcode's Influencers oppose a new proposal by the US Commerce Department to further restrict the export of most software vulnerabilities. While the changes to the Wassenaar Arrangement, the 41-country agreement that governs arms exports, were offered in large part to help block the export of military-grade spyware to repressive regimes, 77 percent of Passcode's Influencers worry the new rules could, as an unintended side effect, hinder legitimate analysis of computer security weaknesses.
Jun 11, 2015

RT @raceBannon99: I agree with the 77% of Passcode Influencers that say that export controls for intrusion software are a bad idea. goo.gl/45xmRJ

Jun 10, 2015

RT @Jason_Healey: "Yet again US policy starts w/ valid risk, ends w/ militarized solution," my take on 0day export control @CSMPasscode goo.gl/u47KOU

Jun 10, 2015

RT @Jason_Healey: "Export control perpetrates 0days as part national arsenal, nurutured for offensive value, not discovered & fixed," http:…

Show 4 more tweets from Sara Sorcher, Sara Sorcher and others...

NSA surveillance debate gives rise to bipartisan civil liberties coalition

csmonitor.com — Behind the scenes, the battle to curb National Security Agency call records surveillance catalyzed an unlikely coalition that bridged far-left and far-right political divides. When the clock struck midnight on June 1, the National Security Agency's sweeping call records surveillance program ended. The expiration was a major loss for Senate Majority Leader Mitch McConnellof Kentucky.
Jun 08, 2015

The behind-the-scenes battle over NSA surveillance catalyzed a new & unlikely coalition bridging political divides: csmonitor.com/World/Passcode…

Jun 08, 2015

How the NSA surveillance debate gave rise to bipartisan civil liberties coalition. My latest for @CSMPasscode: csmonitor.com/World/Passcode…

Jun 08, 2015

RT @CSMPasscode: An exclusive look at how the unlikely Civil Liberties Coalition helped sunset #Section215 and pass #USAFreedomAct csmonitor.com/World/Passcode…

Jun 08, 2015

RT @LarryAkey: In aftermath of #USAFreedomAct, @SaraSorcher looks at left-right coalition that almost pulled off demise of Sec 215 - bit.ly/1FF1zWy

Show 16 more tweets from Noelle Swan, Sara Sorcher and others...

Will our future Internet be paradise or dystopia?

csmonitor.com — What we learned from an Atlantic Council event discussing digital trends and possible scenarios for the world's online future. What does the perfect Internet look like? The paradisiacal vision of its future - a scenario Atlantic Council senior fellow Jason Healey calls "Cyber Shangri La" - is one in which the dreams of Silicon Valley come true: New technologies are born and implemented quickly; secure online access is a human right.
May 21, 2015

RT @CSMPasscode: Will Silicon Valley’s dreams come true, or will future Internet be dangerous? @AtlanticCouncil @Jason_Healey predicts csmonitor.com/World/Passcode…

May 21, 2015

RT @CSMPasscode: There are always "leaders and laggards” in cybersecurity, @stiennon says. Laggards actually have short-term benefit. csmonitor.com/World/Passcode…

More Articles →
Jul 28, 2015

RT @NewAmCyber: #NewAmCyber Fellow @k8em0 w/ @peterwsinger @SaraSorcher on newest Cybersec Pod on bug bounties, stunts & disclosure http://…

Jul 28, 2015

RT @CSMPasscode: Bug bounties, stunt hacks & golden rules of breach disclosure. Latest Cybersecurity Podcast: soundcloud.com/newamerica/bug… http…

Jul 28, 2015

RT @CSMPasscode: Passcode's @SaraSorcher & @NewAmerica's @PeterWSinger host @k8em0 & @Gorman_Siobhan on latest Cybersecurity Podcast: https…

Jul 28, 2015

RT @CSMPasscode: Researchers @bishopfox say all you need is a flash drive – & 60 secs – to break into a smart safe. By @MalenaCarollo http:…



Are You a Journalist?

Make a Portfolio

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.