Sara Sorcher on Muck Rack

Sara Sorcher

Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering digital security & privacy. Former National Journal nat'l security correspondent. 0x9A199099

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?


What's your favorite social network?

Twitter for news, Facebook for sharing.

Digital attack on journalist raises specter of online censorship — After an unprecedented online assault took down cybersecurity journalist Brian Krebs's influential cybersecurity blog, he was able to return to the web because of a new service that protects journalists and activists from online censorship. -When cybersecurity journalist Brian Krebs exposes internet crime rings or digital fraudsters, retaliation often follows.

Podcast: Government hacking v. human rights — On the latest edition of The Cybersecurity Podcast, digital privacy expert Amie Stepanovich discusses government hacking from a human rights perspective. The government can hack you ... legally. It sounds like a dystopian sci-fi novel, but all around the world, governments are increasingly breaking into personal computers and smartphones to carry out spy operations.

Podcast: How the University of Central Florida built a hacking dynasty — It's a scene familiar to many cybersecurity professionals: Network defenders try to keep business running while fighting off digital attacks. But it's also the scenario for one of the country's largest student cyberdefense competitions, the National Collegiate Cyber Defense Competition.

Video: So you want to be a hacker? Advice from the kids of DEF CON — Passcode caught up with some of the kids at r00tz Asylum to get their advice: What's the first step other kids - or anyone, really - should take if they want to be a hacker? These are hacker kids.

Lessons from a digital mercenary: Beware the ‘October Surprise' — Turns out, you don't need a stash of guns and bombs to overthrow a government. All you need, according to researcher Chris Rock, is a capable team of hackers with a diverse set of skills to break into different systems, from banks to the power grid.

With the drama but not the bruises, hacking becomes a spectator sport — Welcome to the future of hacking, where machines are the stars and the humans are in the audience. The night before the DEF CON hacker conference began here, seven supercomputers went head-to-head in a kind of Olympics for cybersecurity.

Hackers grapple with a once-unthinkable idea: Political action — As the DNC hack puts digital security in the national spotlight, cybersecurity professionals took the unusual step of staging a Hillary Clinton fundraiser at a hacker conference known for its fiercely independent and antiestablishment attendees. Throngs of hackers have been flocking to Sin City to celebrate their craft every summer since Jeff Moss founded the Black Hat and DEF CON conferences in the 1990s.

Experts: Obama’s color-coded rankings oversimplify cybersecurity threats — The DNC hack is a prime example of why President Obama's new cybersecurity policy directive does not adequately account for the complex nature of the digital security threat, experts say. With the Democratic National Committee still reeling from massive data breach, President Obama released a policy directive Tuesday outlining how the government plans to tackle major cyberattacks.

The Internet of Toys raises new privacy and security concerns for families (+video) — If you're a parent buying a talking toy for your kids, you probably wouldn't want a hacker using it as a way to talk to them alone in their bedrooms. Nor would you want hackers using their toys as a way to collect sensitive personal information about them.

Podcast: 'Zero Days' director Alex Gibney on making Stuxnet a movie star — An award-winning director discusses the challenges of making a documentary about a top secret digital weapon. Officials from both countries believed to be responsible for the virus meant to slow Iran's nuclear program won't publicly acknowledge it ever existed.
More Articles →
Sep 29, 2016

Do you have what it takes to win the @CSMPasscode cup? Join our Capture the Flag competition on 10/21 

Sep 28, 2016

RT @reporterporter: "Privacy is not about secrecy. It's about autonomy," writes Robyn Greene for @CSMPasscode: 

Sep 26, 2016

Cybertwitter freaking out right now ⚡️#cyberinthespotlight #debatenight

Sep 26, 2016

RT @CSMPasscode: "As far as the #cyber," we should be better than anyone else, says #Trump #debatenight

Sep 26, 2016

Clinton "deeply concerned" about state-linked cyberattacks. "Putin is playing a tough, long game here." #debatenight

Are You a Journalist?

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.

Create a Portfolio