Sara Sorcher on Muck Rack

Sara Sorcher

Verified
Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering digital security & privacy. csmpasscode.com. Former National Journal nat'l security correspondent. 0x9A199099

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?

E-mail.

What's your favorite social network?

Twitter for news, Facebook for sharing.

Podcast: How the University of Central Florida built a hacking dynasty

csmonitor.com — It's a scene familiar to many cybersecurity professionals: Network defenders try to keep business running while fighting off digital attacks. But it's also the scenario for one of the country's largest student cyberdefense competitions, the National Collegiate Cyber Defense Competition.

Video: So you want to be a hacker? Advice from the kids of DEF CON

csmonitor.com — Passcode caught up with some of the kids at r00tz Asylum to get their advice: What's the first step other kids - or anyone, really - should take if they want to be a hacker? These are hacker kids.

Lessons from a digital mercenary: Beware the ‘October Surprise'

csmonitor.com — Turns out, you don't need a stash of guns and bombs to overthrow a government. All you need, according to researcher Chris Rock, is a capable team of hackers with a diverse set of skills to break into different systems, from banks to the power grid.

With the drama but not the bruises, hacking becomes a spectator sport

csmonitor.com — Welcome to the future of hacking, where machines are the stars and the humans are in the audience. The night before the DEF CON hacker conference began here, seven supercomputers went head-to-head in a kind of Olympics for cybersecurity.

Hackers grapple with a once-unthinkable idea: Political action

csmonitor.com — As the DNC hack puts digital security in the national spotlight, cybersecurity professionals took the unusual step of staging a Hillary Clinton fundraiser at a hacker conference known for its fiercely independent and antiestablishment attendees. Throngs of hackers have been flocking to Sin City to celebrate their craft every summer since Jeff Moss founded the Black Hat and DEF CON conferences in the 1990s.

Experts: Obama’s color-coded rankings oversimplify cybersecurity threats

csmonitor.com — The DNC hack is a prime example of why President Obama's new cybersecurity policy directive does not adequately account for the complex nature of the digital security threat, experts say. With the Democratic National Committee still reeling from massive data breach, President Obama released a policy directive Tuesday outlining how the government plans to tackle major cyberattacks.

The Internet of Toys raises new privacy and security concerns for families (+video)

csmonitor.com — If you're a parent buying a talking toy for your kids, you probably wouldn't want a hacker using it as a way to talk to them alone in their bedrooms. Nor would you want hackers using their toys as a way to collect sensitive personal information about them.

Podcast: 'Zero Days' director Alex Gibney on making Stuxnet a movie star

csmonitor.com — An award-winning director discusses the challenges of making a documentary about a top secret digital weapon. Officials from both countries believed to be responsible for the virus meant to slow Iran's nuclear program won't publicly acknowledge it ever existed.

As FBI surveillance takes center stage, Senator Wyden warns against eroding civil liberties

csmonitor.com — After the Senate beat back a proposal to expand FBI surveillance powers in the wake of the Orlando shooting, the Oregon Democrat told Passcode 'the public is picking up that you don't fight terror by eroding our freedoms for policies that don't leave them safer.' Sen.

Podcast: Why a Ukraine-style hack on US power grid isn't likely

csmonitor.com — Rob Lee, cofounder of cybersecurity company Dragos Security, who personally investigated the Ukraine hack, downplays the imminent risk of a major, isolated attack on the US power grid. The December cyberattack that left more than 200,000 people in the dark in Western Ukraine left many experts wondering: Could US adversaries pull off a similar operation and take down a portion of the American power grid?
More Articles →
Aug 25, 2016

RT @NewAmCyber: "It’s not just a numbers game, it’s not just statistics." Peep this photo essay from our friends at @CSMPasscode  https://twitter.com/peterwsinger/status/768849323350044672 


Are You a Journalist?

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.

Create a Portfolio