Sara Sorcher on Muck Rack

Sara Sorcher Verified

Washington, D.C.
Deputy Editor, Passcode — Christian Science Monitor
Covers:  national security, foreign policy, foreign aid, war, congress, drones, counterterrorism, intelligence, cybersecurity, defense industry, export control

Deputy editor of @CSMPasscode, covering digital security & privacy. Former National Journal nat'l security correspondent. 0x9A199099

Sara Sorcher is the deputy editor of a forthcoming cybersecurity and technology section at the Christian Science Monitor. Previously, she was National Journal's national security correspondent. Her work at the magazine from 2013 won the National Press Club's Michael Dornheim award. Before joining the newsroom in September 2010, Sorcher worked as a freelance journalist in Israel. Her print and video packages have been featured with major outlets including ...

Read Full Bio →

National Press Club Award

2014 - Michael A. Dornheim award for defense reporting
From the judges: “Sara’s work explored defense procurement, civil applications of unmanned aerial vehicles, federal budgeting and congressional oversight. Sara combine dogged reporting and deft writing to produce stories that explained the sweeping political and economic forces affecting defense and aerospace – but also with an eye for the perfect illustrative detail.”

What was your first job as a journalist?

During college, I was an intern with ABC News 20/20 & Primetime in NYC.

How do you prefer to be pitched on stories?


What's your favorite social network?

Twitter for news, Facebook for sharing.

Experts: Obama’s color-coded rankings oversimplify cybersecurity threats — The DNC hack is a prime example of why President Obama's new cybersecurity policy directive does not adequately account for the complex nature of the digital security threat, experts say. With the Democratic National Committee still reeling from massive data breach, President Obama released a policy directive Tuesday outlining how the government plans to tackle major cyberattacks.

The Internet of Toys raises new privacy and security concerns for families (+video) — If you're a parent buying a talking toy for your kids, you probably wouldn't want a hacker using it as a way to talk to them alone in their bedrooms. Nor would you want hackers using their toys as a way to collect sensitive personal information about them.

Podcast: 'Zero Days' director Alex Gibney on making Stuxnet a movie star — An award-winning director discusses the challenges of making a documentary about a top secret digital weapon. Officials from both countries believed to be responsible for the virus meant to slow Iran's nuclear program won't publicly acknowledge it ever existed.

As FBI surveillance takes center stage, Senator Wyden warns against eroding civil liberties — After the Senate beat back a proposal to expand FBI surveillance powers in the wake of the Orlando shooting, the Oregon Democrat told Passcode 'the public is picking up that you don't fight terror by eroding our freedoms for policies that don't leave them safer.' Sen.

Podcast: Why a Ukraine-style hack on US power grid isn't likely — Rob Lee, cofounder of cybersecurity company Dragos Security, who personally investigated the Ukraine hack, downplays the imminent risk of a major, isolated attack on the US power grid. The December cyberattack that left more than 200,000 people in the dark in Western Ukraine left many experts wondering: Could US adversaries pull off a similar operation and take down a portion of the American power grid?

Podcast: Steve Weber on why hackers may start targeting your emotions — In this episode of The Cybersecurity Podcast, UC Berkeley's Steve Weber outlines his team's research into the possible futures of the Internet and cybersecurity in 2020. Today, you may not care if anyone hacks your Fitbit. After all, what could someone really do with data about how far you walk?

What the US government really thinks about encryption — The national debate over the growing use of encryption on consumer devices is often framed in stark terms: Silicon Valley versus Washington in a bicoastal battle over privacy. It's easy to see why. FBI Director James Comey grabs headlines every time he says that law enforcement efforts are hindered by strong security features commonly used in popular apps and smartphones.

How much is a security flaw worth? An inside look into Yahoo’s bug bounty program — As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial. Every week, the Paranoids - charged with protecting the digital security of Yahoo's more than 1 billion users - discuss one of the more mysterious parts of the cybersecurity business: How much is a security flaw worth?

Thousands of New Yorkers named as apparent Islamic State targets — An online group claiming Islamic State ties threatened 3,600 New Yorkers and distributed their personal information last week on a secure messaging app. Islamic State supporters published the names and addresses of 3,600 New Yorkers in an apparent "hit list" seemingly meant to escalate the group's campaign of sowing fear far from the battlefield in Syria.

Podcast: Niloofar Howe on the looming cybersecurity industry implosion — On the latest edition of the Cybersecurity Podcast, RSA's chief strategy officer makes industry forecast and Raytheon's Jack Harrington talks about defending US networks and how to recruit new talent to the field. With all the news about data breaches, the cybersecurity market may seem like a smart investment.
More Articles →
Jul 29, 2016

@laparisa Hi there! What's a good email for you? Have a cool project I'm working on for @CSMPasscode and would love to connect.

Jul 27, 2016

RT @CSMPasscode: Govt rankings for cyberincident severity "nonsense" says @HerbLinCyber. Stealing $1B from Fed>no power in small town https…

Are You a Journalist?

Make a Portfolio

Create a free Muck Rack account to customize your profile and upload a portfolio of your best work.