Darren Hayes
Assistant Professor

E-mail: dhayes@pace.edu

School/College: Seidenberg School of Computer Science and Information Systems
Department(s): Information Technology NY
Primary Location:

Office Hours: (Fall 2016)
Wednesday
12:15PM-5:15PM

Office Phone:
+1 (212) 346-1005

Fax Phone: 914-989-8606

Education

DPS, Pace University, Seidenberg School of Computer Science and Information Systems, White Plains, NY, US, 2008

MS, Pace University, New York, NY, US, 2001

Information Systems

H.D.B.S, Michael Smurfit Graduate School of Business, University College Dublin, Dublin, Ireland, 1993

Banking & Finance

BA, University College Dublin, Dublin, Ireland, 1992

History

Scheduled Courses

Fall 2016:
  • CIT 363: Computer Forensics, Cyber Law
  • UNV 101: First-Year Smnr Unvrsty Cmmnty
  • IT 670: Mobile Forensics Investigation

View All Courses Taught
  • CIS 101: Cmptrs & Environmental Science
  • CIS 101: Cmptrs & Frnsc Scnce Lrng Pod
  • CIS 101: Cmptrs & Social Responsibility
  • CIS 101: Cmptrs &Scl Rspnsblty Lrng Pod
  • CIS 101: Computers & Forensic Science
  • CIS 101: Computers & Social Respnsblty
  • CIS 101: Computers & Social Rspnsblty
  • CIS 101: Computers and The Environment
  • CIS 101: Downtown New York
  • CIS 101: Downtown NY Learning Pod
  • CIS 101: Forensic Computing
  • CIS 101: Forensic Learning Pod
  • CIS 101: Intro to Computing - LC
  • CIS 101: Introduction to Computing
  • CIS 101: Introduction to Computing - LC
  • CIS 101: Social Rspnsblty Learning Pod
  • CIS 101: Urban Environment
  • CIS 102: IT for Strtgc Comm. Planning
  • CIS 102: Prblm Slvng Using LEGO Rbtcs
  • CIS 102: Topic:Intergenerational Cmptng
  • CIS 102: Web Dsgn for Non-Profit Org
  • CIS 122: Advanced Spreadsheet Skills
  • CIT 354: Computer Forensics
  • CIT 361: Forensic Investigation
  • CIT 363: Computer Forensics, Cyber Law
  • CIT 365: Mobile Device Forensics
  • CIT 397: Cyber Intel for Threat Modelng
  • CIT 481: Cpstn in Infrmtn Tchnlgy
  • CIT 490: Independent Study in Infor Tec
  • CS 397: Engineering Designs in 3D Wrld
  • CS 600: Indpndnt Study in Grad CS
  • CS 632: Engineering Designs in 3D Wrld
  • CS 693: Thesis I
  • CS 694: Thesis II
  • IS 639: Info Systems Planning & Policy
  • IS 699: Field Study
  • IT 603: Overview of Infrmtn Security
  • IT 662: Web and Internet Security
  • IT 664: Computer and Internet Forensic
  • IT 670: Mobile Forensics Investigation
  • IT 690: Mobile Forensics Investigation
  • IT 691: Capstone Project
  • TS 671: Intrnshp in Edctnl Tchnlgy
  • UNV 101: First-Year Smnr Unvrsty Cmmnty
  • UNV 101: First-Yr Smnr: Unvrsty Commnty
  • Awards and Honors

    • HTCIA, Northeast Chapter, December 15, 2013 - Outstanding Contribution Award
    • Forensics Colleges, January 1, 2013 - Top 10 Computer Forensics Professors
    • HTCIA, Northeast Chapter, December 15, 2010 - Outstanding Contribution Award

    LICENSURES & CERTIFICATES

    • AccessData, January 17 - AccessData Mobile Examiner

    MEDIA CONTRIBUTIONS

    • eCommerce Times [Internet], October 19 2016
      Europe Duns Apple for $14.5B in Illegal Tax Breaks
    • NPR [Radio], September 30 2016
      The dangerous world of the Internet of Things
    • CNBC [TV], September 21 2016
      Nightly Business Report interview on the Wireless Emergency Alert System
    • SC Magazine [Magazine], July 26 2016
      Trump's Russian interests and Guccifer 2.0
    • SC Magazine [Magazine], July 25 2016
      Russian hackers take the stage at DNC convention
    • Epoch Times [Internet], May 18 2016
      Intelligence: Hackers Are Spying on Presidential Candidates, Expect More Cyber Threats,
    • U.S. News [Internet], April 29 2016
      A Big iPhone Slump Bites Into Apple (AAPL)
    • Law360 [Internet], April 29 2016
      Banks Between A Rock And A Hard Place On Chat Records
    • Wall Street Journal [Newspaper], April 9 2016
      The Accidental Accomplice in Central-Bank Cyberheist: Bankers’ Hours
    • Corporate Counsel [Internet], March 31 2016
      Experts: GCs Are Aghast Over Hacks at Top Law Firms
    • SC Magazine [Magazine], March 30 2016
      FBI investigating attack against computer networks at U.S. law firms
    • Entrepreneur [Internet], March 28 2016
      Meet the Middlemen Who Connect Hackers for Hire With Corporate America
    • Cape Cod Times [Newspaper], March 22 2016
      Apple's objections a recent development
    • Trinidad Newsday [Newspaper], March 12 2016
      US expert: Use cyber security to fight crime
    • Trinidad Newsday [Newspaper], March 10 2016
      US expert: Beware social media pitfalls
    • Caribbean New Media Group [TV], March 8 2016
      The growth of cyber crime in Trinidad and internationally.
    • Islam Channel (UK) [TV], March 4 2016
      The FBI case against Apple
    • tbs eFM (S. Korea) [Radio], March 3 2016
      Appeared on the radio show called News Focus to discuss the government's case against Apple in the San Bernardino case.
    • New York News 1 [TV], February 25 2016
      Potential Effects of Phone Security Fight Between Apple and FBI
    • MSNBC [TV], 2015
      Hillary Clinton email server investigation
    • Homeland Security Today [Internet], December 3 2015
      ANALYSIS - New Legislation Needed to Address Terrorists’ Use of Phone Encryption
    • CNBC [TV], November 20 2015
      Data encryption a 'matter of national security': Expert
    • SC Magazine [Magazine], November 4 2015
      2nd Update: Surveillance bill; judicial oversight, no encryption ban, archiving browsing data
    • Trinidad Guardian [Newspaper], October 24 2015
      Real and imminent cyber security threat
    • Epoch Times [Newspaper], September 29 2015
      US–China Cyberpact: A Deal Built on Distrust
    • Washington Post [Newspaper], August 18 2015
      Probe of Clinton's server could find more than just emails

    PROFESSIONAL MEMBERSHIPS

    • Open Web Application Security Project [Member & Academic Supporter] , March 1 , 2014
      The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
    • Armed Forces Communications and Electronics Association [Member] , January 1 , 2012
      AFCEA International, established in 1946, is a non-profit organization serving its members by providing a forum for the ethical exchange of information, and dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology, communications and electronics for the defense, homeland security and intelligence communities.
    • FBI - Academic Alliance Program [FBI - Academic Alliance Program Coordinator] , January 1 , 2011
      Increased communication and understandings on both sides of the table. All of which is helping universities to take proactive steps to better protect their institutions and the FBI to develop new strategies to keep Americans safe while remaining sensitive to unique concerns and cultures on campus.
    • InfraGard [Member] , January 1 , 2008
      InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
    • High Technology Crime Investigation Association [First Vice President & Former President] , January 1 , 2007
      The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. As such, we are an organization that aspires to help all those in the high technology field by providing extensive information, education, collective partnerships, mutual member benefits, astute board leadership and professional management.

    Contract, Grants, and Sponsored Research

    • Chen, L., Hayes, D. & Ryan, J. (2015, August 1). A Multiple Pathway Approach to CyberCorps . National Science Foundation , Federal , $2,550,986.00 . Funded,
    • Chen, L., Tappert, C. & Hayes, D. (2012, October 1). Establishing the Information Assurance Student Pipeline Through Community College Outreach. National Science Foundation , Federal , $294,477.00 . Funded,
    • Hayes, D. (2012, January 01). Skimmer Fraud. Association of Certified Chartered Accountant , Other , $30,000.00 . Funded,

    Publications

    Snow, C., Hayes, D. & Dwyer, C. (2016, October (4th Quarter/Autumn)). Leakage of Geolocation Data by Mobile Ad Networks. Journal of Information Systems Applied Research. Vol 9 (Issue 2) , pages 24-33. http://jisar.org/2016-9/n2/JISARv9n2p24.html

    DOWNLOAD PRESENTATION

    Cappa, F., Del Sette, F., Rosso, F., Ossipov, J. & Hayes, D. (2016, July (3rd Quarter/Summer) 3). An Integrated Sustainable Approach, Based On Peer Production And Collaborative Product Development, To Deliver Commercial Products: An Entrepreneurial Opportunity. http://www.rnd2016.eng.cam.ac.uk/

    DOWNLOAD PRESENTATION

    Cappa, F., Del Sette, F., Hayes, D. & Rosso, F. (2016, April (2nd Quarter/Spring) 7). Collaborative product development and peer production as an innovative integrated approach to deliver sustainable marketable products: a case study. http://www.ciriaf.it/Congresso_2016/CONGRESSO_CIRIAF_2016_PROGRAMMA.pdf

    DOWNLOAD PRESENTATION

    Snow, C., Hayes, D. & Dwyer, C. Leakage of Geolocation Data by Mobile Ad Networks.

    Hayes, D. (2014, December 27). A Practical Guide to Computer Forensics Investigations. (Issue 1) , pages 502. http://www.pearsonitcertification.com/store/practical-guide-to-computer-forensics-investigations-9780789741158

    Hayes, D., Townsend, K., Vargas, A., Ferrett, R., Hain, C. & Gaskin, S. (2013, March 1). Skills for Success with Mac Office 2011. Prentice Hall.

    Hayes, D. (2012, March 9). http://www.technewsworld.com/story/The-Privacy-Shell-Game-Part-2-74603.html

    Hayes, D. (2012, March 5). http://dailycaller.com/2012/03/05/white-house-follows-eu%E2%80%99s-lead-with-new-internet-rules-of-the-road/

    Hayes, D. (2012, March 1). http://www.ecommercetimes.com/story/74515.html

    Hayes, D. (2012, February 28). http://thehill.com/opinion/op-ed/213167-us-must-protect-privacy-better

    Hayes, D. (2012, February 23). http://www.govtech.com/policy-management/White-House-Releases-Privacy-Bill-of-Rights-for-Consumers.html

    Hayes, D. (2012, February 21). http://www.technewsworld.com/rsstory/74478.html

    Hayes, D. (2012, February 15). http://www.technewsworld.com/rsstory/74434.html

    Hayes, D. (2012, February 13). http://www.thestreet.com/story/11415615/1/3-security-stocks-benefiting-from-hack-attacks.html

    Hayes, D. (2012, January (1st Quarter/Winter) 31). http://www.internetevolution.com/author.asp?section_id=852&doc_id=238541&f_src=internetevolution_gnews

    Hayes, D. (2012, January (1st Quarter/Winter) 20). http://www.technewsworld.com/story/Quantum-Tech-Could-Secure-the-Cloud-Through-Blind-Data-Processing-74235.html

    Hayes, D. (2012, January (1st Quarter/Winter) 10). http://www.technewsworld.com/story/74148.html

    Hayes, D. (2011, December 27). http://www.technewsworld.com/story/74053.html

    Hayes, D. (2011, December 19). http://www.internetevolution.com/author.asp?section_id=852&doc_id=236857&

    Hayes, D. (2011, December 14). http://www.forensicmag.com/article/csi-cell-phone?page=0,0

    Hayes, D. (2011, December 13). http://www.technewsworld.com/story/73964.html

    Hayes, D. (2011, December 9). http://www.internetevolution.com/author.asp?section_id=852&doc_id=236600

    PRESENTATIONS

    Hayes, D. Dow Jones Newswire. Interview. Dow Jones Newswire, New York, NY

    Hayes, D. Impact of Corporate Governance and Institutional Investor Targeting. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc., New York, NY

    Hayes, D. The Annual Meeting Process. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc., New York, NY

    Hayes, D. Understanding Your Shareholder Profile. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc, New York, NY

    Hayes, D. R. (2016, June 7). UBTech Conference. Economic Espionage and the Campus IT Professional. Las Vegas, NV

    Hayes, D. R. (2016, May 25). Enfuse Conference. Mobile Malware for Financial Fraud. Guidance Software, Las Vegas, NV

    Hayes, D. R. (2016, March 29). Privacy is Dead!. Pace Adult Resource Center (PARC), Pace University, Downtown

    Hayes, D. R. (2016, March 9). The Forensics of Cybercrime. ACCA Caribbean & IIATT, Arthur Lok Jack Graduate School of Business, Trinidad, W.I.

    Hayes, D. R. (2016, March 9). TTPS. Open Source Intelligence for Cybercrime. British High Commissioner, Trinidad & Tobago Police Service HQ, Trinidad, W.I.

    Hayes, D. R. (2016, March 8). Anti-Corruption Conference 2016. Ever Present Danger of Cyber Crime. Transparency International, Port of Spain, Trinidad, W.I.

    Hayes, D. R. (2015, November 23). Training Workshop. OSINT & Mobile Forensics for Fraud Examinations. Bankers Association of Trinidad & Tobago, Port of Spain, Trinidad, W.I.

    PUBLIC SERVICE

    • Asylee Refugee Migrant Assistance Network (ARMAN) [Board Member]
      Desc: Advisory Board Member as it relates to digital forensics investigations.
      Committee's Key Accomplishments: Faculty-led student support and research for victims of human trafficking. In 2015, organized a week-long series of seminars at Pace University's Downtown and Pleasantville campuses with Dr. Halleh Seddigzadeh.