Marie-Helen Maras

Marie-Helen Maras

Marie-Helen Maras
Associate Professor
Phone number: 
212-621-4168
Room number and address: 
Haaren Hall, 43311

Education

DPhil in Law, University of Oxford

MPhil in Criminology and Criminal Justice, University of Oxford

Msc in Criminology and Criminal Justice, University of Oxford

MA in Industrial and Organizational Psychology, University of New Haven

BS in Computer and Information Science, University of Maryland University College

BS in Psychology, University of Maryland University College

 

Bio

Dr. Marie-Helen (Maria) Maras is a tenured Associate Professor at John Jay College of Criminal Justice. She is also a faculty member of the graduate program in Digital Forensics and Cybersecurity at John Jay and a faculty member of the PhD program in Criminal Justice at the CUNY Graduate Center. Her academic background and research cover cybersecurity, transnational crime (e.g., cybercrime, smuggling of migrants, and trafficking in persons and drugs), transnational security issues (e.g., war and terrorism), and the legal, political, social, cultural, and economic impact of digital technology. She is the Director and Principal Investigator (PI) of a National Institute of Justice grant (app. $600,000) and two Bureau of Justice Assistance awards (totaling more than $1.6 million). She is also the co-PI on two NSF grants focused on improving cyberinfrastructure at the college and enhancing institutional cybersecurity research talent (app. $400,000). Dr. Maras serves as a subject matter expert and consultant on cybercrime and cyber organized crime for UNODC. 

Dr. Maras is the author of numerous peer-reviewed academic journal articles and books, including Cybercriminology (Oxford University Press, 2016); Computer Forensics: Cybercriminals, Laws, and Evidence (now in its second edition; Jones and Bartlett, 2014); Transnational Security (CRC Press, 2014); CRC Press Terrorism Reader (CRC Press, 2013); and Counterterrorism (Jones and Bartlett, 2012), among other publications. She is currently working on books on Cyberlaw and Cyberliberties, Transnational Crime, and Human Trafficking Today (the latter two books focus on the evolution of these crimes and the facilitation of these crimes by the Internet and digital technology), as well as other projects with Oxford University Press. Prior to her academic post, she served in the U.S. Navy for approximately seven years gaining significant experience in security, international investigations, and law enforcement from her posts as a Navy Law Enforcement Specialist and Command Investigator. During the early stages of her military career, she worked as an Electronics and Calibration Technician.

 

 

Scholarly Work

Select Publications

Books

Maras, M.-H. (2016). Cybercriminology. New York, NY: Oxford University Press.

Maras, M.-H. (2014). Transnational Security. Boca Raton, FL: CRC Press.

Maras, M.-H. (2014). Computer Forensics: Cybercriminals, Laws and Evidence (2nd edition). Burlington, MA: Jones and Bartlett.

Maras, M.-H. (2012). Counterterrorism. Burlington, MA: Jones and Bartlett.

Regoli, R. M., Hewitt, J. D., and Maras, M.-H. (2012). Exploring Criminal Justice: The Essentials (2nd edition). Burlington, MA: Jones and Bartlett.

Maras, M.-H. (2011). Computer Forensics: Cybercriminals, Laws and Evidence. Burlington, MA: Jones and Bartlett.

Journal Articles

Maras, M.-H. and Logie, K. (2021). Understanding What it Really Takes to Control Your Data: A Critical Evaluation of FaceApp. Journal of Internet Law, 24(8), 1 and 11-18.

Maras, M.-H., and Wandt, A. S. (2020). Case Commentary State of Ohio v. Ross Compton: Internet-Enabled Medical Device Data Introduced as Evidence of Arson and Insurance Fraud. International Journal of Evidence and Proof, 24(3), 321-328.

Maras, M.-H. and Wandt, A. (2019). Enabling Mass Surveillance: Data Aggregation in the Age of Big Data and the Internet of Things. Journal of Cyber Policy, 4(2), 160-177.

Shapiro, L. R. and Maras, M.-H. (2019). Women’s Radicalization to Religious Terrorism: An Examination of ISIS Cases in the U.S. Studies in Conflict & Terrorism, 42(1-2), 88-119.

Maras, M.-H. and Alexandrou, A. (2018). Determining Authenticity of Video Evidence in the Age of Artificial Intelligence and in the Wake of Deepfake Videos. International Journal of Evidence and Proof, 23(3), 255-262.

Shapiro, L. R., Maras, M.-H., Velotti, L., Pickman, S., Wei, H.-L., and Till, R. (2018). Trojan horse risks in the maritime transportation systems sector. Journal of Transportation Security, 11(3-4), 65-83.

Maras, M.-H. and Shapiro, L. R. (2017). Child Sex Dolls and Robots: More Than Just an Uncanny Valley. Journal of Internet Law, 21(6), 3-21.

Maras, M.-H. (2017). Online Classified Advertisement Sites: Pimps and Facilitators of Prostitution and Sex Trafficking? Journal of Internet Law, 21(5), 17-21.

Maras, M.-H. (2017). Overcoming the Intelligence Sharing Paradox: Improving Information Sharing Through Change in Organizational Culture. Comparative Strategy, 36(3), 1-11.

Maras, M.-H. (2017). Social Media Platforms: Targeting the “Found Space” of Terrorists. Journal of Internet Law, 21(2), 3-9.

Maras, M.-H. and Miranda, M.-H. (2017). Overlooking Forensic Evidence? A Review of the 2014 International Protocol on the Documentation and Investigation of Sexual Violence in Conflict. Global Security: Health, Science and Policy, 2(1), 10-21.

Miranda, M. D. and Maras, M.-H. (2017). Sexual Violence Perpetrated Against Women in India: The Role of Forensic Evidence. International Journal of Comparative and Applied Criminal Justice, 41(1-2), 95-107 [published online on 14 Oct 2016].

Maras, M.-H. (2015). Combating Cybercrime: Dealing With Barriers to International Investigations and Enforcement in Cyberspace. Criminal Justice and Law Enforcement Annual: Global Perspectives, 7(2), 175–201.

Maras, M.-H. (2015). Unprotected Speech Communicated via Social Media: What Amounts to a True Threat? Journal of Internet Law, 19(3), 3–9.

Maras M.-H. (2015). The Internet of Things: Security and Privacy Implications. International Data Privacy Law, 5(2), 99–104.

Charles, C. A. D. and Maras, M.-H. (2015). Strengthening Counterterrorism from the Information of a Successful Terrorist Attack and Failed Missions in the United States. Journal of Applied Security Research, 10(2), 155–180.

Maras, M.-H. (2012). The Social Consequences of a Mass Surveillance Measure: What Happens When We Become the “Others”? International Journal of Law, Crime and Justice, 40(2), 65–81.

Maras, M.-H. (2012). The Economic Costs and Consequences of Mass Communications Data Retention: Is the Data Retention Directive a Proportionate Measure? European Journal of Law and Economics, 33(2), 447–472.

Maras, M.-H. (2011). While the European Union was Sleeping, the Data Retention Directive Was Passed: The Political Consequences of Mass Data Retention. Hamburg Review of Social Sciences, 6(2), 1–30.

Maras, M.-H. (2010). How to Catch a Terrorist: Is Mass Surveillance the Answer? Journal of Applied Security Research, 5(1), 20–41.

Chapters in Edited Volumes

Maras, M.-H. Cybercrime Laws and Investigations. (2019). In M. Natarajan (Ed.). International and Transnational Crime and Justice: An Anthology, second edition. Cambridge, UK: Cambridge University Press.

Shapiro, L. R. and Maras, M.-H. (2020). Women’s Radicalization to Religious Terrorism: An Examination of ISIS Cases in the United States. In M. Conway and S. Macdonald. (Eds.). Islamic State’s Online Activity and Responses. New York, NY: Routledge [journal article reprint].

Miranda, M. D. and Maras, M.-H. (2019). Sexual Violence Perpetrated Against Women in India: The Role of Forensic Evidence. In N. P. Unnithan and M. K. Nalla. (Eds.). Violence Against Women in India. New York, NY: Routledge [journal article reprint].

Maras, M.-H. (2013). Risk Perception, Fear and Its Consequences Following the 2004 Madrid and 2005 London Bombings. In S. J. Sinclair and D. Antonius (Eds.). The Political Psychology of Terrorism Fears (pp. 227–245). Oxford, UK: Oxford University Press.

Maras, M.-H. (2009). From Targeted to Mass Surveillance: Is the EU Data Retention Directive a Necessary Measure or an Unjustified Threat to Privacy? In B. Goold and D. Neyland (Eds.). New Directions in Surveillance and Privacy (pp. 74–103). Devon, UK: Willan.

Edited Volumes

Maras, M.-H. (Ed.). (2014). The CRC Press Terrorism Reader. Boca Raton, FL: CRC Press.

Encyclopedias

Shapiro, L. R. and Maras, M.-H. (eds.). (2020). Encyclopedia of Security and Emergency Management. Springer Nature Switzerland AG.

 

Area of Expertise

Most requested topics by media

Criminal Justice / Crime Prevention & Reduction
Cybersecurity
Human Rights
Human Trafficking
Organized Crime
Terrorism & Violent Extremism
In The Media

TV/YouTube

Cheng, P.-S., Pavlovic, K., and Stulberger, E. (2019). I-Team: Scammer Uses Sports Anchor’s Photo on Dating Site. NBC New York, May 3, 2019. https://www.nbcnewyork.com/investigations/I-Team-Scammer-Uses-Sports-Anchors-Photo-on-Dating-Site-Catfishing-509242501.html [Provided expert opinion].

Russo, M. (2018). I-Team: Child Sex Doll Listings Found on YouTube, Instagram, Twitter. NBC News NY, April 27, 2018. https://www.nbcnewyork.com/news/local/Child-Sex-Dolls-Sold-Internet-Listings-on-Social-Media-Sites-481020361.html [Provided expert opinion].

Maras, M.-H. (2018). Seen At 11: Social Media’s Dirty Secret. NBC New York. Channel 4 TV interview on child sex dolls (April 27, 2018).

Maras, M.-H. (2017). How to Be Smart About Cybersecurity. Guest on CUNY-TV show Criminal Justice Matters with host Stephen Handelman (March 27, 2017). [http://www.cuny.tv/show/criminaljusticematters/PR2006138].

Maras, M.-H. (2017). Professor Says Credit Data Is Now Commodity in Organized Crime. WNBC, February 9, 2017. https://www.nbcnewyork.com/on-air/as-seen-on/Professor-Says-Credit-Data-Is-Now-Commodity-in-Organized-Crime_New-York-413354553.html [Video Interview].

Dienst, J. and Paredes, D. (2017). I-Team: Violent Drug Gangs Increasingly Turn to Credit Card Thefts      as Big Moneymaker. NBC News NY (February 7, 2017). http://www.nbcnewyork.com/news/local/Gang-Member-Credit-Card-Shopping-Investigation-New-York-FBI-NYPD-Police-Investigation-I-Team-Dienst-413046083.html [Provided expert opinion].

Maras, M.-H. (2015). Video Interview on Life in the Digital Age (CUNY-TV, January 30, 2015).

Maras, M.-H. (2014). Live interview discussing the merits of biometrics in light of the fingerprint cloning of the German Defence Minister by the Chaos Computer Club. Quest Means Business, CNN International (December 30, 2014).

Maras, M.-H. (2014). UK US Militant Weapon. Filmed by Associated Press in New York. Shown on SKY TV in the UK (November 5, 2014).

Maras, M.-H. (2014). Seen At 11: Identity Thieves May Be After Your Health Insurance. CBSNews, August 8, 2014. Channel 2 TV interview on medical identity theft. [https://newyork.cbslocal.com/2014/08/08/seen-at-11-identity-thieves-may-be-after-your-health-insurance/].

Maras, M.-H. (2014). Video Interview on Medical Identity Theft. CBSNews, July 28, 2014. [https://www.cbsnews.com/news/medical-identity-theft-can-threaten-health-as-well-as-bank-account/].

Maras, M.-H. (2014). Video Interview on Identity Theft. CBSNews, July 14, 2014. [https://www.cbsnews.com/news/identity-theft-ensnares-millions-while-the-law-plays-catch-up/].

Print/Online

Chatelain, Y. (2019). Une conversation avec Marie-Helen (Maria) Maras autour de la formation universitaire   sur    la      cybercriminalité. The Conversation (France) [https://theconversation.com/une-conversation-avec-marie-helen-maria-maras-autour-dela- formation-universitaire-sur-la-cybercriminalite-109902].

Janoski, S. (2017). The modern scammer is online (and probably fake in love with you). (December 1, 2017). https://www.northjersey.com/story/news/bergen/2017/12/01/modern-scammer-online-and-probably-fake-love-you/906972001/ [Provided expert opinion].

Hall, M. (2016). Facebook and Twitter are losing the war against ISIS, expert says. Sydney Morning Herald (March 2, 2016). http://www.smh.com.au/technology/technology- news/facebook-and-twitter-are-losing-the-war-against-isis-expert-says-20160301-gn7oef. html [Provided expert opinion].

Bernardo, R. (2015). Provided information about identity theft and how to safeguard data against cybercriminals for his piece on “2015’s States Most Vulnerable to Identity Theft and Fraud” (December 2015) [https://wallethub.com/edu/states-where-identity-theft-and- fraud-are-worst/17549/#marie-helen-maras].

Jenkins, C. (2015). Provided information for an article titled “Broken Windows” (discussing the need to tackle low-level criminality online) in the first issue of The Cyber Investigator, a UK magazine, Issue 1 (March 2015) [www.the-investigator.co.uk].

Curry, C. (2015). How Governments are Fighting Security Threats in an Era of Soft Target Attacks. Vice News, January 13, 2015. https://news.vice.com/article/how-governments-are-fighting-security-threats-in-an-era-of-soft-target-attacks [Provided expert opinion].

Wallis, D. (2015). The Next Big Thing – The Next Big Threat (the Internet of Things). New York Observer, January 7, 2015. https://observer.com/2015/01/the-next-big-thing-what-you-need-to-know-about-in-2015/ [Provided expert opinion].

Johnson, O. (2014). Multi-factor ID protects passwords. Boston Herald, September 4, 2014. https://www.bostonherald.com/2014/09/04/multi-factor-id-protects-passwords/[Provided expert opinion].

Rivoli, D. (2014). How to Protect Yourself Online: Tips from Experts. AM New York, September 3, 2014. http://www.amny.com/news/how-to-protect-yourself-online-tips- from-experts-1.9210332 [Provided expert opinion].

Bailey, T. C. (2014). Identity Theft and the Underground Economy. Center for Identity, the University of Texas at Austin (August 25, 2014).

https://identity.utexas.edu/news/articles/identity-theft-and-the-underground-economy [Provided expert opinion].

Koeppen, S. (2014). Identity Thieves May Be After Your Health Insurance. CBS Local- Pittsburg, August 19, 2014. http://pittsburgh.cbslocal.com/2014/08/19/identity-thieves-may-be-after-your-health-insurance/ [Provided expert opinion].

Dahl, J. (2014). Medical identity theft can threaten health as well as bank account.” CBSNews, July 28, 2014. https://www.cbsnews.com/news/medical-identity-theft-can-threaten-health-as-well-as-bank-account/ [Provided expert opinion].

Dahl, J. (2014). Identity theft ensnares millions while the law plays catch-up. CBSNews, July 14, 2014. https://www.cbsnews.com/news/identity-theft-ensnares-millions-while-the-law-plays-catch-up/ [Provided expert opinion].

Ünal, B. (2014). Nükleer tesislere siber saldırı en büyük korku. Millyet, April 18, 2014 [Turkish Newspaper]. http://www.milliyet.com.tr/nukleer-tesislere-siber-saldiri/gundem/detay/186881 2/default.htm [Provided expert opinion].

Maras, M.-H. (2010). Interview on Cyberbullying. Conducted by the editor of OurBlook.com Gerry Storch (November 12, 2010).

Shallwani P., Morris D., Brune T. and Riley J. (2010). Cooler left in Times Square serves as Latest Scare. Newsday, May 8, 2010 [Provided expert opinion].

Marcus D. and Whitehouse B. (2010). What Tighter Airport Security Means for You. Newsday, January 10, 2010 [Provided expert opinion].

Online Presence