Abstract
Information and communication technologies develop continuously and uninterruptedly with the main purpose of increasing the quality of life by facilitating human efforts in many areas. However, these technologies can often be exploited for the realization of malicious acts. Terrorist groups, which aim to attract attention by creating fear and confusion in large populations, use such technologies as effective tools. The internet enables widespread access, end-to-end encryption, and the establishment of virtual private networks, which provide a useful environment for terrorist and extremist groups to air propaganda, recruit new members, assemble financial resources, and plan and conduct terrorist acts. The enhanced version of virtual reality technology, the Metaverse, is a development that will allow users to connect to an already existing virtual world via the internet. In this research, previous studies were examined on the connection between terrorism and technology, and evaluations and suggestions were made about how the Metaverse—most probably the next stage in the development of the internet—might be used for terrorist acts. According to the results of the study, in addition to those already experienced in internet use for the purpose of terror, there may be different types of threats in the Metaverse. Therefore, it is important for both states and international organizations to conduct studies on the possible misuse of the Metaverse.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Prabha, K.: Defining terrorism. Strateg. Anal. 24(1), 125–135 (2000)
Saul, B.: Defining Terrorism in International Law. Oxford University Press (2006)
Schmid, A.P.: Terrorism—the definitional problem. Case Western Reserve J. Int. Law 36(2), 375–419 (2004)
Ganor, B.: Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Pract. Res. 3(4), 287–304 (2002)
Crenshaw, M.: Explaining Terrorism: Causes, Processes and Consequences. Taylor & Francis (2010)
Merari, A.: Terrorism as a strategy of insurgency. Terror. Polit. Violence 5(4), 213–251 (1993)
Harmon, C.C.: Five strategies of terrorism. Small Wars Insurgencies 12(3), 39–66 (2001)
Kydd, A.H., Walter, B.F.: The Strategies of Terrorism. Int. Secur. 31(1), 49–80 (2006)
Güngör, U.: Terrorism strategy of strategies of terrorism? Akademik Bakış 12(24), 1–17 (2019)
Schmid, A.P., Jongman, A.J.: Political Terrorism. Routledge (2005)
Duyvesteyn, I.: How new is the new terrorism? Stud. Conflict Terror. 27(5), 439–454 (2004)
Damar, M.: Metaverse shape of your life for future: a bibliometric snapshot. J. Metaverse 1(1), 1–8 (2021)
Weimann, G.: How modern terrorism uses the Internet. U.S. Inst. Peace 116, 1–12 (2004)
Kazan, H.: Terror-media relationship and terror journalism in media. Güvenlik Stratejileri 12(24), 109–147 (2016)
Twitter. Violent Organizations Policy (2020). https://help.twitter.com/en/rules-and-policies/violent-groups
GIFCT: Who we are? https://gifct.org/about/
UNODC (2012) The use of the Internet for terrorist purposes (2012). https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
Britannica. https://www.britannica.com/topic/propaganda
Salihi, E., Göksun, Y.: Media strategy of DAESH. SETA Found. 98, 1–82 (2018)
Berger, J.M.: How terrorists recruit online (and how to stop it). Brookings (2015). https://www.brookings.edu/blog/markaz/2015/11/09/how-terrorists-recruit-online-and-how-to-stop-it/
Guadagno, R.E., Lankford, A., Muscanell, N.L., Okdie, B.M., McCallum, D.M.: Social influence in the online recruitment of terrorists and terrorist sympathizers: implications for social psychology research. Rev. Int. Psychol. Soc. 23(1), 25–56 (2010)
Veeresamy, N., Grobler, M.: Terrorist use of the Internet: exploitation and support through ICT infrastructure. In: Proceedings of the International Conference on Information Warfare and Security, Washington, DC, pp. 260–267 (2011)
Stevens, T.: Security and surveillance in virtual worlds: Who is wathcing Warlocks and Why? Int. Polit. Sociol. 9(3), 230–247 (2015)
IARPA. REYNARD. https://www.iarpa.gov/research-programs/reynard
Yuen, S.: It’s not just Russia—terror financiers are also using social media propaganda. CNBC (2017). https://www.cnbc.com/2017/12/18/social-media-propaganda-terror-financiers-operate-on-internet.html
Jacobson, M.: Terrorist financing and the Internet. Stud. Conflict Terror. 33(4), 353–363 (2010)
FATF: Emerging Terrorist Financing Risks, Paris (2015). https://www.fatf-gafi.org/media/fatf/documents/reports/Emerging-Terrorist-Financing-Risks.pdf
Aykın, H., Sözmen, H.K.: Fight against terrorist financing. The Financial Crimes Investigation Board, Ankara (2008)
Stenersen, A.: The internet: a virtual training camp? Terror. Polit. Violence 20, 215–233 (2008)
Alexander, D.C.: Cyber threats against the North Atlantic Treaty Organization (NATO) and selected responses. İstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi 1(2), 1–36 (2014)
NATO. Warsaw Summit Communique (2016). https://www.nato.int/cps/en/natohq/official_texts_133169.htm
NATO CoE DAT: Responses to cyber terrorism. Ankara (2008)
Zuckerberg, M.: Founder’s Letter (2021). https://about.fb.com/news/2021/10/founders-letter/
Robinson, J.: The Sci-Fi guru who predicted google earth explains silicon valley’s latest obsession. Vanityfair (2017). https://www.vanityfair.com/news/2017/06/neal-stephenson-Metaverse-snow-crash-silicon-valley-virtual-reality
Nielsen, N.: Zuckerberg's Metaverse ripe for terror recruitment, says EU. EU Observer (2022). https://euobserver.com/digital/155128
Diwakar, A.: The Metaverse will ‘become embroiled in future geopolitical conflict’. TRT World (2022). https://www.trtworld.com/magazine/the-Metaverse-will-become-embroiled-in-future-geopolitical-conflict-57118
Herath, C., Jarnecki, J.: Securing future realities: What can we expect from the Metaverse? RUSI (2022). https://rusi.org/explore-our-research/publications/commentary/securing-future-realities-what-can-we-expect-Metaverse
Smith, A., Domadia, B., Wang, D.: The Metaverse: tech game-changer or security nightmare? Secur. Mag. (2022). https://www.securitymagazine.com/articles/97635-the-Metaverse-tech-game-changer-or-security-nightmare?
Danilin, I.: Emerging technologies and their impact on international relations and global security. Hoover Institution (2018). https://www.hoover.org/research/emerging-technologies-and-their-impact-international-relations-and-global-security
Elson, J.S., Doctor, A.C., Hunter, S.: The Metaverse offers a future full of potential—for terrorists and extremists, too. The conversation (2022). https://theconversation.com/the-Metaverse-offers-a-future-full-of-potential-for-terrorists-and-extremists-too-173622
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Yalcin-Ispir, A. (2023). The Metaverse and Terrorism. In: Esen, F.S., Tinmaz, H., Singh, M. (eds) Metaverse. Studies in Big Data, vol 133. Springer, Singapore. https://doi.org/10.1007/978-981-99-4641-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-99-4641-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4640-2
Online ISBN: 978-981-99-4641-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)