The article indicates the threats of crime on the Internet and the specificity of criminals’ activities. Moreover, the content of the work shows how dynamically crime is changing on the Internet and it may affect all users. Nevertheless, the youngest are the most vulnerable to the actions of criminals because they can easily trust a perpetrator, who wants to commit a crime against a minor. Today, we all use different websites more frequently because the current pandemic situation in the world shows that both study, play and work only takes place in the virtual world (Hofmolk 2009).Online crime is now very dynamic and dangerous due to the high number of victims that were affected this type of online crime. Each of us could fall victim to hackers more than once in the network, however, we managed to react and prevent entry into our devices and data theft. The most dangerous thing is that the perpetrators are often anonymous because finding these people is almost impossible due to their skills in this area. The police have many mechanisms to combat this phenomenon, however, in many cases it is impossible to confirm who was the perpetrator of the incident online. Identification in the network is very difficult to detect because the perpetrators do not leave behind any signs such as: fingerprints, image or voice. The aim of the article was to indicate new forms of crime on the Internet and to show the broad spectrum of activities of offenders on the Internet. It was also indicated how big is the dynamics of crime and the emergence of newer and newer forms of online activity.
The research paper discusses different issues of interpretation and qualification of illegal access to an information system (IS), taking into account international instruments and European Union legislation as well as the relevant case law of Lithuania. Analysis of criminal cases and legal regulation shows that such cases require an appropriate combination of the technical and legal sides of such criminal offences. In this context, it is also important that criminal liability for illegal access to an IS must be underpinned not only by the principles of technological neutrality and equivalent assessment but also must ensure respect for the ultima ratio (last resort) principle. It is this principle which in particular is the subject of considerable attention in the research paper in terms of over-criminalisation of illegal access to an IS. While solving the puzzle of technology and terminology alignment, the paper also explores the elements of illegal access to an IS. In the light of developments in Lithuanian case law, more emphasis is placed on the debatable infringement of security measures, as an element, and on possible interpretation of its content.