C.R.S.
Section 18-9-309
Telecommunications crime
(1)
As used in this section and section 18-9-309.5:(a)
“Access device” means any card, plate, code, account number, or other means of access that can be used, alone or in conjunction with another access device, to obtain telecommunications service.(a.5)
“Cellular phone” means a radio telecommunications device that may be used to obtain telecommunications services and that is programmed with an electronic serial number by or with the consent of the cellular phone manufacturer.(a.7)
“Cloned cellular phone” means a cellular phone, the electronic serial number of which has been altered without the consent of the cellular phone’s manufacturer.(a.8)
“Cloning equipment” means any instrument, apparatus, equipment, computer hardware, computer software, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used, is intended to be used, or is capable of being used:(I)
To intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or(II)
To create cloned cellular phones.(b)
“Credit card number” means the card number appearing on a credit card which is an identification card or plate issued to a person by any supplier of telecommunications service which permits the person to whom the card has been issued to obtain telecommunications service on credit. The term includes the number or description of the card or plate even if the card or plate itself is not produced at the time of obtaining telecommunications service.(b.7)
“Electronic serial number” means an electronic number that is programmed into a cellular phone by or with the consent of the manufacturer, transmitted by the cellular phone, and used by cellular phone telecommunications providers to validate radio transmissions as having been made by cellular phones authorized or approved by telecommunications providers.(c)
“Illegal telecommunications equipment” means any instrument, apparatus, equipment, computer hardware, computer software, mechanism, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used or is intended to be used to evade the lawful charges for any telecommunications service or for concealing from any telecommunications provider or lawful authority the existence, place of origin, or destination of any telecommunication. Illegal telecommunications equipment includes cloned cellular phones.(c.5)
To “intercept signals” means to electronically capture, record, reveal, or otherwise access signals, including data, electronic serial numbers, and mobile identification numbers, that are emitted, transmitted, or received by a telecommunications provider without consent of the telecommunications provider or the person receiving or initiating the signal.(c.7)
“Mobile identification number” means the cellular phone number assigned to a cellular phone by the cellular phone telecommunications provider.(d)
“Telecommunications device” means any instrument, apparatus, method, system, or equipment which controls, measures, directs, or facilitates telecommunications service. The term includes, but is not limited to, computer hardware, software, programs, electronic mail systems, voice mail systems, identification validation systems, and private branch exchanges.(e)
“Telecommunications provider” means any person, firm, association, or any corporation, private or municipal, owning, operating, or managing any facilities used to provide telecommunications service.(f)
“Telecommunications service” means a service which, in exchange for a pecuniary consideration, provides or offers to provide transmission of messages, signals, facsimiles, or other communication between persons who are physically separated from each other by means of telephone, telegraph, cable, wire, or the projection of energy without physical connection.(g)
“Telephone company” means any telecommunications provider which provides local exchange telecommunications service.(2)
A person commits a civil infraction if he or she knowingly:(a)
Accesses, uses, manipulates, or damages any telecommunications device without the authority of the owner or person who has the lawful possession or use thereof;(b)
Makes, possesses, or uses illegal telecommunications equipment; except that a person who knowingly uses cloning equipment to create a cloned cellular phone commits a class 4 felony as provided in subsection (4) of this section;(c)
Sells, gives, or furnishes to another or advertises or offer for sale illegal telecommunications equipment;(d)
Sells, gives, or furnishes to another or advertises or offers for sale any plans or instructions for making, assembling, or using illegal telecommunications equipment; or(e)
Sells, rents, lends, gives, publishes, or otherwise transfers or discloses to another or offers or advertises for sale or rental the number or code of a counterfeited, canceled, expired, revoked, or nonexistent telephone number or credit card number or method of numbering or coding which is employed in the issuance of telephone numbers access devices or credit card numbers or an existing number or code or method of numbering or coding without the authority of the owner or person who has the lawful possession or use thereof.(2.5)
Repealed.(3)
A person commits theft as defined in section 18-4-401 and shall be subject to the penalties as set forth in that section if he knowingly:(a)
Obtains any telecommunications service by charging such service to or causing such service to be charged to an existing telephone number, access device, or credit card number without the authority of the person to whom issued or of the subscriber thereto or of the lawful holder thereof or to a nonexistent, counterfeit, expired, revoked, or canceled credit card number, or by any method of code calling, or by installing, rearranging, or tampering with any equipment, physically or electronically, or by the use of any other fraudulent means, method, trick, or device or scheme;(b)
Obtains telecommunications service with fraudulent intent through the use of a false or fictitious name, telephone number, address, or credit information or through the unauthorized use of the name, telephone number, address, or credit information of another.(4)
Intentionally left blank —Ed.(a)
A person commits a class 2 misdemeanor if the person knowingly uses cloning equipment to:(I)
Intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or(II)
Create a cloned cellular phone.(b)
A person commits a class 2 misdemeanor if the person aids, abets, advises, or encourages one or more persons who engage in the activities described in subsection (4)(a) of this section.(c)
Each violation of this subsection (4), including each instance of intercepting signals or of creating a cloned cellular phone, shall be a separate offense.(5)
The provisions of this section do not apply to:(a)
Officers, employees, or agents of telecommunications providers who engage in conduct prohibited by this section for the purpose of constructing, maintaining, or conducting telecommunications services or for law enforcement purposes;(b)
Law enforcement officers and public officials in charge of jails, police premises, sheriffs’ offices, department of corrections’ institutions, or other penal or correctional institutions or any other person under the color of law who engages in conduct prohibited by this section for the purpose of law enforcement or in the normal course of the officer’s or official’s employment activities or duties; or(c)
Officers, employees, or agents of federal or state agencies who are authorized to monitor or intercept cellular telephone service in the normal course of the officer’s, employee’s, or agent’s employment.(6)
Prosecution under this section does not preclude civil liability under any applicable provision of law.
Source:
Section 18-9-309 — Telecommunications crime, https://leg.colorado.gov/sites/default/files/images/olls/crs2023-title-18.pdf
(accessed Oct. 20, 2023).