C.R.S. Section 18-9-309
Telecommunications crime


(1)

As used in this section and section 18-9-309.5:

(a)

“Access device” means any card, plate, code, account number, or other means of access that can be used, alone or in conjunction with another access device, to obtain telecommunications service.

(a.5)

“Cellular phone” means a radio telecommunications device that may be used to obtain telecommunications services and that is programmed with an electronic serial number by or with the consent of the cellular phone manufacturer.

(a.7)

“Cloned cellular phone” means a cellular phone, the electronic serial number of which has been altered without the consent of the cellular phone’s manufacturer.

(a.8)

“Cloning equipment” means any instrument, apparatus, equipment, computer hardware, computer software, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used, is intended to be used, or is capable of being used:

(I)

To intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or

(II)

To create cloned cellular phones.

(b)

“Credit card number” means the card number appearing on a credit card which is an identification card or plate issued to a person by any supplier of telecommunications service which permits the person to whom the card has been issued to obtain telecommunications service on credit. The term includes the number or description of the card or plate even if the card or plate itself is not produced at the time of obtaining telecommunications service.

(b.7)

“Electronic serial number” means an electronic number that is programmed into a cellular phone by or with the consent of the manufacturer, transmitted by the cellular phone, and used by cellular phone telecommunications providers to validate radio transmissions as having been made by cellular phones authorized or approved by telecommunications providers.

(c)

“Illegal telecommunications equipment” means any instrument, apparatus, equipment, computer hardware, computer software, mechanism, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used or is intended to be used to evade the lawful charges for any telecommunications service or for concealing from any telecommunications provider or lawful authority the existence, place of origin, or destination of any telecommunication. Illegal telecommunications equipment includes cloned cellular phones.

(c.5)

To “intercept signals” means to electronically capture, record, reveal, or otherwise access signals, including data, electronic serial numbers, and mobile identification numbers, that are emitted, transmitted, or received by a telecommunications provider without consent of the telecommunications provider or the person receiving or initiating the signal.

(c.7)

“Mobile identification number” means the cellular phone number assigned to a cellular phone by the cellular phone telecommunications provider.

(d)

“Telecommunications device” means any instrument, apparatus, method, system, or equipment which controls, measures, directs, or facilitates telecommunications service. The term includes, but is not limited to, computer hardware, software, programs, electronic mail systems, voice mail systems, identification validation systems, and private branch exchanges.

(e)

“Telecommunications provider” means any person, firm, association, or any corporation, private or municipal, owning, operating, or managing any facilities used to provide telecommunications service.

(f)

“Telecommunications service” means a service which, in exchange for a pecuniary consideration, provides or offers to provide transmission of messages, signals, facsimiles, or other communication between persons who are physically separated from each other by means of telephone, telegraph, cable, wire, or the projection of energy without physical connection.

(g)

“Telephone company” means any telecommunications provider which provides local exchange telecommunications service.

(2)

A person commits a civil infraction if he or she knowingly:

(a)

Accesses, uses, manipulates, or damages any telecommunications device without the authority of the owner or person who has the lawful possession or use thereof;

(b)

Makes, possesses, or uses illegal telecommunications equipment; except that a person who knowingly uses cloning equipment to create a cloned cellular phone commits a class 4 felony as provided in subsection (4) of this section;

(c)

Sells, gives, or furnishes to another or advertises or offer for sale illegal telecommunications equipment;

(d)

Sells, gives, or furnishes to another or advertises or offers for sale any plans or instructions for making, assembling, or using illegal telecommunications equipment; or

(e)

Sells, rents, lends, gives, publishes, or otherwise transfers or discloses to another or offers or advertises for sale or rental the number or code of a counterfeited, canceled, expired, revoked, or nonexistent telephone number or credit card number or method of numbering or coding which is employed in the issuance of telephone numbers access devices or credit card numbers or an existing number or code or method of numbering or coding without the authority of the owner or person who has the lawful possession or use thereof.

(2.5)

Repealed.

(3)

A person commits theft as defined in section 18-4-401 and shall be subject to the penalties as set forth in that section if he knowingly:

(a)

Obtains any telecommunications service by charging such service to or causing such service to be charged to an existing telephone number, access device, or credit card number without the authority of the person to whom issued or of the subscriber thereto or of the lawful holder thereof or to a nonexistent, counterfeit, expired, revoked, or canceled credit card number, or by any method of code calling, or by installing, rearranging, or tampering with any equipment, physically or electronically, or by the use of any other fraudulent means, method, trick, or device or scheme;

(b)

Obtains telecommunications service with fraudulent intent through the use of a false or fictitious name, telephone number, address, or credit information or through the unauthorized use of the name, telephone number, address, or credit information of another.

(4)

Intentionally left blank —Ed.

(a)

A person commits a class 2 misdemeanor if the person knowingly uses cloning equipment to:

(I)

Intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or

(II)

Create a cloned cellular phone.

(b)

A person commits a class 2 misdemeanor if the person aids, abets, advises, or encourages one or more persons who engage in the activities described in subsection (4)(a) of this section.

(c)

Each violation of this subsection (4), including each instance of intercepting signals or of creating a cloned cellular phone, shall be a separate offense.

(5)

The provisions of this section do not apply to:

(a)

Officers, employees, or agents of telecommunications providers who engage in conduct prohibited by this section for the purpose of constructing, maintaining, or conducting telecommunications services or for law enforcement purposes;

(b)

Law enforcement officers and public officials in charge of jails, police premises, sheriffs’ offices, department of corrections’ institutions, or other penal or correctional institutions or any other person under the color of law who engages in conduct prohibited by this section for the purpose of law enforcement or in the normal course of the officer’s or official’s employment activities or duties; or

(c)

Officers, employees, or agents of federal or state agencies who are authorized to monitor or intercept cellular telephone service in the normal course of the officer’s, employee’s, or agent’s employment.

(6)

Prosecution under this section does not preclude civil liability under any applicable provision of law.

Source: Section 18-9-309 — Telecommunications crime, https://leg.­colorado.­gov/sites/default/files/images/olls/crs2023-title-18.­pdf (accessed Oct. 20, 2023).

18‑9‑101
Definitions
18‑9‑102
Inciting riot
18‑9‑103
Arming rioters
18‑9‑104
Engaging in a riot
18‑9‑105
Disobedience of public safety orders under riot conditions
18‑9‑106
Disorderly conduct
18‑9‑107
Obstructing highway or other passageway
18‑9‑108
Disrupting lawful assembly
18‑9‑108.5
Residential picketing - legislative declaration
18‑9‑109
Interference with staff, faculty, or students of educational institutions
18‑9‑110
Public buildings - trespass, interference - penalty
18‑9‑111
Harassment - Kiana Arellano’s Law
18‑9‑112
Loitering - definition - legislative declaration
18‑9‑113
Desecration of venerated objects
18‑9‑114
Hindering transportation
18‑9‑115
Endangering public transportation and utility transmission
18‑9‑115.5
Violation of a restraining order related to public conveyances
18‑9‑116
Throwing missiles at vehicles - harassment of bicyclists
18‑9‑116.5
Vehicular eluding
18‑9‑117
Unlawful conduct on public property
18‑9‑118
Firearms, explosives, or incendiary devices in facilities of public transportation
18‑9‑119
Failure or refusal to leave premises or property upon request of a peace officer - penalties - payment of costs
18‑9‑120
Terrorist training activities - penalties - exemptions
18‑9‑121
Bias-motivated crimes
18‑9‑122
Preventing passage to and from a health-care facility - engaging in prohibited activities near facility
18‑9‑123
Bringing alcohol beverages, bottles, or cans into the major league baseball stadium
18‑9‑124
Hazing - penalties - legislative declaration
18‑9‑125
Interference with a funeral
18‑9‑201
Definitions
18‑9‑201.5
Scope of part 2
18‑9‑202
Cruelty to animals - aggravated cruelty to animals - service animals - short title
18‑9‑202.5
Impounded animals - costs of impoundment, provision, and care - disposition - procedures - application - definition
18‑9‑204
Animal fighting - penalty
18‑9‑204.5
Unlawful ownership of dangerous dog - legislative declaration - definitions
18‑9‑205
Disposition of fines
18‑9‑206
Unauthorized release of an animal - penalty - restitution
18‑9‑207
Tampering or drugging of livestock
18‑9‑208
Forfeiture of animals
18‑9‑209
Immunity for reporting cruelty to animals - false report - penalty
18‑9‑301
Definitions
18‑9‑302
Wiretapping and eavesdropping devices prohibited - penalty
18‑9‑303
Wiretapping prohibited - penalty
18‑9‑304
Eavesdropping prohibited - penalty
18‑9‑305
Exceptions
18‑9‑306
Abuse of telephone and telegraph service
18‑9‑306.5
Obstruction of telephone or telegraph service
18‑9‑309
Telecommunications crime
18‑9‑309.5
Civil remedies - injunctions - forfeiture
18‑9‑310
Unlawful use of information - penalty
18‑9‑310.5
False statement to the CBI for sex offender registry information
18‑9‑311
Automated dialing systems prohibited
18‑9‑312
Hostage, endangered person, or armed person in geographical area - telephone, electronic, cellular, or digital communications
18‑9‑313
Personal information on the internet - victims of domestic violence, sexual assault, and stalking - other protected persons - definitions
18‑9‑313.5
Personal information on the internet - election officials - definitions
18‑9‑314
Interference with lawful distribution of newspapers - definitions
Green check means up to date. Up to date

Current through Fall 2024

§ 18-9-309’s source at colorado​.gov