• Skip to main content
  • Skip to secondary menu

The Urbanic Law Firm

Oklahoma city criminal defense attorney Frank Urbanic provides efficient, effective, and relentless representation.

625 NW 13th St

Oklahoma City, Ok 73103

405-633-3420

  • Home
  • About
    • In the News
    • Frank Urbanic
    • Corey Brennan
    • Ky Corley
  • Answers
    • Crimes
    • Procedure
  • Blog
  • Wins
  • Contact
  • Procedure
  • Crimes
  • Areas Served
    • State Courts
    • Municipalities
      • OKC Metro

Oklahoma Computer & Telecom Crimes Defense

Daytime office scene of a man working at a laptop with digital network screens, representing Oklahoma computer and telecom crimes and Oklahoma criminal defense by The Urbanic Law Firm.Oklahoma computer & telecom crimes cover accusations that you used a phone, device, account, network, or data connection in a way the law says you couldn’t. Some cases center on unpaid service, hidden routing, or stolen records. Others center on unauthorized access, copied data, online threats, or computer-based fraud. Because every click, message, and login can leave a trail, charges can grow fast.

However, a digital trail doesn’t answer every real issue. The State still has to prove who used the device. It also has to prove what authority existed, what you meant to do, and whether the conduct matches the charged statute. That’s where strong defense work matters.

Quick links

  • Free consultation
  • How these cases work
  • Crime groups in this category
    • Telecommunications
    • Computer access & hacking offenses
    • Computer fraud & unauthorized use
    • Online harassment & computer threats
  • Defense strategies
  • Key terms
  • FAQs

Get ahead of a computer or telecom charge

If you’ve been accused of Oklahoma Computer & Telecom Crimes in Oklahoma, reach out for a free consultation before you speak too much, delete data, or hand over devices without a plan. Early advice can protect evidence, narrow issues, and keep one allegation from turning into several.

Call us at 405-633-3420 or use our secure online form.

How Oklahoma computer & telecom crimes cases work

What this category covers

Oklahoma groups these charges around misuse of communication services, computer access, data, accounts, and digital tools. So, the category reaches conduct that looks like bypassing phone charges, sneaking into a network, copying data, shutting users out, running a fraud through a computer, or using a computer to threaten someone. Many cases rise or fall on authorization. Others turn on intent to defraud, deceive, extort, threaten, or harass.

Common scenarios

You might see these charges after a workplace split, a breakup, a billing dispute, an insider-access fight, or a shared-password problem. Sometimes the claim is that someone used another person’s login, phone account, or customer data. In other cases, the issue is a script, a spoofed number, an access tool, a recovered chat, or a deleted file. Because phones, laptops, routers, cloud accounts, and business systems overlap, one event can trigger several theories at once.

How investigators build these cases

Investigators usually start with logs, provider records, screenshots, emails, texts, IP data, device extractions, and witness interviews. They often compare timestamps, login patterns, routing data, payment records, browser activity, and who controlled a device or password at a given time. However, digital evidence can mislead. Shared devices, reused passwords, remote access tools, spoofing, and weak chain-of-custody work can create real holes.

Prosecutors also look for related counts that fit the same facts. So, a computer or telecom case may travel with false personation, forgery, larceny, extortion, stalking, or separate electronic-communication charges when the facts support them. Even so, the State still has to keep the theories distinct. In some cases, a broad computer-use count and the underlying offense can raise duplication problems if both rest on the same exact act.

What these charges often share

Most of these cases share four pressure points. First, they depend on proving lack of authorization or limits on authorization. Second, they lean hard on intent. Third, they depend on technical proof that jurors may not understand at first glance. Finally, they often rely on records from private companies, and those records can be incomplete, stale, or easy to overread.

Crime groups in this category

Oklahoma telecommunications offenses

Telecommunications charges usually start with a claim that someone dodged a lawful service charge, used someone else’s account, or tampered with service equipment. One common theory is telecom charge evasion (21 O.S. § 1515). Another targets telecom bypass devices or plans, which covers making, possessing, selling, or sharing equipment or instructions meant to beat service charges or hide where a communication came from or where it went (21 O.S. § 1516).

This group also reaches theater-recording allegations, publishing phone-card data for misuse, and phone-record fraud. A phone-record case often lands as phone-record fraud, which covers procuring, soliciting, selling, or receiving telephone records by fraud (21 O.S. § 1742.2). So, these cases often turn on account history, provider records, device control, and whether the State can prove a fraudulent purpose instead of a mix-up, shared access problem, or innocent mistake.

Computer access & hacking offenses

This group focuses on getting into a system when you weren’t allowed to, or doing more than you were allowed to do once inside. A common charge is unauthorized access that causes damage, copying, disclosure, or data loss (21 O.S. § 1953(A)(1)). Another is going beyond allowed access to alter, copy, delete, or disclose data (21 O.S. § 1953(A)(3)). Oklahoma also separately punishes simple unauthorized access or attempted access, even when the State can’t show bigger harm (21 O.S. § 1953(A)(4)).

In addition, this group can sweep in claims that you helped someone else get in by sharing a method, credential, tool, or pathway. That means these cases often turn on permission, role-based access, employee practice, shared credentials, and whether the State can prove where the access line really ended. Because workplace systems are messy, a strong defense often starts by separating policy violations from actual crimes.

Computer fraud & unauthorized use

These charges focus less on breaking in and more on what the computer was used to do. A major theory is computer-based fraud or deception for money, property, data, or services (21 O.S. § 1953(A)(2)). Another centers on disrupting computer services or denying access to an authorized user (21 O.S. § 1953(A)(6)). Oklahoma also makes it a separate felony to use computer access as a step toward violating another Oklahoma statute (21 O.S. § 1958).

This group also includes unauthorized use of computer services. So, the fight may be about billing, service consumption, account scope, business purpose, or whether the State is stretching a policy dispute into a fraud theory. These cases are often paired with theft-style or deception-based counts when money, records, or customer information moved at the same time.

Online harassment & computer threats in Oklahoma

This group centers on what was said or done through a computer and how it landed on the other side. One charge covers computer-based harassment or abusive use (21 O.S. § 1953(A)(8)). Another targets computer-based threats that put someone in fear of physical harm or death (21 O.S. § 1953(A)(9)). Oklahoma also punishes soliciting another person to commit an Oklahoma computer crime, even if money never changed hands (21 O.S. § 1953(A)(10)).

However, context matters a lot here. Investigators may rely on screenshots, account returns, metadata, deleted-message recovery, and proof tying a person to a device. Still, anger, sarcasm, spoofing, shared access, reposted content, or missing parts of the conversation can change how a message reads and who sent it. Because of that, these cases often turn on meaning, attribution, and whether the State can prove a real criminal intent rather than rough talk or bad assumptions.

Defense strategies for Oklahoma computer & telecom crimes

  • Challenge the claim that you lacked permission or went beyond the limits of valid access.
  • Attack attribution by testing who really controlled the device, password, account, or connection.
  • Dispute intent where the State is trying to infer fraud, deception, extortion, threat, or harassment from thin facts.
  • Test the digital trail for gaps, bad timestamps, weak provider returns, or poor forensic handling.
  • Suppress evidence taken through an overbroad warrant, weak consent, or unlawful device search.
  • Contest proof of damage, copying, denial of service, procurement, or loss when the records don’t clearly show it.
  • Put messages in context when the accusation depends on tone, fear, or how a message was understood.
  • Separate overlapping counts when prosecutors try to pile broad computer counts on top of the same underlying act.

Key terms in these cases

Published

Published means the communication of information to one or more persons, either orally, in person or by telephone, radio, or television, or in a writing of any kind, including a letter, memorandum, circular, handbill, newspaper or magazine article, or book. In this category, that definition can decide whether sharing phone-card information crossed from private conduct into a charged publication. (21 O.S. § 1522)

Access

Access means to approach, gain entry to, instruct, communicate with, store data in, retrieve data from, or otherwise use the logical, arithmetical, memory, or other resources of a computer, computer system, or computer network. So, a case may turn on access even when the State cannot prove permanent damage. (21 O.S. § 1952(1))

Computer network

Computer network means the wired or wireless physical or logical interconnection of one or more computers or computer systems to each other, or to other computer networks, for the purpose of transmitting or receiving computer programs, computer software, or data. That broad definition matters because these cases are not limited to one laptop or one desktop. (21 O.S. § 1952(3))

Data

Data means a representation of information, knowledge, facts, concepts, computer software, computer programs, or instructions. Data may be in any form, in storage media, stored in computer memory, in transit, or presented on a display device. Because of that reach, copied files, transmitted code, and on-screen information can all become part of the same charge. (21 O.S. § 1952(7))

Harass

Harass means a pattern or course of conduct directed toward a person that would cause a reasonable person to suffer emotional distress and that actually causes emotional distress to the victim. In online-threat cases, that definition helps separate a single rude message from conduct the State says crossed into criminal harassment. (21 O.S. § 1173(F)(1); jury instruction 4-31)

Oklahoma computer & telecom crimes FAQs

What counts as an Oklahoma computer or telecom crime?

An Oklahoma computer or telecom crime usually involves unauthorized access, misuse of computer services, computer-based fraud, service-charge evasion, stolen phone records, online threats, or digital harassment. The exact charge depends on what was used, what authority existed, and what the State says the person meant to do.

Can Oklahoma charge you for computer access even if no data was destroyed?

Yes. Some Oklahoma computer charges focus on unauthorized access itself. Others require proof of damage, copying, disclosure, disruption, service use, or fear. So, the answer depends on which statute the State chose.

Are Oklahoma computer and telecom cases mostly built on digital evidence?

Often, yes. Oklahoma prosecutors usually rely on logs, provider records, screenshots, device data, account history, and metadata. However, those cases still depend on people too, including witnesses who can explain who had control, who had permission, and what the records really show.

Can Oklahoma file more than one charge from the same event?

Yes. Oklahoma prosecutors often file multiple counts if different laws fit different parts of the conduct. Still, duplicate punishment for the same exact act can be challenged, and the State must keep separate theories legally distinct.

Does deleting messages or files stop an Oklahoma investigation?

No. Oklahoma investigations can continue through provider returns, recipient devices, backups, business records, and forensic recovery. In some cases, deletion also makes the defense harder because it wipes out context that could have helped explain what really happened.

This page is for informational purposes only and is not legal advice. Every case is unique; consult an attorney about your specific situation. Page last updated March 24, 2026. Consult the statutes listed above for the most up-to-date law.

Free Case Consultation

 


    CRIMES

    Alcohol
    Animals
    Arson
    Assault/Battery/Domestic Abuse
    Boating
    Burglary & Trespass
    Children
    Coercion & Intimidation
    Dangerous Driving
    Disorderly Conduct & Public Decency
    Drugs – Possession / Intent / Trafficking
    Drunk Driving – DUI / DWI / APC
    Elder & Caretaker Abuse
    Escape/Harboring/Bail
    Firearms
    Forgery
    Fraud & Deception
    Homicide
    Identity & Impersonation
    Jail/Prison Contraband/Unauthorized Entry
    Obstruction of Justice
    Payment & Cyber Crimes
    Public Order/Terrorism/Explosives
    Robbery
    Sex Crimes – Level 3 / 2 / 1 / Non-register
    VPO Violation
    Theft & Property Crimes
    Threatening/Harassing Communication
    Vandalism/Malicious Mischief
    White Collar

    PROCEDURE

    Expungements
    Youthful Offender
    Probation
    85% Crimes
    Violent Crimes
    Victim Protective Order – VPO
    Criminal Process in Oklahoma
    Diversion Programs
    Sentence Enhancement
    Bail
    Restitution

    RECENT BLOG POSTS
    Oklahoma boat stabbing scene showing a captain on a boat on an Oklahoma lake as a man approaches with a knife, illustrating Oklahoma criminal defense by The Urbanic Law Firm.

    Stabbin’ the Captain! Boater Goes Berserk in Hawaii!

    April 21, 2026 By Frank Urbanic

    Oklahoma age of consent criminal defense image showing ID cards, handcuffs, folders, and a gavel on a table for The Urbanic Law Firm

    Age of Consent in Oklahoma: Who You Can & Can’t Have Sex With

    April 10, 2026 By Corey Brennan

    Man standing at an outdoor shooting range in daylight with a holstered handgun, illustrating Oklahoma handgun license issues and Oklahoma criminal defense by The Urbanic Law Firm.

    Oklahoma Handgun License Rules: Who Qualifies & Who Doesn’t

    April 6, 2026 By Frank Urbanic

    oklahoma-handgun-reciprocity-criminal-defense-urbanic-law-firm.png

    Oklahoma Handgun & Firearm Reciprocity Rules—Complete Guide

    April 6, 2026 By Ky Corley

    Man with a holstered pistol standing outdoors in Oklahoma near the State Capitol, illustrating Oklahoma constitutional carry and Oklahoma criminal defense by The Urbanic Law Firm.

    Oklahoma Constitutional Carry Firearms Laws – Complete Guide

    April 5, 2026 By Frank Urbanic

    WINS

    TRIAL WIN – Judgment of $1,205.64

    2/2/17 ● Lincoln County

    Obtaining Money by False Pretenses x 2

    Count 1 – Reduced to misdemeanor & DEFERRED

    Count 2 – DISMISSED

    4/6/16 ● Oklahoma County

    DUI (felony) – DISMISSED

    Leaving Scene of Accident – DISMISSED

    Leaving Scene of Accident x2 – Probation

    8/17/2020 ● Oklahoma County

    Expired Registration – DISMISSED

    11/22/16 ● Oklahoma County

    Motion to Accelerate - DISMISSED

    5/12/17 ● Oklahoma County

    Copyright © 2026 The Urbanic Law Firm, PLLC