STOP ILLEGAL OPERATORS
BEFORE THEY START

A shared intelligence platform for Philippine ISPs and Electric Cooperatives to detect, document, and eliminate unauthorized telecommunications operators and pole attachments.

Pioneered by J2 Network & Data Solutions, Inc.

THE PROBLEM

Illegal Operators Are Costing Every ISP Revenue

All ISPs are fighting the same battle independently. A shared platform would multiply every ISP's enforcement capability.

₱1.8M+
Per Violator Exposure
Max NTC fine for 1 year of illegal ops — but only if you catch them and file.
100%
Manual Detection Today
Every ISP relies on field staff physically spotting violations. Reactive and slow.
0
Shared ISP Intelligence
No platform exists for ISPs to pool information about illegal operators.
Weeks
To File One Complaint
Drafting NTC/SEC complaints with evidence takes weeks per violation.
All ISPs are fighting the same battle independently. A shared platform would multiply every ISP's enforcement capability.
THE SOLUTION

NetWatch PH — Six Integrated Modules

A comprehensive platform that transforms how ISPs detect, document, and act against unauthorized operators.

🗺

GIS Detection Layer

Live map of violations. Field techs pin incidents with GPS + photos via mobile. Five layers: service area polygons, violation pins color-coded by status, density heatmap by barangay, pole asset markers, and fiber route overlays. Bounding box queries load only visible pins. MarkerCluster prevents overlap at scale.

📡

Network Monitor

SNMP polling detects rogue MACs and optical anomalies automatically 24/7. Monitors OLTs for unknown ONUs, switches for unauthorized MAC addresses, RADIUS for auth abuse, bandwidth for reseller patterns, and optical power for splice detection. Critical alerts trigger SMS + email instantly.

📋

Pole Asset Registry

Every pole QR-tagged with auto-generated codes (POLE-YYMM-#####). Scan to view ownership, authorized attachments, and flag unauthorized cables. Full inspection tracking, patrol route management, and weatherproof label generation for field deployment.

💡

Shared Intelligence

All ISPs contribute anonymized sightings. Operator profiles track aliases, equipment signatures, geographic expansion patterns, and rebranding history. Credibility scoring algorithm escalates threats automatically when multiple ISPs report the same operator.

Complaint Generator

Complete NTC+SEC complaint package auto-generated in minutes, not weeks. Pre-filled with pole ownership proof, GPS coordinates, timestamped photos, violation history, and operator profile data. One click from confirmed violation to filed complaint.

Verification Portal

Public tool for subscribers and LGUs to verify if an ISP is NTC-licensed. Shows active COR status, service area, and any violation reports. Protects consumers from subscribing to illegal operators.

THE RULES & PENALTIES

Every Law They Break. Every Penalty They Face.

Philippine law is clear — operating a telecommunications entity without NTC authorization is illegal. Here is the complete legal arsenal available to legitimate ISPs and cooperatives. The penalties exist. The problem has always been detection and documentation, not legislation.

⚖ NTC Penalties for Illegal Operators

ViolationLegal BasisPenalty
Operating without CPCN/CORRA 7925, Sec. 21Fine of ₱200/day of violation + imprisonment of 1–4 years. Equipment confiscation.
Unauthorized Value-Added Service (ISP without COR)NTC MC 01-01-2015Cease and Desist Order (CDO). Equipment seizure. Criminal referral to DOJ.
Non-compliance with CDONTC Rules of PracticeContempt proceedings. Additional fines of ₱500/day. Criminal prosecution for defiance of lawful order.
Operating on unauthorized frequencies (wireless ISPs)RA 3846 (Radio Control Law)Fine of ₱500–₱10,000 + imprisonment of 1–3 years. Equipment forfeiture to government.
Interconnection without authorityRA 7925, Sec. 18Fine + revocation of any existing permits. Mandatory disconnection within 30 days.
Failure to file required reportsNTC MC 08-09-2006Fine of ₱200/day. Suspension of COR until compliance.
Using type-unapproved equipmentNTC MC 04-08-2005Equipment confiscation. Fine per device. Operator liable for interference caused.
Operating expired CORNTC MC 01-01-2015Treated same as operating without COR. CDO + full penalty schedule applies.

⚖ SEC Penalties

ViolationLegal BasisPenalty
Operating unregistered corporation/partnershipRevised Corporation Code (RA 11232), Sec. 151Fine of ₱10,000–₱1,000,000. Officers personally liable. Imprisonment up to 6 years.
Operating under false/fictitious nameRA 11232, Sec. 148Fine + imprisonment. Additional fraud charges if used to deceive subscribers.
Collecting investments without SEC registration (networking schemes)Securities Regulation Code (RA 8799)Fine of ₱1M–₱5M + imprisonment of 7–21 years. Estafa charges if subscriber funds lost.
Failure to file Annual Financial StatementsRA 11232, Sec. 177Fine + revocation of registration. Officers barred from incorporating new entities.

⚖ BIR / Tax Penalties

ViolationLegal BasisPenalty
Operating without BIR registrationNIRC Sec. 236Fine of ₱5,000–₱20,000 + closure of business. Criminal liability for officers.
Non-issuance of official receiptsNIRC Sec. 264Fine of ₱25,000–₱50,000 per occurrence + imprisonment of 2–4 years.
Tax evasion (undeclared income)NIRC Sec. 254Fine of ₱30,000–₱100,000 + imprisonment of 2–4 years. 50% surcharge + 20% interest on unpaid tax.
GCash-only operation to avoid paper trailAMLA (RA 9160), NIRCSuspicious transaction report filed. Asset freeze. Full tax assessment + penalties for entire operating period.

⚖ Criminal & Civil Penalties

ViolationLegal BasisPenalty
Theft of service / pilferage (tapping existing fiber)Revised Penal Code, Art. 308Imprisonment of 6 months–6 years depending on value stolen. Civil damages to ISP.
Destruction / damage to telecom infrastructureRA 7925, Sec. 23 + RPC Art. 327Imprisonment of 2–6 years. Full restitution for repair costs.
Unauthorized pole attachment (damage to property)Civil Code, Art. 2176 (Quasi-delict)Full civil liability for damages. Cooperative can sue for back-rent + repair + removal costs.
Injury/death from unauthorized installationRPC Art. 365 (Criminal negligence)Imprisonment + civil indemnity. If death occurs: reckless imprudence resulting in homicide (4–8 years).
Estafa (fraud against subscribers)RPC Art. 315Imprisonment proportional to amount defrauded. 6 months (under ₱6K) to 20 years (over ₱2.4M).
Trespassing on cooperative propertyRPC Art. 280-281Fine + imprisonment of 1–6 months per occurrence.

⚖ LGU & Cooperative-Level Enforcement

🏛 Barangay Resolution

Barangay council can pass a resolution prohibiting unauthorized telecom installations within their jurisdiction. Violators subject to barangay-level penalties and referral to municipal/city government. Quick, local enforcement for immediate action.

🏙 Municipal/City Ordinance

LGU can enact ordinances requiring business permits for telecom operators. Operating without a mayor's permit is a separate violation with fines of ₱1,000–₱5,000 and business closure. Useful when NTC proceedings are slow.

📜 Cooperative Board Resolution

Cooperative board can authorize immediate removal of unauthorized attachments after proper notice. Legal basis: cooperative's property rights over its own poles. 30-day notice period, then removal at violator's expense.

🙋 Physical Removal

After due notice and board resolution, cooperatives may physically remove unauthorized cables and equipment. Document everything with photos and GPS before removal. Equipment held as evidence for NTC complaint. Removal costs billed to violator.

Maximum Combined Exposure Per Illegal Operator: NTC fines (₱200/day x 365 = ₱73,000/year) + SEC fines (up to ₱1M) + BIR tax assessment (all undeclared revenue + 50% surcharge) + criminal imprisonment (up to 4 years NTC + 6 years SEC + 4 years BIR) + civil damages (back-rent + repair + removal) + equipment confiscation. Total financial exposure can exceed ₱5M per year of illegal operation.
THE ENEMY WITHIN

Internal Threats That Enable Illegal Operations

Not every threat comes from outside. Some of the most damaging enablers of illegal operators are inside your own organization — cooperative employees, ISP staff, barangay officials, and even NTC personnel who look the other way for a price.

⚠ Inside the Cooperative

👤 The Paid-Off Lineman

A cooperative lineman accepts ₱500–₱2,000 per pole to look the other way when unauthorized cables are installed. Sometimes actively assists with installation during off-hours. Has keys to substations and knows patrol schedules. One compromised lineman can open 50+ poles to illegal attachment.

💼 The Complicit Supervisor

Mid-level supervisor deliberately delays pole inspection reports, loses unauthorized attachment documentation, or reassigns field crews away from areas where illegal operators are actively installing. Motivated by regular cash payments or family connections to the illegal operator.

📈 The Data Leaker

Employee with access to cooperative's patrol schedules, inspection routes, or planned enforcement actions tips off illegal operators before raids. Operators temporarily remove cables before inspection and reinstall after. Enforcement appears to find nothing wrong.

📋 The Permit Rubber-Stamper

Engineering department staff who approves pole attachment permits without proper safety evaluation or capacity checks. Authorized attachments that shouldn't have been approved create precedent that blurs the line between legal and illegal use.

💰 The Revenue Skimmer

Billing department employee who processes pole rental payments but diverts a portion. Creates fake "authorized" records for illegal operators in exchange for payment. Books appear correct, but actual collections don't match the number of attachments on the ground.

🗣 The Board Protector

Board member with financial interest in or family ties to an illegal operator. Uses board position to block enforcement resolutions, defund pole inspection programs, or prevent the cooperative from joining enforcement coalitions like NetWatch PH.

⚠ Inside the ISP

👤 The Rogue Technician

ISP field tech who moonlights by installing service for an illegal operator using the ISP's own tools, splicing equipment, and fiber. Uses knowledge of the ISP's network topology to tap fiber at optimal points. May also sell subscriber credentials or network access maps.

🔐 The Credential Seller

NOC staff who creates unauthorized PPPoE accounts or provides RADIUS credentials to illegal operators. Subscribers appear legitimate in the system but are actually connected through unauthorized infrastructure. ISP's own authentication system validates the illegal network.

📊 The Bandwidth Reseller

Employee with access to provisioning systems who secretly upgrades illegal operator connections from 10Mbps to 100Mbps, or creates hidden bandwidth allocations. ISP unknowingly provides backhaul for a competing illegal operation running on its own infrastructure.

🗺 The Route Informant

Employee who shares the ISP's fiber route maps, splice point locations, and OLT configuration details with illegal operators. This intelligence allows operators to identify the best tap points and avoid areas with monitoring equipment.

💰 The Side-Business Operator

ISP employee who runs their own unauthorized ISP operation on the side, using the legitimate ISP's infrastructure as backhaul. Recruits subscribers in areas where the employer ISP has poor coverage. Direct conflict of interest disguised as entrepreneurship.

🗣 The NTC Fixer

Contact within or connected to NTC regional office who ensures complaints against specific illegal operators are delayed, lost, or dismissed. Charges illegal operators a monthly "protection fee" to keep enforcement at bay. The most damaging enemy of all.

⚠ Inside Government

🏛 The Barangay Captain Protector

Barangay official who receives monthly payments from illegal operators to prevent complaints from reaching the municipal level. Actively discourages residents from reporting unauthorized installations. May also provide barangay clearances that operators use as fake "permits."

🏙 The LGU Permit Blind Eye

Municipal permit office that issues business permits to telecom operators without verifying NTC COR. Illegal operators obtain a mayor's permit for "computer services" or "general merchandise" and claim it covers their ISP business. LGU collects permit fees and doesn't question.

🙋 The NTC Regional Bottleneck

NTC regional staff who deliberately slow-walks complaint processing, requires excessive documentation, or "loses" filed complaints. Creates a de facto safe harbor for illegal operators in their jurisdiction. Enforcement is technically available but practically inaccessible.

🛡 How NetWatch PH Neutralizes Internal Threats

✅ Audit Trails on Everything

Every pole inspection, every report, every status change is timestamped with the user who performed it. If a lineman marks a pole "clear" but satellite imagery or subsequent inspection shows unauthorized cables, the discrepancy is logged and flagged automatically.

✅ Cross-ISP Verification

When one ISP reports a violation that another ISP's employee should have caught, the system flags the gap. If Cooperative A's patrol consistently misses violations that ISP B detects in the same area, the pattern is visible to administrators.

✅ Anonymous Tip System

Employees can report internal corruption anonymously through the platform. Tips are routed to cooperative management or ISP ownership without revealing the reporter's identity. Protected whistleblower channel.

✅ Multi-Party Evidence Chain

NTC complaints filed through NetWatch PH include evidence from multiple ISPs and cooperatives, making it impossible for a single corrupt contact to suppress. The complaint is a matter of record across the entire coalition, not just one entity's filing.

STOP RED TAPE

From Weeks of Paperwork to Minutes of Automation

Filing a single NTC complaint today requires gathering GPS evidence, photographs, operator research, legal citations, and formal documentation. Most ISPs give up before they start. NetWatch PH eliminates every bottleneck.

📄 The Old Way: Manual Complaint Filing

Field tech spots violation. Reports to office by phone. Office sends someone to photograph and document. Legal team researches operator. Drafts formal complaint letter. Gathers supporting evidence. Files at NTC regional office. Timeline: 2–6 weeks per violation. Most violations are never filed.

⚡ The NetWatch Way: Automated Pipeline

Field tech taps location on map. Fills form on mobile. Photos auto-attached with GPS metadata. System matches operator against shared intelligence database. Complaint template pre-populated with all evidence. Admin clicks "Generate Complaint." Timeline: minutes.

📊 Batch Filing Power

Accumulated 15 violations against the same operator across 3 municipalities? Generate one comprehensive complaint package with all evidence bundled, geographic spread documented, and escalation pattern highlighted. One filing covers everything. NTC takes pattern complaints far more seriously than individual reports.

The Automated Complaint Pipeline

1Violation detected — Field tech pins on GIS map with photos, GPS, and operator details
2Auto-matched — System matches operator name against shared intelligence database. Pulls existing profile, aliases, prior reports
3Evidence compiled — GPS coordinates, timestamped photos, pole ownership records, prior sightings, NTC verification status — all assembled automatically
4Complaint generated — NTC/SEC complaint package auto-populated with all evidence, legal citations, and formal language. Admin reviews and approves
5Filed & tracked — Complaint submitted. Outcome tracked in the shared intelligence system. All member ISPs see enforcement progress
THEIR SCHEMES

How Illegal Operators Infiltrate Your Territory

Understanding the playbook is the first step to defeating it. These are the documented patterns our member ISPs have identified across the Philippines.

👁 The Night Installer

Crews work between 10PM and 4AM to avoid detection. Fiber spliced onto existing cables under cover of darkness. By morning, a new unauthorized network segment is live. Subscribers are signed up door-to-door the next day. Multiple ISPs report identical patterns.

🔁 The Rebrand Loop

When heat builds, the operator dissolves the business name and reappears under a new one within weeks. "FastNet" becomes "QuickNet" becomes "FiberHome PH." Same equipment, same areas, same people — different name on the GCash account. NetWatch tracks rebranding history and equipment signatures to maintain continuity.

💲 The GCash Ghost

No bank account. No official receipts. Payment exclusively via GCash or cash. No paper trail for tax authorities or SEC investigators. Subscribers pay ₱599/month to a mobile number that changes quarterly. Impossible to trace through traditional financial investigation.

🚚 The Lash Parasite

Never installs their own poles. Lashes fiber onto existing cables — yours, PLDT's, the electric cooperative's. Minimal capital investment. Maximum damage. The physical tap is a simple splice that adds 0.1–0.5 dBm of insertion loss on your fiber route. Only detectable through optical power monitoring.

👥 The Door-to-Door Blitz

Targets low-income barangays where subscribers are price-sensitive. Offers service at 30–50% below legitimate ISP rates. No contract. No installation fee. No service level agreement. When the network fails, there's no support number to call. Subscribers learn the hard way.

📋 The Fake License

Shows a photocopy of a "DTI registration" or fabricated "NTC permit" to barangay officials when questioned. The DTI registration is real — but for a food business, not telecommunications. The NTC document is entirely fabricated. No one checks because no verification tool exists. Until now.

More Documented Schemes

👥 The Cooperative Insider

Pays a cooperative lineman or supervisor to allow attachment. Lineman gets ₱500–₱2,000 per pole. Operator gets free infrastructure. 50 poles compromised by one corrupt employee. The cooperative doesn't know until a patrol discovers it — if they patrol at all.

💻 The Bandwidth Leech

Employee of a legitimate ISP creates unauthorized PPPoE accounts or bandwidth allocations for a side business. ISP's own RADIUS authenticates the illegal subscribers. Appears as legitimate traffic in monitoring. Only caught by auditing subscriber-to-session ratios.

🚚 The Licensed Telco Overreach

Even licensed operators violate: attaching cables without pole rental agreements, exceeding authorized service areas, or using cooperative poles without permits. Legal entity, illegal attachment. Often harder to enforce because they have lawyers and political connections.

🖓 The Ponzi ISP

Collects installation fees and 6-month advance payments. Provides service for 2–3 months using minimal infrastructure. Degrades service. Stops responding. Collects from new barangays. Leaves subscribers with no service and no recourse. Moves to next province.

🏙 The Barangay Deal

Illegal operator makes a "donation" of ₱50,000–₱100,000 to the barangay hall for a "community internet project." In exchange, barangay captain issues a clearance and actively prevents complaints. Operator uses the clearance as a fake permit when questioned by other authorities.

📊 The Franchise Faker

Claims to be a "sub-franchise" or "authorized reseller" of a legitimate ISP. Shows fake authorization letters. Subscribers believe they're getting PLDT or Globe service. In reality, the operator runs their own unauthorized network and pockets all revenue.

Equipment Signatures We Track

🔌 Cable Patterns

Brand (Corning, Furukawa, generic), color coding, strand count. The same operator consistently uses the same cable. Track it across municipalities to link seemingly separate operations.

📤 ONU/Router Models

Huawei HG8245H, TP-Link Archer, generic Chinese ONUs. Bulk purchases of specific models create a fingerprint. When the same ONU model appears across multiple unauthorized networks, it's likely the same operator.

🕐 Operating Hours

Installation activity time patterns. Night installers leave traces — SNMP detects new ONUs registering at 2AM. RADIUS sees auth attempts from unknown MACs during off-hours. Patterns map to specific operators.

💰 Pricing Patterns

₱599 flat rate. ₱499 promo. Always below market. Always GCash only. Subscriber recruitment methods and pricing structure are behavioral signatures as reliable as equipment fingerprints.

YOUR DEFENSE

Seven Layers of Technical Detection

Illegal fiber taps cause measurable changes in your network. NetWatch monitors these signals 24/7 so violations are caught by technology, not luck.

📡

OLT Monitoring (Critical)

Your Optical Line Terminals are ground zero. Monitor optical Rx power per port — a sudden 3+ dBm drop signals a possible splice/tap. Track every ONU registration event. Any new device not in your subscriber database triggers an immediate alert. Port status changes outside business hours flag suspicious activity.

🖥

Switch & Aggregation Monitoring

MAC address table whitelisting detects unauthorized devices. New MAC on a port = alert. MAC on wrong port = possible loop or tap. Port traffic spikes on low-usage subscribers indicate bandwidth reselling. CRC errors and input errors signal physical layer tampering. VLAN changes catch bridge attacks.

🌐

Bandwidth Anomaly Detection

50 subscribers on a segment should generate X Mbps at peak. Seeing 2–3x expected traffic? Possible reseller. Asymmetric traffic (equal up/down) at off-hours indicates an aggregation point. New traffic source IPs appearing on your network segments are flagged automatically.

🔎

Optical Power Monitoring

Each fiber route has a known loss budget in dBm. A new splice adds 0.1–0.5 dBm of insertion loss. Track cumulative loss per route over time — unexplained increase = new tap point. Per-ONU power level trending catches splices between your OLT and their ONT.

🔐

RADIUS Authentication Monitoring

Every auth attempt compared against subscriber database. Unknown MAC trying to authenticate = alert. One account with 10+ concurrent sessions = reselling. Auth from unexpected NAS IP = rogue access device on your network. Failed auth floods indicate brute-force credential attacks.

📡

Wireless / RF Monitoring

Detect rogue access points on 5GHz/2.4GHz using your SSIDs. Identify unlicensed WISP base stations operating in your service areas. Monitor signal interference patterns on your wireless backhaul. A new transmitter nearby shows as sudden quality degradation on affected links.

Alert Response Matrix

Alert TypeSeverityAuto-ActionResponse Time
Unknown ONU registered🔴 CriticalSMS + Email + Violation draftImmediate
Optical power drop 3+ dBm🔴 CriticalSMS + EmailSame day
Rogue MAC on switch🔴 CriticalSMS + EmailImmediate
RADIUS auth from unknown NAS🔴 CriticalSMS + EmailImmediate
Multiple sessions same account🟠 WarningEmail24 hours
Off-hours bandwidth spike🟠 WarningEmail48 hours
Optical power drop 1–3 dBm🟡 InfoDashboard onlyNext patrol
SHARED INTELLIGENCE

The Credibility Scoring System

Individual ISP data stays private. Patterns and threats get shared. Like a credit bureau — ISPs share violator data without revealing their own operations. No ISP sees another's subscriber counts, revenue, or network details. Only threat intelligence.

ConditionLevelScoreAction
1 report from 1 ISP⚪ UNVERIFIED1.0Needs investigation
2 reports from 1 ISP🟡 SUSPECTED2.0Possible pattern
3 reports from 2+ ISPs🟠 CONFIRMED3.0Multiple sources validated
5 reports from 3+ ISPs🔴 CRITICAL4.0Widespread — escalate to NTC
NTC complaint filed🔴 CRITICAL4.0+Enforcement in progress
CDO issued by NTC⬛ BLACKLISTED5.0Permanent record

Evidence Bonus Weights

📷 Photo Evidence

+0.5 to credibility score. Timestamped photos of cables, equipment, or operator activity attached to the report.

📊 Network Log Evidence

+0.5 to credibility score. SNMP data, RADIUS logs, or optical power readings that corroborate the physical sighting.

🏢 Pole Registry Evidence

+1.0 to credibility score. Unauthorized attachment documented on a registered, QR-tagged pole with ownership proof.

📄 Consistent Operator Name

+0.5 to credibility score. Multiple reports using the same or matched operator name confirms identity.

🆔 Government ID of Operator

+1.0 to credibility score. Positively identified individual or entity behind the operation.

📊 Geographic Expansion Pattern

Auto-tracked when an operator appears in a new municipality. Alerts sent to all ISPs in the predicted expansion direction.

What Gets Shared vs. What Stays Private

✅ Shared With All Members

Operator name & aliases, violation type, GPS coordinates, municipality/barangay, date/time, equipment description, photos (anonymized), severity rating, credibility score, NTC/SEC verification status, complaint outcomes, geographic expansion patterns, equipment signatures, behavioral patterns.

🔒 Private Per ISP

Which ISP reported it, internal case reference numbers, subscriber impact data, network segment details, legal strategy, settlement amounts, competitive intelligence. No ISP ever sees which other ISP filed a report.

Your Poles. Your Assets.
Take Back Control.

Across the Philippines, 121 electric cooperatives own an estimated 7–10 million distribution poles — the backbone of both the power grid and the nation's telecom infrastructure. Yet every day, unauthorized ISPs, cable TV operators, and even licensed telcos attach cables, drop wires, and equipment to these poles without permits, without payment, and without regard for safety. The result? Overloaded poles, deadly hazards, and billions in lost revenue that should be lowering electricity rates for member-consumers.

121
Electric Cooperatives
Nationwide, under NEA & PHILRECA
7–10M
Distribution Poles
Owned by cooperatives across the country
₱2–5B
Annual Revenue Loss
Unpaid pole rental fees nationwide
20+
Typhoons per Year
Overloaded poles fail first in storms
2–3x
Unauthorized vs Authorized
For every permitted attachment, 2–3 are illegal
THE CRISIS ON YOUR POLES

Unauthorized Attachments Are a Safety, Revenue & Liability Emergency

Field crews report the same problems from Bataan to Mindanao. Here's what uncontrolled pole access is doing to your cooperative:

Electrocution & Fire Risk

Improperly installed telecom cables contact or approach energized power lines. Insulation fails. Arcing ignites fires. Linemen face lethal unknowns on every pole climb. EC member-consumers live under the danger daily.

🌪

Typhoon Vulnerability

Overloaded poles are the first to fall during the 20+ typhoons the Philippines sees each year. A pole designed for power lines plus one cable now carries 5–10 unauthorized cables. Restoration takes days longer because crews must navigate tangled, unmapped wires.

💰

Billions in Lost Revenue

At PHP 25–50 per pole per month, unauthorized attachments cost cooperatives an estimated PHP 2–5 billion per year nationally. Revenue that should lower member-consumer electricity rates goes uncollected.

📄

Liability Without Authority

If an unauthorized attachment causes injury, fire, or property damage, the cooperative may face legal liability — even though it never authorized the attachment. You bear the risk while others profit from your infrastructure.

🚫

Spaghetti Wire Chaos

Excessive, unmanaged cables cause line sag below minimum clearances, obstruct pedestrian and vehicular traffic, and create the visual blight of "spaghetti wires" that degrades communities.

🔧

Maintenance Gridlock

Every unauthorized cable on a pole slows emergency response. Linemen cannot safely or quickly perform repairs when poles are crowded with unmapped, unidentified attachments from unknown operators.

OUR COMMITMENT TO YOU

We Will Build Your GIS Pole Inventory & SCADA Integration

J2 Network & Data Solutions is prepared to design, build, and deploy a complete GIS-based pole asset management system for every cooperative that joins NetWatch PH. This is not just software — it's a transformational shift from paper-based, manual field work to a technology-first enforcement and revenue recovery platform. Minimize civic works. Maximize technology.

🌐

Georeferenced Pole Database

Every pole mapped with GPS coordinates, type, height, class rating, condition, circuit assignment, and full attachment inventory. Your entire distribution network, digitized and searchable.

🔒

QR-Code Tagging

Durable, weather-resistant QR plates on every pole. Field crews scan to instantly pull up pole records, log inspections, photograph attachments, and flag unauthorized cables — all from a smartphone.

📡

Drone + AI Inspection

UAV-based surveys capture 200–500 poles per day versus 30–50 by ground crews. AI-assisted image analysis detects unauthorized attachments, counts cables, and flags safety clearance violations automatically.

📊

SCADA Integration

IoT tilt sensors, load monitors, and vibration detectors on high-priority poles feed directly into your SCADA system. When a pole begins leaning from overloading, the system cross-references the attachment database instantly.

💳

Automated Billing Engine

GIS attachment data feeds directly into an invoicing system. Every pole, every attachment, every month — billed automatically. Discovery of unauthorized attachments triggers back-rent calculation and demand letters.

🔑

Automated Permitting Portal

ISPs apply for pole attachments online. The system auto-checks pole capacity, validates safety clearances per PEC standards, routes for engineering approval, and issues digital permits linked to the GIS database.

🔥

Thermal & LiDAR Analysis

Infrared drone cameras detect hot spots from overloaded conductors and poor connections. LiDAR creates 3D point clouds to precisely measure clearances, sag, and attachment positions for safety compliance.

📣

Crowdsourced Reporting

A mobile app for member-consumers and barangay officials to report suspected unauthorized pole work with photo and GPS. Every pair of eyes in your service area becomes a sensor.

TECHNOLOGY ROADMAP

From Paper Ledgers to Smart Grid Intelligence

A phased approach that delivers value from day one while building toward full smart-grid capability:

Phase 1 — Digital Foundation

Complete pole inventory with GPS mapping, QR-code tagging, and mobile field app deployment. Every pole gets a digital identity. Immediate visibility into authorized vs. unauthorized attachments.

Phase 2 — Automated Enforcement

Online permitting portal, automated billing engine, and complaint generator integration. Revenue recovery begins immediately with back-rent calculations on discovered violations.

Phase 3 — Aerial Intelligence

Drone fleet deployment with AI-powered image analysis. Quarterly aerial surveys of the entire service area. Thermal imaging for safety hotspot detection. 10x inspection throughput.

Phase 4 — SCADA + IoT Mesh

Smart sensors on critical poles feeding real-time data to your SCADA system. Tilt, vibration, and load monitoring. Automated alerts when pole loading changes unexpectedly. Predictive maintenance powered by data.

Phase 5 — National Intelligence Network

All participating cooperatives share anonymized pole utilization data. NEA and PHILRECA gain aggregate visibility. Data-driven policy-making. The first nationwide joint-pole intelligence platform.

WHAT YOUR COOPERATIVE GAINS

Every Reason to Join. No Reason to Wait.

Joining NetWatch PH isn't just about catching violators — it's about transforming how your cooperative manages its most valuable physical assets.

💰Revenue Recovery & Growth

Recover millions in unpaid pole rental fees. Automated billing ensures every attachment is accounted for. New revenue stream that directly benefits member-consumers through lower electricity rates.

Safety Compliance Scoring

Every pole gets a dynamic safety score based on load, clearance compliance, inspection recency, and typhoon risk. Color-coded GIS maps let you prioritize the most dangerous poles first. Protect your linemen and communities.

📊NEA Reporting Integration

Auto-generate pole attachment revenue reports for NEA financial submissions. Support NEA's digitalization mandate. Become a model cooperative for technology adoption and governance.

🌪Typhoon Resilience

Know exactly which poles are overloaded before storm season. Prioritize reinforcement or load reduction. After a typhoon, GIS data accelerates restoration by giving crews a complete, current map of every pole and every attachment.

🛡Legal Protection

Document every unauthorized attachment with timestamped GPS evidence and photographs. Generate NTC/SEC complaint packages in minutes. Shift liability where it belongs — to the violators, not the cooperative.

🏢Community Trust

Member-consumers see their cooperative taking action on the spaghetti wire problem. Clean, safe, well-managed poles reflect a well-managed cooperative. Public verification portal lets residents confirm which ISPs are authorized.

PENELCO. BATELEC. BENECO. CEBECO. Every Cooperative.

We are inviting all 121 electric cooperatives and private distribution utilities across the Philippines to join the NetWatch PH coalition. Together, we protect every pole, every community, every peso. Let's end unauthorized attachments — permanently.