STOP ILLEGAL OPERATORS
BEFORE THEY START

A shared intelligence platform for Philippine ISPs and Electric Cooperatives to detect, document, and eliminate unauthorized telecommunications operators and pole attachments.

Pioneered by J2 Network & Data Solutions, Inc.

THE PROBLEM

Illegal Operators Are Costing Every ISP Revenue

All ISPs are fighting the same battle independently. A shared platform would multiply every ISP's enforcement capability.

₱1.8M+
Per Violator Exposure
Max NTC fine for 1 year of illegal ops — but only if you catch them and file.
100%
Manual Detection Today
Every ISP relies on field staff physically spotting violations. Reactive and slow.
0
Shared ISP Intelligence
No platform exists for ISPs to pool information about illegal operators.
Weeks
To File One Complaint
Drafting NTC/SEC complaints with evidence takes weeks per violation.
All ISPs are fighting the same battle independently. A shared platform would multiply every ISP's enforcement capability.
THE SOLUTION

NetWatch PH — Six Integrated Modules

A comprehensive platform that transforms how ISPs detect, document, and act against unauthorized operators.

🗺

GIS Detection Layer

Live map of violations. Field techs pin incidents with GPS + photos via mobile. Five layers: service area polygons, violation pins color-coded by status, density heatmap by barangay, pole asset markers, and fiber route overlays. Bounding box queries load only visible pins. MarkerCluster prevents overlap at scale.

📡

Network Monitor

SNMP polling detects rogue MACs and optical anomalies automatically 24/7. Monitors OLTs for unknown ONUs, switches for unauthorized MAC addresses, RADIUS for auth abuse, bandwidth for reseller patterns, and optical power for splice detection. Critical alerts trigger SMS + email instantly.

📋

Pole Asset Registry

Every pole QR-tagged with auto-generated codes (POLE-YYMM-#####). Scan to view ownership, authorized attachments, and flag unauthorized cables. Full inspection tracking, patrol route management, and weatherproof label generation for field deployment.

💡

Shared Intelligence

All ISPs contribute anonymized sightings. Operator profiles track aliases, equipment signatures, geographic expansion patterns, and rebranding history. Credibility scoring algorithm escalates threats automatically when multiple ISPs report the same operator.

Complaint Generator

Complete NTC+SEC complaint package auto-generated in minutes, not weeks. Pre-filled with pole ownership proof, GPS coordinates, timestamped photos, violation history, and operator profile data. One click from confirmed violation to filed complaint.

Verification Portal

Public tool for subscribers and LGUs to verify if an ISP is NTC-licensed. Shows active COR status, service area, and any violation reports. Protects consumers from subscribing to illegal operators.

THE RULES

The Legal Framework That Makes This Enforceable

Philippine law is clear — operating a telecommunications entity without NTC authorization is illegal. The penalties exist. The problem is detection and documentation, not legislation.

⚖ Republic Act 7925 — Public Telecommunications Policy Act

Requires all public telecommunications entities to secure a Certificate of Public Convenience and Necessity (CPCN) or Certificate of Registration (COR) from the NTC before operating. Operating without one is a criminal offense punishable by fines up to ₱200 per day of violation and/or imprisonment.

⚖ NTC Memorandum Circular 01-01-2015

Requires all Value-Added Service (VAS) providers — including internet service providers — to register with the NTC and maintain valid COR. Unregistered operators are subject to cease-and-desist orders and equipment confiscation.

⚖ Republic Act 10929 — Free Internet in Public Places Act

While focused on free internet access, it reinforces the NTC's authority over all internet service provision in the Philippines and establishes that ISPs must be properly registered entities.

⚖ SEC Registration Requirements

Any entity operating as a corporation or partnership must register with the Securities and Exchange Commission. Operating a business enterprise without SEC registration is a separate violation with its own penalties, providing a second enforcement vector.

⚖ Philippine Electrical Code (PEC)

All pole attachments must comply with PEC safety clearances. Unauthorized cables that violate minimum clearance requirements create fire and electrocution hazards, giving cooperatives an additional safety-based enforcement argument beyond revenue recovery.

⚖ NEA Guidelines on Pole Attachment

The National Electrification Administration requires cooperatives to maintain proper records of all pole attachments and collect appropriate rental fees. Cooperatives that allow unauthorized attachments without enforcement may face governance findings during NEA audits.

The NTC can issue Cease and Desist Orders (CDOs) against illegal operators. A CDO requires the operator to immediately stop all operations. Non-compliance escalates to criminal prosecution. NetWatch PH automates the evidence package that triggers CDO proceedings.
STOP RED TAPE

From Weeks of Paperwork to Minutes of Automation

Filing a single NTC complaint today requires gathering GPS evidence, photographs, operator research, legal citations, and formal documentation. Most ISPs give up before they start. NetWatch PH eliminates every bottleneck.

📄 The Old Way: Manual Complaint Filing

Field tech spots violation. Reports to office by phone. Office sends someone to photograph and document. Legal team researches operator. Drafts formal complaint letter. Gathers supporting evidence. Files at NTC regional office. Timeline: 2–6 weeks per violation. Most violations are never filed.

⚡ The NetWatch Way: Automated Pipeline

Field tech taps location on map. Fills form on mobile. Photos auto-attached with GPS metadata. System matches operator against shared intelligence database. Complaint template pre-populated with all evidence. Admin clicks "Generate Complaint." Timeline: minutes.

📊 Batch Filing Power

Accumulated 15 violations against the same operator across 3 municipalities? Generate one comprehensive complaint package with all evidence bundled, geographic spread documented, and escalation pattern highlighted. One filing covers everything. NTC takes pattern complaints far more seriously than individual reports.

The Automated Complaint Pipeline

1Violation detected — Field tech pins on GIS map with photos, GPS, and operator details
2Auto-matched — System matches operator name against shared intelligence database. Pulls existing profile, aliases, prior reports
3Evidence compiled — GPS coordinates, timestamped photos, pole ownership records, prior sightings, NTC verification status — all assembled automatically
4Complaint generated — NTC/SEC complaint package auto-populated with all evidence, legal citations, and formal language. Admin reviews and approves
5Filed & tracked — Complaint submitted. Outcome tracked in the shared intelligence system. All member ISPs see enforcement progress
THEIR SCHEMES

How Illegal Operators Infiltrate Your Territory

Understanding the playbook is the first step to defeating it. These are the documented patterns our member ISPs have identified across the Philippines.

👁 The Night Installer

Crews work between 10PM and 4AM to avoid detection. Fiber spliced onto existing cables under cover of darkness. By morning, a new unauthorized network segment is live. Subscribers are signed up door-to-door the next day. Multiple ISPs report identical patterns.

🔁 The Rebrand Loop

When heat builds, the operator dissolves the business name and reappears under a new one within weeks. "FastNet" becomes "QuickNet" becomes "FiberHome PH." Same equipment, same areas, same people — different name on the GCash account. NetWatch tracks rebranding history and equipment signatures to maintain continuity.

💲 The GCash Ghost

No bank account. No official receipts. Payment exclusively via GCash or cash. No paper trail for tax authorities or SEC investigators. Subscribers pay ₱599/month to a mobile number that changes quarterly. Impossible to trace through traditional financial investigation.

🚚 The Lash Parasite

Never installs their own poles. Lashes fiber onto existing cables — yours, PLDT's, the electric cooperative's. Minimal capital investment. Maximum damage. The physical tap is a simple splice that adds 0.1–0.5 dBm of insertion loss on your fiber route. Only detectable through optical power monitoring.

👥 The Door-to-Door Blitz

Targets low-income barangays where subscribers are price-sensitive. Offers service at 30–50% below legitimate ISP rates. No contract. No installation fee. No service level agreement. When the network fails, there's no support number to call. Subscribers learn the hard way.

📋 The Fake License

Shows a photocopy of a "DTI registration" or fabricated "NTC permit" to barangay officials when questioned. The DTI registration is real — but for a food business, not telecommunications. The NTC document is entirely fabricated. No one checks because no verification tool exists. Until now.

Equipment Signatures We Track

🔌 Cable Patterns

Brand (Corning, Furukawa, generic), color coding, strand count. The same operator consistently uses the same cable. Track it across municipalities to link seemingly separate operations.

📤 ONU/Router Models

Huawei HG8245H, TP-Link Archer, generic Chinese ONUs. Bulk purchases of specific models create a fingerprint. When the same ONU model appears across multiple unauthorized networks, it's likely the same operator.

🕐 Operating Hours

Installation activity time patterns. Night installers leave traces — SNMP detects new ONUs registering at 2AM. RADIUS sees auth attempts from unknown MACs during off-hours. Patterns map to specific operators.

💰 Pricing Patterns

₱599 flat rate. ₱499 promo. Always below market. Always GCash only. Subscriber recruitment methods and pricing structure are behavioral signatures as reliable as equipment fingerprints.

YOUR DEFENSE

Seven Layers of Technical Detection

Illegal fiber taps cause measurable changes in your network. NetWatch monitors these signals 24/7 so violations are caught by technology, not luck.

📡

OLT Monitoring (Critical)

Your Optical Line Terminals are ground zero. Monitor optical Rx power per port — a sudden 3+ dBm drop signals a possible splice/tap. Track every ONU registration event. Any new device not in your subscriber database triggers an immediate alert. Port status changes outside business hours flag suspicious activity.

🖥

Switch & Aggregation Monitoring

MAC address table whitelisting detects unauthorized devices. New MAC on a port = alert. MAC on wrong port = possible loop or tap. Port traffic spikes on low-usage subscribers indicate bandwidth reselling. CRC errors and input errors signal physical layer tampering. VLAN changes catch bridge attacks.

🌐

Bandwidth Anomaly Detection

50 subscribers on a segment should generate X Mbps at peak. Seeing 2–3x expected traffic? Possible reseller. Asymmetric traffic (equal up/down) at off-hours indicates an aggregation point. New traffic source IPs appearing on your network segments are flagged automatically.

🔎

Optical Power Monitoring

Each fiber route has a known loss budget in dBm. A new splice adds 0.1–0.5 dBm of insertion loss. Track cumulative loss per route over time — unexplained increase = new tap point. Per-ONU power level trending catches splices between your OLT and their ONT.

🔐

RADIUS Authentication Monitoring

Every auth attempt compared against subscriber database. Unknown MAC trying to authenticate = alert. One account with 10+ concurrent sessions = reselling. Auth from unexpected NAS IP = rogue access device on your network. Failed auth floods indicate brute-force credential attacks.

📡

Wireless / RF Monitoring

Detect rogue access points on 5GHz/2.4GHz using your SSIDs. Identify unlicensed WISP base stations operating in your service areas. Monitor signal interference patterns on your wireless backhaul. A new transmitter nearby shows as sudden quality degradation on affected links.

Alert Response Matrix

Alert TypeSeverityAuto-ActionResponse Time
Unknown ONU registered🔴 CriticalSMS + Email + Violation draftImmediate
Optical power drop 3+ dBm🔴 CriticalSMS + EmailSame day
Rogue MAC on switch🔴 CriticalSMS + EmailImmediate
RADIUS auth from unknown NAS🔴 CriticalSMS + EmailImmediate
Multiple sessions same account🟠 WarningEmail24 hours
Off-hours bandwidth spike🟠 WarningEmail48 hours
Optical power drop 1–3 dBm🟡 InfoDashboard onlyNext patrol
SHARED INTELLIGENCE

The Credibility Scoring System

Individual ISP data stays private. Patterns and threats get shared. Like a credit bureau — ISPs share violator data without revealing their own operations. No ISP sees another's subscriber counts, revenue, or network details. Only threat intelligence.

ConditionLevelScoreAction
1 report from 1 ISP⚪ UNVERIFIED1.0Needs investigation
2 reports from 1 ISP🟡 SUSPECTED2.0Possible pattern
3 reports from 2+ ISPs🟠 CONFIRMED3.0Multiple sources validated
5 reports from 3+ ISPs🔴 CRITICAL4.0Widespread — escalate to NTC
NTC complaint filed🔴 CRITICAL4.0+Enforcement in progress
CDO issued by NTC⬛ BLACKLISTED5.0Permanent record

Evidence Bonus Weights

📷 Photo Evidence

+0.5 to credibility score. Timestamped photos of cables, equipment, or operator activity attached to the report.

📊 Network Log Evidence

+0.5 to credibility score. SNMP data, RADIUS logs, or optical power readings that corroborate the physical sighting.

🏢 Pole Registry Evidence

+1.0 to credibility score. Unauthorized attachment documented on a registered, QR-tagged pole with ownership proof.

📄 Consistent Operator Name

+0.5 to credibility score. Multiple reports using the same or matched operator name confirms identity.

🆔 Government ID of Operator

+1.0 to credibility score. Positively identified individual or entity behind the operation.

📊 Geographic Expansion Pattern

Auto-tracked when an operator appears in a new municipality. Alerts sent to all ISPs in the predicted expansion direction.

What Gets Shared vs. What Stays Private

✅ Shared With All Members

Operator name & aliases, violation type, GPS coordinates, municipality/barangay, date/time, equipment description, photos (anonymized), severity rating, credibility score, NTC/SEC verification status, complaint outcomes, geographic expansion patterns, equipment signatures, behavioral patterns.

🔒 Private Per ISP

Which ISP reported it, internal case reference numbers, subscriber impact data, network segment details, legal strategy, settlement amounts, competitive intelligence. No ISP ever sees which other ISP filed a report.

Your Poles. Your Assets.
Take Back Control.

Across the Philippines, 121 electric cooperatives own an estimated 7–10 million distribution poles — the backbone of both the power grid and the nation's telecom infrastructure. Yet every day, unauthorized ISPs, cable TV operators, and even licensed telcos attach cables, drop wires, and equipment to these poles without permits, without payment, and without regard for safety. The result? Overloaded poles, deadly hazards, and billions in lost revenue that should be lowering electricity rates for member-consumers.

121
Electric Cooperatives
Nationwide, under NEA & PHILRECA
7–10M
Distribution Poles
Owned by cooperatives across the country
₱2–5B
Annual Revenue Loss
Unpaid pole rental fees nationwide
20+
Typhoons per Year
Overloaded poles fail first in storms
2–3x
Unauthorized vs Authorized
For every permitted attachment, 2–3 are illegal
THE CRISIS ON YOUR POLES

Unauthorized Attachments Are a Safety, Revenue & Liability Emergency

Field crews report the same problems from Bataan to Mindanao. Here's what uncontrolled pole access is doing to your cooperative:

Electrocution & Fire Risk

Improperly installed telecom cables contact or approach energized power lines. Insulation fails. Arcing ignites fires. Linemen face lethal unknowns on every pole climb. EC member-consumers live under the danger daily.

🌪

Typhoon Vulnerability

Overloaded poles are the first to fall during the 20+ typhoons the Philippines sees each year. A pole designed for power lines plus one cable now carries 5–10 unauthorized cables. Restoration takes days longer because crews must navigate tangled, unmapped wires.

💰

Billions in Lost Revenue

At PHP 25–50 per pole per month, unauthorized attachments cost cooperatives an estimated PHP 2–5 billion per year nationally. Revenue that should lower member-consumer electricity rates goes uncollected.

📄

Liability Without Authority

If an unauthorized attachment causes injury, fire, or property damage, the cooperative may face legal liability — even though it never authorized the attachment. You bear the risk while others profit from your infrastructure.

🚫

Spaghetti Wire Chaos

Excessive, unmanaged cables cause line sag below minimum clearances, obstruct pedestrian and vehicular traffic, and create the visual blight of "spaghetti wires" that degrades communities.

🔧

Maintenance Gridlock

Every unauthorized cable on a pole slows emergency response. Linemen cannot safely or quickly perform repairs when poles are crowded with unmapped, unidentified attachments from unknown operators.

OUR COMMITMENT TO YOU

We Will Build Your GIS Pole Inventory & SCADA Integration

J2 Network & Data Solutions is prepared to design, build, and deploy a complete GIS-based pole asset management system for every cooperative that joins NetWatch PH. This is not just software — it's a transformational shift from paper-based, manual field work to a technology-first enforcement and revenue recovery platform. Minimize civic works. Maximize technology.

🌐

Georeferenced Pole Database

Every pole mapped with GPS coordinates, type, height, class rating, condition, circuit assignment, and full attachment inventory. Your entire distribution network, digitized and searchable.

🔒

QR-Code Tagging

Durable, weather-resistant QR plates on every pole. Field crews scan to instantly pull up pole records, log inspections, photograph attachments, and flag unauthorized cables — all from a smartphone.

📡

Drone + AI Inspection

UAV-based surveys capture 200–500 poles per day versus 30–50 by ground crews. AI-assisted image analysis detects unauthorized attachments, counts cables, and flags safety clearance violations automatically.

📊

SCADA Integration

IoT tilt sensors, load monitors, and vibration detectors on high-priority poles feed directly into your SCADA system. When a pole begins leaning from overloading, the system cross-references the attachment database instantly.

💳

Automated Billing Engine

GIS attachment data feeds directly into an invoicing system. Every pole, every attachment, every month — billed automatically. Discovery of unauthorized attachments triggers back-rent calculation and demand letters.

🔑

Automated Permitting Portal

ISPs apply for pole attachments online. The system auto-checks pole capacity, validates safety clearances per PEC standards, routes for engineering approval, and issues digital permits linked to the GIS database.

🔥

Thermal & LiDAR Analysis

Infrared drone cameras detect hot spots from overloaded conductors and poor connections. LiDAR creates 3D point clouds to precisely measure clearances, sag, and attachment positions for safety compliance.

📣

Crowdsourced Reporting

A mobile app for member-consumers and barangay officials to report suspected unauthorized pole work with photo and GPS. Every pair of eyes in your service area becomes a sensor.

TECHNOLOGY ROADMAP

From Paper Ledgers to Smart Grid Intelligence

A phased approach that delivers value from day one while building toward full smart-grid capability:

Phase 1 — Digital Foundation

Complete pole inventory with GPS mapping, QR-code tagging, and mobile field app deployment. Every pole gets a digital identity. Immediate visibility into authorized vs. unauthorized attachments.

Phase 2 — Automated Enforcement

Online permitting portal, automated billing engine, and complaint generator integration. Revenue recovery begins immediately with back-rent calculations on discovered violations.

Phase 3 — Aerial Intelligence

Drone fleet deployment with AI-powered image analysis. Quarterly aerial surveys of the entire service area. Thermal imaging for safety hotspot detection. 10x inspection throughput.

Phase 4 — SCADA + IoT Mesh

Smart sensors on critical poles feeding real-time data to your SCADA system. Tilt, vibration, and load monitoring. Automated alerts when pole loading changes unexpectedly. Predictive maintenance powered by data.

Phase 5 — National Intelligence Network

All participating cooperatives share anonymized pole utilization data. NEA and PHILRECA gain aggregate visibility. Data-driven policy-making. The first nationwide joint-pole intelligence platform.

WHAT YOUR COOPERATIVE GAINS

Every Reason to Join. No Reason to Wait.

Joining NetWatch PH isn't just about catching violators — it's about transforming how your cooperative manages its most valuable physical assets.

💰Revenue Recovery & Growth

Recover millions in unpaid pole rental fees. Automated billing ensures every attachment is accounted for. New revenue stream that directly benefits member-consumers through lower electricity rates.

Safety Compliance Scoring

Every pole gets a dynamic safety score based on load, clearance compliance, inspection recency, and typhoon risk. Color-coded GIS maps let you prioritize the most dangerous poles first. Protect your linemen and communities.

📊NEA Reporting Integration

Auto-generate pole attachment revenue reports for NEA financial submissions. Support NEA's digitalization mandate. Become a model cooperative for technology adoption and governance.

🌪Typhoon Resilience

Know exactly which poles are overloaded before storm season. Prioritize reinforcement or load reduction. After a typhoon, GIS data accelerates restoration by giving crews a complete, current map of every pole and every attachment.

🛡Legal Protection

Document every unauthorized attachment with timestamped GPS evidence and photographs. Generate NTC/SEC complaint packages in minutes. Shift liability where it belongs — to the violators, not the cooperative.

🏢Community Trust

Member-consumers see their cooperative taking action on the spaghetti wire problem. Clean, safe, well-managed poles reflect a well-managed cooperative. Public verification portal lets residents confirm which ISPs are authorized.

PENELCO. BATELEC. BENECO. CEBECO. Every Cooperative.

We are inviting all 121 electric cooperatives and private distribution utilities across the Philippines to join the NetWatch PH coalition. Together, we protect every pole, every community, every peso. Let's end unauthorized attachments — permanently.