A shared intelligence platform for Philippine ISPs and Electric Cooperatives to detect, document, and eliminate unauthorized telecommunications operators and pole attachments.
Pioneered by J2 Network & Data Solutions, Inc.
Live map of violations. Field techs pin incidents with GPS + photos via mobile.
SNMP polling detects rogue MACs and optical anomalies automatically 24/7.
Every pole QR-tagged. Any unauthorized attachment is instantly provable.
All ISPs contribute sightings. Combined intel exponentially more powerful.
Complete NTC+SEC complaint package auto-generated in minutes, not weeks.
Public tool for subscribers and LGUs to verify if an ISP is NTC-licensed.
Across the Philippines, 121 electric cooperatives own an estimated 7–10 million distribution poles — the backbone of both the power grid and the nation's telecom infrastructure. Yet every day, unauthorized ISPs, cable TV operators, and even licensed telcos attach cables, drop wires, and equipment to these poles without permits, without payment, and without regard for safety. The result? Overloaded poles, deadly hazards, and billions in lost revenue that should be lowering electricity rates for member-consumers.
Field crews report the same problems from Bataan to Mindanao. Here's what uncontrolled pole access is doing to your cooperative:
Improperly installed telecom cables contact or approach energized power lines. Insulation fails. Arcing ignites fires. Linemen face lethal unknowns on every pole climb. EC member-consumers live under the danger daily.
Overloaded poles are the first to fail during the 20+ typhoons the Philippines sees each year. A pole designed for power lines plus one cable now carries 5–10 unauthorized cables. Restoration takes days longer because crews must navigate tangled, unmapped wires.
At PHP 25–50 per pole per month, unauthorized attachments cost cooperatives an estimated PHP 2–5 billion per year nationally. Revenue that should lower member-consumer electricity rates goes uncollected.
If an unauthorized attachment causes injury, fire, or property damage, the cooperative may face legal liability — even though it never authorized the attachment. You bear the risk while others profit from your infrastructure.
Excessive, unmanaged cables cause line sag below minimum clearances, obstruct pedestrian and vehicular traffic, and create the visual blight of “spaghetti wires” that degrades communities.
Every unauthorized cable on a pole slows emergency response. Linemen cannot safely or quickly perform repairs when poles are crowded with unmapped, unidentified attachments from unknown operators.
Every pole mapped with GPS coordinates, type, height, class rating, condition, circuit assignment, and full attachment inventory. Your entire distribution network, digitized and searchable.
Durable, weather-resistant QR plates on every pole. Field crews scan to instantly pull up pole records, log inspections, photograph attachments, and flag unauthorized cables — all from a smartphone.
UAV-based surveys capture 200–500 poles per day versus 30–50 by ground crews. AI-assisted image analysis detects unauthorized attachments, counts cables, and flags safety clearance violations automatically.
IoT tilt sensors, load monitors, and vibration detectors on high-priority poles feed directly into your SCADA system. When a pole begins leaning from overloading, the system cross-references the attachment database instantly.
GIS attachment data feeds directly into an invoicing system. Every pole, every attachment, every month — billed automatically. Discovery of unauthorized attachments triggers back-rent calculation and demand letters.
ISPs apply for pole attachments online. The system auto-checks pole capacity, validates safety clearances per PEC standards, routes for engineering approval, and issues digital permits linked to the GIS database.
Infrared drone cameras detect hot spots from overloaded conductors and poor connections. LiDAR creates 3D point clouds to precisely measure clearances, sag, and attachment positions for safety compliance.
A mobile app for member-consumers and barangay officials to report suspected unauthorized pole work with photo and GPS. Every pair of eyes in your service area becomes a sensor.
A phased approach that delivers value from day one while building toward full smart-grid capability:
Complete pole inventory with GPS mapping, QR-code tagging, and mobile field app deployment. Every pole gets a digital identity. Immediate visibility into authorized vs. unauthorized attachments.
Online permitting portal, automated billing engine, and complaint generator integration. Revenue recovery begins immediately with back-rent calculations on discovered violations.
Drone fleet deployment with AI-powered image analysis. Quarterly aerial surveys of the entire service area. Thermal imaging for safety hotspot detection. 10x inspection throughput.
Smart sensors on critical poles feeding real-time data to your SCADA system. Tilt, vibration, and load monitoring. Automated alerts when pole loading changes unexpectedly. Predictive maintenance powered by data.
All participating cooperatives share anonymized pole utilization data. NEA and PHILRECA gain aggregate visibility. Data-driven policy-making. The first nationwide joint-pole intelligence platform.
Joining NetWatch PH isn't just about catching violators — it's about transforming how your cooperative manages its most valuable physical assets.
Recover millions in unpaid pole rental fees. Automated billing ensures every attachment is accounted for. New revenue stream that directly benefits member-consumers through lower electricity rates.
Every pole gets a dynamic safety score based on load, clearance compliance, inspection recency, and typhoon risk. Color-coded GIS maps let you prioritize the most dangerous poles first. Protect your linemen and communities.
Auto-generate pole attachment revenue reports for NEA financial submissions. Support NEA's digitalization mandate. Become a model cooperative for technology adoption and governance.
Know exactly which poles are overloaded before storm season. Prioritize reinforcement or load reduction. After a typhoon, GIS data accelerates restoration by giving crews a complete, current map of every pole and every attachment.
Document every unauthorized attachment with timestamped GPS evidence and photographs. Generate NTC/SEC complaint packages in minutes. Shift liability where it belongs — to the violators, not the cooperative.
Member-consumers see their cooperative taking action on the spaghetti wire problem. Clean, safe, well-managed poles reflect a well-managed cooperative. Public verification portal lets residents confirm which ISPs are authorized.
We are inviting all 121 electric cooperatives and private distribution utilities across the Philippines to join the NetWatch PH coalition. Together, we protect every pole, every community, every peso. Let's end unauthorized attachments — permanently.
Philippine law is clear: any qualified, NTC-licensed ISP that meets the technical and safety requirements must be given equal opportunity to apply for pole access. Applications must be processed first-come, first-served. Rates must be standardized and published. No cooperative official may skip the queue, create artificial delays, or grant preferential terms to any applicant for any reason. Partnerships between cooperatives and ISPs are not just allowed — they are actively encouraged by NEA and the government's National Broadband Plan. But the moment favoritism, under-the-table payments, or exclusive deals enter the picture, a legitimate partnership becomes a criminal offense.
Unauthorized operators don't always act alone. Across the country, there are cooperative managers, board members, and agency officials who accept money under the table from illegal operators — deliberately delaying legitimate telco applications while fast-tracking favored operators who pay bribes. This is not just unethical. It is a criminal offense punishable by up to 15 years in prison. Philippine law is clear, and NetWatch PH is here to make sure these laws are enforced.
Cooperative managers and officials accept cash payments from illegal or unlicensed telecom operators in exchange for turning a blind eye to unauthorized pole attachments. These operators get unfettered access to cooperative infrastructure while paying nothing in official rental fees. The cooperative loses revenue, member-consumers bear the cost, and the official pockets the bribe.
Officials intentionally slow-walk or bury permit applications from legitimate, NTC-licensed ISPs — creating artificial bottlenecks, requesting unnecessary documents, or simply sitting on paperwork for months. Meanwhile, the operators who pay bribes sail through with zero scrutiny. This red tape isn't bureaucracy — it's weaponized corruption designed to eliminate competition for the favored operator.
Some cooperative officials enter into exclusive, undisclosed agreements with a single ISP — granting sole pole access across the cooperative's entire service area, effectively creating an illegal monopoly. Other qualified applicants are denied access or never even informed that pole attachment is available. This violates NEA Memorandum Circulars that explicitly prohibit exclusive pole access arrangements.
In some cases, cooperative board members or managers have undisclosed ownership stakes in the very ISPs they are granting pole access to. They use their position to advantage their own business while blocking competitors. This is a direct violation of RA 3019 Section 3(h) and is punishable by up to 15 years imprisonment and perpetual disqualification from public office.
Multiple overlapping Republic Acts and criminal statutes ensure there is nowhere to hide. Both the officials who accept bribes and the operators who pay them face severe penalties.
Mandates strict processing timelines: 3 days for simple, 7 days for complex, and 20 days for highly technical transactions. First-in, first-out processing is required by law. Any official who delays, demands unofficial fees, or favors certain applicants commits a criminal offense.
Prohibits receiving gifts in connection with official transactions, giving unwarranted benefits through manifest partiality, having financial interest in transactions under one's authority, and approving permits for unqualified persons. Electric cooperative officials are treated as public officers under this law.
Officials shall not solicit or accept any gift, gratuity, favor, or anything of monetary value from any person in the course of official duties. Requires annual SALN filing — unexplained wealth is a red flag for investigation.
Article 210 (Direct Bribery): Agreeing to perform an official act in exchange for payment. Article 211 (Indirect Bribery): Accepting gifts by reason of office. Article 212: The briber faces the same penalties as the bribed official — illegal operators are equally liable.
Access to essential facilities must be provided on fair, reasonable, and non-discriminatory terms. NTC Memorandum Circulars reinforce that infrastructure sharing and pole access must follow first-come, first-served processing without favoritism.
Standard pole attachment rates must be applied uniformly. Exclusive pole access agreements are prohibited. Cooperatives must process permits fairly and transparently. Officials accepting payments from third parties violate NEA governance rules.
| Law | Offense | Penalty |
|---|---|---|
| RA 3019 Sec. 3(b) | Receiving gifts for official transactions | 6 yrs 1 mo – 15 yrs + perpetual disqualification |
| RA 3019 Sec. 3(e) | Giving unwarranted benefits through partiality | 6 yrs 1 mo – 15 yrs + perpetual disqualification |
| RA 3019 Sec. 3(h) | Hidden financial interest in transactions | 6 yrs 1 mo – 15 yrs + perpetual disqualification |
| RA 11032 Sec. 21 | Acting as fixer / causing delays / favoritism | 1 – 6 yrs + PHP 50K – 2M fine |
| RPC Art. 210 | Direct bribery (accepting payment for official act) | 6 mos 1 day – 12 yrs imprisonment |
| RPC Art. 211 | Indirect bribery (accepting gifts by reason of office) | 2 yrs 4 mos – 6 yrs imprisonment |
| RPC Art. 212 | Corruption of public officials (the briber) | Same penalty as the bribed official |
| RA 6713 Sec. 7(d) | Soliciting/accepting gifts during official duties | Suspension up to 1 yr / removal / fine |
| NEA MC 2019-033 | Violating pole attachment governance rules | Removal + NEA takeover + personal surcharge |
When every transaction is logged, timestamped, and visible, there is no room for under-the-table deals. NetWatch PH doesn't just expose corruption — it makes corruption structurally impossible.
All pole attachment applications go through a single digital portal with automatic first-in, first-out processing. No official can skip the queue or bury an application. Every action is timestamped and logged.
Every approval, denial, and modification is recorded with who did it, when, and why. Immutable logs prevent after-the-fact tampering. NEA and PHILRECA can audit any cooperative at any time through the platform.
If an application exceeds the RA 11032 processing timelines (3/7/20 days), the system automatically escalates to cooperative management, NEA, and the Anti-Red Tape Authority (ARTA). No more silent delays.
A public-facing dashboard shows how many applications each cooperative has received, approved, denied, and how long processing took. Member-consumers, LGUs, and regulators can see performance in real time.
Any cooperative employee, ISP, or member-consumer can anonymously report suspected corruption or favoritism through the platform. Reports are routed to NEA, the Ombudsman, and ARTA with supporting evidence.
Pole attachment rates are set per NEA guidelines and applied uniformly through the platform. No room for “special arrangements” or off-book discounts. Every operator pays the same published rate.
RA 3019 carries a 20-year prescriptive period. RA 11032 empowers ARTA to investigate and prosecute. The Ombudsman has jurisdiction. NetWatch PH creates the digital evidence trail that makes prosecution possible. The era of impunity is ending. Join the right side — or face the full force of the law.
Operators purchase minimal bandwidth (e.g. 2 Gbps) just to appear as paying customers, while bribing insiders at the upstream provider to unlock the full port capacity (e.g. 10 Gbps). They pay for a fraction of what they actually consume. This relies on a syndicate of people working within the upstream providers who manipulate port configurations.
Operators sign contracts or partnerships with upstream providers, then use the upstream provider's name, NTC credentials, and Right-To-Attach (RTA) permits to deploy infrastructure in locations where only the upstream provider has authorization. This allows them to expand illegally under a legitimate provider's identity.
Operators tap into the upstream provider's backhaul infrastructure to facilitate interconnections to their own unauthorized customers. This effectively steals transport capacity to serve subscribers the operator has no license or agreement to serve.
Deploy SNMP v3 polling at 1-minute intervals on all handoff ports. Alert when sustained throughput exceeds the contracted CIR. Compare ifHCInOctets/ifHCOutOctets counters against contracts.
Enable flow export on all edge routers. Analyze for volume exceeding contracted rates, unexpected destination prefixes, and residential subscriber traffic patterns indicating unauthorized onboarding.
Apply strict ingress/egress rate-limiting matching contracted bandwidth. Require dual-authorization for any QoS policy change. Log all changes to a tamper-evident SIEM.
Maintain whitelists of authorized MAC addresses, IP subnets, and BGP prefixes. Enforce with port security, DHCP snooping, and strict BGP prefix filters. Enable RPKI.
Establish 30-day rolling traffic baselines per downstream port. Flag deviations exceeding 15–20% above contracted capacity. Correlate with peak-hour patterns.
Monitor transceiver Rx/Tx power via SNMP (DOM/DDM). Run periodic OTDR tests on backhaul routes to detect physical taps or splice points.
Require unannounced audits, liquidated damages of 3–5x revenue differential, immediate termination for fraud, and mandatory disclosure of all service areas.
Contractually prohibit unauthorized use of your name, NTC permits, SEC registrations, or RTA certificates. Register authorized resellers with regulators.
File formal complaints with the NTC. Request facility inspections and demand suspension of violator registrations for misrepresentation.
Report fraudulent credential use to the SEC. Provide LGUs with verified authorized partner lists to block unauthorized permits.
Require approval from both network operations and commercial teams for any port capacity or VLAN change. All changes need matching signed service orders.
Route all config changes to write-once SIEM. Quarterly access reviews. Immediate credential revocation for transferred or terminated employees.
Anonymous whistleblower channels. Background checks on NOC staff. Rotate field technicians across regions to prevent collusion.
Quarterly inspections of all co-location cages, meet-me rooms, and fiber handoff points. Verify all connections against records.
Smart locks with electronic access logs on all cabinets and splice enclosures. Broken seals trigger immediate investigation.
SEC Cert · NTC COR · DTI/BIR · Rep ID
GeoJSON Map · Municipality List · Barangay Coverage
Pole GPS+Photos · OLT IPs · Switch Inventory · Fiber Routes
NOC 24/7 · Legal · Field Team Lead · Executive Signatory
Catch illegal operators before they steal your subscribers and your pole space.
Every violation documented and complaint-ready instantly.
ISPs + Cooperatives reporting together = unstoppable enforcement.
Charter members shape the platform and its policies.