Welcome!

News Feed Item

Fitch Rates AP WIP Holdings, LLC Notes Maturing 2019 'BBBsf'

Fitch Ratings has assigned the following rating and Rating Outlook to AP WIP Holdings, LLC notes maturing 2019:

--$115,000,000 notes maturing 2019 'BBBsf'; Outlook Stable.

The ratings are based on information provided by the issuer as of Aug. 12, 2014.

The $115 million AP WIP Holdings, LLC loan maturing 2019 is backed by 630 wireless sites with 860 wireless tenant leases. Of the $115 million, $90 million is advanced at closing with an additional $25 million available to purchase eligible additional assets. The transaction is an issuance of notes backed by mortgages representing approximately 96% of the annualized net cash flow, a first priority perfected security interest in the personal property associated with the mortgaged sites, and a perfected security interest in the personal property and fixtures of the asset entities of the non-mortgaged sites. The transaction is structured as interest-only through the anticipated repayment date in 2019.

The ownership interest in the wireless sites consists of lease purchase sites, easements and fee interests in land, rooftops or other structures on which site space is allocated for placement of tower and wireless communication equipment.

KEY RATING DRIVERS

Cash flow and leverage: Fitch's net cash flow (NCF) on the pool is approximately $14.9 million (including prefunding), which is approximately 4.4% below the issuer's NCF, implying a Fitch stressed debt service coverage ratio (DSCR) of 1.37x including all potential future prefunding. Gross potential rents were determined on a tenant-by-tenant basis per Fitch's 'Criteria for Analyzing U.S. Wireless Tower Transactions'. The debt multiple relative to Fitch's NCF for the loan is 7.69x, which equates to a debt yield of 13%.

Leases to Strong Tower Tenants: There are 860 wireless tenant leases. Telephony tenants represent 99.5% of the leases on the cellular sites. AT&T (rated 'A', Outlook Negative by Fitch) and Verizon (rated 'A-') are the largest tenants, representing approximately 21% each of the total issuer cash flow. The tenant leases have average annual escalators of approximately 3.07%.

Reasonable Diversification: There are 630 sites spanning 50 states. The largest state (California) represents approximately 21.6% of issuer cash flow.

Loan secured by mortgages and first-priority security interests: The loan is secured by: perfected first mortgage liens on the interests of the asset entities in fee assets, ground leased assets, and other sites representing approximately 96.9% of the NCF from all such assets; and the equity interests of the issuers and each asset entity, as well as various transaction accounts and agreements. The security interests in the equity of the issuers and the asset entities provide noteholders with the ability to foreclose on the ownership of the issuers and the asset entities in addition to their assets pledged as collateral in the event of default.

Importance of Towers to Wireless Service Providers: Increased smartphone penetration and data usage have increased the need for cell towers. With wireless service providers (WSPs) moving to 4G networks, there is a need for additional towers, since 4G has a smaller range per WSP. The emergence of tablets and other devices adds additional demands for higher speeds and network build-outs.

Risk of Technological Obsolescence: The notes have a rated final payment date 25 years after closing, and the long-term tenor of the notes increases the risk that an alternative technology - rendering obsolete the current transmission of wireless signals through cellular sites - will be developed. Currently, WSPs depend on towers to transmit their signals and continue to invest in this technology.

Additional Notes: It is expected that the transaction will allow for the issuance of additional notes. Such additional notes may rank pari passu with or subordinate to the 2014 notes. The additional notes will be pari passu with and be rated the same as any class of notes bearing the same alphabetical class designation. Additional notes may be issued without the benefit of additional collateral, provided the post-issuance DSCR is not less than 2.0x. As Fitch monitors the transaction, the possibility of upgrades may be limited due to the provision that allows additional notes and cash flow deterioration.

Prefunding: It is expected that on the closing date, approximately 22% of the total rated proceeds can be used by AP to acquire additional cellular sites during the 12-month acquisition period via further advances as allowed under the loan agreement. Prefunding introduces uncertainty as to final collateral characteristics. Fitch accounted for prefunding by stressing the NCF of the prefunding component to reflect the most conservative prefunding pool composition tests. Fitch also performed an originator review including a site inspection to gain comfort with AP's origination practices. Additionally, the calculation agent, Deutsche Bank Trust Company Americas, will be performing certain recalculation of prefunding requirements outlined in the documents.

Structural Features: The transaction features an upfront reserve account with an initial balance of approximately $2.6 million. The reserve account thereafter has a minimum balance of $2.6 million, or six months interest payments, and is replenished. The transaction also features mandatory prepayments if the advances are greater than 7.75x the eligible free cash flow. This allows for the prepayment of the loan if sites become ineligible due to condemnation, concentration or missed payments (among other criteria). Site eligibility is outlined in the transaction documents. The calculation agent monitors the structural triggers on a monthly basis.

RATING SENSITIVITIES

Fitch performed several stress scenarios in which Fitch's NCF was stressed. Fitch determined that a 26.9% reduction in Fitch's NCF would cause the notes to break even at 1.0x DSCR on an interest-only basis.

Fitch evaluated the sensitivity of the ratings and an 11.9% decline in NCF would result in a one-category downgrade to 'BBsf', while a 30.6% decline would result in a downgrade below 'CCCsf'.

Additional information is available at 'www.fitchratings.com'.

Applicable Criteria and Related Research:

--'Global Structured Finance Rating Criteria'(May 24, 2013);

--'Criteria for Analyzing U.S. Wireless Tower Transactions' (Dec. 3, 2013).

Applicable Criteria and Related Research: AP WIP Holdings, LLC maturing 2019

http://www.fitchratings.com/creditdesk/reports/report_frame.cfm?rpt_id=754056

Global Structured Finance Rating Criteria - Effective from 20 May 2014 to 4 August 2014

http://www.fitchratings.com/creditdesk/reports/report_frame.cfm?rpt_id=748821

Criteria for Analyzing U.S. Wireless Tower Transactions

http://www.fitchratings.com/creditdesk/reports/report_frame.cfm?rpt_id=724675

Additional Disclosure

Solicitation Status

http://www.fitchratings.com/gws/en/disclosure/solicitation?pr_id=849794

ALL FITCH CREDIT RATINGS ARE SUBJECT TO CERTAIN LIMITATIONS AND DISCLAIMERS. PLEASE READ THESE LIMITATIONS AND DISCLAIMERS BY FOLLOWING THIS LINK: HTTP://FITCHRATINGS.COM/UNDERSTANDINGCREDITRATINGS. IN ADDITION, RATING DEFINITIONS AND THE TERMS OF USE OF SUCH RATINGS ARE AVAILABLE ON THE AGENCY'S PUBLIC WEBSITE 'WWW.FITCHRATINGS.COM'. PUBLISHED RATINGS, CRITERIA AND METHODOLOGIES ARE AVAILABLE FROM THIS SITE AT ALL TIMES. FITCH'S CODE OF CONDUCT, CONFIDENTIALITY, CONFLICTS OF INTEREST, AFFILIATE FIREWALL, COMPLIANCE AND OTHER RELEVANT POLICIES AND PROCEDURES ARE ALSO AVAILABLE FROM THE 'CODE OF CONDUCT' SECTION OF THIS SITE. FITCH MAY HAVE PROVIDED ANOTHER PERMISSIBLE SERVICE TO THE RATED ENTITY OR ITS RELATED THIRD PARTIES. DETAILS OF THIS SERVICE FOR RATINGS FOR WHICH THE LEAD ANALYST IS BASED IN AN EU-REGISTERED ENTITY CAN BE FOUND ON THE ENTITY SUMMARY PAGE FOR THIS ISSUER ON THE FITCH WEBSITE.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...