Free report: Straithead Industry Vision Report 2026 — AI: The New Essential Infrastructure

Download free

Telecom and Sovereignty

Telco Platforms · Strategic Analysis

Telecom
Sovereignty
Measured.

What it actually means to own your network. How to measure what you have. The trade-offs no vendor will quantify for you — and a clear framework for where to invest, what to defer, and what to deprioritise entirely.

Straithead Analysis March 2026 16 min read Telco Platforms
€1.09TEU digital comms
value 2024
35%Draghi telecom recs
on track to delivery
$320BGlobal telecom
CAPEX 2026
4%Operators at Level 4
autonomous networks
01 ——

What Telecom Sovereignty Actually Means

And why every definition you’ve heard is probably incomplete

At Mobile World Congress in March 2026, “sovereignty” was the most used strategic term on the conference floor. Strikingly, it was also the least consistently defined. Vendors meant vendor diversity. Governments, meanwhile, meant data residency. Operators meant operational independence, while regulators focused on compliance. All of them were right — yet none was describing the full picture.

Working Definition Telecom sovereignty is the measurable degree to which a nation, operator, or organisation retains meaningful control over the physical infrastructure, software stack, data flows, governance standards, and supply chains that constitute its communications capability — across normal operations, geopolitical stress, and adversarial conditions. The key word is measurable. Consequently, sovereignty without metrics is merely a political aspiration. This analysis treats it as a set of quantifiable dimensions across four interconnected pillars. Click the cards below to explore each.

Three Clarifications That Matter

Three clarifications matter before we go further. First, sovereignty is not the same as autarky — no country or operator can or should aim to build and operate everything domestically. The goal is strategic control at critical decision points — not self-sufficiency across the board. Furthermore, sovereignty is not binary. It exists on a spectrum, and the relevant question is always “sovereign enough for what?” Finally, sovereignty and resilience are related but distinct. On the one hand, a resilient network can recover from failure. On the other hand, a sovereign network controls whether failure is possible in the first place.

The Core Distinction

Resilience is about bouncing back. Sovereignty, however, is about not being pushed. Both matter — yet they require different investments, different governance, and different strategic postures.

Why Scale Makes This a Systemic Issue

This distinction collapses in practice for most European operators. Indeed, Europe’s telecom sector reached a value of €1.09 trillion in 2024 — equivalent to 5% of GDP — underpinning industry, banking, commerce, healthcare, education, and defence. The scale of the dependency makes sovereignty a systemic issue, not merely a regulatory one. The question is no longer whether Europe has technological capacity, but whether it has a coherent regulatory framework to transform that capacity into competitive advantage.

◆ ◆ ◆
02 ——

How to Measure It: The Four-Pillar Framework

Sovereignty becomes real when it changes procurement decisions — not when it stays a policy slogan

The Four Measurable Dimensions

France is already moving toward tools that map and quantify reliance on non-European services — an observatory plus resilience-style scoring. Importantly, this is the right instinct. Here is the framework Straithead uses to assess telecom sovereignty across four measurable dimensions. Click each pillar to see the indicators and what a strong score requires.

🏗️ 0 Infrastructure Control

Who owns the physical layer — towers, fibre, subsea cables, data centres — and under what jurisdictional conditions?

Why Infrastructure Control Comes First

Infrastructure control is the most foundational pillar. An operator that does not control its physical infrastructure has limited ability to enforce any other sovereignty measure. Key factors include ownership of passive infrastructure, backhaul independence, and the legal regime governing foreign ownership.

  • % domestic ownership of passive infra Target: >70%
  • Backhaul route diversity score Target: 3+ paths
  • Data centre jurisdiction risk Target: Low
  • Subsea cable landing independence Target: Sovereign control
🧠 0 Software & AI Stack

How much of the software layer — OSS/BSS, RAN software, AI/ML models, cloud infrastructure — is under domestic or controllable governance?

The Software Layer: The Fastest-Moving Risk

This is the most rapidly shifting pillar. Most European telcos today rely on hyperscalers for cloud and AI, creating architectural lock-in through proprietary APIs, economic lock-in through usage-based pricing, and AI model lock-in as AI capabilities become embedded in network operations. The softwarisation of networks means software sovereignty is now as critical as physical sovereignty.

  • % cloud workloads on EU-governed infra Target: >60% critical
  • AI model governance (data residency) Target: Documented
  • Open source vs proprietary RAN ratio Target: >40% open
  • Vendor concentration index Target: <3 critical vendors
⛓️ 0 Supply Chain Resilience

Can equipment sourcing, maintenance, and upgrade cycles continue under geopolitical stress, export controls, or vendor withdrawal?

Supply Chain: Direct CAPEX Consequences

PwC estimates that annual US tariff measures affecting TMT supply chains could rise from around $76 billion to nearly $697 billion — raising hardware costs, elongating lead times, and complicating capital planning. Supply chain sovereignty is therefore not a geopolitical abstraction. It has direct, measurable CAPEX implications for every operator today.

  • RAN vendor diversity score Target: 2+ vendors
  • Critical component lead time risk Target: <90 days buffer
  • % equipment from high-risk vendors Target: <10% core
  • Domestic semiconductor exposure Target: Mapped
⚖️ 0 Governance & Standards

Does the operator and its jurisdiction actively shape telecom standards, security rules, and governance frameworks — or consume decisions made elsewhere?

Governance: The Most Overlooked Pillar

Governance sovereignty is the most overlooked pillar. Countries and operators that participate actively in 3GPP, ITU-R, and CNCF shape the rules under which their infrastructure operates. Those that do not adopt standards defined by others — often reflecting the interests of the most active contributors. In 6G, this dynamic is already in motion.

  • 3GPP / ITU-R participation level Target: Active contributor
  • NIS2 / KRITIS compliance status Target: Full compliance
  • Security incident transparency score Target: Disclosed
  • Board-level security accountability Target: Mandated
← Click any pillar to reveal measurement indicators and benchmarks
◆ ◆ ◆
03 ——

The Four Trade-offs No Vendor Will Quantify

Sovereignty is not free. Understanding the tensions is the first step to managing them intelligently.

Why the Tensions Are Unavoidable

The political framing of telecom sovereignty tends to present it as an unalloyed good — secure infrastructure is better, more control is better, less foreign dependency is better. In practice, however, every sovereignty measure involves a real trade-off against at least one other strategic priority. The organisations that navigate this best are those that name the tensions explicitly and make deliberate choices, rather than defaulting to whichever value is most politically convenient at the time.

Trade-off Tension Analysis Select a tension to explore
Physical Infra Ownership
High
Owning infrastructure strongly boosts resilience — you control repair timelines, access, and redundancy design. But ownership concentrates risk too: a sovereign network that has only one domestic vendor is less resilient than a diverse multi-vendor network, even with some foreign components.
Vendor Concentration
Risk
Pursuing sovereignty by consolidating to a single trusted domestic vendor trades geopolitical risk for vendor concentration risk. The lesson from Europe’s 5G experience: sovereign intent without diverse supply chains creates a different type of fragility.
Data Localisation
Mixed
In practice, strict data localisation requirements can reduce geographic redundancy and make cross-border disaster recovery architectures legally complex. Sovereignty and resilience pull in different directions here — the optimal answer is jurisdiction-aware architecture design, not blanket localisation.
Open RAN Premium
+20-35%
Open RAN currently carries a 20–35% total cost of ownership premium over integrated RAN at scale, primarily driven by integration complexity and performance optimisation overhead. However, this gap is narrowing — and the sovereignty dividend takes 5–7 years to materialise as a cost advantage through vendor competition.
Sovereign Cloud Premium
+15-40%
Sovereignty should be evaluated not as a cost premium but as risk-adjusted total cost of ownership over a 10–15 year horizon. The upfront cost differential is real. The comparison point, however, is not the current hyperscaler price — it is the cost of a major incident, a hostile vendor withdrawal, or a regulatory sanction under NIS2 personal liability provisions.
Rip-and-Replace
Very High
Removing high-risk vendors from existing networks is extraordinarily expensive. For example, UK operators face estimated costs of £2.5–3bn to remove Huawei equipment by 2027. Therefore, this is the most compelling case for front-loading sovereignty decisions: the cost of correction is an order of magnitude greater than the cost of prevention.
Hyperscaler AI Access
Major
The most advanced AI capabilities — large language models, real-time inference, network optimisation ML — are currently concentrated in US and Chinese hyperscalers. Consequently, IDC notes that 52% of telco C-suite leaders have AI as a top-three priority, while 50% simultaneously have technology modernisation — creating direct competition for finite capital. Restricting hyperscaler access in pursuit of sovereignty forfeits near-term AI capability.
Ecosystem Fragmentation
Significant
Sovereignty-driven procurement restrictions create smaller, fragmented markets that reduce the commercial incentive for vendors to innovate for European requirements. Nevertheless, the solution — collective purchasing coordination across European operators — is available, though it requires competitive tensions to be suspended. This is politically difficult but economically necessary.
6G Standards Race
Opportunity
6G is the exception where sovereignty and innovation align. Active participation in 3GPP and ITU-R standards development — funded by domestic R&D investment — is both a sovereignty strategy and an innovation strategy simultaneously. Consequently, the countries that shape 6G standards will have a structural competitive advantage for a decade.
Procurement Lead Times
2-3× longer
Sovereign procurement processes — security assessments, supply chain audits, domestic sourcing requirements — typically extend procurement cycles by a factor of two to three versus standard commercial procurement. In fast-moving network upgrade cycles, this speed differential has direct operational and competitive consequences.
Regulatory Compliance Speed
Variable
NIS2 compliance timelines vary significantly by member state. Operators with cross-border operations must manage multiple, sometimes conflicting regulatory timelines simultaneously. The absence of a harmonised EU implementation pace creates a competitive distortion — operators in faster-implementing states face cost disadvantages relative to peers in slower ones.
“The question is no longer whether to pursue sovereignty, but where sovereignty is essential, where managed interdependence is acceptable, and how to retain strategic control while remaining globally competitive.”
Netaxis Solutions — Cloud Dependence to Strategic Control, January 2026
◆ ◆ ◆
04 ——

Policy Gaps & Conflicts Shaping the Landscape

Where the regulatory framework actively contradicts itself — and what that means for operators trying to comply

The Seven Active Contradictions

Only 35% of Draghi’s telecom recommendations have a realistic path to delivery, with security and technological sovereignty emerging as the only pillars with consistent political momentum. This is the regulatory reality operators are navigating: a framework with urgent ambitions, fragmented implementation, and multiple internal contradictions. The seven gaps below are not future risks — they are live conflicts shaping procurement, architecture, and investment decisions today.

35%Draghi telecom recs
on delivery path
63%EU 5G SA population
coverage vs 93% China
€50BEU spectrum licence
costs since 2020

Europe demands sovereignty — which requires scale and investment — yet simultaneously it blocks the operator mergers that would create the scale to achieve it. As a result, individual operators acting alone have limited leverage. The European telco sector collectively represents one of the largest sources of demand for cloud, AI, and edge infrastructure.

The Unresolved Investment Paradox

The EU’s Digital Networks Act is supposed to address this. But the Connect Europe report notes that the tension between competition policy and investment policy remains the defining unresolved conflict in European telecom regulation. On one hand, without consolidation, sovereignty ambitions are underfunded. On the other hand, with consolidation, competition policy is compromised. No current proposal resolves this cleanly.

NIS2: Personal Liability Is Now Live

NIS2 establishes CEO personal liability for security failures — a genuinely significant regulatory shift. Nevertheless, But transposition and enforcement vary dramatically across EU member states. Operators with cross-border operations face a patchwork of timelines, interpretations, and enforcement vigour that creates a compliance lottery.

Significantly, the competitive distortion is real: operators in jurisdictions with slower or more lenient NIS2 implementation face lower short-term costs, creating a race-to-the-bottom incentive that undermines the directive’s intent. However, the European Commission has flagged this but has no fast mechanism to enforce harmonised implementation timelines.

LEO Satellites: The Data Jurisdiction Vacuum

Between 15,000 and 18,000 LEO satellites will be connecting over 15 million global subscribers by end of 2026, including around 1,000 Direct-to-Device satellites. Notably, this expansion is occurring faster than the regulatory framework can keep pace with.

Crucially, data transiting a US-incorporated satellite operator is potentially subject to US legal process regardless of its origin. The EU has no consolidated response. Furthermore, operators integrating satellite into their service portfolios — as T-Mobile, Orange, and Telefónica are all doing — are making de facto sovereignty decisions without a clear regulatory framework to guide them. As a result, this gap will produce a significant enforcement conflict within 24–36 months.

Big Tech’s Unresolved Debt to Network Operators

Mega-content deals — Netflix’s roughly $72 billion offer for Warner Bros. Discovery and Paramount Skydance’s $108.4 billion hostile bid — underscore how enormous content platforms pay vast sums for exclusive property rights while still refusing to compensate downstream broadband providers for network usage.

The network cost recovery debate sits at the intersection of sovereignty and investment capacity. Moreover, if Big Tech continues to extract value from telecom infrastructure without contributing to its maintenance and upgrade costs, the capital available for sovereign network investment is structurally reduced. The EU’s proposed “fair share” contribution framework remains contested — and unresolved.

Worryingly, Europe covers 63% of its population with 5G Standalone — the form of 5G capable of supporting network slicing, private networks, and defence connectivity — compared to 93% in China, 81% in the US, and 75% in Japan.

Indeed, 5G SA is the technological prerequisite for almost every sovereign use case that European governments want to build: emergency communications slices, defence network integration, critical infrastructure isolation, and private enterprise networks. The coverage gap is a sovereignty gap — and it has accumulated despite enormous spectrum auction costs paid by European operators, totalling over €50 billion since 2020.

In 2024, NIST published its first post-quantum cryptographic standards. Subsequently, several national authorities — including ANSSI in France and BSI in Germany — have begun publishing migration guidance. But the gap between mandated timelines and operational readiness is substantial for most telecom operators.

In principle, transitioning infrastructure, networks, and devices to quantum-safe encryption is achievable — but requires thorough reviews of systems. Nevertheless, most operators have not yet conducted those reviews. The “harvest now, decrypt later” threat — state actors collecting encrypted data today to decrypt when quantum computing matures — means the window for action is shorter than most compliance timelines suggest.

Surprisingly, TM Forum data shows only 4% of operators self-reported achieving Level 4 autonomous network status, yet 85% aspire to reach that level by 2030. As AI takes an increasing role in network management — traffic routing, anomaly detection, resource allocation — the governance question becomes urgent: who is accountable when an AI-managed network makes a consequential decision?

Currently, no regulatory framework provides a clear answer. The EU AI Act, for instance, has limited applicability to telecom network operations. Furthermore, NIS2 focuses on security outcomes — not the governance of the AI systems producing those outcomes. As a result, this is a genuine gap — and as agentic AI is adopted by operators through 2026–2027, it will produce the first major incidents where responsibility cannot be clearly attributed.

◆ ◆ ◆
05 ——

Real-World Cases: What Sovereignty Looks Like in Practice

From sovereign AI clusters to defence network slices — the cases that define what is actually achievable

Six Cases That Define What Is Achievable

Nations increasingly want to own, operate, or meaningfully influence critical components of the digital stack that underpin economic stability and national security — including connectivity infrastructure, data platforms, cloud environments, and, increasingly, AI capabilities. The cases below show what this looks like when it moves from aspiration to architecture.

🇫🇮 Finland — Defence Nokia & Telia: First cross-border 5G SA handover for Finnish Defence Forces

Specifically, Nokia and Telia trialled a 5G Standalone slice handover between multiple NATO countries for the Finnish Defence Forces — the first operational demonstration of sovereign military network slicing at scale. Finland’s position bordering Russia made this a live operational requirement, not a proof of concept.

In technical terms, the achievement is the ability to maintain encrypted, low-latency comms for military units crossing national borders without dropping to a foreign commercial network. This is the model for NATO’s broader network sovereignty architecture.

Operational · Replicable architecture · NATO template
🇫🇷 France — Sovereign Cloud NumSpot: The first sovereign cloud platform purpose-built for sensitive public sector workloads

Notably, NumSpot — backed by Docaposte, La Poste, Banque des Territoires, Dassault Systèmes, and Bouygues Telecom — launched commercially in Q1 2025 as a sovereign cloud platform governed entirely under French law. It targets the segment hyperscalers cannot serve: classified, health, and government workloads requiring absolute data sovereignty.

Notably, the model is instructive: telecom operators (Bouygues) as anchor investors in sovereign cloud infrastructure creates a structural link between network sovereignty and compute sovereignty — the combination that makes AI sovereignty possible.

Live · B2G focus · Replicable model for other EU states
🇸🇦 Saudi Arabia — Sovereign AI HUMAIN and Stargate UAE: Building sovereign AI compute at nation-state scale

The Public Investment Fund of Saudi Arabia established HUMAIN in 2025, with a mandate to develop end-to-end AI infrastructure in partnership with AWS and NVIDIA. The adjacent Stargate UAE initiative represents a 1 gigawatt AI compute cluster — among the largest single sovereign AI infrastructure commitments globally.

Moreover, Deloitte predicts that over $100 billion will be committed to building sovereign AI compute in 2026, with the share of AI compute managed outside the US and China likely to double from its current 10% of global capacity by 2030. Clearly, the Middle East is leading this shift.

Investment committed · Telecom + AI stack integration
🇨🇦 Canada — Operator-Led TELUS, Bell, SaskTel: Domestic operators as anchors of sovereign AI data centre strategy

Canada’s sovereign AI compute strategy places domestic telecom operators — TELUS, Bell, and SaskTel — as the primary infrastructure anchors for sovereign AI data centres. Specifically, this is a deliberate model choice: using established, regulated, domestically accountable operators rather than hyperscalers to host sensitive AI workloads.

As a result, the model addresses the sovereignty gap at the compute layer by leveraging existing telecom trust relationships, physical presence, and regulatory accountability. Indeed, it is a template other mid-sized nations with established domestic telecom sectors should study carefully.

Policy framework active · Operator-as-sovereign-infra model
🇬🇧 United Kingdom — Rip & Replace Huawei removal: The most expensive sovereignty lesson in telecom history

Specifically, the UK’s 2021 Telecoms Security Act mandated removal of Huawei equipment from the core network by January 2023 and from the access network by January 2027. Estimated total cost across BT, Virgin Media O2, and Vodafone: £2.5–3 billion. Remarkably, this is a measure that could have been avoided by front-loading vendor diversity requirements at the time of 4G procurement a decade earlier.

Consequently, this is the clearest real-world demonstration of the cost differential between prevention and correction — and the most powerful argument for building sovereignty considerations into architecture decisions before procurement, not after.

In progress · £2.5–3B cost · The prevention/correction benchmark
🇪🇺 European Union — Orange Orange creates dedicated defence & homeland security division

Significantly, Orange has established a dedicated division for defence and homeland security, focusing on communication network resilience for both civilian and military applications — alongside cybersecurity. This follows Nokia advancing its defence offering with a new mission-safe rugged smartphone purpose-built for battlefield use.

As a result, the emergence of operator-led defence divisions signals a structural shift: telecom companies are no longer passive infrastructure suppliers to defence. Instead, they are active architects of sovereign communications capability — and that repositions them as strategic national assets rather than regulated utilities.

Structural shift · Operator as sovereign defence partner
◆ ◆ ◆
ANALYTICAL NOTE — The framework and observations in this section represent analytical considerations drawn from third-party research and publicly available data. They do not constitute investment advice, financial recommendations, or guidance on specific commercial decisions. Readers should conduct independent analysis appropriate to their specific circumstances.
06 ——

What the Evidence Suggests: Priorities, Trade-offs & Open Questions

An analytical reading of where the strategic weight appears to fall — and where the evidence is still developing

A Four-Quadrant Decision Matrix

Above all, the most useful output of any sovereignty analysis is not a list of threats — it is a decision framework. MWC 2026 made clear that winners will be those that scale beyond pilots to execution, prioritising initiatives that deliver real value while building resilience and trust. Therefore, the matrix below applies this logic across four quadrants: act now, build towards, manage carefully, and deprioritise.

Highest Apparent Urgency — Active risks, established regulatory obligations Where Evidence Points Strongest
  • NIS2 board-level accountability structure — CEO liability obligations are already active in transposed member states
  • Supply chain mapping — understanding vendor jurisdiction and exit conditions appears analytically critical given current tariff trajectories
  • High-risk vendor exposure in core networks — the UK’s £2.5–3B correction cost suggests early action is significantly less costly than remediation
  • Post-quantum cryptography readiness — the “harvest now, decrypt later” window is analytically considered open, with NIST standards now published
  • 5G SA coverage — evidence suggests it is the technical prerequisite for the sovereign use cases governments are prioritising
  • Signalling security (SS7/Diameter) — documented active exploits make this an operational risk rather than a theoretical one
Medium-Term Strategic Weight — Developing case, 18–36 month horizon Where Analytical Momentum Is Building
  • Open RAN — the vendor diversity case appears analytically sound; most assessments place the cost-parity crossover at 2028–2030
  • Sovereign cloud for critical workloads — the sensitivity-tiered approach appears to offer the most evidence-supported path given current cost differentials
  • 6G standards participation — evidence from 5G suggests that governance sovereignty correlates strongly with active standards contribution, not passive adoption
  • Private network capability for defence and critical infrastructure — emerging as both a sovereignty anchor and a distinct revenue segment in multiple jurisdictions
  • Domestic AI inference capability — ceding the network intelligence layer to hyperscalers appears analytically inconsistent with broader sovereignty objectives
  • Cross-operator procurement coordination — collective leverage appears to be the primary mechanism by which smaller operators can access competitive sovereign vendor pricing
Manageable Interdependence — Risk present but governance can address it Where Governance Appears Sufficient
  • Hyperscaler cloud for non-critical workloads — contractual sovereignty protections appear to offer adequate governance for workloads below sensitivity thresholds
  • LEO satellite integration — the data governance framework appears to be the analytically critical variable; without it, jurisdiction risk is unquantified
  • US-origin AI platforms — dependency documentation and contractual exit conditions appear to be the minimum governance threshold for analytical acceptability
  • International RAN vendors (non-banned) — diversity management rather than exclusion appears to offer a more analytically balanced sovereignty/resilience outcome
  • Cross-border data flows — GDPR-compliant transfers with residency protections appear sufficient for most commercial workloads under current regulatory interpretation
Weaker Evidence Base — Lower apparent strategic return on sovereignty grounds Where the Case Appears Weakest
  • Full network autarky — no jurisdiction appears to have the domestic industrial base to make this analytically viable; the evidence suggests it would reduce resilience rather than increase it
  • Sovereign consumer application layer — the analytical case appears weak; the infrastructure layer is where sovereignty evidence is concentrated
  • Premature autonomous network mandates — evidence suggests data governance gaps make early mandates analytically premature in most jurisdictions
  • Bespoke national standards that fragment interoperability — the analytical consensus suggests fragmentation costs exceed sovereignty benefits in most modelled scenarios
  • Duplicating hyperscaler commodity infrastructure — the evidence suggests governance differentiation offers a more viable competitive position than attempting to match scale
Analytical framework based on Straithead’s reading of IDC, Bain, Netaxis, PwC, and Connect Europe research — March 2026. This represents analytical observations only and does not constitute investment advice or recommendations.
The Sequencing Principle

Importantly, sovereignty investments compound. First, getting supply chain diversity right makes Open RAN viable. Subsequently, Open RAN makes 6G standards participation meaningful. Finally, 6G standards participation makes the next generation of sovereign AI infrastructure possible. The organisations that sequence these correctly will have structural advantages that are very difficult to close later.

Balancing Sovereignty With Scale

As a result, the analytical evidence suggests telcos are positioned to serve as trusted providers of digital infrastructure — through network API exposure and locally governed cloud and edge platforms. However, sovereign clouds must still be agile, programmable, and cost-efficient. The tension between sovereignty and scale appears to be the defining operational question of 2026 — not yet resolved in any jurisdiction.

Straithead Assessment — March 2026

Telecom sovereignty is not a destination. It is a continuously calibrated position — maintained through deliberate choices, measurable metrics, and sequenced investment.

Ultimately, the organisations that will navigate the next decade best are not those with the most ambitious sovereignty declarations. They are those with the most honest sovereignty audits: a clear-eyed map of every dependency, every jurisdiction, every exit condition — and a sequenced plan to reduce strategic exposure at the points that matter most.


For operators: In summary, the investment framework is clear. The evidence points toward supply chain risk, signalling security, and NIS2 accountability as the areas of highest current analytical urgency. Open RAN, sovereign cloud, and 6G standards participation appear to have a medium-term evidence case. Managed interdependence appears analytically defensible where sovereignty costs clearly exceed resilience benefits.


For governments: The regulatory contradictions are real and urgent. On one hand, you cannot mandate sovereignty and block the consolidation that funds it. Furthermore, you cannot demand data residency without defining satellite data jurisdiction. Similarly, you cannot enforce NIS2 without harmonising its implementation. In short, these are not technical problems — they are political choices that have been deferred too long.


For enterprise decision-makers: The analytical evidence suggests that connectivity decisions increasingly carry sovereignty implications — particularly for sensitive data flows, cross-border operations, and regulated industries. Dependency mapping, governance frameworks, and contractual clarity around data jurisdiction appear to be the areas where analytical due diligence is most evidently underdeveloped.

Sources & References — March 2026
  • IDC — From Connectivity to Intelligence: Telcos at the Crossroads, MWC Barcelona, March 2026
  • Bain & Company — MWC 2026: Telecoms at the Inflection Point
  • Telefónica / Connect Europe — State of Digital Communications 2026
  • TBR — Agentic AI, Sovereignty & Resiliency at Mobile World Congress 2026
  • Netaxis Solutions — Cloud Dependence to Strategic Control, January 2026
  • PwC — Global Telecom Outlook 2025–2029
  • Deloitte — Technology Sovereignty: A New Era of Self-Reliance, November 2025
  • Strand Consult — 25th Anniversary Global Mobile Telecom Review & 2026 Predictions
  • Confrontations Europe — Telecom Sector: The Digital Network Act Must Be a Game Changer
  • Tietoevry — Key Telecom Trends 2026: AI, Edge, and Sovereign Cloud
  • Orange — Building Telecommunications Resilience Through Transformation, January 2026
  • CircleID — Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism

1 thought on “Telecom and Sovereignty”

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top