Telecom
Sovereignty
Measured.
What it actually means to own your network. How to measure what you have. The trade-offs no vendor will quantify for you — and a clear framework for where to invest, what to defer, and what to deprioritise entirely.
What Telecom Sovereignty Actually Means
At Mobile World Congress in March 2026, “sovereignty” was the most used strategic term on the conference floor. Strikingly, it was also the least consistently defined. Vendors meant vendor diversity. Governments, meanwhile, meant data residency. Operators meant operational independence, while regulators focused on compliance. All of them were right — yet none was describing the full picture.
Three Clarifications That Matter
Three clarifications matter before we go further. First, sovereignty is not the same as autarky — no country or operator can or should aim to build and operate everything domestically. The goal is strategic control at critical decision points — not self-sufficiency across the board. Furthermore, sovereignty is not binary. It exists on a spectrum, and the relevant question is always “sovereign enough for what?” Finally, sovereignty and resilience are related but distinct. On the one hand, a resilient network can recover from failure. On the other hand, a sovereign network controls whether failure is possible in the first place.
Resilience is about bouncing back. Sovereignty, however, is about not being pushed. Both matter — yet they require different investments, different governance, and different strategic postures.
Why Scale Makes This a Systemic Issue
This distinction collapses in practice for most European operators. Indeed, Europe’s telecom sector reached a value of €1.09 trillion in 2024 — equivalent to 5% of GDP — underpinning industry, banking, commerce, healthcare, education, and defence. The scale of the dependency makes sovereignty a systemic issue, not merely a regulatory one. The question is no longer whether Europe has technological capacity, but whether it has a coherent regulatory framework to transform that capacity into competitive advantage.
How to Measure It: The Four-Pillar Framework
The Four Measurable Dimensions
France is already moving toward tools that map and quantify reliance on non-European services — an observatory plus resilience-style scoring. Importantly, this is the right instinct. Here is the framework Straithead uses to assess telecom sovereignty across four measurable dimensions. Click each pillar to see the indicators and what a strong score requires.
Who owns the physical layer — towers, fibre, subsea cables, data centres — and under what jurisdictional conditions?
Why Infrastructure Control Comes First
Infrastructure control is the most foundational pillar. An operator that does not control its physical infrastructure has limited ability to enforce any other sovereignty measure. Key factors include ownership of passive infrastructure, backhaul independence, and the legal regime governing foreign ownership.
- % domestic ownership of passive infra Target: >70%
- Backhaul route diversity score Target: 3+ paths
- Data centre jurisdiction risk Target: Low
- Subsea cable landing independence Target: Sovereign control
How much of the software layer — OSS/BSS, RAN software, AI/ML models, cloud infrastructure — is under domestic or controllable governance?
The Software Layer: The Fastest-Moving Risk
This is the most rapidly shifting pillar. Most European telcos today rely on hyperscalers for cloud and AI, creating architectural lock-in through proprietary APIs, economic lock-in through usage-based pricing, and AI model lock-in as AI capabilities become embedded in network operations. The softwarisation of networks means software sovereignty is now as critical as physical sovereignty.
- % cloud workloads on EU-governed infra Target: >60% critical
- AI model governance (data residency) Target: Documented
- Open source vs proprietary RAN ratio Target: >40% open
- Vendor concentration index Target: <3 critical vendors
Can equipment sourcing, maintenance, and upgrade cycles continue under geopolitical stress, export controls, or vendor withdrawal?
Supply Chain: Direct CAPEX Consequences
PwC estimates that annual US tariff measures affecting TMT supply chains could rise from around $76 billion to nearly $697 billion — raising hardware costs, elongating lead times, and complicating capital planning. Supply chain sovereignty is therefore not a geopolitical abstraction. It has direct, measurable CAPEX implications for every operator today.
- RAN vendor diversity score Target: 2+ vendors
- Critical component lead time risk Target: <90 days buffer
- % equipment from high-risk vendors Target: <10% core
- Domestic semiconductor exposure Target: Mapped
Does the operator and its jurisdiction actively shape telecom standards, security rules, and governance frameworks — or consume decisions made elsewhere?
Governance: The Most Overlooked Pillar
Governance sovereignty is the most overlooked pillar. Countries and operators that participate actively in 3GPP, ITU-R, and CNCF shape the rules under which their infrastructure operates. Those that do not adopt standards defined by others — often reflecting the interests of the most active contributors. In 6G, this dynamic is already in motion.
- 3GPP / ITU-R participation level Target: Active contributor
- NIS2 / KRITIS compliance status Target: Full compliance
- Security incident transparency score Target: Disclosed
- Board-level security accountability Target: Mandated
The Four Trade-offs No Vendor Will Quantify
Why the Tensions Are Unavoidable
The political framing of telecom sovereignty tends to present it as an unalloyed good — secure infrastructure is better, more control is better, less foreign dependency is better. In practice, however, every sovereignty measure involves a real trade-off against at least one other strategic priority. The organisations that navigate this best are those that name the tensions explicitly and make deliberate choices, rather than defaulting to whichever value is most politically convenient at the time.
“The question is no longer whether to pursue sovereignty, but where sovereignty is essential, where managed interdependence is acceptable, and how to retain strategic control while remaining globally competitive.”Netaxis Solutions — Cloud Dependence to Strategic Control, January 2026
Policy Gaps & Conflicts Shaping the Landscape
The Seven Active Contradictions
Only 35% of Draghi’s telecom recommendations have a realistic path to delivery, with security and technological sovereignty emerging as the only pillars with consistent political momentum. This is the regulatory reality operators are navigating: a framework with urgent ambitions, fragmented implementation, and multiple internal contradictions. The seven gaps below are not future risks — they are live conflicts shaping procurement, architecture, and investment decisions today.
on delivery path
coverage vs 93% China
costs since 2020
Europe demands sovereignty — which requires scale and investment — yet simultaneously it blocks the operator mergers that would create the scale to achieve it. As a result, individual operators acting alone have limited leverage. The European telco sector collectively represents one of the largest sources of demand for cloud, AI, and edge infrastructure.
The Unresolved Investment Paradox
The EU’s Digital Networks Act is supposed to address this. But the Connect Europe report notes that the tension between competition policy and investment policy remains the defining unresolved conflict in European telecom regulation. On one hand, without consolidation, sovereignty ambitions are underfunded. On the other hand, with consolidation, competition policy is compromised. No current proposal resolves this cleanly.
NIS2: Personal Liability Is Now Live
NIS2 establishes CEO personal liability for security failures — a genuinely significant regulatory shift. Nevertheless, But transposition and enforcement vary dramatically across EU member states. Operators with cross-border operations face a patchwork of timelines, interpretations, and enforcement vigour that creates a compliance lottery.
Significantly, the competitive distortion is real: operators in jurisdictions with slower or more lenient NIS2 implementation face lower short-term costs, creating a race-to-the-bottom incentive that undermines the directive’s intent. However, the European Commission has flagged this but has no fast mechanism to enforce harmonised implementation timelines.
LEO Satellites: The Data Jurisdiction Vacuum
Between 15,000 and 18,000 LEO satellites will be connecting over 15 million global subscribers by end of 2026, including around 1,000 Direct-to-Device satellites. Notably, this expansion is occurring faster than the regulatory framework can keep pace with.
Crucially, data transiting a US-incorporated satellite operator is potentially subject to US legal process regardless of its origin. The EU has no consolidated response. Furthermore, operators integrating satellite into their service portfolios — as T-Mobile, Orange, and Telefónica are all doing — are making de facto sovereignty decisions without a clear regulatory framework to guide them. As a result, this gap will produce a significant enforcement conflict within 24–36 months.
Big Tech’s Unresolved Debt to Network Operators
Mega-content deals — Netflix’s roughly $72 billion offer for Warner Bros. Discovery and Paramount Skydance’s $108.4 billion hostile bid — underscore how enormous content platforms pay vast sums for exclusive property rights while still refusing to compensate downstream broadband providers for network usage.
The network cost recovery debate sits at the intersection of sovereignty and investment capacity. Moreover, if Big Tech continues to extract value from telecom infrastructure without contributing to its maintenance and upgrade costs, the capital available for sovereign network investment is structurally reduced. The EU’s proposed “fair share” contribution framework remains contested — and unresolved.
Worryingly, Europe covers 63% of its population with 5G Standalone — the form of 5G capable of supporting network slicing, private networks, and defence connectivity — compared to 93% in China, 81% in the US, and 75% in Japan.
Indeed, 5G SA is the technological prerequisite for almost every sovereign use case that European governments want to build: emergency communications slices, defence network integration, critical infrastructure isolation, and private enterprise networks. The coverage gap is a sovereignty gap — and it has accumulated despite enormous spectrum auction costs paid by European operators, totalling over €50 billion since 2020.
In 2024, NIST published its first post-quantum cryptographic standards. Subsequently, several national authorities — including ANSSI in France and BSI in Germany — have begun publishing migration guidance. But the gap between mandated timelines and operational readiness is substantial for most telecom operators.
In principle, transitioning infrastructure, networks, and devices to quantum-safe encryption is achievable — but requires thorough reviews of systems. Nevertheless, most operators have not yet conducted those reviews. The “harvest now, decrypt later” threat — state actors collecting encrypted data today to decrypt when quantum computing matures — means the window for action is shorter than most compliance timelines suggest.
Surprisingly, TM Forum data shows only 4% of operators self-reported achieving Level 4 autonomous network status, yet 85% aspire to reach that level by 2030. As AI takes an increasing role in network management — traffic routing, anomaly detection, resource allocation — the governance question becomes urgent: who is accountable when an AI-managed network makes a consequential decision?
Currently, no regulatory framework provides a clear answer. The EU AI Act, for instance, has limited applicability to telecom network operations. Furthermore, NIS2 focuses on security outcomes — not the governance of the AI systems producing those outcomes. As a result, this is a genuine gap — and as agentic AI is adopted by operators through 2026–2027, it will produce the first major incidents where responsibility cannot be clearly attributed.
Real-World Cases: What Sovereignty Looks Like in Practice
Six Cases That Define What Is Achievable
Nations increasingly want to own, operate, or meaningfully influence critical components of the digital stack that underpin economic stability and national security — including connectivity infrastructure, data platforms, cloud environments, and, increasingly, AI capabilities. The cases below show what this looks like when it moves from aspiration to architecture.
Specifically, Nokia and Telia trialled a 5G Standalone slice handover between multiple NATO countries for the Finnish Defence Forces — the first operational demonstration of sovereign military network slicing at scale. Finland’s position bordering Russia made this a live operational requirement, not a proof of concept.
In technical terms, the achievement is the ability to maintain encrypted, low-latency comms for military units crossing national borders without dropping to a foreign commercial network. This is the model for NATO’s broader network sovereignty architecture.
Notably, NumSpot — backed by Docaposte, La Poste, Banque des Territoires, Dassault Systèmes, and Bouygues Telecom — launched commercially in Q1 2025 as a sovereign cloud platform governed entirely under French law. It targets the segment hyperscalers cannot serve: classified, health, and government workloads requiring absolute data sovereignty.
Notably, the model is instructive: telecom operators (Bouygues) as anchor investors in sovereign cloud infrastructure creates a structural link between network sovereignty and compute sovereignty — the combination that makes AI sovereignty possible.
The Public Investment Fund of Saudi Arabia established HUMAIN in 2025, with a mandate to develop end-to-end AI infrastructure in partnership with AWS and NVIDIA. The adjacent Stargate UAE initiative represents a 1 gigawatt AI compute cluster — among the largest single sovereign AI infrastructure commitments globally.
Moreover, Deloitte predicts that over $100 billion will be committed to building sovereign AI compute in 2026, with the share of AI compute managed outside the US and China likely to double from its current 10% of global capacity by 2030. Clearly, the Middle East is leading this shift.
Canada’s sovereign AI compute strategy places domestic telecom operators — TELUS, Bell, and SaskTel — as the primary infrastructure anchors for sovereign AI data centres. Specifically, this is a deliberate model choice: using established, regulated, domestically accountable operators rather than hyperscalers to host sensitive AI workloads.
As a result, the model addresses the sovereignty gap at the compute layer by leveraging existing telecom trust relationships, physical presence, and regulatory accountability. Indeed, it is a template other mid-sized nations with established domestic telecom sectors should study carefully.
Specifically, the UK’s 2021 Telecoms Security Act mandated removal of Huawei equipment from the core network by January 2023 and from the access network by January 2027. Estimated total cost across BT, Virgin Media O2, and Vodafone: £2.5–3 billion. Remarkably, this is a measure that could have been avoided by front-loading vendor diversity requirements at the time of 4G procurement a decade earlier.
Consequently, this is the clearest real-world demonstration of the cost differential between prevention and correction — and the most powerful argument for building sovereignty considerations into architecture decisions before procurement, not after.
Significantly, Orange has established a dedicated division for defence and homeland security, focusing on communication network resilience for both civilian and military applications — alongside cybersecurity. This follows Nokia advancing its defence offering with a new mission-safe rugged smartphone purpose-built for battlefield use.
As a result, the emergence of operator-led defence divisions signals a structural shift: telecom companies are no longer passive infrastructure suppliers to defence. Instead, they are active architects of sovereign communications capability — and that repositions them as strategic national assets rather than regulated utilities.
What the Evidence Suggests: Priorities, Trade-offs & Open Questions
A Four-Quadrant Decision Matrix
Above all, the most useful output of any sovereignty analysis is not a list of threats — it is a decision framework. MWC 2026 made clear that winners will be those that scale beyond pilots to execution, prioritising initiatives that deliver real value while building resilience and trust. Therefore, the matrix below applies this logic across four quadrants: act now, build towards, manage carefully, and deprioritise.
- NIS2 board-level accountability structure — CEO liability obligations are already active in transposed member states
- Supply chain mapping — understanding vendor jurisdiction and exit conditions appears analytically critical given current tariff trajectories
- High-risk vendor exposure in core networks — the UK’s £2.5–3B correction cost suggests early action is significantly less costly than remediation
- Post-quantum cryptography readiness — the “harvest now, decrypt later” window is analytically considered open, with NIST standards now published
- 5G SA coverage — evidence suggests it is the technical prerequisite for the sovereign use cases governments are prioritising
- Signalling security (SS7/Diameter) — documented active exploits make this an operational risk rather than a theoretical one
- Open RAN — the vendor diversity case appears analytically sound; most assessments place the cost-parity crossover at 2028–2030
- Sovereign cloud for critical workloads — the sensitivity-tiered approach appears to offer the most evidence-supported path given current cost differentials
- 6G standards participation — evidence from 5G suggests that governance sovereignty correlates strongly with active standards contribution, not passive adoption
- Private network capability for defence and critical infrastructure — emerging as both a sovereignty anchor and a distinct revenue segment in multiple jurisdictions
- Domestic AI inference capability — ceding the network intelligence layer to hyperscalers appears analytically inconsistent with broader sovereignty objectives
- Cross-operator procurement coordination — collective leverage appears to be the primary mechanism by which smaller operators can access competitive sovereign vendor pricing
- Hyperscaler cloud for non-critical workloads — contractual sovereignty protections appear to offer adequate governance for workloads below sensitivity thresholds
- LEO satellite integration — the data governance framework appears to be the analytically critical variable; without it, jurisdiction risk is unquantified
- US-origin AI platforms — dependency documentation and contractual exit conditions appear to be the minimum governance threshold for analytical acceptability
- International RAN vendors (non-banned) — diversity management rather than exclusion appears to offer a more analytically balanced sovereignty/resilience outcome
- Cross-border data flows — GDPR-compliant transfers with residency protections appear sufficient for most commercial workloads under current regulatory interpretation
- Full network autarky — no jurisdiction appears to have the domestic industrial base to make this analytically viable; the evidence suggests it would reduce resilience rather than increase it
- Sovereign consumer application layer — the analytical case appears weak; the infrastructure layer is where sovereignty evidence is concentrated
- Premature autonomous network mandates — evidence suggests data governance gaps make early mandates analytically premature in most jurisdictions
- Bespoke national standards that fragment interoperability — the analytical consensus suggests fragmentation costs exceed sovereignty benefits in most modelled scenarios
- Duplicating hyperscaler commodity infrastructure — the evidence suggests governance differentiation offers a more viable competitive position than attempting to match scale
Importantly, sovereignty investments compound. First, getting supply chain diversity right makes Open RAN viable. Subsequently, Open RAN makes 6G standards participation meaningful. Finally, 6G standards participation makes the next generation of sovereign AI infrastructure possible. The organisations that sequence these correctly will have structural advantages that are very difficult to close later.
Balancing Sovereignty With Scale
As a result, the analytical evidence suggests telcos are positioned to serve as trusted providers of digital infrastructure — through network API exposure and locally governed cloud and edge platforms. However, sovereign clouds must still be agile, programmable, and cost-efficient. The tension between sovereignty and scale appears to be the defining operational question of 2026 — not yet resolved in any jurisdiction.
Telecom sovereignty is not a destination. It is a continuously calibrated position — maintained through deliberate choices, measurable metrics, and sequenced investment.
Ultimately, the organisations that will navigate the next decade best are not those with the most ambitious sovereignty declarations. They are those with the most honest sovereignty audits: a clear-eyed map of every dependency, every jurisdiction, every exit condition — and a sequenced plan to reduce strategic exposure at the points that matter most.
For operators: In summary, the investment framework is clear. The evidence points toward supply chain risk, signalling security, and NIS2 accountability as the areas of highest current analytical urgency. Open RAN, sovereign cloud, and 6G standards participation appear to have a medium-term evidence case. Managed interdependence appears analytically defensible where sovereignty costs clearly exceed resilience benefits.
For governments: The regulatory contradictions are real and urgent. On one hand, you cannot mandate sovereignty and block the consolidation that funds it. Furthermore, you cannot demand data residency without defining satellite data jurisdiction. Similarly, you cannot enforce NIS2 without harmonising its implementation. In short, these are not technical problems — they are political choices that have been deferred too long.
For enterprise decision-makers: The analytical evidence suggests that connectivity decisions increasingly carry sovereignty implications — particularly for sensitive data flows, cross-border operations, and regulated industries. Dependency mapping, governance frameworks, and contractual clarity around data jurisdiction appear to be the areas where analytical due diligence is most evidently underdeveloped.
- IDC — From Connectivity to Intelligence: Telcos at the Crossroads, MWC Barcelona, March 2026
- Bain & Company — MWC 2026: Telecoms at the Inflection Point
- Telefónica / Connect Europe — State of Digital Communications 2026
- TBR — Agentic AI, Sovereignty & Resiliency at Mobile World Congress 2026
- Netaxis Solutions — Cloud Dependence to Strategic Control, January 2026
- PwC — Global Telecom Outlook 2025–2029
- Deloitte — Technology Sovereignty: A New Era of Self-Reliance, November 2025
- Strand Consult — 25th Anniversary Global Mobile Telecom Review & 2026 Predictions
- Confrontations Europe — Telecom Sector: The Digital Network Act Must Be a Game Changer
- Tietoevry — Key Telecom Trends 2026: AI, Edge, and Sovereign Cloud
- Orange — Building Telecommunications Resilience Through Transformation, January 2026
- CircleID — Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism

this is good study and resourceful.