Mobile World Congress (MWC) has been around since 1987. The conference, part trade fair, part consumer electronics expo, and part industry pageant, has long served as the stage where Europe’s mobile giants showed off their newest ideas. For years, it was the place where companies like Nokia, LG, and Samsung unveiled the phones that defined an era. In the early 2000s, the halls were packed with crowds waiting to see the next slider, flip phone, or improbably thin handset that would set the tone for the coming year.
Those days are mostly gone. The modern smartphone has settled into a stable shape. A black slab of glass with a fast processor and a slightly improved camera arrives every year with minor refinements. The era of wild form factors and strange experiments has largely passed. The handset has become a mature technology.

But that does not mean MWC has lost its purpose. In fact, the conference has become even more important. People no longer go to Barcelona to marvel at a new phone. They go to understand the systems that connect everything around it.
Connectivity has become the real product. The networks that carry data, the satellites that extend coverage, the edge computing platforms that process information, and the infrastructure that links machines together are now the center of the mobile industry. These systems do not simply support communication between people. They increasingly support the operation of entire economies.
They also sit at the center of geopolitics.
In recent years, the importance of connectivity has become visible in global conflicts. A striking example came with the deployment of Starlink terminals in Ukraine. The satellite network helped maintain communications during the early stages of the war, allowing military units, emergency responders, and civilians to stay connected even as infrastructure was damaged. At the same time, debates over when and where the system could be used revealed something new about modern power. Control over connectivity now sits partly in the hands of potentially capricious private companies rather than governments.
The low-level hum beneath many modern conflicts is no longer only artillery or aircraft. It is the flow of data.
Modern war is no longer defined solely by missiles, tanks, and aircraft. Beneath those tools sits a hidden layer made up of communication networks. Phones, data links, satellites, and digital command systems now shape how operations unfold. Intelligence from drones moves through data networks. Units coordinate through encrypted messaging. Targeting information flows between sensors and weapons in seconds. Telegram and Signal are the de facto communication tools for countless soldiers who use them to do everything from call in reinforcements to phone home.
In places like Ukraine, Iran, and elsewhere, whoever controls the flow of information holds a powerful advantage. Communication systems have become operational infrastructure, as critical as fuel or ammunition.
What makes the moment unusual is who runs those systems. Many of the networks that enable modern communication are owned and operated by private firms rather than states. Telecom companies, satellite operators, cloud providers, and network equipment manufacturers now sit quietly at the center of global connectivity.
And every one of them shows up at Mobile World Congress.
Drive by wireless

At an unassuming booth tucked into one of the far halls at Mobile World Congress sat a mock police cruiser. It looked simple at first glance. Two seats, a steering wheel, a dashboard filled with screens. Above the windshield ran a light bar flashing red and blue, but alongside the lights sat a dense array of sensors. Cameras, small antennas, and other devices were mounted across the bar like a compact surveillance rig.
Visitors were invited to sit inside the cruiser. From the driver’s seat, you could watch the crowd moving through the hall outside. The system scanned the flow of faces automatically. Each person who passed in front of the cameras was detected, framed, and logged by the software. Faces were isolated from the background and quietly stored in the vehicle’s internal database.
The real demonstration came when one of the booth staff walked by. Their faces triggered an alert on the screen. The system highlighted the individual, flagged them as a match, and notified the driver that a suspect had been identified in the crowd. What looked like a simple patrol car mockup was actually a mobile facial recognition platform designed to scan large numbers of people in real time.
In practical terms, it was a wireless surveillance system mounted on a law enforcement vehicle. Cameras captured faces. AI models processed them locally or through connected networks. The results were compared against watchlists and databases. A patrol car could drive slowly through a crowded area while the system quietly analyzed every passerby.
Not long ago, technology like this would have appeared only at specialized military or intelligence exhibitions. Seeing it displayed openly on the floor of a telecom trade show says something about how quickly the landscape is changing. The “panopticon cruiser” was not presented as a science fiction concept. It was presented as a product.
Around it sat other examples of the same trend. Drones designed to patrol cities. Security robots equipped with cameras and wireless links. Mobility vehicles packed with sensors and AI systems that rely on constant network connectivity. Each system depended on the same ingredients: cameras, wireless data, and machine learning running on edge hardware.
Mobile networks are no longer just about connecting phones. They are becoming the nervous system for a new generation of sensing machines. Cars, drones, and robots are now built to see, identify, and communicate continuously. On the exhibition floor at MWC, that future was already sitting behind the wheel of a police car.
Networks as strategic infrastructure
Mobile towers, fiber lines, switching centers, and satellite terminals have become strategic assets in modern conflict. A century ago, armies fought over rail lines and ports because those systems moved men and material. Today, communication networks play a similar role for information. Units rely on constant data flow for targeting, reconnaissance, logistics coordination, and command decisions. When those networks fail, the entire system slows down.
The most fascinating example of this is Serhii “Flash” Beskrestnov. In his immensely popular Telegram group, this Ukrainian engineer and special advisor on technology to the Ministry of Defense shares insights on the inner workings of Shahed drones, Skylink radios, and the “cheap” Chinese systems Russia is falling back on to interconnect their weapons.
In one indicative post, he offers up photos of the gutter drone and discusses the wildly primitive hardware within:
In our country, a dozen services and agencies study captured Shahed drones. Currently, the Shahed drones do not have the PHYSICAL ABILITY to operate via mobile network connections.
All that exists is a tracker that has two modems and modem management via a Raspberry Pi single-board computer.
The two modems have 4 external antennas. The tracker has the functionality of transmitting the Shahed’s location and engine operating parameters.
We block the operation of such trackers after the Shahed drones cross the borders.
His insights, born out of a tinkerer’s mind and engineer’s training, show us that modern defense is a hodgepodge of DIY weaponry that would make a Boeing exec snicker. But what Flash and others like him prove is that the future of defense is open source and that connectivity, not hardware, is what holds it all together.
Because of this, communications infrastructure has become a direct military target. Mobile towers are destroyed or jammed to isolate units in the field. Fiber lines are cut to sever links between command centers and frontline forces. Satellite terminals are tracked and attacked because they provide resilient connectivity when everything else fails. In many recent conflicts, the first strikes have not been against armored formations but against the network that holds the military together.
The effect can be immediate. Without communications, logistics systems cannot track supplies, commanders cannot coordinate units, and intelligence gathered from drones or sensors cannot reach the people who need it. Even well-equipped forces can find themselves blind and disorganized if the network goes down.
The reverse is also true. Restoring connectivity can revive an entire operational zone. When communications come back online, units regain the ability to coordinate, share intelligence, and move resources efficiently. A repaired fiber line or a restored cellular network can have the same operational impact as reinforcing a frontline position. In that sense, telecommunications infrastructure has become part of the battlefield itself. It’s so important, in fact, that Ukraine is planning its own national mobile carrier, something unheard of even a year ago.
This reality has also pulled telecom companies into wartime work in ways few expected. Engineers and network operators now find themselves working under conflict conditions to keep infrastructure running. Repair teams restore towers and cables under fire. Satellite providers maintain service in contested environments. Private companies that once thought of themselves as civilian infrastructure providers now play a quiet role in national security.
At the same time, space-based communications have moved from a niche capability to a core part of the network. Satellite internet systems can provide connectivity in places where towers are destroyed or fiber lines have been severed. Small terminals can be deployed quickly and allow units to reconnect to command networks even in isolated areas.
These systems do not replace traditional telecom infrastructure. Instead, they form a layered architecture. Ground networks provide high-bandwidth connectivity where infrastructure exists. Radio links support local communication between units. Satellite systems fill the gaps when everything else is damaged or unavailable. Together, they form hybrid communication systems that can survive disruption and continue operating under difficult conditions.
One of the most difficult realities of modern conflict is that the networks used for war are often the same ones used by civilians. Commercial telecom infrastructure, consumer smartphones, cloud services, and public internet platforms now sit directly inside military operations. Soldiers coordinate through encrypted messaging apps. Drone feeds move through commercial networks. Intelligence data flows across infrastructure originally designed for everyday communication.
This creates a complicated environment where civilian systems become operational tools. A cellular tower that serves a town during the day may also carry traffic between military units. A fiber line that supports business activity can also transmit battlefield intelligence. Cloud platforms host software that processes imagery, targeting data, and logistics information.

This creates legal and ethical problems that governments and international law are still struggling to address. If a military uses a commercial network for operations, does that infrastructure become a legitimate military target? If communications satellites or internet providers carry military data, are they neutral infrastructure or part of the conflict? These questions are becoming harder to answer as digital systems intertwine with military activity.
It also raises risks for civilians. Disrupting a network to weaken an opponent can also interrupt emergency services, banking systems, and everyday communication. When infrastructure serves both military and civilian purposes, damage spreads far beyond the battlefield.
The new arms race
As communication networks become central to military effectiveness, countries are investing heavily in technologies designed to keep those networks alive under attack. The focus is no longer just on faster connections. The focus is on resilience.

New systems are being developed that allow networks to adapt and rebuild themselves during disruption. Mesh networks can route data through multiple nodes if one path fails. Autonomous relay drones can restore connectivity over damaged terrain. Software-defined radios allow units to change frequencies and communication protocols in real time to avoid jamming.
Satellite networks add another layer of redundancy, while edge computing allows data processing to happen locally when connections to distant servers are interrupted. Together, these technologies create distributed communication systems that are harder to disrupt than traditional centralized networks.
This effort has created a new kind of arms race, one centered on connectivity. Defense startups, telecom companies, and software developers are now competing to build the communication infrastructure that will support future military operations. Governments are funding systems that combine commercial technology with military resilience.
The strategic logic is simple. Modern forces depend on the speed and reliability of information. A unit that can see, communicate, and coordinate faster than its opponent has a decisive advantage. In that environment, communication networks are no longer just support systems. They are part of the weapon system itself.

In many cases, the decisive factor will not be the size of an arsenal or the sophistication of a single platform. It will be whether a military can keep its network functioning when everything around it is under pressure. In modern warfare, the side that maintains the signal may ultimately control the battlefield.










