Russia’s war against Ukraine is not limited to conventional military tools. It increasingly relies on civilian infrastructure—repurposed and weaponized—to enhance its operational capabilities on the battlefield. Among these tools are national mobile network operators, which have become a quiet but critical component of Russia’s military ecosystem.
One operator in particular, formerly known as Tele2, now operating under the brand t2, appears to play a central role in this system. Evidence suggests that SIM cards associated with this network are systematically integrated into Iranian-designed Shahed loitering munitions used by Russia against Ukrainian targets. These SIM cards are not incidental—they are reportedly procured in bulk and supplied directly for military use.
Although Ukraine has taken measures to block roaming services for this operator within its territory, the system is designed to exploit cross-border connectivity. As these drones operate near Ukraine’s borders, they can connect to foreign networks—such as those in Belarus, and potentially even EU countries like Poland or Romania—allowing them to maintain communication capabilities during flight.
Just days earlier, an illustrative case underscored the human cost of these attacks. Serhiy “Flash” Beskrestnov, an advisor to Ukraine’s minister of defense, was directly targeted by a Russian drone strike.
Multiple Shahed drones were reportedly used in the attack, completely destroying his home and leaving him seriously injured. This incident is not an isolated case but part of a broader pattern. Russia conducts hundreds of such targeted strikes across Ukraine, often aimed at individuals, infrastructure, or symbolic targets.
The effectiveness and precision of these attacks are not accidental: they are likely facilitated by the integration of telecommunications capabilities—particularly those provided by Russian national mobile operators—into the operational architecture of these unmanned systems.
Within the architecture of Russia’s use of Shahed-type drones, the SIM card—specifically those provided by the operator t2—ceases to function as a conventional communication tool and instead becomes a core operational component of the weapon itself. It effectively acts as a “digital brain,” enabling the drone to receive commands in real time and transmit location data during flight. This transforms a standard element of civilian telecommunications into a critical part of guidance and detonation systems, blurring the line between civilian infrastructure and military technology.
The presence of industrial-scale batches of SIM cards recovered from downed drones further suggests that this is not an incidental or improvised practice. These SIM cards are not commercially available to ordinary consumers, indicating coordinated procurement and direct supply chains between the operator and entities involved in drone production. This points to a structured and deliberate integration of telecommunications capabilities into Russia’s military-industrial complex, where a nominally civilian company becomes functionally embedded in the development and deployment of weapons systems.
Moreover, the use of mobile network-based positioning technologies—such as location-based services (LBS)—provides these drones with an additional layer of navigational resilience. Even in conditions where GPS signals are disrupted or spoofed, drones can rely on triangulation from cellular base stations to maintain course. This capability significantly undermines traditional defensive measures employed to protect urban areas, allowing unmanned systems to adapt in real time and sustain targeting accuracy. In effect, civilian telecom infrastructure is leveraged to enhance the lethality and precision of strikes, raising serious concerns about the militarization of global communication networks.
Russia is already testing the vulnerabilities of European infrastructure by deploying Shahed-type drones equipped with t2 SIM cards along NATO borders. When these drones connect to mobile towers in countries such as Poland or Romania via roaming, they are not merely maintaining communication—they are effectively conducting real-time reconnaissance.
This process allows Russian systems to map network coverage, analyze signal behavior, and potentially assess the effectiveness of electronic warfare measures within the alliance. What is currently used to support strikes against Ukraine may, in the future, serve as a pre-collected dataset for operations targeting European capitals, with routing patterns already “trained” within EU telecommunications networks.
At the same time, roaming agreements between European telecom operators and t2 create an unintended but critical vulnerability. Through these arrangements, Russian drones can gain legitimate access to Western communication infrastructure, exchanging data with servers in Russia via international connectivity channels. This transforms standard commercial telecom cooperation into a conduit for military data transmission. In practical terms, maintaining such roaming relationships risks enabling hostile systems to operate within the European digital space under the cover of lawful network access.
More broadly, the continued functionality of t2 SIM cards in border regions of NATO countries sends a problematic strategic signal. It demonstrates that, despite the scale of the security threat, commercial telecom frameworks remain insufficiently adapted to wartime realities.
From a military-strategic perspective, this may be interpreted by Russia as a sign that Western digital security can be bypassed through existing civilian infrastructures. If a hostile network code can continue to operate across borders without restriction, it raises fundamental questions about the resilience of collective security in an era where civilian technologies are increasingly weaponized.
To effectively counter this threat, it is essential to fundamentally reassess the role of Russia’s telecom operators within the broader architecture of hybrid warfare. The case of t2 demonstrates that such entities can no longer be viewed as neutral commercial actors. In the context of a full-scale war, this operator functions de facto as an extension of Russia’s military and intelligence apparatus, with its infrastructure, frequencies, and SIM cards directly embedded into weapons systems. Any form of international connectivity that sustains its operations effectively contributes to maintaining the communication chain between Russian command structures and strike capabilities.
Equally concerning is the financial dimension of this ecosystem. Revenues generated by t2 through international operations and inter-operator settlements feed back into the technological enhancement of systems used in warfare. This creates a closed loop in which global telecommunications frameworks inadvertently support the continued development and deployment of weaponized communication tools. As long as such financial and technical linkages remain intact, they will continue to indirectly enable further attacks.
Accountability must therefore extend beyond states to include corporate actors and their leadership. Senior management involved in facilitating the supply of telecommunications components for military use should be subject to international legal scrutiny. Providing infrastructure that directly contributes to lethal operations raises serious questions under international law and may warrant criminal investigation in relevant jurisdictions.
In practical terms, the most immediate and effective response lies in the implementation of a comprehensive “digital embargo.” This would involve the full disconnection of t2 from the global telecommunications ecosystem, including the termination of roaming agreements and interconnect arrangements. Such measures are not merely punitive—they are defensive. By eliminating the operator’s ability to function beyond Russia’s borders, Ukraine and its partners can significantly reduce the operational effectiveness of systems that rely on cross-border connectivity.
Ultimately, the challenge posed by the weaponization of telecom infrastructure requires a coordinated international response. Without decisive action, civilian communication networks will remain vulnerable to exploitation as instruments of warfare—not only in Ukraine, but potentially across Europe and beyond.
DISCLAIMER: The views and opinions expressed in this article are those of the author and may not necessarily reflect the editorial policy of Türkiye Today.