THREAT ASSESSMENT: G7 LEADERS SUMMIT IN CANADA PRESENTS UNIQUE PHYSICAL AND CYBER-RELATED CHALLENGES; SECURITY STAFF SHOULD PREPARE FOR TENSE PROTESTS AND CYBER INTRUSIONS
- Senior Editor
- 3 days ago
- 22 min read
Jacob Robison, Ananya Das, Clémence Van Damme, Giovanni Lamberti, WATCH, NORTHCOM, and Extremism Teams
Elena Alice Rossetti, Senior Editor
June 8, 2025

G7 Flags[1]
Summary
The Counterterrorism Group (CTG) assesses with HIGH CONFIDENCE that the Group of Seven (G7) Leaders’ Summit in Kananaskis, Alberta province, Canada, is very likely vulnerable to multi-domain disruption due to the potential combination of environmental hazards, limited access infrastructure, likely fragmented interagency coordination, protests and geopolitical tensions, protests and geopolitical tensions, insider threats, and cyber-kinetic convergence threats. Regional wildfire activity would likely degrade aerial surveillance and limit evacuation capabilities, while traffic constraints and singular access points likely present risks enticing threat actors. The current state of geopolitics, particularly that of Israel-Palestine and Russia-Ukraine, will very likely prompt tense protests within predesignated protest zones, with some protests likely overwhelming these areas. Cyber-kinetic threat actors will likely attempt to exploit coordination gaps between digital and physical security systems. Alternatively, favorable weather and well-prepared, preemptive security measures will likely reduce or effectively mitigate key risks during the Summit. If these concerns are not properly addressed, hostile actors will very likely seek to generate disruptions, delays, and reputational impacts against G7 participants.
Context of Concern
The G7 Leaders Summit is a geopolitical discussion forum for several nations, with its leadership rotation including Canada, the US, the UK, France, Germany, Japan, and Italy. The meeting is an opportunity for communication between key leaders and policy-makers focusing on a variety of domestic and international concerns, including climate change and advanced technologies. Canada is hosting the upcoming Summit, for the seventh time since joining in 1976.[2] The summit will occur from June 15 to 17, 2025, in Kananaskis, Alberta province, for the second time since 2002.[3]
The Summit will host multiple world leaders and officials, including:
Prime Minister of Canada Mark Carney
President of France Emmanuel Macron
Prime Minister of the United Kingdom Keir Starmer
President of Ukraine Volodymyr Zelensky
Prime Minister of Australia Anthony Albanese[4]
Finance Minister of Canada Francois-Philippe Champagne
Bank of Canada Governor Tiff Macklem
Treasury Secretary of the US Scott Bessen
Commerce Secretary of the US Howard Lutnick
US Federal Reserve Chairman Jerome Powell
Finance Minister of Ukraine Sergii Marchenko[5]
The G7 Summit has been targeted multiple times, but none have caused injuries or casualties.
In 2019, French authorities arrested five anti-capitalist extremists for posting threatening messages online encouraging others to attack a hotel where G7 security was staying.[6]
In 2013, an Irish Republican Army (IRA) dissident republican splinter group, known as Oglaigh Na hEireann (soldiers of Ireland), claimed responsibility for a failed bombing targeting the G8[7] Summit in Northern Ireland.[8]
In 2023, host country Japan experienced increased Distributed Denial-of-Service (DDoS) attacks and cyber-targeting of organizations and government officials weeks before the Summit, prompting concerns over the event's cybersecurity.[9]
Domestic and international media are based in the Banff Centre building, and will travel by bus to and from the venue. The journalists will commute around an hour to and from the event location.[10]
Weather forecasts predict stormy conditions that will fuel an active wildfire season in southern Alberta.[11] Thunder represents the primary cause of wildfire ignitions, significantly increasing fire risks during storm activity, according to Alberta's 2024 seasonal statistics.[12] Alberta is currently at a level 4 local preparedness level, which indicates heightened wildfire activity requiring significant resource deployment and competition for firefighting resources between geographic areas.[13] As of June 8, 2025, wildfire data shows 58 active fires burning across Alberta province, with 22 of these wildfires remaining out of control.[14] The G7 Summit location faces elevated danger levels according to federal mapping systems, as Kananaskis sits within a very high wildfire risk area classified by the Canadian Wildland Fire Information System.[15] Geographic proximity to active fires compounds these concerns. The nearest uncontrolled wildfire burns in the Edson Forest area, approximately five hours' driving distance from Kananaskis. Hot and windy atmospheric conditions in the Edson area create ideal scenarios for fire expansion, with recent precipitation proving insufficient to mitigate these hazardous circumstances.[16]
Kananaskis falls under a Public Land Use Zone (PLUZ),[17] which lacks the full environmental protections of protected crown land[18] and supports outdoor recreation. This status leaves it exposed to natural hazards like flooding. June marks the region’s wettest month.[19] Recent data shows the water level at the Spray Reservoir near the Three Sisters Dam has risen significantly,[20] which could trigger flood warnings if heavy rains begin. In 2013, floods forced authorities to close Highway 40 and left major infrastructure in disrepair for years, including the Kananaskis Golf Course.[21] Although no official alerts are active at the moment,[22] the Kananaskis area is vulnerable to flood warnings. As of June 8, weather forecasts project unproblematic weather for Kananaskis.[23]
The Summit venue’s geography and infrastructure create security challenges across digital and physical domains.[24] Telecom coverage in remote and mountainous areas reduces real-time communication and emergency coordination, as documented in Canadian telecom audit reports during large-scale events.[25] Terrain features such as tree cover, elevation variation, and limited surveillance zones allow adversaries to conceal drone operations and signal interference tools.[26] During previous summits, physical access points such as temporary structures, service routes, and infrastructure nodes required enhanced security coordination, especially when digital systems faced operational stress or resource limitations.[27] Legacy digital systems and credentials from past public events are often left embedded in venue infrastructure, and forensic analyses have confirmed these elements potentially enable unauthorized access or unwanted privilege escalation.[28]
RCMP leads the Integrated Safety and Security Group (ISSG) and takes full responsibility for planning, coordinating, and delivering security operations for the 2025 G7 Summit.[29] The ISSG includes five partner agencies: the RCMP, Calgary Police Service (CPS), Alberta Sheriffs' Branch under Alberta’s Ministry of Public Safety and Emergency Services, Alberta Forestry and Parks’ Conservation Officers, and the Canadian Armed Forces (CAF).[30] Each agency provides specialized expertise and resources to coordinate comprehensive security that protects summit participants, local communities, and visitors.[31] The ISSG enforces a Controlled Access Zone (CAZ) across Kananaskis Country, limiting entry to authorized personnel, residents, and accredited businesses.[32] It imposes temporary airspace restrictions over Calgary and Kananaskis from June 14 to 17, 2025, including a 30-nautical-mile no-fly zone to secure summit airspace.[33] CPS manages public safety, crowd control, protests, and emergency responses in Calgary’s urban areas.[34] The Alberta Sheriffs’ Branch handles traffic control, vehicle checks, and detainee transport, and stands ready to assist with mass arrests if necessary.[35] Alberta Conservation Officers contribute to the security presence and coordinate with ISSG partners, although their specific assignments remain generalized in public reporting.[36] CAF supports RCMP under Operation CADENCE, providing air transport, aerial monitoring, and helping enforce airspace restrictions through North American Aerospace Defense Command (NORAD).[37] The ISSG boosts secure communications by deploying satellite and radio systems to overcome the mountainous terrain and limited tower infrastructure.[38] The Canadian Security Intelligence Service (CSIS) delivers intelligence and threat assessments that inform real-time decision-making.[39] Security teams from G7 member countries coordinate with the ISSG to protect visiting dignitaries.[40] G7 security officials have planned designated demonstration zones (DDZs) for protestors in Banff and Calgary.[41] Three official G7 DDZs will be active from June 10 to 18, 2025. One will be located in Banff at the Fenlands Banff Recreation Centre. Two others will be in Calgary at Municipal Plaza (800 Macleod Trail SE) and Enoch/East Victoria Park (1102 Macleod Trail SE), equipped to broadcast messages to G7 leaders. An additional site near Calgary International Airport at the Edward H. LaBorde Viewing Area will not be broadcast. Royal Canadian Mounted Police (RCMP) officials warned that protests on major highways will not be permitted, pushing them to establish these zones. City officials raised concerns regarding the locations and whether protestors will be able to sufficiently interact with G7 leaders. They warned that demonstration zone attendees will experience challenges in accommodations like lodging and parking, and that interaction with leaders is unlikely.[42]
Previous international summits have demonstrated that geopolitical tensions often translate into localized security concerns, particularly through protests, cyber threats, and disinformation. During the 2018 G20 Summit in Buenos Aires, protest activity escalated into clashes with police, prompting extensive security deployments.[43] The 2021 G7 Summit in Cornwall saw large-scale environmental and anti-globalization protests, some of which temporarily disrupted transportation and logistics in surrounding areas.[44]
In 2014, the US, under Obama, and other international members removed Russia from what was then the G8 following Russia’s annexation of Crimea.[45] Recently, Trump, in efforts to improve relations with Russia, pinned former prime minister Justin Trudeau on Russia’s ousting, indicating he thought it was unfair.[46] Additionally, the US refused to support a joint G7 statement that would’ve labeled Russia’s invasion of Ukraine as illegal. Trump has notably swapped the previous US administrations’ stance on Russia-Ukraine by pressuring Ukraine for agreements favorable to Russia, including potentially accepting partial territorial annexations.[47]
The G7 Summit faces threats from cyber-kinetic convergence attacks, where adversaries coordinate both digital and physical intrusions.[48] Unauthorized drone activities that occurred at previous high-profile diplomatic events have prompted officials to deploy counter-drone systems, such as Israel’s Drone Dome at the 2021 G7 Summit in the UK.[49] Disruption tools like Global Positioning System (GPS) spoofers and signal jammers have interfered with critical infrastructure in real-world incidents, including interference with aircraft and maritime navigation systems.[50] The UK National Audit Office (NAO) reported that outdated and unpatched legacy Information Technology (IT) systems remain exploitable in high-security government contexts.[51] Security organizations, such as the American Society for Industrial Security (ASIS) Foundation, highlight the gaps between public, private, and digital security teams that hinder effective threat detection and response during major events.[52] In 2014, attackers exploited stolen credentials from KeyPoint Government Solutions, a federal contractor, to infiltrate the U.S. Office of Personnel Management’s (OPM) network, install malware, and establish a persistent backdoor, ultimately exfiltrating sensitive data.[53] The 2024 G7 Summit experienced DDoS attacks across multiple countries, including Switzerland and Japan, that exposed coordination gaps between the various security teams.[54]
Assessments
Wildfire danger ratings will very likely remain at Very High levels in the Kananaskis area during early June, due to the stormy conditions announced, with shifting weather patterns, likely contributing to increased fire spread. The out-of-control fire in the Edson Forest Area[55] will likely spread due to hot and windy conditions, which almost certainly increase ignition potential and accelerate fire movement. Natural firebreaks around the G7 Summit venue will very likely be insufficient to contain potential wildfires, as the continuous forest ecosystem lacks significant natural barriers like large rivers or bare rock expanses. The remote fire activity will likely threaten the G7 Summit area, since the terrain will very likely enable fires to expand over long distances. The potential wildfires have a roughly even chance to cause air quality issues, which will likely disrupt transportation networks and strain emergency services. These conditions will likely ground or limit the visibility of helicopter surveillance, likely reducing real-time situational awareness and delaying critical response times. Adverse weather will likely ground aircraft and compromise evacuation capabilities, with a roughly even chance of suitable flying conditions daily in a mountain environment during the G7 Summit period. Available helicopter landing zones, such as Kananaskis Village Helistop, will likely accommodate only a few aircraft for emergency evacuation. They will very likely be insufficient for complete and timely G7 Summit evacuation requirements, including world leaders, their delegations, and security personnel from seven countries plus EU representatives. Road infrastructure will very likely be inadequate for the evacuation of all participants, as two-lane mountain highways such as Highway 40 likely cannot handle the mass emergency evacuation volumes required during a potential security incident. Coordinated firefighting efforts and evacuation procedures will very likely face significant challenges, as provincial authorities dispatch units to address fires elsewhere, likely creating a temporary gap in emergency resources near the Summit site that threat actors can exploit. Given recent recognition of capacity limitations requiring $6.54 million in new wildfire teams,[56] local firefighting resources will very likely be insufficient without pre-positioned federal assistance, should multiple incidents occur simultaneously.
Precipitation and stormy conditions in June will likely raise water levels in the Spray Reservoir at the Three Sisters Dam–TAU basin, located upstream of the event site, likely leading to flood warnings. Because the government did not designate Kananaskis Country as protected crown land, less regulated human activities and infrastructure development likely contributed to increased vulnerability to flood damage, including erosion and sedimentation. The extensive destruction from the 2013 Alberta floods[57] will likely exacerbate the consequences of any future flooding events. Should flooding occur during the G7 Summit at Pomeroy Kananaskis Mountain Lodge, there is a roughly even chance of access disruptions along the primary route, Kananaskis Trail/AB-40 S, to the venue. Flood conditions will likely complicate security operations and require enhanced emergency protocols, though the lodge's elevated position will very likely reduce direct flood impact.
Since the closure of the southern section of Highway 40,[58] all G7 Summit traffic will almost certainly approach from the north via Kananaskis Trail/AB-40 S. This restriction will very likely force ground transportation routes for leaders to be predictable and concentrated along a single corridor. Threat actors will very likely exploit this predictability by positioning surveillance assets, as drones, along the limited northern route to monitor convoy movements and timing. The concentrated traffic flow will likely allow threat actors to conduct reconnaissance on security protocols, vehicle configurations, and timing patterns for preparing potential future targeting. Hostile persons have a roughly even chance of pre-positioning improvised explosive devices (IEDs) at choke points, such as bridges crossing, along the single access corridor, or coordinating blocking actions at critical intersections to stop motorcades. Adversaries will very likely exploit the isolation of the single route by creating diversions that force security teams to respond along the predictable pathway, likely exposing leaders during transit. As security resources will very likely concentrate on the predictable northern vehicle corridor, they will likely overlook southern approaches on foot. Threat actors will likely use established campgrounds south of Pomeroy Kananaskis Mountain Lodge by positioning themselves days before the G7 Summit, then approaching the venue through backcountry trails that security perimeters will unlikely cover adequately.
Security officers will likely struggle to detect and respond effectively to unauthorized access attempts targeting the G7 Summit in the expansive Kananaskis natural environment due to limited sensor coverage and extended response distances. The remote mountain terrain likely provides numerous concealment opportunities for hostile actors attempting to breach security perimeters through densely forested areas or ridgelines. Security teams will likely face delays in reaching and neutralizing detected threats across the backcountry terrain. Dense tree cover and elevation changes will likely degrade aerial surveillance effectiveness, very likely creating persistent blind spots for drones and fixed cameras. Adversaries will likely use these gaps to stage drone-based equipment drops, conduct signal interference, or test response timing without early detection. Security forces will likely rely on manual patrols together with aerial assets such as manned helicopters and unmanned aerial vehicles (UAVs) for complete coverage, increasing response time and limiting their ability to respond to simultaneous incidents across the terrain, very likely creating confusion and delaying tactical response.
Coordination protocols between federal, provincial, and local agencies will likely face implementation challenges during the G7 Summit in the remote setting, considering communication limitations and jurisdictional complexity. The RCMP's ISSG[59] will likely face delays in protocol implementation as personnel from the CPS, Alberta Sheriffs, Alberta Conservation Officers, and the CAF will likely require additional training time to familiarize themselves with specialized G7 security procedures that differ from their routine operational protocols. The establishment of a CAZ[60] and the enforcement of a 30 nautical-mile no-fly zone[61] will likely require rigorous inter-agency cooperation to manage access and airspace restrictions effectively, minimizing jurisdictional overlaps and ensuring the safety of summit attendees. Mountainous terrain interference and limited tower infrastructure in the remote Kananaskis location will likely increase reliability issues for mobile and internet communications, likely affecting secure communications between the RCMP, the CSIS, and international security details from G7 member countries. International security details will very likely encounter operational difficulties as their unfamiliarity with Kananaskis's specific mountainous terrain, wildlife patterns, and extreme weather conditions will likely compromise standard surveillance and patrol protocols. Coordination challenges will likely emerge from conflicting standard operating procedures between different national security agencies, as each country's security details operate under distinct rules of communication protocols and threat assessment methodologies that may not seamlessly integrate during joint operations. The complexity of harmonizing multiple nations' security frameworks in real-time will very likely create gaps in response coordination, especially when they need to make rapid decisions regarding threat escalation procedures and jurisdictional authority in the remote setting.[62] The area's dependence on limited transmission paths means that natural disasters, such as windstorms damaging transmission lines, will very likely compromise critical communications systems, likely creating risks for coordinating security responses when world leaders are present. Historical precedents like the 2018 G20 Summit in Buenos Aires or the 2021 G7 Summit in Cornwall suggest that the current geopolitical climate, particularly surrounding conflicts such as Russia-Ukraine and Israel-Palestine, will likely embolden groups to attempt similar actions during the G7 in Canada, increasing the probability of disruptions, reputational damage, or attempts to exploit the event as a platform for political messaging. Russia will likely attempt to covertly undermine the G7 Summit’s messaging through coordinated disinformation campaigns, as noted by the G7 Rapid Response Mechanism in its attribution of previous global influence operations to Russian state-linked entities. These efforts will likely focus on delegitimizing the Summit’s outcomes, diverting attention from unified support for Ukraine, and amplifying alternative narratives favorable to Russian interests.[63] The Israel-Hamas conflict will very likely inspire protests and activism, with a roughly even chance of disruptive actions near the Summit venues with groups sympathetic to the Palestinian cause. There is a roughly even chance China’s strategic rivalry over the G7 bloc will result in a risk of cyber reconnaissance and attempts to gather intelligence on participants, although state-linked cyber actions are unlikely to occur. The convergence of geopolitical flashpoints will likely sustain a complex and dynamic threat environment for the G7 Summit.
Potential US support for Russian stances, or resistance to pro-Ukrainian proposals, will likely stir geopolitical unrest between the three countries. Ukraine, very likely prepared for limited US support at the G7 Summit, will likely lean on other alliances in Europe and Canada to supplement the US shift. This new dynamic will likely isolate US representatives on other proposals that indirectly or directly benefit the US, such as economic tariff agreements. Russia’s absence from the summit will likely prompt online discourse regarding the legitimacy of the meeting, with anonymous online accounts likely spreading misinformation and disinformation regarding the conflict and its potential resolutions. Notable figures, such as Trump and other US representatives, have a roughly even chance of echoing these narratives online, very likely depending on the perceived favoritism of Ukrainian proposals over US initiatives.
Insider threats will likely pose a risk, particularly individuals with authorized access who harbor personal grievances, ideological motivations, or other vulnerabilities. There is a roughly even chance that an insider could exploit privileged access to facilitate unauthorized data exfiltration, sabotage, or other forms of harm. The threat from insiders will unlikely manifest as a coordinated or large-scale operation, but isolated incidents like the leak of sensitive scheduling information would likely have a disproportionate impact on the security and operational integrity of the event by undermining the credibility of the host-nation security efforts, straining diplomatic relations, and disrupting contingency planning. The visibility and symbolic significance of the G7 Summit would likely prompt public and media scrutiny to amplify any insider-related failure. The required presence of support personnel with legitimate credentials likely increases risks associated with insider threats. Staff, including caterers and janitorial service personnel, very likely have elevated levels of access to the venue, including back rooms and areas not accessible to guests. Extremist, ideologically motivated staff would likely seek to exploit this access, presenting themselves as legitimate personnel while sabotaging or disrupting the event. The supportive role of these personnel very likely serves as effective camouflage, likely allowing staff to get closer to guests than any outsiders, such as protestors.
Cyber-kinetic convergence attacks are a likely and escalating threat to the G7 Summit, as state and non-state actors very likely view high-profile diplomatic events as opportunities to gain a strategic advantage or disrupt the global narrative. These actors very likely demonstrated growing intent and capability to coordinate digital and physical intrusions, using fragmented tactics to exploit security gaps and media attention. to coordinate both digital and physical intrusions. Adversaries will likely attempt low-level disruptions such as drone flights, phishing attacks, or signal jamming. These actions will likely focus on disrupting communication, optics, including interrupting or hijacking streaming for diplomats or the public, or response time, rather than causing long-term damage. There is a roughly even chance of visible interference with livestreams, cellular networks, or public messaging systems. Threat actors will likely attempt fragmented actions to disrupt operations and create unrest rather than conducting a single, fully synchronized attack. Potential coordination gaps between private, public, and digital security systems and ground teams likely pose a key vulnerability. This gap will likely delay threat detection and response, especially if digital intrusions and physical breaches happen simultaneously across systems managed by different stakeholders with limited real-time coordination protocols.
Cyber and physical disruptions will very likely have a greater impact in the summit location than in urban environments. There is a roughly even chance that limited telecom coverage and restricted access routes will hinder coordinated responses in the event of interference. Threat actors such as domestic extremists or cybercriminal groups with physical access capabilities will very likely exploit terrain features like tree cover, elevation changes, and limited surveillance zones to stage or conceal drone operations and signal interference tools. Fewer overlapping networks will enable jamming and spoofing tools to work more effectively. Potential threat actors will likely test physical access points when digital systems are overwhelmed or disconnected. Attackers will likely target these access points, including service roads, utility infrastructure, and temporary event facilities, during moments of digital overload or signal jamming, with a roughly even chance of physical breaches going unnoticed in the confusion.
Using a public event space very likely increases risk, including malicious actors exploiting systems for unauthorized access, privilege escalation, and lateral movement across systems, as past events often leave access credentials, modified infrastructure, or overlooked digital integrations behind. Attackers will likely use the residual elements to escalate privileges or bypass new security measures. There is a roughly even chance that event organizers and security teams will overlook legacy systems, such as a badge reader or electronic door lock that still recognize old credentials or use outdated encryption protocols, in favor of current deployments like facial recognition systems and mobile credentialing apps. This oversight will likely occur because audit processes prioritize new infrastructure, leaving older systems, such as access control logs, Wi-Fi networks, or surveillance endpoints, likely unmonitored or misconfigured, creating exploitable gaps for threat actors. Adversaries will have a roughly even chance of identifying and using these gaps, especially if coordination between public, private, and digital security teams remains limited.
Alternatively, favorable weather and sufficient security preparation will likely reduce key risks during the G7 Summit. Clearer weather conditions likely reduce personnel concerns regarding fire management, despite the distance between Kananaskis and the larger fires. Security teams, including ISSG, are likely well prepared for this event, and will unlikely face direct attacks against the venue. Security personnel will likely see the DDZ protests as the most active risk, but appropriate precautions regarding distance and enforcement are very likely implemented. Appeasing protestors' concerns regarding visibility and event proximity will likely aid in the civility of the protests, as officers will likely effectively manage the balance between guest protection and freedom to protest.
Future Implications
A successful attack on the G7 summit would likely raise doubts about Canada’s capacity to secure diplomatic events, likely damaging their international image. This perception would likely expand to non-diplomatic events, such as sporting and cultural ones, likely stagnating domestic support for the sitting administration. A breach of security would likely signal to allies that Canada’s internal threat detection and prevention capabilities are insufficient, especially if later investigations label the attack as preventable. Threat actors would likely note these vulnerabilities, likely exploiting perceived gaps in Canadian security during future attacks. Canada would likely lose diplomatic trust of its peers, likely losing out on future G7 leadership opportunities, and reshaping how Canada is viewed as a security partner. This would likely impact Canada’s participation in joint-security operations, such as intelligence-sharing agreements, as some partner countries would very likely reassess their cooperation. The attack would likely prompt domestic dissent in Canada, with citizens likely questioning the government's competence and priorities, exacerbating the perception of instability.
Recommendations
The Counterterrorism Group (CTG) recommends that G7 security teams establish direct coordination with the Canadian Interagency Forest Fire Centre (CIFFC), given Canada's current National Preparedness Level 4,[64] indicating significant wildfire activity and high demand for interagency resources. Intelligence units should continuously monitor the Alberta Wildfire Status Dashboard and Canadian Wildland Fire Information System Interactive Map for real-time updates on the 58 active wildfires, focusing on the Edson Forest Area fire, approximately 5.5 hours from the venue, experiencing hot and windy conditions. Command centers should pre-position federal water bombers at Calgary International Airport and establish redundant helicopter evacuation zones at Canmore, Kananaskis Country Golf Course, and emergency staging areas.
Security forces should supplement the existing RCMP CAZ and northern screening checkpoint by establishing covert observation posts at specific vulnerable locations along the Spray Lakes Road corridor. Counter-surveillance teams should deploy concealed sensors and cameras at the Ribbon Creek Trail system, the Three Sisters Pass approach, and the East End of Rundle Trail, where experienced hikers could traverse ridgelines to observe convoy movements or conduct reconnaissance on the security perimeter from elevated positions. Intelligence units should coordinate with Alberta Parks to monitor multi-day backcountry permit applications for areas near the event, identifying individuals requesting permits for the June 10-20 timeframe who could establish forward observation positions days before the Summit while appearing to engage in legitimate recreational activities. Telecom providers should strengthen local networks by physically securing base stations and actively monitoring frequencies for jamming or spoofing attempts. The network infrastructure team should increase temporary bandwidth and system resilience to support live streaming, security coordination, and emergency services. Mobile network service providers should close known coverage gaps around the venue and perform continuous spectrum analysis throughout the event to detect any interference. National security agencies should collaborate with telecom providers to scan for and eliminate unauthorized signal activity before and during the Summit. Security coordinators should establish dedicated liaison officers from each G7 member country's national security services embedded within the RCMP command structure at Kananaskis Village to enable real-time intelligence sharing that transcends traditional diplomatic channels. RCMP should assign permanent cross-agency coordinators who spend several days before the Summit working exclusively at the CPS, Alberta Sheriffs, and CAF headquarters to understand operational differences and develop unified standard operating procedures (SOPs) that account for decision-making processes. Training coordinators should conduct full-scale scenario exercises replicating communication blackouts and multi-agency response situations at the actual Kananaskis location, forcing the agencies involved to practice G7-specific protocols under realistic mountain terrain conditions that simulate equipment failures and jurisdictional confusion. Security planners should establish mandatory daily inter-agency briefings using standardized intelligence formats that all participating agencies practice during these scenario exercises, ensuring personnel can quickly interpret and act on security information without requiring clarification between different reporting systems. Communication coordinators should designate specific radio channels and encryption keys exclusively for inter-agency coordination, with backup liaison officers stationed permanently at each agency's command post to manually relay critical information if technical systems fail.
Security teams, specifically those tasked with monitoring DDZs, should be hypervigilant regarding the intensity of the crowd, as well as elements surrounding the DDZs, such as passing vehicles. Security teams should be on alert for suspicious bags or unattended items near the DDZs and should quickly clear the area of civilians if these concerns arise. Personnel should prepare for physical confrontations among protestors and between law enforcement and protestors. Personnel should actively promote peaceful demonstrations and de-escalate any tense situations they encounter.
G7 security teams should ensure that essential personnel, including caterers and janitorial staff, are appropriately vetted and actively monitor their actions during the summit. Security should patrol out-of-sight areas, such as kitchens, to mitigate hidden planning or activities, and should ensure they do not disregard insider threats in favor of exterior ones. Security should use tiered clearance access systems to manage personnel movements, as well as other surveillance tactics, such as sign-in/sign-out sheets and random patrols.
G7 security teams should integrate cyber and physical security operations under a unified command structure with shared communication protocols. Audit teams should conduct a comprehensive review of legacy systems and infrastructure from previous public events, securing or decommissioning outdated access credentials, surveillance systems, and control points. Security forces should deploy layered counter-drone technologies and station rapid response teams at terrain-vulnerable zones. Perimeter control teams should reinforce physical access controls at service roads and utility infrastructure using enhanced surveillance such as portable Closed Circuit Television (CCTV) towers and motion detectors, and strict authentication methods such as biometric Identity Document (ID) checks, badge scanners, and real-time access logs. Joint task forces should conduct full-scale exercises simulating cyber-physical disruptions in coordination with public and private stakeholders to identify, address, and rectify operational gaps.
[1] G7 flags, by CIA World Factbook, licensed under Public Domain (created by AI)
[2] Canada and the G7, Government of Canada, January 2025, https://www.international.gc.ca/world-monde/international_relations-relations_internationales/g7/index.aspx?lang=eng
[3] Top finance officials from G7 countries gather in Banff for 3-day summit, CBC, May 2025, https://www.cbc.ca/news/canada/calgary/calgary-g7-finance-ministers-meeting-banff-1.7539528
[4] The G7 summit is being held just outside Calgary. Here’s who will be there and what these meetings achieve, The Globe and Mail, May 2025, https://www.theglobeandmail.com/politics/article-what-is-g7/
[5] Top finance officials from G7 countries gather in Banff for 3-day summit, CBC, May 2025, https://www.cbc.ca/news/canada/calgary/calgary-g7-finance-ministers-meeting-banff-1.7539528
[6] French police thwart attack on G7 summit, DW, August 2019, https://corporate.dw.com/en/french-police-thwart-attack-on-g7-summit/a-50102795
[7] Member countries of the then G8 ousted Russia from the group following the annexation of Crimea in 2014.
Russia Is Ousted From Group of 8 By U.S. and Allies, The New York Times, March 2014, https://www.nytimes.com/2014/03/25/world/europe/obama-russia-crimea.html
[8] Group says car bomb intended for G8 hotel, United Press International, March 2013, https://www.upi.com/Top_News/World-News/2013/03/26/Group-says-car-bomb-intended-for-G8-hotel/UPI-73901364275980/
[9] Cyberattacks increasing in Japan ahead of G-7 summit, Kyodo News, April 2023, https://english.kyodonews.net/news/2023/04/f43c163c64cc-cyberattacks-increasing-in-japan-ahead-of-g-7-summit.html
[10] Ibid
[11] Weather conditions expected to fuel active wildfire season in southern Alberta, CBC, May 2025, https://www.cbc.ca/news/canada/calgary/wildfire-outlook-rain-summer-1.7534387
[12] "2024 Alberta Wildre’s seasonal statistics," Government of Alberta, 2024, https://open.alberta.ca/dataset/db7cdfde-7ccd-4419-989f-09f8bb28da22/resource/0dd1c558-d049-4248-ace0-1b17ac13dbaf/download/fp-alberta-wildfire-seasonal-statistics-2024.pdf
[13] National Wildland Fire Situation Report, Government of Canada, https://cwfis.cfs.nrcan.gc.ca/report
[14] Alberta Wildfire Status, Government of Alberta, https://experience.arcgis.com/experience/0e45bd0ef9814d5e9ec3f87900a4cfe9
[15] Interactive Map, Canadian Wildland Fire Information System, https://cwfis.cfs.nrcan.gc.ca/interactive-map
[16] Wildfire Update Edson Forest Area, Government of Alberta, https://www.alberta.ca/wildfire-update-edson-forest-area
[17] Public Land Use Zones, Government of Alberta, https://www.alberta.ca/public-land-use-zones
[18] Alberta Crown Land Vision, Government of Alberta, January 2021, https://www.alberta.ca/alberta-crown-land-vision
[19] Weather conditions Banff National Park, Parks Canada, October 2024, https://parks.canada.ca/pn-np/ab/banff/securite-safety/meteo-weather
[20] Alberta River Basins, Government of Alberta, https://rivers.alberta.ca/
[21] Kananaskis Golf Course reopens Thursday, 5 years after flood, CBC, May 2018, https://www.cbc.ca/news/canada/calgary/kananskis-golf-course-reopens-thursday-1.4656401
[22] Weather Alerts for: Kananaskis Improvement District near Kananaskis Village, Environment and natural resources Canada, June 2025, https://weather.gc.ca/warnings/report_e.html?abrm29=
[23] Kananaskis Village, AB, Government of Canada, June 2025, https://weather.gc.ca/en/location/index.html?coords=50.916,-115.142
[24] Establishment of G7 Designated Demonstration Zones, Royal Canadian Mounted Police, May 2025,https://rcmp.ca/en/g7/news/2025/05/establishment-g7-designated-demonstration-zones
[25] “Canadian Telecommunication Market Report,” The Canadian Radio-television and Telecommunications Commission, 2025,https://crtc.gc.ca/pubs/cmr_ctmr_2025-en.pdf
[26] “National Cyber Threat Assessment,” Canadian Centre for Cyber Security, 2024,https://www.cyber.gc.ca/sites/default/files/national-cyber-threat-assessment-2025-2026-e.pdf
[27] Audit of the Summit Management Office for the 2018 G7 Presidency, Global Affairs Canada - Office of the Chief Audit Executive, June 2019,https://www.international.gc.ca/gac-amc/publications/audits-verification/2019/audit_2018_g7.aspx?lang=eng
[28] Managing the risks of legacy IT: Executive guidance, Australian Signals Directorate, April 2024, https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/legacy-it-management/managing-risks-legacy-it-executive-guidance
[29] Integrated Safety and Security Group, Royal Canadian Mounted Police, January 2025, https://rcmp.ca/en/g7/integrated-safety-and-security-group
[30] Ibid
[31] Ibid
[32] Controlled access zone and air restrictions, Royal Canadian Mounted Police, May 2025, https://rcmp.ca/en/g7/controlled-access-zone-and-air-restrictions
[33] Ibid
[34] Establishment of G7 Designated Demonstration Zones, Royal Canadian Mounted Police, May 2025, https://rcmp.ca/en/g7/news/2025/05/establishment-g7-designated-demonstration-zones
[35] G7 protests to be livestreamed to leaders in Kananaskis to give protesters a voice, Globalnews, June 2025, https://globalnews.ca/news/11209851/g7-kananaskis-protests-security/
[36] Integrated Safety and Security Group outline security preparations for the upcoming G7 Leaders' Summit, Royal Canadian Mounted Police, June 2025, https://rcmp.ca/en/g7/news/2025/06/integrated-safety-and-security-group-outline-security-preparations-upcoming-g7-leaders-summit
[37] RCMP, local police say security planning underway for G7 summit, Globalnews, May 2025, https://globalnews.ca/news/11193391/g7-leaders-summit-rcmp-police-preparations/
[38] Integrated Safety and Security Group, Royal Canadian Mounted Police, January 2025, https://rcmp.ca/en/g7/integrated-safety-and-security-group
[39] Ibid
[40] Ibid
[41] Highway protests won’t be tolerated during G7 summit in Kananaskis, head of security says, CBC, May 2025, https://www.cbc.ca/news/canada/calgary/g7-kananaskis-leaders-summit-security-protests-highways-banff-demonstration-zones-1.7536322
[42] Ibid
[43] Buenos Aires locked down for G20 summit, protest tightly controlled, Reuters, December 2018, https://www.reuters.com/article/business/buenos-aires-locked-down-for-g20-summit-protest-tightly-controlled-idUSKCN1NZ1ZJ/
[44] G7: Climate protesters target Cornish summit, BBC, June 2021,
[45] Member countries of the then G8 ousted Russia from the group following the annexation of Crimea in 2014.
Russia Is Ousted From Group of 8 By US and Allies, The New York Times, March 2014, https://www.nytimes.com/2014/03/25/world/europe/obama-russia-crimea.html
[46] Trump says Trudeau 'wrongly' pushed Russia out of G8 — when Harper was in power, CBC, May 2025, https://www.cbc.ca/news/politics/trump-wrongly-credits-trudeau-russia-g8-removal-1.7528717
[47] US opposes joint G7 statement on further support for Ukraine, Politico reports, Kyiv Independent, May 2025, https://kyivindependent.com/us-opposes-joint-statement-on-further-support-for-ukraine-during-g7-meeting-politico-reports/
[48] “The Dawn of Kinetic Cyber,” NATO CCD COE Publications, 2013,https://ccdcoe.org/uploads/2018/10/10_d2r1s4_applegate.pdf
[49] Permission granted for publication: This is the Israeli defense system that protected the leaders of the world powers at the G7 summit in Britain, Rafael, September 2021, https://he.rafael.co.il/blog/%d7%94%d7%95%d7%aa%d7%a8-%d7%9c%d7%a4%d7%a8%d7%a1%d7%95%d7%9d-%d7%96%d7%95-%d7%9e%d7%a2%d7%a8%d7%9b%d7%aa-%d7%94%d7%94%d7%92%d7%a0%d7%94-%d7%94%d7%99%d7%a9%d7%a8%d7%90%d7%9c%d7%99%d7%aa-%d7%a9%d7%94/ (Translated by Google)
[50] 2023-013-Various-GPS Interference & AIS Spoofing, US Department of Transportation, February 2023, https://www.maritime.dot.gov/msci/2023-013-various-gps-interference-ais-spoofing
[51] “Government Cyber Resilience,” UK National Audit Office, 2025, https://www.nao.org.uk/wp-content/uploads/2025/01/government-cyber-resilience.pdf
[52] “The State of Security Convergence in the United States, Europe, and India,” ASIS Foundation, 2019, https://www.asisonline.org/globalassets/publications-and-resources/convergence.pdf
[53] The OPM hack explained: Bad security practices meet China’s Captain America, CSO, February 2020, https://www.csoonline.com/article/566509/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html
[54] “Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing,” Journal of Cyber Security Technology, 2024, https://www.tandfonline.com/doi/full/10.1080/23742917.2024.2312671
[55] Alberta Wildfire Status, Government of Alberta, https://experience.arcgis.com/experience/0e45bd0ef9814d5e9ec3f87900a4cfe9
[56] New wildfire protection teams to serve at-risk Alberta municipalities, CBC, May 2025, https://www.cbc.ca/news/canada/calgary/widlland-urban-interface-fire-alberta-1.7542533
[57] Kananaskis still on long road to recovery, after 2013 flood, Globalnews, June 2014, https://globalnews.ca/news/1407238/kananaskis-still-on-long-road-to-recovery-after-2013-flood/
[58] Kananaskis County Annual Road Closures, Alberta Parks, 2025, https://www.albertaparks.ca/parks/kananaskis/kananaskis-country/advisories-public-safety/annual-road-closures/
[59] Integrated Safety and Security Group, Royal Canadian Mounted Police, January 2025, https://rcmp.ca/en/g7/integrated-safety-and-security-group
[60] Controlled access zone and air restrictions, Royal Canadian Mounted Police, May 2025, https://rcmp.ca/en/g7/controlled-access-zone-and-air-restrictions
[61] Police forces gear up to protect 3,400 people in Alberta wilderness at June G7 summit, CityNews, February 2025, https://calgary.citynews.ca/2025/02/26/police-forces-gear-up-to-protect-3400-people-in-alberta-wilderness-at-june-g7-summit/
[62] “The Kananaskis G8 Summit: A Case Study in Interagency Cooperation,” CANADIAN FORCES COLLEGE, 2003, https://www.cfc.forces.gc.ca/259/281/275/barr2.pdf
[63] G7 says Russia finding covert efforts to undermine elected governments, Reuters, January 2025, https://www.reuters.com/world/europe/g7-says-russia-finding-covert-efforts-undermine-elected-governments-2025-01-17/
[64] National Wildland Fire Situation Report, Canadian Wildland Fire Information System (CSIS), Government of Canada, https://cwfis.cfs.nrcan.gc.ca/report