Free and open-source software is changing the way we view infrastructure: FOSSCON 2017 – Technical.ly Philly

Free and open-source software is all around us today, becoming part of our lives in ways we might never know. In the early days FOSS was primarily a hobbyist alternative, but today it has become ubiquitous, making its way into our phones, our cars, our schools, government, offices and even home appliances.

This year at FOSSCON were seeing a new trend as FOSS explodes into the infrastructure space. While hardware is still largely closed behind the walls of patents and trademarks, virtual infrastructure means we are abstracted from the underlying hardware, and more and more infrastructure is being built on top of flexible, open and scalable FOSS solutions.

You can learn more about the expansion of FOSS in infrastructure and what it means to the world at FOSSCON, Philadelphias own Free and Open Source Software Conference. This free all-day event is held annually in Philadelphia, and offers a variety of talks, workshops and other content to let the community explore and learn about Free and Open Source Software. FOSSCON 2017 takes place Saturday, Aug. 26. Registration is quick and easy.

Topics this year include more than just big-business FOSS as an infrastructure solution, with talks on Stargates, Amateur Radio and a dive into the past to talk about punch cards. Attendees can also get help installing Linux on their machines, or learn about some of the other pieces of software they can use on their current computers for free.

In keeping with the Free in the name, FOSSCON is also free for everyone. The event is paid for entirely by FOSS-friendly sponsors, donors and attendees who opt to contribute to the event. The FOSSCON team believes it is important that anyone be able to make it to the event, and never wants the price of a ticket to stand in the way of the great experience that is FOSSCON.

Jonathan Simpson is a systems engineer at CoreDial and an organizer of FOSSCON, the Free and Open Source Software Conference. Check him out on LinkedIn here.

Go here to see the original:
Free and open-source software is changing the way we view infrastructure: FOSSCON 2017 - Technical.ly Philly

Japanese Online Giant GMO Launches Open Source Blockchain Project – Finance Magnates

Internet giant GMO Internet Inc. of Japan today announced the launch of the GMO Blockchain Open Source Software Project (GMO Blockchain OSS). The system will allow users to develop programs using blockchain as open source. In a first attempt by the company using this platform, the company has developed an open source medical record sharing system and launched it on July 6th, 2017.

Learn how to buy Bitcoin and Ethereum safely with our simple guide!

The GMO Blockchain OSS (free to modify, free for commercial) programmes are capable of supporting real service development using blockchain technology. Blockchain technology enables users to record and retain data which can bedistributed on multiple computers. The system is popular for its fraud-resistant capabilities and zero downtime for a low cost. This helps the doctors access the medical history of patients quickly, in times of emergency, as soon as the user gives access to the same.

The company issued a statement on the sidelines of the launch of GMO Blockchain OSS: As the first initiative, we have now created a Medical Record Sharing System based on Z.com Cloud Semi-Public Blockchain and started providing open source from today. We will continue to publish open source programs that meet various needs in the future.

GMO Internet is investing big on developing new services using blockchain technology. This is evident from the companys participation in the cryptocurrency exchange and trading business through the newlyestablished GMO Wallet Co. Ltd. andlaunch of the Z.com Cloud blockchain and ConoHa blockchain for easy creation of distributed blockchain applications.

See original here:
Japanese Online Giant GMO Launches Open Source Blockchain Project - Finance Magnates

Executive Spotlight Interview with Lynne Chamberlain, VP of Business Dev. for Red Hat – ExecutiveBiz (blog)

ExecutiveBiz: What does your role as the leader of business development for the public sector entail?

Lynne Chamberlain: Istarted with Red Hatthirteen years ago and moved to theNorth American Public Sector organization2 years later.

Red Hat has grown from $500M to $3B in revenues during this time and Paul Smiths Public Sector Organization has been a key contributor.

We started the Federal Business Development group to pursue government programs in the DOD, Intel, and Civilian Agencies. Today the organization captures both Federal and SLED programs, and supports our System Integrators through a premier partner program. The Business Development organization working with the top 20 System Integrators has successfully teamed to win major programs within Public Sector. Our continual growth of 30%+ YOY, through closing Open Source solutions that include: Linux, Cloud, Containers, Storage, middleware and management software.I have been fortunate to lead the BD organization to include 26 Capture/Alliance Managers, System Architects and BD Marketing.

ExecutiveBiz: Where do you see open-source software having the greatest impact in the public sector?

Lynne Chamberlain:Open Source softwares greatest impact is in the Cloud and Dev Ops market space.Our Cloud and middleware products provide technology leadership:

Partners, i.e., Amazon and Microsoft turn to Red Hat to secure their cloud platforms and provide customers software defined storage, and middleware.Cloud Forms from Red Hat provides a single pane of glass so customers can manage a hybrid infrastructure that allows customers to transform their environments to take advantage of the best architectures in the software industry.

Red Hat has seen significant growth in the Cyber security market.Our Open Source Linux software is the foundation for many Cyber companies to build their software stack. Companies like Forcepoint, Raytheon uses Red Hat to combat insider threat, and General Dynamics uses Red Hat for mission critical apps. Red Hat was pleased to be part of the CSRA winning team for DISAs MILCOULD.

ExecutiveBiz: You have led the growth of your division thirty percent year over year for the past twelve years. Could you tell our readers how you achieved that?

Lynne Chamberlain:When I came to Red Hat we were known as the Linux software company that provided free software or people thought. Our business model of selling subscriptions instead of perpetual licenses has proved to be the direction of the industry today.It was an easy transition for Red Hat under the Cloud model. About 95% of Public Sector customers use Red Hat Linux software over our competition.Clients use it not only for the security, but also as the building block for our other software. Through the years Red Hat has acquired state of the art software, i.e., middleware, management software, storage and made it OPEN and easy to use by the community.

As the government transforms from the old mainframe technology to the Cloud, it is important for them to find an architecture that allows compatibility to all technologies so organizations are not locked in to any one vendor.

Today, we have so many great solutions not just Linux. When you think of Red Hat, you dont think of just Linux anymore, but instead customers think of our complete stack of solutions and of all these capabilities.Our growth has on one hand been organic with the foundation being a secure OS that adheres to standards, compliance, is efficient and all at a huge cost savings to our partners and end user customers.Weve also grown through acquisitions weve acquired JBOSS, a middleware product, as well as our Cloud and Storage products.We have a whole robust open source software suite today and Gartner portrays this in their 4 Quadrant model.

ExecutiveBiz: How can the public and private sector work closer together to implement Open-source software?

Lynne Chamberlain:Many of the Federal Agencies have adopted Open Source through out their infrastructure.They view the private sector as experts and their choices in architectures and software as key indicators of the future direction of industry.Take the VA, and DHA; they have procured Open source solutions through Cerner and Optum.The SEC looks to Wall Street and their IT decisions. Both the NY Stock Exchange and the NASDAQ run on Red Hat Open Source software. The Department of Treasury looks to the Bank of America, Citibank, etc as to how they build their banking, trading, etc., solutions.They run many of their applications on Red Hat Open Source software.Law Enforcement is tightly connected between DOJ, FBI, and the Police Departments when researching finger print identification, retina scans, etc.The foundation for all this work is done on Red Hat Open Source.Red Hat has a large partner eco-system.The applications running on Red Hat range from Child Welfare, to Toll Authority, to Banking, to Healthcare, to Justice, etc.Red Hat cannot do this alone.Teaming with System Integrators, Value Added Partner, and Resellers, together make this happen.

ExecutiveBiz: What new market opportunities do you see on the horizon?

Lynne Chamberlain:The industry is our oyster. Open Source is the Industrys software technology of choice.The total package of software includes: security, compliance, a complete stack of products from the OS, Open Stack, Cloud, middleware, storage, etc.

We continue to transform ourselves in order to support our customers and partners.We not only sell software to the IT Folk within the Public Sector but we are strong in our capabilities within the mission critical applications and framework.

As Jim Cramer on MSNBC says, Red Hat is Red Hot!

Read more from the original source:
Executive Spotlight Interview with Lynne Chamberlain, VP of Business Dev. for Red Hat - ExecutiveBiz (blog)

Doing a Startup Involving Cryptography? Get Out of the US – IEEE Spectrum

Theres no better place than Singapore to do a deep tech startup, particularly anything involving cryptography. So says Brijesh Pande, founder and managing partner of the Tembusu ICT Fund, a Singapore-based software-focused venture capital fund. Admittedly, he has a vested interest in enticing entrepreneurs to come to the island nation, but heand two founders of companies in his portfolio, Lawrence Hughes from Sixscape and Ramond Looi from Vi Dimensionsmake a solid argument.

Here in Singapore, Pande says, We have no requirement for a security back door. The fact that the NSA [National Security Agency] requires U.S. companies to provide a back door makes technology developed in the U.S. less trusted around the world.

Hughes, who before decamping to Singapore founded several companies, including U.S.-based Ciphertrust and Philippine-based Infoweapons, says its just too difficult to do cyber security products in the U.S. these days. The NSA requires weakened algorithms and back doors, so you have to assume all IT products in the U.S. are compromised. That, he says, makes it hard to market them around the world.

Sixscape, Hughes latest startup, has developed a certificate management protocol based on a distributed public key infrastructure that can manage, he says, billions of unique certificates. Web sites use server certificates to identify themselves as legitimate. In his scheme, individual users will also use client certificates, created on their own computers, as identification, instead of less secure usernames and passwords. For additional security, banks and other particularly sensitive businesses can give their clients hardware keys containing certificates to even more reliably confirm identity. Hughes says Sixscape will soon be piloting the technology, issuing some 2 million hardware tokens for a government agency in a nearby country that wishes to allow secureaccess its website, without usernames or passwords.

Meanwhile, two-year-old Vi Dimensions, Looi explained, is developing AI to mine surveillance videos for anomalies. With hundreds of millions of cameras out there, he says, the cost of human monitoring is just too high. The software, he says, can spot a big truck driving an unusual route, or a child lost in a subway station. The company, he says, has deployed the technology on 200 cameras in Sentosa, a resort island with 20 million visitors annually, has signed an agreement with one of Europes largest national railways to use the technology on its surveillance cameras, and has completed trials in an Abu Dhabi skyscraper. On Sentosa, he said, the technology was able to improve operationsby spotting too-long lines at taxi stands and identifying points where parents were having trouble navigating strollers.

Its not just escaping the NSA that makes Singapore more and more attractive to startups, these entrepreneurs say.

The potential tightening of H1B visas in the United States will push more companies to start elsewhere, says Pande. If the U.S. develops an H1B issue, he says, that will be good for Singapore.

Here, there is no limit to H1Bs, you just have to demonstrate a need, Pande says.We have Singaporeans, Americans, Iranians, Indians, Russiansa veritable United Nations working at all our companies.

And, pointed out Hughes, Singapore has zero capital gains tax, relying instead on income and value added taxes.

Starting a company in Singapore, Pande points out, is not without challenges. We dont have a deep bench, he says. So the second level of tech talent, just below the entrepreneur, can be hard to come by.

And though the local universities are solid, he says, there just arent the big tech companies doing core R&D that spit out spinoffs.And there isnt a big domestic market, says Pande,though government support helps.

Valuations for startups also tend to be low compared to those in the U.S., Hughes says, but its early days here.

IEEE Spectrums blog featuring the people, places, and passions of the world of technologists in Silicon Valley and its environs. Contact us:t.perry@ieee.org

Germany takes the lead in making the Internet local 23Jan2014

Scott Borg, director of the U.S. Cyber Consequences Unit, says hardware design engineers hold the future of cybersecurity in their hands 15May

Secretive big data company Palantir has gobbled up downtown Palo Alto 14Jan2015

HAXs Ben Joffe takes a look at whats going on in Chinas startup sector 27Jun

Derive is taking technology that lets hot rodders soup up their vehicles and using it to make drivers behave themselves 27Jun

HAX executives preview trends in hardware startups 26Jun

The Canadian company wants to use AI to rate your car insurance risk in real time 22Jun

Affectivas Rana El-Kaliouby says our devices need to get a lot more emotionally intelligent 13Jun

The Pied Piper of the TV show's fictional quest to reinvent the Internet trails the progress of MaidSafe and the University of Michigan 9Jun

Nannycams? So yesterday. Startup Lighthouse's computer vision and AI will tell you everything you miss when youre not home 6Jun

Silicon Valley startup Verdigris cloud-based analysis can tell whether youre using a Chromebook or a Mac, or whether a motor is running fine or starting to fail 3May

Enviro Powers small steam turbine could cut homeowners electricity bills by 30 percent 18Apr

Avegant is confident enough about its light-field-based mixed-reality technology that it's willing to show and tell 18Apr

The 2017 contest puts a renewed emphasis on projects that could become successful businesses 24Mar

Who needs infrared spectrometers in their phones? People who hate buying tasteless produce or mystery cheese 14Mar

Palo Alto startup twoXAR partners with Santen Pharmaceutical to identify new glaucoma drugs; efforts on rare skin disease, liver cancer, atherosclerosis, and diabetic nephropathy also under way 13Mar

As coal industry jobs are lost, likely not to return, some in coal country have turned to coding 15Feb

The next-generation kitchen ovens promise perfect cooking using solid-state RF transmitters and sensors 6Feb

Take a bit of Maker Faire, a dash of Burning Man, and a scoop of Chuck E. Cheese, add $15 million, and poof, a micro-amusement park 19Jan

$34 million in drone preorders wasn't enough to keep Lily open 12Jan

Originally posted here:
Doing a Startup Involving Cryptography? Get Out of the US - IEEE Spectrum

A brief history of GnuPG: Vital to online security but free and underfunded – GCN.com

A brief history of GnuPG: Vital to online security but free and underfunded

This article was first posted on The Conversation.

Most people have never heard of the software that makes up the machinery of the internet. Outside developer circles, its authors receive little reward for their efforts, in terms of either money or public recognition.

One example is the encryption software GNU Privacy Guard (also known as GnuPG and GPG), and its authors are regularly forcedto fundraiseto continue the project.

GnuPG is part of the GNU collection offree and open source software, but its story is an interesting one, and it begins with software engineer Phil Zimmermann.

We do not know exactly what Zimmermann felt onJanuary 11, 1996, but relief is probably a good guess. The United States government had just endedits investigationinto him and his encryption software, PGP or Pretty Good Privacy.

In the 1990s, the U.S. restricted the exportof strong cryptography, viewing it as sensitive technology that had once been the exclusive purview of the intelligence and military establishment. Zimmermann had been facing serious punishment for posting PGP on the internet in 1991, which could have been seen as a violation of theArms Export Control Act.

To circumvent U.S. export regulations and ship the software legally to other countries, hackers even printed the source codeas a book, which would allow anyone to scan it at its destination and rebuild the software from scratch.

Zimmermann later worked with the PGP Corporation, which helped define PGP as an open internet standard,OpenPGP. A number of software packages implement this standard, of which GnuPG is perhaps the best known.

What is PGP?

PGP implements a form of cryptography that is known as asymmetric cryptography or public-key cryptography.

The story of its discovery is itself worth telling. It was invented in the 1970s byresearchersat the British intelligence service GCHQ and then again byStanford University academicsin the U.S., although GCHQs results were only declassified in 1997.

Asymmetric cryptography gives users two keys. The so-called public key is meant to be distributed to everyone and is used to encrypt messages or verify a signature. The private or secret key must be known only to the user. It helps decrypt messages or sign them -- the digital equivalent of a seal to prove origin and authenticity.

Zimmermann published PGP becausehe believedthat everybody has a right to private communication. PGP was meant to be used for email, but could be used for any kind of electronic communication.

The challenge facing security software

Despite Zimmermanns work, the dream of free encryption for everyone never quite came to full bloom.

Neither Zimmermanns original PGP nor the later GnuPG managed to become entirely user friendly. Both use highly technical language, and the latter is still known for being accessible only by typing out commands -- an anachronism even in the late 1990s, when most operating systems already used the mouse.

Many users did not understand why they should encrypt their email at all, and attempts to integrate the tools with email clients were not particularly intuitive.

Big corporations such as Microsoft, Google and Apple shunned it -- to this day, they do not ship PGP with their products, although some are now implementing forms of end-to-end encryption.

Finally, there was the issue of distributing public keys -- they had to be made available to other people to be useful. Private initiatives never gathered much attention. In fact,a number ofacademic studiesin the early and late 2000s showed that these attempts never managed to attract widespread public usage.

The releaseof the Edward Snowden documents in 2013 spurred renewed interest in PGP. Crypto parties became a global phenomenon when people met in person to exchange their public keys, but this was ultimately short-lived.

PGP today

When I met Zimmermann in Silicon Valley in 2015, he admitted that he did not currently use PGP. In a more recent email, he said this is because it does not run on current versions of macOS or iOS. I may soon run GnuPG, he wrote.

By todays standards, GnuPG -- like all implementations of OpenPGP -- lacks additional security features that are provided by chat apps such as WhatsApp or Signal. Both are spiritual descendants of PGP and unthinkable without Zimmermanns invention, but they go beyond what OpenPGP can do by protecting messages even in the case of a private key being lost.

Read more:
A brief history of GnuPG: Vital to online security but free and underfunded - GCN.com

As Cryptocurrency Prices Recover, Bitcoin War May Be Averted – Futurism

In Brief After a rough weekend, Bitcoin investors, miners, and developers are cautiously optimistic: after hitting historic lows, the cryptocoin's price went back up on Monday.

After a rough weekend of historic lows, Bitcoin prices began to recoveron Monday, reachingover $2,300, signaling a crisis averted for now.Its also an optimistic sign that the potential network hard fork may be avoided, with more bitcoin shareholders, miners and developers,warming up to a proposed solution.

Bitcoin prices dropped dramatically beginning Friday and continuing well into the weekend. Economic forecasts had suggested that the most turbulent period in the cryptocoins history wasimminent. It didnt come as a complete surprise, as many were expecting the so-called Bitcoin Civil Warto ensue between miners and developers, after a deadlock in deciding what direction the cryptocurrency should take amidst increased blockchain traffic.

Miners wanted to increase Bitcoins block-size limit, while developers have proposed moving data off the main blockchain network, which would diminish the influence miners wield. The scaling solution in question is the Bitcoin Improvement Protocol (BIP) 91, which makes theSegWit2x update and the BIP 148compatible. Essentially, it would make it easier for the SegWit2x update to be adopted, while at the same time avoiding the split that BIP 148 might cause.

To lock in by July 31, BIP 91 only needs 80 percent miner support unlike BIP 148, which would require 95 percent. With increased support for BIP 91, the expected July 31 to August 2 bitcoin splitcould still be averted.

Disclosure: Several members of the Futurism team, including the editors of this piece, are personal investors in a number of cryptocurrency markets. Their personal investment perspectives have no impact on editorial content.

Continue reading here:
As Cryptocurrency Prices Recover, Bitcoin War May Be Averted - Futurism

Hackers Just Stole $7 Million in a Brazen Ethereum Cryptocurrency Heist – Fortune

Hackers hijacked cryptocurrency trading platform CoinDash on Monday just as it was in the middle of its initial coin offering, or ICO. It's the first known breach of an ICO, this season's hottest fundraising method.

CoinDash, an Israeli startup, planned to raise capital by selling its own digital tokens in exchange for the cryptocurrency Ethereum , which is similar to Bitcoin . But just 13 minutes into the token sale, which began at 9 a.m. ET Monday, an "unknown perpetrator" hacked CoinDash's website and changed the address for sending investments to a fake one, the company later announced on its website . That diverted millions of dollars in contributions to the attacker.

While the CoinDash ICO still managed to raise $6.4 million from early investors, the hacker stole $7 million worth of Ethereum before the company was forced to pull the plug on the token sale. Despite the losses, CoinDash promised to dole out its tokens accordingly to everyone who participated in the ICO before it was shut down, whether or not they sent funds to the correct address.

"Reminder: We are still under attack. Please do not send any [Ethereum] to any address, as the Token Sale has been terminated," CoinDash said in the statement.

The incident is likely to put a damper on the enthusiasm surrounding ICOs. The offerings are similar to stock market initial public offerings, or IPOs. But there are two key differences: ICO investors receive cryptocurrency instead of equity, and the offerings face far less regulation.

ICOs have had a banner year. In 2017 alone, such token sales have raised at least $540 million, my colleague Jeff John Roberts reported in a recent Fortune Magazine story, "Why Tech Investors Love ICOsand Lawyers Dont." A month ago, a single ICO raised as much as $147 million; another raised $35 million in just 30 seconds .

The CoinDash hack is reminiscent of another large-scale Ethereum heist last year, when attackers breached a blockchain organization called the DAO and stole more than $50 million that had been raised in an ICO a month earlier. But the DAO hack occurred after the token sale had already ended.

To CoinDash, which hyped its ICO with modified promotional imagery for HBO's Game of Thrones , the breach is a blow both financially and in terms of its relationship with customers, some of whom suggested on social media that the attack could have been an inside job.

For its part, CoinDash pledged to investigate the breach and move on. "This was a damaging event to both our contributors and our company but it is surely not the end of our project," the company said in its statement.

More:
Hackers Just Stole $7 Million in a Brazen Ethereum Cryptocurrency Heist - Fortune

Now could be a good time to pick up a secondhand graphics card as … – TechRadar

Cryptocurrency mining is the process of using GPUs, or graphics cards, to invest in, and profit from, the value of digital encrypted currencies. In recent times there has been something of a boom in the value of cryptocurrencies, meaning that miners have been snapping up GPUs.

However, in the last few days there has been a swift decline in the value of both Bitcoin and Etherium, leading to many miners selling their GPUs. According to CoinDesk, there have been 260 entries on Ebay for 'Etherium mining rig', all bar three of which appeared online after July 11.

That date is significant because thats the day after Etherium hit its peak of $400 to put that in context it was only worth $10 a unit on January 1. The value of cryptocurrencies plummeted after that, with the market losing $10 billion over the weekend and Etherium hitting a low of $133, although it's since recovered to around $200.

If you want to take advantage of the sudden glut of GPUs on Ebay, youre going to have to know what youre looking at, as they are definitely packaged for the purpose of mining, even though they're essentially just powerful gaming GPUs.

It's worth bearing in mind that months (or years) of mining could shorten the life expectancy of graphics cards if they've been used a lot, but the savings you get may be worth the risk. As the rigs usually contain a number of GPUs specifically calibrated for mining, it will require a few friends and a little expertize to get your cheap GPU.

If plowing through mining rigs sounds like a lot of work, you may still see a discount in the price of GPUs in the coming months as the diminishing demand may well have a knock-on effect on GPU cost.

If we see any change in GPU prices, we'll let you know.

From CoinDesk

Via PC Gamer

More here:
Now could be a good time to pick up a secondhand graphics card as ... - TechRadar

Solving the Email Spam Problem with Cryptocurrency – Finance Magnates

Billionaire venture capitalist Tim Draper announced on Monday that he has bought 10% of all tokens in the initial coin offering (ICO) of Credo, a new cryptocurrency meant to solve the problem of email spam. The CEO of BitBounce, Stewart Dennis, who is heading the project, sat down to talk with Finance Magnates about his solution and the ICO process.

Learn how to buy Bitcoin and Ethereum safely with our simple guide!

The interview was broadcast live and a video recording is available here:

Draper made tidal waves in the investor community last month by investing in the companies that created Tezos and Bancor. He was also the winner of the US Marshals Bitcoin auction, making him one of the leading owners of Bitcoin.

Token offerings allow entrepreneurs a new way to transform society. They are doing everything from banking the unbanked to streamlining how people transact business to helping secure peoples identities. Credos solve the SPAM problem, allowing legitimate advertisers to pay to connect, while allowing people to put value on their time and attention, said Draper.

Draper previously made multiple investments in Credos parent company BitBounce.

Credo and BitBounce were developed by husband-and-wife team Stewart Dennis and Alexis Roizen-Dennis. Stewart is a Stanford Computer Science graduate and leads engineering for the company. Alexis studied art at the Academy of Art University in San Francisco and leads design for the company. The team also created the SaaS product suite called Turing Cloud, which gave them their experience in developing email software.

Credos official ICO for the public is taking place on July 26th.

More here:
Solving the Email Spam Problem with Cryptocurrency - Finance Magnates

Refugees who helped Edward Snowden now look to Canada as their only hope – The Guardian

The refugee families in Hong Kong, China on Monday. Photograph: ZUMA Wire/REX/Shutterstock

For two weeks they sheltered the worlds most wanted man, ferrying Edward Snowden between tiny apartments in Hong Kongs poorest neighborhood.

Now the four refugees are at the centre of a court battle in Canada, as lawyers frantically work to bring them and their children to the country amid concerns that they face grave reprisals over their actions.

It seems like the families connection to Snowden has made them radioactive and put them in a uniquely vulnerable situation, said Michael Simkin, one of the lawyers behind a motion filed this week in federal court and aimed at expediting asylum claims for the group in Canada.

The families lived in obscurity until last year, when Oliver Stones film on the whistleblower revealed that Snowden had been protected by asylum seekers in Hong Kong.

After journalists tracked them down, the refugees three from Sri Lanka and one from the Philippines came forward, explaining that they had been introduced by their mutual lawyer and that their actions had come before the US demand for Snowdens arrest was recognised in Hong Kong.

Since then, the asylum seekers claim theyve been routinely questioned by authorities to find out what they know about Snowden. Their lawyers have spoken out about relocating their clients several times over suspicions that members of Sri Lankan security forces are attempting to find them.

In May, Hong Kong rejected their asylum claims, paving the way for deportation to their home countries, where the claimants say they could face imprisonment, torture and even death. Lawyers are now appealing the decisions; though they believe they have little hope of success.

Two weeks ago, the asylum claimants who include a former Sri Lankan soldier who alleges he was tortured by the army and a single mother from the Philippines who said she fled the country after being kidnapped and sexually assaulted were ordered to report to a detention centre in Hong Kong in early August. Their lawyers fear their children will end up in foster care as the parents await deportation.

Every development in their cases is being carefully tracked in Montreal, where a team of lawyers have launched For the Refugees, a non-profit organisation dedicated to bringing the families to Canada as privately sponsored refugees.

Using funds collected from donors to cover the expenses of settling the families, the paperwork to bring the four adults and their three children to Canada was filed in January. We are encouraged by prime minister Trudeaus commitment in taking a clear lead internationally in welcoming refugees, lawyer Marc-Andr Sguin said in April.

But months later, it appears that little progress has been made in processing the Canadian claims, said Simkin. Canada today is truly their last and only hope, added the lawyer. Once the families are arrested, it will severely compromise our ability to ever relocate them to Canada. Our clients lives are at stake, and this may be their last chance to escape a horrific fate.

In recognition of the urgency facing their cases, Simkin said that Canadas minister of immigration, Ahmed Hussen who came to Canada as a teenaged refugee from Somalia had committed in May to expedite the asylum claims. Two months later, consular officials said the files had not been fast-tracked, leaving the families at the whim of a process that could take years.

Simkin questioned why the Canadian government had seemingly changed its mind. We dont know if the US has put any kind of pressure on Canada, we dont know why Minister Hussen has reversed his decision What we do know is that the families and their three, stateless children who are under six years old are being punished, and thats just not right, he said. We cannot use these families as a proxy for punishing Edward Snowden.

After attempts to seek answers from the ministry proved fruitless, the lawyers said they were left with no other option but to file a legal challenge and hope that a federal court judge will force the Canadian government to fast-track the claims.

On Tuesday, the office of the minister of immigration said that the government is committed to ensuring every case is evaluated in a fair manner. The Minister has not made any commitment to expedite this application, said a spokesperson for the minister, declining to comment further due to privacy reasons.

The legal saga that has entangled the refugees has also attracted attention from Human Rights Watch, who noting that Hong Kong has accepted fewer than one percent of refugee claims in recent years urged Canada to open its doors to the families.

The compassionate act of letting Edward Snowden into their homes should never have landed these families in peril, the organisations Dinah PoKempner said in a statement. No one should have to risk a return to torture or persecution because they opened their door to another who feared the same.

Continue reading here:
Refugees who helped Edward Snowden now look to Canada as their only hope - The Guardian