A well-reasoned argument from our favorite security blogger, with plenty of links to help us in writing our final paper. It is also an interesting article as it talks about the debate before Snowden, Wikileaks, and other whistleblowers.
This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?