Harold Abelson, et. al, Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications (MIT Cybersecurity and Internet Policy Research Initiative) (July 7, 2015) (full-text).
This report examines whether it is technically and operationally feasible to meet law enforcement's call for exceptional access without causing large-scale security vulnerabilities. It takes no issue with law enforcement's desire to execute lawful surveillance orders when they meet the requirements of human rights and the rule of law. The strong recommendation is that anyone proposing regulations should first present concrete technical requirements, which industry, academics, and the public can analyze for technical weaknesses and for hidden costs.