SEATTLE — Microsoft handed over BitLocker encryption keys to the FBI last year, enabling federal investigators to unlock three laptops seized in a Guam fraud investigation, according to a Forbes report published Thursday. The disclosure marks the first known instance of a major technology company providing encryption keys that grant access to personal devices, reigniting debates over cloud-stored recovery keys and user privacy.
The Case: Guam Fraud Investigation
The BitLocker keys were provided to the FBI in connection with a fraud investigation on the U.S. territory of Guam, according to court documents reviewed by Forbes. Federal investigators had seized three laptop computers as part of the probe but were unable to access the devices due to BitLocker encryption, Microsoft's built-in disk encryption feature for Windows.
Rather than attempting to crack the encryption—a process that could take years or prove impossible with modern encryption standards—investigators requested the BitLocker recovery keys from Microsoft. The company complied with the request, providing keys that allowed investigators to unlock all three laptops and access their contents.
The case remains under seal, and neither the FBI nor Microsoft confirmed specific details. However, Forbes reported that court filings indicate the laptops were unlocked using recovery keys provided by Microsoft in response to a valid legal process.
What is BitLocker?
BitLocker is a full-disk encryption feature included with Windows Pro, Enterprise, and Education editions since Windows Vista. When enabled, BitLocker encrypts the entire drive, making data unreadable without proper authentication—typically the user's password or PIN.
How BitLocker Works:
- • Uses AES encryption (128-bit or 256-bit) to protect data
- • Generates a recovery key during initial setup
- • Recovery key can unlock drive if password is lost or forgotten
- • Microsoft accounts can automatically backup recovery keys to cloud
- • Users can also save keys locally or print them
The recovery key is a 48-digit numerical password that serves as a backup method to unlock the encrypted drive. While users can choose to store this key locally, Microsoft's default behavior for devices signed in with a Microsoft account is to automatically upload recovery keys to the user's OneDrive cloud storage.
Cloud Storage as Backdoor?
Privacy advocates have long warned that cloud-stored encryption recovery keys effectively create a "backdoor" that law enforcement can exploit with legal process, undermining the security benefits of encryption. The Microsoft case appears to confirm these concerns.
"This is exactly what privacy advocates have been warning about for years," said Matthew Green, a cryptography professor at Johns Hopkins University. "When your encryption recovery keys are stored in the cloud, they're accessible to the company—and by extension, to law enforcement with a warrant. It's not a backdoor in the cryptographic sense, but it has the same practical effect."
The revelation contrasts sharply with Apple's stance on device encryption. In the famous 2016 San Bernardino case, Apple refused FBI demands to create software that would unlock an iPhone used by a terrorist, arguing that doing so would undermine encryption security for all users. Apple's iPhones use device-only encryption where the company does not have access to decryption keys.
However, Microsoft's situation differs because BitLocker users themselves choose (or are defaulted into) uploading recovery keys to Microsoft's servers. The company did not create a special backdoor—it simply provided access to keys that users had already stored with Microsoft.
Microsoft's Response
Microsoft declined to confirm specific details of the Guam case but provided a statement defending its practices regarding law enforcement requests.
"Microsoft complies with legal requests for customer data when we receive appropriate legal process, such as a warrant or court order," a company spokesperson said. "We carefully review all such requests and push back on overly broad or inappropriate demands. When BitLocker recovery keys are stored in a customer's Microsoft account, they may be subject to legal process just like other account data."
The company emphasized that users control whether recovery keys are uploaded to Microsoft accounts and can choose to store them locally instead.
"Users have full control over where their BitLocker recovery keys are stored," the spokesperson added. "They can choose to save recovery keys to their Microsoft account for convenience, print them, save them to a USB drive, or store them in other secure locations. We provide clear information about these options during BitLocker setup."
⚠️ Important for Users:
If you use BitLocker on a Windows device signed in with a Microsoft account, your recovery keys may be automatically stored in OneDrive and accessible to law enforcement with proper legal process.
To check if your recovery keys are stored with Microsoft, visit:microsoft.com/account → Devices → Recovery Keys
Legal Framework and Precedent
The Microsoft case raises important questions about the legal framework governing law enforcement access to encrypted data. Under the Stored Communications Act and other federal laws, companies can be compelled to provide customer data in their possession when presented with appropriate legal process.
"If Microsoft has the recovery keys in their possession, they can be legally required to turn them over with a warrant," said Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory. "This is fundamentally different from being asked to break encryption or create a backdoor. Microsoft is simply handing over data that's already stored on their servers."
However, privacy advocates argue that the distinction matters little from a user's perspective. If encryption can be bypassed through cloud-stored keys, the practical security benefit is significantly diminished compared to true end-to-end encryption where no third party can access the data.
Industry Practices Vary
Technology companies take varying approaches to encryption recovery keys:
- Apple (iPhones/iPads): Uses device-only encryption keys that Apple cannot access. Even with a warrant, Apple cannot unlock modern iPhones. However, iCloud backups (if enabled) can be accessed by Apple with legal process.
- Google (Android): Similar to Microsoft, Android devices signed into Google accounts may backup encryption keys to Google servers, making them accessible with legal process.
- 1Password, Bitwarden (Password Managers): Use end-to-end encryption where the company cannot access user data even with legal process. Only users have decryption keys.
- WhatsApp, Signal (Messaging): Implement end-to-end encryption with no company access to message content, though metadata may be accessible.
The variation in approaches reflects different balances between security, convenience, and recoverability if users forget passwords or lose access to devices.
Privacy Advocate Reactions
Digital rights organizations expressed concern about the implications of Microsoft providing BitLocker keys to law enforcement, warning that the practice could have a chilling effect on encryption adoption.
"This revelation undermines trust in commercial encryption products," said Cindy Cohn, Executive Director of the Electronic Frontier Foundation. "Users who believe their data is securely encrypted may not realize that the keys to unlock that encryption are sitting on a corporate server accessible to law enforcement."
The American Civil Liberties Union called for greater transparency from technology companies about their data retention practices and law enforcement cooperation.
"Companies should be crystal clear with users about what data they retain and how it can be accessed," said Jennifer Granick, ACLU Surveillance and Cybersecurity Counsel. "Many users assume that if they enable encryption, their data is safe from third-party access. That's not always true."
Law Enforcement Perspective
Law enforcement agencies have long argued that widespread encryption creates significant challenges for legitimate criminal investigations. The FBI did not comment specifically on the Guam case but has consistently advocated for lawful access to encrypted data.
"Encryption is a valuable tool for protecting privacy and security, but it can also shield criminal activity from investigation," FBI Director Christopher Wray said in a speech last year. "We need solutions that provide both strong encryption and lawful access for investigations conducted under proper legal authority."
However, cybersecurity experts argue that any mechanism for lawful access—including cloud-stored recovery keys—creates potential security vulnerabilities that could be exploited by sophisticated adversaries including foreign intelligence services.
What Users Can Do
Users concerned about law enforcement access to their encrypted devices have several options:
Privacy-Focused Options:
- 1. Store Recovery Keys Locally: Don't save BitLocker recovery keys to your Microsoft account. Save them to a USB drive or print them and store in a secure physical location.
- 2. Use Alternative Encryption: Consider third-party encryption tools like VeraCrypt that don't involve cloud-stored keys.
- 3. Check Existing Keys: Visit microsoft.com/account to see what recovery keys are stored and delete them if desired (but keep a secure backup elsewhere).
- 4. Use Local Accounts: Consider using Windows without signing in to a Microsoft account to avoid automatic cloud backup of recovery keys.
- 5. Understand Trade-offs: Recognize that maximum security comes with reduced convenience—if you lose locally-stored recovery keys, your data is unrecoverable.
Key Takeaways:
- • Microsoft provided BitLocker encryption keys to FBI for Guam fraud investigation
- • First known instance of major tech company providing device encryption keys to law enforcement
- • BitLocker recovery keys automatically uploaded to OneDrive by default for Microsoft accounts
- • Differs from Apple's stance refusing to unlock devices in San Bernardino case
- • Privacy advocates warn cloud-stored keys effectively create law enforcement "backdoor"
- • Users can choose to store recovery keys locally instead of in cloud
- • Raises broader questions about balance between security, convenience, and lawful access
About the Author
Jack SJack S is a journalist at ObjectWire specializing in investigative reporting, technology analysis, and privacy issues. Committed to ethical journalism and accurate, unbiased reporting in an era of misinformation.
View all articles by Jack S →Related Coverage
Editor's Note: This article is based on a Forbes report and publicly available court documents. Neither Microsoft nor the FBI provided detailed comments beyond official statements. Last updated: January 23, 2026, 6:00 PM ET.