Microsoft Hands Over BitLocker Encryption Keys to FBI

by Rebecca Sutton

TLDR

Microsoft confirmed it gave BitLocker encryption keys to the FBI as part of a fraud investigation in Guam. The company receives roughly 20 such requests yearly. By default, Windows backs up these recovery keys to Microsoft’s cloud, which means they’re accessible via legal orders. Unlike Apple and Google, Microsoft stores these keys in a format it can actually read. If you want proper protection, you’ll need to manage your own keys locally.

Why Your BitLocker Keys Might Not Be as Private as You Think

Here’s the thing about encryption: it’s only as secure as whoever holds the keys. Microsoft just proved that point rather spectacularly.

In early 2026, the FBI served Microsoft with a search warrant requesting BitLocker encryption keys for three laptops. Microsoft complied. The investigation centred on a Covid unemployment fraud scheme in Guam, and federal agents needed access to encrypted devices seized from suspects. Without Microsoft’s help, those laptops would have remained locked tight.

This marks the first publicly confirmed instance of Microsoft handing over BitLocker encryption keys to law enforcement. A Microsoft spokesperson told Forbes the company receives about 20 such requests annually. Most fail because users haven’t stored their recovery keys in the cloud. But when keys are stored with Microsoft? The company hands them over.

How BitLocker Keys End Up With Microsoft

BitLocker works brilliantly for what it’s designed to do. The full-disk encryption scrambles everything on your drive using AES encryption with 128-bit or 256-bit keys. Anyone who nicks your laptop can’t read your files without the proper credentials.

The catch? Windows encourages users to back up their recovery keys to a Microsoft account. It’s convenient, sure. Forget your password or swap out hardware, and you can retrieve that 48-digit recovery code from Microsoft’s servers. Dead simple.

But that convenience creates a proper vulnerability. Those keys sit on Microsoft’s cloud infrastructure in a format the company can access. So when a government agency turns up with a valid legal order, Microsoft can and does provide those BitLocker encryption keys.

Why Cloud Key Storage Differs From True End-to-End Encryption

Apple and Google handle this differently. With FileVault on macOS and similar encryption on Android, these companies store backup keys in encrypted form that even they cannot access. Hand over the encrypted blob to the FBI? Good luck decrypting it without the user’s credentials.

Matthew Green, a cryptography professor at Johns Hopkins University, put it bluntly on Bluesky:

“It’s 2026 and these concerns have been known for years. Microsoft’s inability to secure critical customer keys is starting to make it an outlier from the rest of the industry.”

Neither Apple nor Meta’s WhatsApp has reportedly ever handed over encryption keys to authorities. They’ve designed their systems so they simply cannot do so. Microsoft took a different path.

Expert Take on Windows Encryption Security

William Fieldhouse, Director of Aardwolf Security Ltd, commented: “This incident highlights why organisations need to think carefully about their encryption key management. Convenience features like cloud backup can introduce risks that undermine the entire point of encrypting data in the first place. Any business handling sensitive information should review their BitLocker configuration immediately.”

Security Implications Beyond Law Enforcement Access

The FBI access story grabbed headlines, but there’s a bigger concern lurking beneath. Microsoft’s cloud infrastructure has suffered multiple breaches in recent years. Hackers who compromise those systems could potentially access stored BitLocker encryption keys.

They’d still need physical access to the encrypted drives. That limits the practical risk somewhat. But for targeted attacks against high-value individuals or organisations? An attacker with stolen keys and a plan to intercept hardware shipments or conduct physical intrusion suddenly has a much easier path.

Organisations conducting proper security assessments should factor this into their threat models. A build review can identify misconfigurations in your Windows estate, including insecure BitLocker policies and Group Policy settings that push recovery keys to places they shouldn’t go.

Practical Steps to Protect Your BitLocker Keys

Check Your Current Configuration

First things first: find out where your keys actually live. In Windows, search for “BitLocker” and check your recovery key backup location. If it points to your Microsoft account, you’ve got a decision to make.

Store Keys Locally or On-Premises

For genuine Windows encryption security, keep recovery keys off Microsoft’s servers entirely. Save them to a USB drive locked in a safe. Print them and store the paper securely. Use Active Directory for enterprise key management. Any of these options keeps Microsoft out of the loop.

Consider Alternative Encryption Tools

VeraCrypt offers open-source full-disk encryption without any cloud key storage. The setup takes more effort, and you lose some of BitLocker’s seamless Windows integration. But you gain complete control over your encryption keys.

Add Extra Authentication Layers

BitLocker supports PIN requirements and USB key authentication on top of TPM-based protection. Even if someone obtains your recovery key, they’d still need these additional factors to unlock the drive.

Harden Your Wider Windows Privacy Settings

BitLocker key storage is just one piece of the puzzle. Windows 11 collects loads of telemetry data by default, and many of those settings tie back to your Microsoft account. If you’re serious about protecting sensitive data, take time to review your entire Windows configuration. Our guide on how to set up Windows 11 for maximum privacy walks through disabling telemetry, controlling app permissions, and reducing the data Microsoft can access in the first place.

Enterprise Considerations for Cloud Key Storage Policies

IT teams managing fleets of Windows devices face a tricky balancing act. Cloud backup means easier recovery when employees forget credentials or leave suddenly. Local-only storage means better security but more complex key management.

Group Policy lets you control BitLocker behaviour across your organisation. You can require that recovery keys get stored in Active Directory rather than Microsoft’s cloud. You can mandate additional authentication factors. You can even prevent BitLocker from activating until keys are safely escrowed on-premises.

The best penetration testing company will examine these configurations as part of any Windows infrastructure assessment. Getting BitLocker settings wrong can leave entire device fleets vulnerable.

The Bottom Line on BitLocker Keys

Microsoft’s decision to hand over BitLocker encryption keys to the FBI wasn’t surprising to security professionals. The company stores these keys in accessible form. Legal orders compel compliance. That’s how the system works.

What matters is whether you’ve configured your systems with this reality in mind. Default settings prioritise convenience over security. Changing those defaults takes effort but delivers genuine protection.

For organisations handling sensitive data, this incident should prompt an immediate review. Check your BitLocker policies. Verify where recovery keys get stored. Consider whether your current approach matches your actual security requirements.

Need help assessing your Windows encryption posture? Request a penetration test quote to understand where your organisation stands.

You may also like