Microsoft handed over BitLocker encryption keys to the FBI under warrant, allowing federal investigators to unlock three suspects' laptops in a Guam fraud case. The disclosure reveals how Windows default settings automatically upload recovery keys to Microsoft's cloud servers, giving law enforcement a backdoor to encrypted devices and reigniting debates about enterprise security practices and privacy protections in the cloud era.
Microsoft just handed the FBI the keys to unlock encrypted laptops belonging to fraud suspects, and the move is turning heads in the security community. The tech giant provided BitLocker recovery keys under warrant for three devices seized in a Guam-based Pandemic Unemployment Assistance fraud investigation, Forbes reported.
Here's what's got enterprise security teams buzzing: BitLocker, the full-disk encryption technology baked into modern Windows computers, is enabled by default on most devices. It's supposed to keep your data locked down tight if your laptop gets seized or stolen. But there's a catch that many users don't realize - those recovery keys automatically upload to Microsoft's cloud infrastructure unless you specifically opt out.
That default setting just became evidence in a federal case. The FBI served Microsoft with a warrant six months after seizing the encrypted laptops from suspects tied to pandemic relief fraud in Guam. Local outlet Pacific Daily News covered the investigation last year, while Kandit News reported in October on the warrant's timing - a notable delay that suggests investigators hit a wall before turning to Microsoft.
Microsoft told Forbes this isn't unusual. The company fields an average of 20 such requests from law enforcement annually, though it declined to comment further to TechCrunch. That number might seem small, but it represents a fundamental tension in enterprise computing: cloud convenience versus data control.











