At a Glance
- Microsoft is the first major tech company to hand over BitLocker recovery keys to law enforcement.
- The keys were provided to the FBI on February 10, 2025 after a search warrant linked to a Guam fraud ring.
- The case involved three seized laptops from a business owned by the lieutenant governor’s sister.
- Why it matters: It raises questions about cloud-backed encryption keys and law-enforcement access.
The FBI’s recent request for BitLocker recovery keys marks a historic moment for Microsoft and privacy advocates. For the first time, the company has complied with a court order to provide encryption keys that unlock data on seized laptops. The case, tied to a fraud investigation in Guam, highlights how cloud-stored keys can become a vulnerability.
The First Time Microsoft Handed Over BitLocker Keys
Microsoft handed over encryption keys for its hard-drive encryption software BitLocker to the FBI last year, complying with a search warrant tied to a fraud investigation in Guam. This marks the first known case of the tech giant providing BitLocker recovery keys to law enforcement. Forbes reported on Friday that Microsoft turned over recovery keys for BitLocker, allowing the FBI to access data stored on three seized laptops. BitLocker comes enabled by default on many Windows PCs and is designed to encrypt a computer’s data in case it’s lost or stolen.
How BitLocker Works and Why the Cloud Backup Matters
BitLocker encryption can be unlocked using a recovery key stored locally on a user’s device, but Microsoft also encourages users to back up their recovery keys to the cloud. That backup can make data recovery easier if a user forgets their password, but it also creates a pathway for law enforcement and potentially hackers to access a user’s data. Microsoft did not immediately respond to a request for comment from News Of Austin. However, a spokesperson told Forbes that “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide… how to manage their keys,” said a Microsoft spokesperson.
Microsoft receives roughly 20 requests for BitLocker recovery keys each year, but is unable to comply in cases where the keys are not backed up in the cloud. The specific request cited in the report comes from a federal investigation into a fraud ring tied to the Pandemic Unemployment Assistance program in Guam. Several people were charged in the case, including family members of the island’s Lieutenant Governor, Josh Tenorio.

The Guam Fraud Investigation
Local news outlets reported last summer that unsealed search warrants revealed that investigators were seeking BitLocker recovery keys for three computers seized during an FBI raid of a business owned by the lieutenant governor’s sister, Charissa Tenorio. The records show that Microsoft complied with the request on February 10, 2025. Beyond this specific case, the news has raised alarms among the cybersecurity community.
Matthew Green, a cryptography expert at Johns Hopkins, took to Bluesky to share his concerns over how easy it seemed to be for authorities to obtain the keys. “Once upon a time you could assume (mostly) that any Federal law enforcement agency doing this would be operating within the bounds of the law. Nowadays, who knows. I sure wouldn’t want to be a journalist relying on Bitlocker,” said Matthew Green. He also warned that the ease with which Microsoft was able to hand over the keys means that “anyone who compromises their cloud infrastructure (and customer service infrastructure, or can forge a plausible LE request) can potentially access that data.”
Microsoft’s Response and Policy
Microsoft’s spokesperson emphasized that the company believes customers are best positioned to decide how to manage their keys. The company’s policy allows it to comply with lawful requests when keys are stored in the cloud, but it cannot provide keys that were never backed up. The firm’s handling of the Guam case is consistent with its stated policy of only responding to valid legal requests.
The company also noted that it does not have a centralized database of all BitLocker keys. Instead, keys are stored in a customer-specific cloud location, which is why the FBI’s request was actionable only when the keys were backed up. Microsoft’s compliance with the Guam request demonstrates how the backup feature can be used by law enforcement when it has the proper authorization.
Expert Concerns and Broader Implications
The incident has sparked debate over the balance between privacy and law-enforcement needs. Cryptographers like Green point out that cloud-based key storage creates a single point of failure. If an attacker gains access to Microsoft’s cloud or can forge a legitimate legal request, they could potentially decrypt any BitLocker-protected device.
Security analysts also warn that the FBI’s ability to retrieve keys could set a precedent. Future investigations might rely on cloud backups as a standard method for accessing encrypted data, even when the device itself is not seized. This could shift the power dynamic between users and law enforcement.
Key Takeaways
- Microsoft is the first major tech company to provide BitLocker recovery keys to law enforcement.
- The keys were handed over on February 10, 2025 during a Guam fraud investigation involving three laptops.
- Microsoft’s policy allows compliance only when keys are cloud-backed, limiting its ability to provide keys that were never backed up.
- Cryptographers warn that cloud backups create a vulnerability that could be exploited by attackers or used by law enforcement.
- The case raises questions about how encrypted data should be protected and who should have access to it.
The Guam incident may be the start of a new era where cloud-stored encryption keys become a routine tool for law-enforcement agencies. Users will need to weigh the convenience of cloud backups against the potential for unwanted access.

