Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the first publicly known case of the technology giant sharing encryption keys with law enforcement.

The disclosure occurred after federal investigators in Guam requested access to three encrypted laptops believed to contain evidence of fraud in the island’s Covid unemployment assistance program.

BitLocker, Microsoft’s disk encryption software automatically enabled on modern Windows PCs, scrambles hard drive data to protect user information.

While users can store recovery keys locally on their own devices, Microsoft recommends cloud storage on its servers for convenience.

This cloud-based key management allows users to recover data if they forget passwords or experience login lockouts, but it simultaneously exposes them to law enforcement subpoenas and warrants.

“While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide how to manage their keys,” stated Microsoft spokesperson Charles Chamberlayne.

Microsoft receives approximately 20 requests annually for BitLocker recovery keys, though many cannot be fulfilled because users have not stored keys in Microsoft’s cloud infrastructure.

The company emphasized that it only complies with valid legal orders for key disclosure.

This revelation contrasts sharply with Microsoft’s 2013 stance, when a company engineer claimed to have rejected government requests to install backdoors in BitLocker, as reported by Forbes.

Matt Green, associate professor at Johns Hopkins University, noted that if competitors like Apple and Google can provide encryption assistance to law enforcement, Microsoft faces similar capabilities and pressures.

The case highlights the ongoing tension between user privacy, data security, and law enforcement access in encrypted systems, particularly when convenience features like cloud-based key storage create potential vulnerabilities.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link