Encryption & Key Management
,
Security Operations
FBI Accessed Encrypted Windows Devices Via BitLocker Keys, Microsoft Says

A decision by Microsoft to supply BitLocker recovery keys to the FBI has drawn renewed attention to how encryption systems are designed – and whether storing keys in the cloud weakens their security.
See Also: Securing Patient Data: Shared Responsibility in Action
The tech giant confirmed Friday that it turned over to the FBI recovery keys in 2025 for Windows devices encrypted with BitLocker. It will continue to comply with court orders from federal investigators when it has access to those keys and receives lawful legal requests from federal investigators, it said.
BitLocker, which encrypts data stored on Windows PCs and encourages users to back up recovery keys to cloud accounts to avoid permanent data loss, is widely used across consumer, enterprise and government environments.
While Microsoft describes BitLocker’s service as a convenient way for users to access their data if they forget a password, recovery keys stored with a service provider create an access pathway outside the user’s direct control. Experts say that design choice raises significant security concerns while enabling law enforcement agencies to obtain access to encrypted data – without attempting to defeat the encryption itself.
“While key recovery offers convenience, it also carries a risk of unwanted access,” Microsoft spokesperson Charles Chamberlayne said in a statement to Forbes. “Microsoft believes customers are in the best position to decide.”
The FBI and other federal agencies have increasingly relied on this type of cooperation from tech companies as strong device encryption has made direct access more difficult. Rather than attempting to break encryption, investigators request recovery keys through warrants or subpoenas when companies retain the technical ability to provide them.
Security researchers say the approach may offer scale, cost savings and convenience, but they also introduces significant risks, including the possibility of unauthorized breaches or future policy shifts that expand access beyond narrowly defined cases. Experts have long warned that not all cloud encryption meaningfully protects data – especially when providers retain access to encryption keys.
Alternative models exist that can limit cloud-based security risks by keeping key generation and storage entirely under user control, even if that comes at the cost of easier recovery. In those architectures, companies like Microsoft cannot unlock devices for investigators because they lack the technical capabilities to access that data.
