Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Encryption Microsoft Security

Microsoft Gave FBI a Set of BitLocker Encryption Keys To Unlock Suspects' Laptops (techcrunch.com) 87

An anonymous reader quotes a report from TechCrunch: Microsoft provided the FBI with the recovery keys to unlock encrypted data on the hard drives of three laptops as part of a federal investigation, Forbes reported on Friday. Many modern Windows computers rely on full-disk encryption, called BitLocker, which is enabled by default. This type of technology should prevent anyone except the device owner from accessing the data if the computer is locked and powered off.

But, by default, BitLocker recovery keys are uploaded to Microsoft's cloud, allowing the tech giant -- and by extension law enforcement -- to access them and use them to decrypt drives encrypted with BitLocker, as with the case reported by Forbes. The case involved several people suspected of fraud related to the Pandemic Unemployment Assistance program in Guam, a U.S. island in the Pacific. Local news outlet Pacific Daily News covered the case last year, reporting that a warrant had been served to Microsoft in relation to the suspects' hard drives.

Kandit News, another local Guam news outlet, also reported in October that the FBI requested the warrant six months after seizing the three laptops encrypted with BitLocker. [...] Microsoft told Forbes that the company sometimes provides BitLocker recovery keys to authorities, having received an average of 20 such requests per year.

Microsoft Gave FBI a Set of BitLocker Encryption Keys To Unlock Suspects' Laptops

Comments Filter:
  • Clickbait title (Score:5, Informative)

    by rsilvergun ( 571051 ) on Friday January 23, 2026 @05:05PM (#65945250)
    All this means is Microsoft has your decryption keys by default but you can still easily turn that off.

    And yeah of course Microsoft gave them the keys they would have had a warrant.

    At least I hope they had a warrant. It's 2025 and that's not a guarantee anymore.
    • by OrangeTide ( 124937 ) on Friday January 23, 2026 @05:07PM (#65945256) Homepage Journal

      Warrants are a form of wasteful bureaucracy that our strong, intelligent government is removing.

    • Re:Clickbait title (Score:5, Insightful)

      by DamnOregonian ( 963763 ) on Friday January 23, 2026 @05:26PM (#65945298)
      You're correct, you can absolutely not send them your keys. And if you don't trust them to fully delete them, you can re-Bitlocker your drive and make sure not to send them your keys this time (it's in the wizard you go through when you turn bitlocker on).

      However, I *can* say that it has saved my ass before. This is because anything that makes a change to your SecureBoot environment (like, from linux for example- which is what happened to me) will render Windows unbootable without a recovery key, and if you didn't bother to save it, you're in for a bad time.
      • by Anonymous Coward

        If you

        don't trust them to fully delete [the old keys]

        then why exactly would you trust the setup wizard not to send your new key to MS?

        • by rta ( 559125 )

          because most "delete me" type requests already have a carve out for backups. And deleting just might break in that someone may forget to wipe all the places it's been stored.

          So even outside of malfeasance, it's more likely the "don't send" is safer than counting on a delete.

      • by tragedy ( 27079 )

        This is because anything that makes a change to your SecureBoot environment (like, from linux for example- which is what happened to me) will render Windows unbootable without a recovery key, and if you didn't bother to save it, you're in for a bad time.

        That happened to me with a super cheap laptop I bought temporarily while I was waiting for a proper replacement to arrive. I set up windows and just went ahead and created a throwaway microsoft account to get through the install. I was going to set it up to dual boot Linux, though I didn't have a lot of use for the windows partition. I ran into exactly the problem you mentioned after the Linux install. At that point it turned out that, although I had recorded the password I set up for the Windows account, I

        • You can still install without an MS account, using only local an account(s). Instructions are online. It involves things like dropping to a terminal to type in a command at a certain point, unplugging a wired connection or disabling wifi at a certain point.

          Install, patch, configure, setup Bitlocker. Take a screenshot of the recovery code and store it on an encrypted flash drive.

          After all that is done, then install Office, Visual Studio, and the other apps that will require an MS account. I recall a pr
          • by tragedy ( 27079 )

            Sure, but I didn't bother because I just wanted to get the stupid setup out of the way, but still thought I would hold on to windows for dual-boot. Then it bricked (for a definition of "bricked" defined as I just sighed deeply and couldn't be bothered to deal with the stupidity of it all after a relatively brief attempt since it was a cheap piece of junk anyway) itself. The thing was the laptop equivalent of the loaner car you get from the garage while waiting for them to repair your car. It just wasn't wor

      • I don't even create an MS account, and simply put the key file on my proton storage.

    • by marcxm ( 6152702 )
      Stop it right f*ng there. I don't care what and if you can disable. This thing happened. If this is possible, then anything is possible with this BS "operating system". You do you, but no sane person would want to process their own data on this thing.
  • I know MS has my keys. They're attached to the accounts. Every day, I get closer to switching to linux desktop.

    • by DamnOregonian ( 963763 ) on Friday January 23, 2026 @05:24PM (#65945290)
      They have the recovery keys. You can remove them if you like.
      If you're paranoid, you can remove them, disable bitlocker, re-enabled it and this time choose not to send MS your keys.
      • Paranoid would be assuming they have the keys whether you give permission or not. Assuming they don't is stupid since Windows is spyware and Microsoft is part of PRISM.

        • Paranoid would be assuming they have the keys whether you give permission or not.

          You're not wrong. If you're that paranoid- you should not use Windows, period.

          Assuming they don't is stupid since Windows is spyware and Microsoft is part of PRISM.

          This is tinfoil hat, territory.
          If they retain the keys after you opt-out, no membership to any executive program will save them from the litigation they will face.
          So no, I very much doubt they're retaining them if you specifically opt-out.

          • Ignore any spurious commas that may have somehow ended up in that post
          • by Holi ( 250190 )

            Again, this is easy to determine. You can legally wireshark your own network and look at the traffic. If MS were doing this, they would already be caught and it would be public.

            • Wireshark? lol.
              Windows connects back to MS frequently during regular usage.
              Wireshark, sadly not being enabled by Shor's Algorithm, is powerless to decrypt even mundane TLS.

              So no- that's not going to help you sleep for one minute if you're that level of paranoid.
        • Assuming they don't is obvious since keys on accounts are user manageable, and Microsoft having keys they claim they don't would end their cloud business overnight.

          Why does Slashdot not believe the moon landing is fake and that the FBI didn't bomb the world trade centre, but as soon as Microsoft is mentioned every nutbag conspiracy theory comes out of the woodworks, despite there having been zero historical evidence to form a basis for the conspiracy. PRISM did not magically mean companies broke their own e

        • by Holi ( 250190 )

          Easy enough to determine. Wireshark while you are doing it and look for the traffic. They would already have been called out.

      • Can you? I tried to delete the passwords which Microsoft Authenticator uploaded from my phone, because I am not using it. They don't let me.
        • Yes, you can.

          I've never used the Authenticator, but the recovery keys for your Bitlocker is device specific, and easily deleted.
        • Can you?
          I tried to delete the passwords which Microsoft Authenticator uploaded from my phone, because I am not using it. They don't let me.

          Did they not let you because it's already gone? Microsoft Authenticator's password manager is gone, it's now a function of Edge and managed through Edge. Delete it from Edge and it deletes it from the MS account, since Edge sync is the only place passwords are kept.

          Secondly this has nothing to do with Bitlocker, the keys of which are managed under your device management section of your account, and every key as a delete button next to it.

      • by Holi ( 250190 )

        Wish I had mod points.

    • You can download a copy of the keys and delete them from your MS account.
      • by PPH ( 736903 )

        and delete them from your MS account.

        Yeah, right. I can also unformat my hard drive.

      • So nuke it, disable bitlocker, then re-enable it with a new key that isn't shared. Well, it's probably still shared. Microsoft can't be trusted.

        • There are alternatives to BitLocker and/or whole drive encryption (or partial drive encryption). VeraCrypt is one. Although I haven't checked up with that software for quite a while now.

        • by Holi ( 250190 )

          Setup Wireshark and then do all that, you will have your answer. Do you think they can somehow hide their traffic on your network?

          It's not hard, So not hard that we would have heard about it.

      • by rta ( 559125 )

        and also print them out on a piece of paper and stick it in a safe or safe deposit box , of that's how you roll. would still be susceptible to subpoena and warrant, but little worry about remote exploit

        • Or, rather than pen/paper, save it on a text file that's saved not on the SSD, but on a removable USB drive. That way, it's completely in your control, but also convenient enough to retrieve should you need to reinstall on another laptop
          • by rta ( 559125 )

            Or, rather than pen/paper, save it on a text file that's saved not on the SSD, but on a removable USB drive. That way, it's completely in your control, but also convenient enough to retrieve should you need to reinstall on another laptop

            Well previously i just printed it but pen and paper is ok too.

            USB drives have surprisingly short data retention lifetimes. i haven't used them enough to experience bitrot myself, but don't count on them for more than a couple of years for stuff you'll be sorry to lose. so ALSO write it/print it or you may have a bad time.

  • by Murdoch5 ( 1563847 ) on Friday January 23, 2026 @05:26PM (#65945294) Homepage
    If someone else can get the key to unlock the drive, the drive isn't locked. The problem with BitLocker, at least in general, is that you don't control the passphrase or keys, and hence it's not really useful in the wider / greater context!

    Look at LUKS, you control the passphrase, and if you choose, additive keys, and that means if law enforcement needs your drive, they can't side step you. The fact Microsoft can hand over the keys makes BitLocker functionally useless, and, really cuts to the core of the Microsoft security model. It's secure, providing you don't question it, or, examine it, and that's a major issue.
    • by taustin ( 171655 ) on Friday January 23, 2026 @05:31PM (#65945310) Homepage Journal

      The fact Microsoft can hand over the keys makes BitLocker functionally useless,

      If your only goal is to hide things from the police, who have a warrant. Criminals and ex-wives generally have a hard time getting those warrants.

      It's good for what it's good for, which is not everything.

      • To be fair, I'd actually use Vera Crypt or another technology to hide anything sensitive, and then randomly generate a massive passphrased > 256 characters. Save it into a password manager, and then if I was arrested, I couldn't give you the code. Furthermore, set a massive PIM, over 10k, and you're fine. The main objective is that BitLocker isn't encryption if someone can hold the key.
        • by rta ( 559125 )

          well Hopefully the Fifth Amendment keeps the government from keeping you in jail until you unlock your PW manager for then

          • Usually you'll do 60 days at County for contempt or some horseshit like that.

            Despite Circuit Court opinion that passphrases are fifth-amendment protected.

            Hardware and biometrics are not protected.

            Sometimes 60 is the best option you'll get, especially if you're a whistleblower against criminal government actions.

          • Simple, add a kill switch or perm lockout that activates if the computer is relocated. Then you can't get in, and there's nothing they can do, and you're not in contempt. If my server is moved geographically, and the scanner is not deactivated, when you boot it up, you'll have 1 hour to enter the override passphrase, and insert the Yubi key, before it will scramble several files.

            What's in these files?

            1. Consensual, legal, adult content, that I locked up when my kids were younger.

            It has collections
      • You assume that a) the keys will not be leaked by the police and b) that the police will only use them for legitimate law enforcement purposes.

        • He is also assuming that

          c) a bad actor at Microsoft doesn't disclose the keys without a warrant

          d) Microsoft's servers aren't hacked and then the keys are disclosed

          And there are probably some other possibilities as well. Just assuming that because you want to protect your data, including from Microsoft, means you are doing something illegal and want to "hide it from the police", is a bad-faith argument.

      • by arcade ( 16638 )

        > If your only goal is to hide things from the police, who have a warrant.

        How comfortable would you be with Chinese developed encryption systems, where the Chinese company held the keys, if you were say American or European?

        Now, how comfortable do you think it makes non-americans that an american company holds the encryption keys. Especially with the current US administration and how they treat other countries ...

    • by Computershack ( 1143409 ) on Friday January 23, 2026 @05:34PM (#65945316)
      Microsoft can only hand over the keys that you have saved in your online Microsoft Account. When you're setting up Bitlocker you're given the choice to do that or to save them as a file or to just see the key to write it down. You don't have to upload them to your MS Account and if you do you can still delete them from it.
      • Re: (Score:2, Flamebait)

        by Murdoch5 ( 1563847 )
        That's why I put an asterisk, and you have to assume they don't have it, but with Microsoft, you can't trust them, so don't.
        • Sorry but your post is misinformation horseshit. There is no asterisk. There is no assumption. You are explicitly prompted to upload the keys. It's not a default. It's a selection screen with no pre-highlighted option.

          Calling Bitlocker fake, even with an asterisk is just a lot of flamebait rubbish at best and outright misinformation at worst.

          • To be fair, I added that in case I was wrong, but I don't think you can easily prevent the upload, at least on most versions of Windows. Once Microsoft has the key, they have the key, and your data is not encrypted against them viewing it.
      • by markdavis ( 642305 ) on Friday January 23, 2026 @06:20PM (#65945424)

        If you believe that Microsoft follows its own policies and the closed-source code is doing what you tell it to do.

        It is highly probably it is, but, in the end, we really don't know 100% for certain. It might forward that stuff to 3-letter agencies without your consent or knowledge. And/or it might have some super-secret back door set of keys.

        • This isn't a policy, this is the action of the software. You're given three options: upload to account, print, or save to file. The idea that someone is secretly uploading encryption keys without prompt to accounts is just "FBI bombed the world trade centre" level of conspiracy bullshit.

          There's zero evidence for any of that, and Microsoft would be untold amount of legal trouble if they did. Please, engage the logical part of your brain, not just the creative one.

          • This isn't a policy, this is the action of the software. You're given three options: upload to account, print, or save to file. The idea that someone is secretly uploading encryption keys without prompt to accounts is just "FBI bombed the world trade centre" level of conspiracy bullshit.

            There's zero evidence for any of that, and Microsoft would be untold amount of legal trouble if they did. Please, engage the logical part of your brain, not just the creative one.

            You are misinformed. If you sign into windows with a Microsoft account it will automatically complete device encryption and send your key to Microsoft without asking.

            • by Holi ( 250190 )

              This is correct. You have no say over the encryption if you initially setup your account with an MS account.

              You can still delete your key from MS. Or decrypt and re-encrypt your drive with a new key to get that choice.

        • We don't know and Microsoft has never gained any trust or respect, so, at best it's a slow head shake.
      • I hope Microsoft has redundant offsite offline backups for its Cloud data, for disaster recovery.

        It would be professional misconduct if they didn't.

        That being the case, it's not clear how long it would be from the time you delete your cloud keys until Microsoft cannot respond to a subpoena.

        • by Holi ( 250190 )

          That is true, nothing happens instantly on intune

        • I absolutely believe Microsoft has access and will hand them out without asking, even if you decided not to upload them. That's why I said use LUKS, it's better anyway.
      • Microsoft can only hand over the keys that you have saved in your online Microsoft Account. When you're setting up Bitlocker you're given the choice to do that or to save them as a file or to just see the key to write it down. You don't have to upload them to your MS Account and if you do you can still delete them from it.

        Prompting depends on edition of windows. Bitlocker (e.g. "Device Encryption") automatically uploads your key without asking for home users.

  • Never trust the Government. Never trust political parties. Never trust big tech companies. Never trust your employer. If you had data that could get you jailed or killed, don't put it anywhere where a guy with a warrant or a woodchipper can find you, legal or otherwise.
  • The FBI used a subpoena or warrant to obtain the private keys.
    • by haruchai ( 17472 )

      The FBI used a subpoena or warrant to obtain the private keys.

      I'm quite sure not everyone's encryption keys would be so easy to obtain with a piece of paper

  • by Anonymous Coward

    Wasn't there a story on Slashdot a few years back where Joe Average requested help from Microslop to gain access to their BitLocker keys after being locked out due to an update or hardware change, but was told in no uncertain terms that this was impossible as Microslop does not have access to them even if they were uploaded to the cloud.

    Doesn't this now make that story a farce?

    • by Anonymous Coward
      Bitlocker didn't have an automatic cloud backup function for the keys. You were expected to manage the keys and backups yourself. If you didn't backup the key when switching on bitlocker, or you lost or damaged the backup, you were out of luck.

      With windows 11, bitlocker is now on by default on new installs. With the default options, the keys are automatically backed up to your microsoft account during the installation process. You still have the option to self manage the encryption keys, but it is not t
    • Wasn't there a story on Slashdot a few years back where Joe Average requested help from Microslop to gain access to their BitLocker keys after being locked out due to an update or hardware change, but was told in no uncertain terms that this was impossible as Microslop does not have access to them even if they were uploaded to the cloud.

      Doesn't this now make that story a farce?

      When bitlocker keys are uploaded they are done so with the explicit purpose of letting the user access their hardware. It's literally what it's there for. Just log into your Microsoft account, click Devices, select your device, select manage bit locker keys, and you can literally read them off the screen. If they are part of your account they are there for you to access from any device historically (my account has bitlocker keys I've not used since 2014 in it).

      Bitlocker keys aren't automatically uploaded to

      • When bitlocker keys are uploaded they are done so with the explicit purpose of letting the user access their hardware.

        You mean access their data.

        It's literally what it's there for.

        Apparently they are "literally" there for more than just users accessing their data according to TFA.

        Just log into your Microsoft account,

        This is a nonstarter.

        Bitlocker keys aren't automatically uploaded to the cloud, they are manually uploaded by user choice. I suspect the article you're remembering has a user who did *not* cloud sync their bitlocker keys, at which point MS has nothing to hand over.

        Incorrect, for home users keys are automatically uploaded.

  • before they're for sale on the dark net? A few months? Less?

  • by CoolDiscoRex ( 5227177 ) on Friday January 23, 2026 @06:58PM (#65945524) Homepage

    At least I hope they had a warrant.

    Over 98 percent of warrants are approved the first time, and the other 2 percent are usually approved after some administrative issue with the warrant is fixed.

    Warrants are trivial to procure, and provide no protection to you whatsoever.

    If a warrant is issued, and nothing is found, nobody is punished. So they issue them as a matter of procedure since it is better to be safe than sorry. At least in their eyes.

  • People really need to go away and rewatch this movie. The government can keep a secret. The government will "sell their grandmother" to keep the secret. And the secret is that they don't need a quantum computer (that we've all been told doesn't exist and is necessary to decrypt our shit) because they already have the keys. It's theater. Apple, Google, Microsoft, Meta all enjoy their monopolies for what they provide the government -- unlimited surveillance while pretending our data is secure. It's not!
    • by allo ( 1728082 )

      And all non-free operating systems can push updates to users. And the free ones can at least hope that you install them yourself.

      Microsoft: Proven since XP that they can install updates on user's PCs without their mechanism (one time they pushed one to fix broken Windows update). Can be targeted at single users.
      iOS: Appstore/Services stuff in the background. Can be targeted at single users.
      Google: Playstore/Services stuff in the background. Can be targeted at single users.
      Redhat/Canonical: Probably harder t

    • Spot on. Apparently it takes a lot more than this clear violation to get people to wake up. But they are to addicted to their doom scrolling ways, Which of course these companies pushed harder than an avalanche.
  • A lot of people use computers as tools to do their work without doing any deep research. They might reasonably expect that an "encrypted" drive didn't provide keys to a 3rd party and use it to store proprietary or otherwise protected information. An attorney pursuing a case against Microsoft might be surprised to learn that they can access all of his notes.

    I'm sure the information that MS has the keys is included somewhere in the vast EULAs but I also bet that very few non-technical users are aware of tha

  • The whole process of entering your bitlocker key on windows 10 upwards is handled in a seperate process, It is not standard text input, the window that pops up asking you to enter the key is hosted inside textinputhost.exe, Which is a long suspected keylogger. A lot of windows 10 is handled inside this process, Like taskbar search, Most of control panel ('new' control panel), basically anything that pops up in a non-standard text entry box. Thing is, There is absolutely no need for this simple task to run i

"You can't make a program without broken egos."

Working...