By Sherri Davidoff   /   Feb 19th, 2026

What the Nancy Guthrie Case Reveals About Cloud Providers

ep60 cover image raw When the FBI announced on February 10, 2026 that it had recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, the technical detail that stood out wasn’t the camera model. It was the phrase the FBI used to explain where the video came from: “residual data located in backend systems.” 

In other words, footage many assumed was gone still existed somewhere inside a cloud provider’s infrastructure. 

For security leaders, that wording is a flashing indicator about cloud reality. Data can disappear from the user experience– apps, dashboards, subscriptions, “history” screens–without actually disappearing from the provider’s underlying systems. 

“From a cybersecurity perspective, it’s always jarring,” Sherri Davidoff noted on a recent episode of Cyberside Chats, “when a cloud provider says, by the way, I have this data that I told you was deleted—or implied wasn’t being collected. Here it is.” 

This case is ongoing and deeply serious. But from a security and governance standpoint, it surfaced a lesson that applies far beyond consumer cameras: in the cloud, your interface is not the system of record. 

When Data Doesn’t Show Up in the Interface, It May Still Exist 

The Guthrie home had a video doorbell, and investigators believe the intruder removed it. Reporting described it as a wireless Google Nest Doorbell (2nd Gen, battery-powered). Battery-powered models matter because they can continue running after removal, and the device is designed to retain limited event footage locally when Wi-Fi is disrupted.  

Early coverage indicated the family did not have a paid Nest subscription, and that there wasn’t usable video available through the normal consumer experience. Whether the footage was ever visible in the app isn’t the key point. The key point is that it wasn’t available in the way people expected. 

Then the FBI released recovered images and video and stated that the footage was recovered from “residual data located in backend systems.”  

That’s the cloud-provider lesson: even when data isn’t available to the customer—because it never surfaced, fell outside a retention window, or is gated behind a subscription tier—artifacts may still exist elsewhere inside a provider’s backend. 

For enterprise security leaders, this is the same trap we fall into with SaaS and cloud logs: we treat what’s visible in the admin console as the complete truth. But cloud platforms routinely generate secondary artifacts—replicas, backups, caches, diagnostic logs, metadata indexes, and AI-derived tags—that may persist outside the dashboards your team monitors. The result is untracked data: information that still exists somewhere in a third-party system even when your organization believes it has been removed, expired, or was never retained in the first place. 

Untracked Data: The Gray Area Cloud Providers Don’t Advertise 

A useful way to describe the risk surfaced by this case is untracked data: data that exists outside your expected retention controls, outside your dashboards, or outside your internal data inventory.  

On the podcast, the conversation landed on a deceptively simple truth. “Just because they’re not obligated to retain it,” Davidoff said, “doesn’t mean that they are deleting it.”  

In corporate environments, many programs quietly rely on the opposite assumption: 

  • If the UI doesn’t show it, it must not exist 
  • If the subscription isn’t active, it must not be stored 
  • If the vendor won’t guarantee they’re retaining data, it must be gone 

None of those assumptions are safe defaults. Cloud providers optimize for resiliency, performance, debugging, legal response, and analytics. Those goals create copies, derived artifacts, and access paths that may not be obvious to customers—until a high-profile case forces the issue. 

Vendors Are Part of Your Data Perimeter 

The most practical “bring it home” takeaway is straightforward: cloud vendors aren’t just service providers. They’re part of your data perimeter. 

That changes how leaders should think about third-party risk. Traditional vendor assessments focus on SOC reports, questionnaires, and security posture. Those inputs are necessary, but they don’t replace governance questions about persistence and access: 

  • What data exists in backend systems beyond what users can see? 
  • What support roles can access customer data, logs, or media? 
  • What derived artifacts are created (indexes, metadata, AI tags)? 
  • What changes when features are enabled, subscriptions change, or accounts are closed? 

If these questions aren’t part of your vendor review and your incident response planning, the Guthrie case is a reminder to add them. Surprises in backend systems are rarely pleasant when the stakes are high. 

Ring Shows How Platform Evolution Expands Risk 

Ring, Amazon’s doorbell/home camera platform (and a major competitor to Google Nest), illustrates how quickly the risk profile of a cloud ecosystem can change. 

In April 2024, the FTC issued more than $5.6 million in refunds to over 117,000 Ring users after allegations involving improper access to customer videos and weak internal security controls. The settlement required stronger safeguards and limitations on employee access. The case underscored a governance reality: backend access paths matter, and vendor controls do not always align perfectly with customer expectations. 

At the same time, Ring has accelerated deployment of AI-powered capabilities that fundamentally change how video data is used. Natural-language search allows users to query footage using descriptions like “person in red hoodie” or “white truck.” Features such as “Search Party” emphasize AI-assisted matching across multiple cameras within a network. 

This is more than convenience. AI search requires structured metadata extraction, indexing, and centralized query infrastructure. Video becomes searchable intelligence, and that intelligence lives in backend systems. 

As platforms expand to retain more data, and those systems evolve to become searchable at scale, then the impact of any access pathway (authorized or malicious) becomes significantly greater. 

For security leaders, the lesson is not about Ring specifically. It is about understanding that vendor feature expansion can quietly multiply the sensitivity, persistence, and accessibility of the data entrusted to cloud platforms. 

Apple and the Double-Edged Sword of Vendor Access 

Apple illustrates another dimension of this issue: vendor access to customer data cuts both ways. 

On one hand, when a cloud provider can access customer data, it can respond to lawful requests, assist with recovery, and support investigations. On the other hand, that same access pathway becomes a potential risk. If a vendor can technically access customer data, then a sufficiently capable threat actor who compromises that vendor may be able to as well. 

Apple has long positioned itself as limiting that risk through strong encryption. In 2022, it introduced Advanced Data Protection (ADP) for iCloud, enabling end-to-end encryption for additional categories of cloud data. Under that model, Apple did not hold the keys to decrypt certain stored content. Customers effectively controlled access. 

That architectural choice significantly reduced Apple’s ability to access customer data—even under lawful demand. It also reduced the risk that a compromise of Apple’s backend systems would expose that encrypted content. 

But in 2025, under pressure from the UK government seeking lawful access capabilities, Apple reportedly removed Advanced Data Protection for UK users. In practical terms, that meant reverting certain data categories back to a model where Apple could access them if compelled. It also increases Apple’s exposure in a compromise scenario: when more customer data is decryptable by the provider, more of it can potentially be accessed if an attacker breaches the provider’s systems or abuses internal access paths. 

The lesson for enterprise leaders is not about Apple specifically. It’s about control. 

When vendors hold decryption keys or maintain backend access paths, they create operational flexibility, but also concentration of risk. When customers hold exclusive control, exposure shifts. 

Encryption architecture is therefore not a marketing feature. It is a risk decision. 

And as the Nest and Ring examples show, the same backend access that can help recover data in one scenario can become a liability in another. 

Back to the Enterprise: Untracked Data Is Both an Asset and a Liability 

Untracked data is both an asset and a liability: 

Asset 

  • Untracked data can be a helpful surprise for investigations or recovery. 
  • But you can’t count on it being there or recoverable when you need it. 
  • The goal is to know what persists, where it persists, and who can access it. 

Liability 

  • It expands the breach blast radius beyond what you think you retain or monitor. 
  • It raises the payoff of compromise because older copies may still exist. 
  • It increases eDiscovery and regulatory exposure because “unknown” data can still be discoverable. 

And the core risk statement is straightforward: If authorized entities can recover backend-retained data, a sophisticated threat actor who compromises those same systems may be able to as well. 

What Security Leaders Should Do Next 

The Nancy Guthrie case reinforces a set of practical governance steps for enterprise security leaders. These are not theoretical concerns—they are operational realities in modern cloud environments. 

  1. Treat vendors as part of your data perimeter. Review contracts and platform settings to understand who can access footage or logs, what “support access” entails, what data is retained in backend systems, and how data is handled during incident response or legal requests. 
  2. Control encryption keys and access paths. Know who holds encryption keys, how administrative access is granted and monitored, and whether “end-to-end encryption” claims align with your threat model and regulatory requirements.
  3. Include IoT and security devices in your data inventory. Cameras, badge systems, and smart building technology are data systems. Document on-device storage, cloud sync behavior, local buffers, and backend retention — not just cloud repositories.
  4. Align retention decisions with legal and regulatory risk. Longer retention may aid investigations but increases eDiscovery scope, breach exposure, and privacy obligations. Retention should be a deliberate business risk decision made with Legal and Compliance.
  5. Test whether deletion actually works. Validate purge workflows across vendor platforms and internal systems, including backups and disaster recovery, because “logical deletion” often isn’t “forensic deletion.” Build policies around how long data persists in replicas, backups, buffers, and vendor systems — and plan accordingly in both incident response and governance strategy. 

While the Nancy Guthrie case remains ongoing and deeply serious, the technical details made public point to a broader cloud reality: data can remain recoverable in backend systems even when it isn’t visible or accessible to the end user. 

For enterprise security leaders, that is the lasting lesson. Cloud platforms increasingly create and retain replicas, logs, indexes, and metadata outside what your team can see in a dashboard. Sometimes that persistence is invaluable – but it also expands breach impact and legal exposure.   

If your organization hasn’t validated what “retained,” “deleted,” and “end-to-end encrypted” actually mean across your vendors, now is the time. At LMG Security, tabletop exercises and security assessments are a practical way to pressure-test those assumptions, map hidden data paths, and make sure your incident response and governance strategy match how your cloud environment really behaves. 

About the Author

Sherri Davidoff

Sherri Davidoff is the Founder of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.

CONTACT US