If you intended to reply to a different thread and accidentally ended up here instead, there is truth to what you say, but it has nothing to do with this one.
As it pertains to this thread, where the sole key holder is dead and took the knowledge with him, how do you anticipate to carry out gaining access to the data using live attacks? There are plenty of reasons why the government wants access to data even where prosecution isn't necessary.