Quite a big deal is being made about Apple's refusal to decrypt an iPhone used in a terrorist attack. What is suspected to be on the device? If the crime has already been committed and the dead buried, of what use will be any information contained on the device?
Might the phone hold contact information for other potential terrorists? Methods of acquiring weapons in the United States? Links to jidahist forums? Is it reasonable to suggest that information on the device may help prevent further attacks?
I ask on this forum as the case revolves around InfoSec's very cornerstones: encryption, methods of brute forcing, and even vendor-supplied backdoors. Thus, this case has far-ranging implications for the field.