It is used to create the crypto key, using a password based key derivation function, using the user's password fed into the PBKDF the output is the key used for encryption/decryption.
The users device key is mixed into that PBKDF. Without both parts of the equation, you have nothing.
The FBI is going after the lowest hanging fruit, the users password that was used to create the crypto key.