Need OPSEC advice on WD External Hard Drive

Here's the scenario; I have a Western Digital External Hard Drive. Say in a crisis it was confiscated by LE and was to be examined by a forensic to get into this thing. All the information on it is Encrypted with WD's utility software, and on top of that I have my own encryption method on top of it, and the encryption method i have on is absolutely not compromised, unless I myself willingly open it. without going into deep detail, I use a unique method, but for the most part its basically GPG encryption I believe at the highest bit.. on top of that, as part of the hard drive's utilities, it has a security feature that password locks the hard drive, I use that with a very extensive complicated password. back to my question, if the hard drive was confiscated while all this Opsec was in place, what are the odds of them getting into it? Is there anyway they can bypass or get WD to pull the WD security features off while my hard drive is locked like I stated? Or is it all good.


Comments


[2 Points] TigerHall:

If you're in the UK, your encryption means nothing unless you'll willingly accept a jail sentence.


[2 Points] Corentas:

Your best bet is to ignore all the WD utilities and lock the drive with whatever else you personally have and then use Bitlocker. I believe that Western Digital would give up the backdoors to their software quicker than big corporate companies like MS. I trust MS' encryption way more than WDs.

Everyone used to rave about the security that TrueCrypt offered but then the company went tits up. The developers retired the software and posted a message that it was NOT secure and reference a replacement. Bitlocker. Bitlocker does a pretty good job at data encryption but is susceptible to all data encryption attacks such as a cold boot attack. Just read up on methods to break whatever you use and be weary of those situations.

Finally, will LE's really spend that much money on someone who is just ordering personal amounts on DNMs? It has to be worth it for them to spend the man hours and warrants involved in breaking through your encryptions. You're also going to find all kinds of legal issues with warrants for the data and the many downfalls that they will lock you in for not letting up the passwords. They may add random small charges to you because you're not cooperating. Or, like the other post mentioned, it could be illegal to refuse information like that. I think that because you use varied methods, breaking into that drive will cost a shit ton of work and money for LE. That is what keeps most of us "relatively" safe.