So by refusing them access to the volumes and for refusing to hand over the passwords to the volumes AFTER one has been opened he is acting guilty and by that act assuming ownership of the material.
Wow. Just, wow.
A warrant does not compel you to let the police into your house to search; it allows the police into your house to search. You don't have to open the door, they'll bust it down.
Well, they can search your encryption all they want, if they can break it.
Even if the police know for a damn fact there's illegal materials in the encrypted volume, requiring him to unlock the volume is tantamount to requiring him to acknowledge ownership of the volume, which is self-incrimination.
"Is this your drive?"
"Unlock the drive."
"Okyday, here's the password."
"How would you know the password if it wasn't your drive?"
Lest we forget, Giordano Bruno was executed by the Catholic Church for daring to postulate that there might be life out in the universe.
I'd not be surprised at all if the discovery of alien life sparked a crusade/jihad/whatever or two.
You could accomplish the same thing by having Alice's pad contain half of the full OTP, only the odd numbers, and Eve having only the even numbers.
Even better, use a third person with a third OTP to determine if the next sequence goes to Alice or Eve (i.e. Bob's pad is a string of numbers; if the number is odd, the next digit comes from Alice's pad, if even, Eve's pad.)
The pads are randomly generated, not random. Each pad needs to be longer than your message. No part of the pad is ever reused; if you have the first half of a pad, you can decrypt anything encrypted with that half, but it tells you absolutely nothing about the second half of the pad, because it's all random, not an algorithm. If you have the cleartext, you could not reverse-engineer the pad from it, and even if you could, you couldn't use that to determine the rest of the pad.
Here's how it works.
You generate a random pad. In the old days, when the term originated, it was literally a pad of paper with random letters.
The sender and receiver must have identical copies of each pad. For example, lets say you generate a pad for each day of a year, and distribute a copy to each embassy. So each pad has a master number, 1 through 365, and each embassy has it's own in that series.
Each and every one of those copies must be physically secure. If they are, the communications are unbreakable. If they are not, the communications are not.
In the above example, each day's pad might be on, in this day and age, a secure USB key, shink wrapped, with anti-tamper foil. If, in daily inspection, any key is missing, appears to have been altered in any way, the shrink wrap scratched or warped, whatever, every embassy is immediately directed to burn their copy of that pad. Once the pad is used, or at the end of the day, each copy is burned to prevent accidental reuse.
It's part of a cryptographic system, not a complete methodology in and of itself. And it's no different than the idea that, say, public/private key encryption is secure until you misplace your private key.
I've seen the same. I've even had iTunes 11 with current quicktime flat-out refuse to play a video as my 'computer is too slow, but WMP, VLC, ANY other program will play it without a hitch.
For reference, Apple claims an i7-3770 quad-core 3.4 ghz machine with GTX660 SLI and 32 gigs of ram can't play a file that an iPad will play fine.
I've said it before, and I'll say it again; the metro screen is a full-screen start menu with vista/7 gadgets built in and expanded.
But this is a prime example of why Microsoft is still around after 20+ years, when so many other computing companies aren't; they're surprisingly agile for a large company. They'll try something, and if it doesn't work, they'll move on.
They demonstrated this back on the 95 era, when in the space of six months, they went from 'internet, schminternet' to 'internet! internet! internet!' and they're demonstrating it again.