Would it be possible to have a system where you have a second key that "decrypts" to an empty drive? I don't see how they could prove that you used your primary or fake key.
The first time, it's a KLUDGE! The second, a trick. Later, it's a well-established technique! -- Mike Broido, Intermetrics