where do you live that you worry about torture?If you're not educated or careful then I could just look for files that are "wrong". Encrypted data looks unstructured and random so doing something like naming a file "libxml.dll" when it's actually an aes encrypted file isn't going to work because they'll just pipe ls -aR through file -f.
Truecrypt's value over bitlocker or filevault isn't the encryption it offers but the plausible deniability: it stores your data in a way that you can convincingly claim "it's not there".
While breaking the encryption might be a concern for run of the mill criminals it's not going to help if you're dealing with a government that can compel you to turn over the keys (through the courts or cutting off your fingers until you tell them what they want to know). A big encrypted file/drive is a giveaway that you've got something to hide: they'll know to torture you to be able to look inside. Truecrypt is valuable because it lets you say "there's no such file on the drive". Even if they detect the truecrypt volume (which they can) you can have nested volumes that are impossible to distinguish from random noise. When 'the man' starts breaking your toes with a hammer you can give him the keys to your top-level volume that he knows exists and then deny to the death that a second or third one is on that drive and he'll have no way to know for certain that you're hiding something.