The main thing you and many others are missing is the simple fact that LE may not even give a fuck about what is on your computer. Having your computer encrypted and locked down isn't going to mean shit if you are deanonymized and they find drugs on you. Not to mention if they really want to get around your full disk encryption they wont have any trouble to do so if they don't fuck up tactically, unless you are taking exceptional security measures that probably almost nobody actually is, like using shielded equipment and carrying your laptop on you 24/7 to prevent it from being bugged with hardware keyloggers etc. They have already pwnt several carders and even a few drug dealers who used FDE simply by bugging their computers when they were left unattended. One technique they use is to make sure a person is online prior to a raid and then they storm the place and flash freeze the RAM / dump the contents of RAM to a forensics laptop, before it has a chance to lose its state entirely, which can take something like five to ten minutes after power is cut. FBI counter intelligence used transient electromagnetic pulse analysis to steal passwords from some Russian spies a bit ago, but they probably spend more resources on them than they will on you.