Modifying encryption algorithms generally makes them much, much weaker, especially if someone thinks they’re being clever with ‘subtle’ changes. It’s way too easy to introduce flaws if you don’t have peer reviews even if you’re an expert on crypto programming, and if you are an expert at crypto programming that probably came at the expense of extensive spy training, or can be used to make a ton of money at a legitimate or semi-legitimate job. Your efforts are pretty much always going to be way more productive if you work on having a solid plan for using encryption and managing devices and access that doesn’t rely on giant security holes like passwords written on paper (which was the case in the OP’s story).
This highlights one of the problems with security: you have to balance usability with security. “You must run this obscure item within 60 seconds” means you could lose all of your data if your system has issues on startup - there are windows updates that take longer than 60 seconds to give you back control, for example. If you have a program that you have to run every 20 minutes, it might kick in on a police raid - but also will kick in if your chinese food delivery arrives at the wrong time, or you get sidetracked while trying to work with your data. If the data is incriminating but has so little value to you that you’re not worried about losing it, you’re probably better off just not saving the data in the first place.
Side note: Any competent law enforcement will attach the disk to a duplicator and make a copy before anything else whether the disk is encrypted or not unless they’re trying to access the device without shutting it down. They can’t understand the data since the copy will just be encrypted data like the original, but they can mess with it without worrying about losing the original.
You could possibly thwart this with custom drive hardware that a disk duplicator won’t understand or would get wrong, but as far as I know even major power spies don’t bother with that, as it gets expensive and annoying (since spies in the field are generally going to treat disks as disposable) and isn’t really worth the effort.