Some people have thought their message might have been a "canary", but I don't think so. You've read the truecrypt audit right? They didn't find any major problems with it.
The developers tried to remain anonymous, and I think they saw the writing on the wall. Look what the government is doing with Apple. I don't think they wanted any part of dealing with the hassles of dealing with random government organizations trying to pressure them to exploit a back door that doesn't exist.
I don't think it's been cracked, at least not without some sort of brute-force method, which would take a lot of computing power and time. Government organizations don't have time or money to throw at some random criminal's truecrypt drive so it's "un-crackable" in these cases. If your drive contained a matter of national security, they'd dedicate the resources it took to get into it.
Truecrypt lists some caveats in their files that would weaken the encryption, but barring those, it's pretty much going to take a brute force method at this point. With a good password, brute force would still take a very long time.