All the scripting in the world won't help you keep track if they just boot a Knoppix CD (or an OS installed to a removable hard disk), mount the file system in a read-only mode, browse, and copy whatever they want. Someone could copy every byte off your hard drive in an hour, and leave no trace whatsoever on the system, no matter how much logging or how many 'scripts' you put on it.
The only way you could keep a knowledgable person out would be to remove or block all of the external USB/Firewire ports, all media drives, and stick proper locks and seals on the system to make it tamper evident (make them use force to open it). Or lock the whole computer up in a vault, or pull the persistant storage out of it and lock THAT up.
You could encrypt the most sensitive files, but encryption isn't 100% certain protection. Remember when a 56 bit DES key was considered 'secure'? How long until triple DES is cracked, or nifty backdoors into other standard encryptions are found? A patient 'bad' person doesn't need to crack your data today. Just have a copy of your encrypted data standing by for the day when the key is known, or the mode of encryption is broken. I hope none of you spent a lot of time making sure your 'wireless' network was secure. That's been broken for a long time.
It isn't really even necessary to 'crack' anything. Once someone can read your hard drive, your internet cache, local password cache, and cookies are right there, and there's a better than even chance you used the same password for more than one thing, and that it's sitting in the clear, in a cookie for a web site. Perhaps even this one....
forums.randi.org FALSE / FALSE 123456789. bbpassword xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Nope, randi.org at least hashed the password with something, possibly even signed the cookie with a randomly generated 'identity' key unrelated to the original password.
Those encrypted internet and windows password caches have a standard weakness: They're
standard, and not only that, they're very
profitable to crack. That combination spells doom. Once the file is copied, even if the data isn't accessible NOW, it can wait until someone has cracked the standard password encryption, and then 'all your passwords are belong to us', and bad people have a copy of your last 'n' electronic tax forms.
Keyloggers are a favorite. You can buy hardware ones inexpensively, and they plug between your keyboard and computer back in that tangle of wires behind your desk. Whatever someone types, the logger records. Some of what they type will be passwords. Install the key logger, wait a few days, go collect the key logger when the next opportunity arrives, plug it in to your own machine, type the magic keys, and out comes everything the victim typed into a text editor.
Software based keyloggers can be installed like spyware to do much the same thing, except these can stay installed basically forever, and report what you typed via the internet during other uploads. Ain't 'spyware' fun? No, it isn't. But it exists.
Like anything else, a little common sense wins. Change the passwords you use occasionally. Don't use the same passwords for *everything*. Above all, physical security for sensitive data is a must.