By the time this happens there will probably be scanners that can monitor them. It's only a matter of time until someone cracks the encryption or it gets leaked and the programming is out. Then what? Are the agencies going to immediately switch to a new system? I doubt it.
I think the ultimate killer of scanning LEO and Fed agencies will be Nextel or something like it that cant even be intercepted much less decrypted (if they even bother to encrypt them).
Are you not aware that under the ECPA, it is illegal in the USA to decrypt encrypted communications that you're not a legal party to? If anyone can do it here in the USA, they're not really going to be able to market it to you or I.
DVP & DES are over 30 years old now, and both were very low-grade systems not even ever allowed to protect classified information. The Parkhill & Vinson family of Type I encryption systems are somewhere close to 40 years old.
Who do you know that's decrypted them, or has "leaked" the encryption/programming *and* was or is selling the capability to monitor that stuff?
It's not crypto systems that are going to bring doom & gloom to us scanner geeks like the original poster implied, but it might be certain spectrally-efficient, proprietary modes (with or without crypto) like iDEN, MotoTurbo or other systems that use spread-spectrum & while not encrypted, do require private/proprietary information in order to detect the network, let-alone track users & decode audio.
I've been around long enough to have survived the doom & gloom predicted and 'Constititional rights violations' that 800MHz trunking (early to mid-1980s), then Motorola Astro/P-25, and more recently OpenSky. All do or did present technological & legal challenges to the scanner manufacturers just as future technologies will. But in the USA -- the largest market for scanners -- the crypto issue is a brick wall. If M/AComm ever decides to license the OpenSky technology to GRE or Uniden, they'd have to offer it cheap, because as of now, OpenSky is somewhat of a fiasco (witness NY...), but it'd let M/AComm's salespeople push encryption for those users who don't already require it.
Oh, a good bulk of federal comms have been using Nextels for the past 10 years or so already!