Beyond Dashboards: OSINT’s Next Two Decades
- Nico Dekens | dutch_osintguy
- Sep 29
- 9 min read
For people who plan to still be useful in 2045 in OSINT.
The next two decades will bury lazy investigators under dashboards and AI assistants. The ones who survive will be the ones who treat OSINT like a discipline, not a dopamine hobby.
Why write this now?
Because the ground is moving under our feet. AI is fast, content is synthetic, platforms are fracturing, and law/regulation is waking up. Most people will add more tools. Fewer will upgrade their tradecraft. This is for the latter, the ones who understand that if your work can’t survive hostile review, you’re just generating engagement.
Here’s the blunt math: collection has gone exponential; verification has not. If your pipeline doesn’t convert raw noise into decisions, ethically and defensibly, you’re not an analyst, you’re a tourist.
This blog is inspired by my recent blogs The Slow Collapse of Critical Thinking in OSINT due to AI and Stop Calling It OSINT
TL;DR Predictions (pin this and argue with it)
OSINT that wins = verification at speed. Collection explodes; verification is the bottleneck and the differentiator.
AI becomes the junior analyst you never trust. Useful, fast, wrong in entertaining ways. Keep it on a leash, never let it hold the pen.
Provenance becomes currency. Chain-of-custody and method transparency will decide what survives daylight. If you can’t show it, you can’t use it.
Platform gravity flips. Less open web; more semi‑closed ecosystems, ephemeral chat, encrypted groups, localised platforms. Translation will lie to you.
Investigations go multi‑sensor by default. Imagery, RF hints, telemetry, logistics, market signals, stitched into one defensible story.
Ethics & legality are operational. Compliance is not a disclaimer; it’s access and impact.
Counter‑deception becomes a core skill. Assume your pipeline is being gamed. Build like it is.

Tradecraft That Scales (and What Doesn’t)
The Verification Ladder (use this like a ritual)
Claim shaping → What exactly is being asserted? What decision depends on it?
Uniqueness check → Can this claim be true and useless? Kill trivia early.
Source triage → Classify by independence, motive, proximity in time/space.
Cross‑modal corroboration → At least two unrelated modalities (text + imagery, imagery + telemetry, etc.).
Context stress → Weather, cultural cues, local calendars, language traps.
Adversarial test → If I wanted to fake this, how would I? Try it.
Provenance pack → Archive, hash, chain-of-custody notes, method summary.
Decision brief → State uncertainty and consequences. Name what would change your mind.
Evidence Objects (stop shipping screenshots)
Treat every artifact as a provable object with:
Raw file(s) + hash + capture/ingest context
Time/place constraints (how we know)
Witness/source graph (who said what, when)
Transformation log (edits, crops, enhancements)
Legal/ethical notes (why we can use it)
Residual doubt (and tests we couldn’t run)
Source Typology (so you don’t get played)
Primary, passive (sensor feeds, Commercial Off-The-Shelf (COTS) imagery)
Primary, active (your collection, interviews, with consent)
Secondary, independent (unrelated actors)
Secondary, entangled (same echo system)
Adversarial/performative (content designed to bait OSINT)
Translation: Label your food before you eat it.
The Next 5 Years (2025–2030): The Verification Squeeze (Deep Dive)
Synthetic Content Everywhere
“Spot the fake” is a party trick. The job is to prove the real under time pressure. Watermarks and provenance tags will help sometimes, be missing often, and be forged occasionally. Build processes that survive all three conditions.
Do this:
Standardise lighting/shadow/time checks (solar azimuth, altitude bands). Automate first pass, manual confirm edge cases.
Audio forensics lite: room tone continuity, mic handling artifacts, compression ladder anomalies.
Face/scene continuity: accessories, wear patterns, weather on clothing, mud/dust consistency.
Generative tells are unstable, never rely on one tell across models.
Assistants on Overdrive
LLMs and specialty models will sit inside every OSINT surface: summarizers, entity extractors, pivot suggesters. Treat them like interns with infinite energy and no context.
Guardrails:
Lead vs. finding: AI output = lead to break, never a finding to ship.
Triangulate across models: Ask 2–3 different systems, compare contradictions, anchor to sources.
Prompt hygiene: encode your verification ladder into the prompts. Force models to show uncertainty and ask for missing data.
Platform Fragmentation (and Language Traps)
Global social is getting quieter; local publics are getting louder: regional apps, private groups, micro‑communities. Machine translation will happily erase cultural meaning (sarcasm, idiom, taboo).
Countermeasures:
Maintain language/region decks: slang, emoji dialects, political/religious context.
Track calendar offsets (religious holidays, school terms, national events) for time anchoring.
Build relationships with community mediators (journalists, researchers) who can reality‑check interpretations.
Commercial Sensing as Baseline
COTS satellite, RF sniffers, ship/air telemetry, logistics breadcrumbs, wildfire/thermal alerts. It’s no longer exotic; it’s another column in your spreadsheet.
Utilisation pattern:
Taskable cadence: know the revisit windows you can count on; pre‑register Areas of Interest (AOIs).
Contrast checks: imagery → thermal → social ground truth.
Budget real talk: pick two premium sensors you’ll actually use. Stop hoarding subscriptions.
Mini Case Study: Ukraine 2022–2023 (Tradecraft Walkthrough)
Claim: Battery of MLRS operating near Village X at 14:30 local.
Initial trigger: video on Telegram with plume and sound.
Step 1 (time/geo): shadow length + road curvature + tree line vs. sat basemap; cross‑reference with historical imagery.
Step 2 (audio): cadence and echo to infer class; compare with known signatures.
Step 3 (telemetry): nearby FR24/ADS‑B gap and NOTAM timing; correlate with observed smoke drift.
Step 4 (secondary): local posts of traffic/ambulance route changes.
Step 5 (adversarial): try a fake. Can the same plume be composited from stock?
Physics says no due to wind shear seen across frames.
Output: 2‑page brief with confidence bands and a map; uncertainty noted (angle could hide launcher count). That’s actionable.

Mini Case Study: Criminal Finance 2026 - Ghost Couriers
Informal cash couriers coordinating on ephemeral chat use ride‑share receipts and food delivery orders as time/geo alibis.
Signals: recurring device presence at neighborhood hubs; micro‑transactions at fixed intervals; gig‑platform heat maps.
OSINT fusion: public delivery screenshots + CCTV requests by journalists + residential permit databases.
Tradecraft highlight: pattern over proof - no single artifact is decisive; the sequence is.
Playbook to implement now
Write a kill checklist for claims (weather, time, shadows, passes, sensor coverage, cross‑source).
Version evidence: archive, hash, keep originals; write methods as you go.
Maintain a source ledger: each fact with two unrelated corroborations.
Treat AI output as leads to break, not answers to ship.
Build a denial list of your blind spots (languages, regions, sensors) and a partnership plan to cover them.
The Next 10 Years (2030–2035): OSINT as Systems (Deep Dive)
Agent Swarms, Human in Command
Collection and first‑pass sorting will be automated. Your value shifts to question design, arbitration, and escalation.
Reference architecture:
Ingest agents (per‑source) → Normalise → De‑dup → Triagers (entity/time/location) → Contradiction hunters (explicitly search for disconfirming evidence) → Human review gates → Brief generator → Legal/ethics gate → Publish.Design patterns:
Voting vs. veto: Agents can vote for inclusion; only humans can veto to prevent automation bias.
Suspicion budget: Allocate compute to counter‑hypotheses not just the mainline story.
Incident heat map: Let agents light up inconsistencies rather than headlines.
Simulation Enters the Room
Digital twins and synthetic environments let you pressure‑test hypotheses before fielding. The trap is believing your sim.
Use it right:
Treat simulations as counterfactual generators (what must be true if our claim is true?).
Validate with low‑cost probes (call a business, check utility outages, scrape transit).
Red‑team your sim assumptions (what parameters are doing all the work?).
Edge‑First, Consentful OSINT
More data will be processed on devices and sensors, not centralised. Large‑scale scraping will be throttled by law and tech. Winning teams build consentful cooperation with sources and communities.
Operationalise:
Offer value back (safety info, local hazard maps, verification service) in exchange for opt‑in signals.
Build privacy‑preserving workflows (hashes, differential privacy for aggregates).
Provenance Standards Mature
Think “chain‑of‑custody for pixels.” Tools will embed capture context; courts and editors will expect it. You’ll still need to explain it in human language.
Deliverable pattern: Each major claim ships with a Provenance Appendix: what we collected, how we verified, what we did to it, and what could break it.
Mini Case Study: Disinformation 2030 - Architecture, Not Artifacts
A state‑aligned campaign manufactures a labor strike rumour.
Persona layer: synthetic organizers with plausible work histories.
Amplification layer: micro‑influencers seeded with “exclusive tips.”
Legitimacy layer: a fake local news site echoes the claim; ads target municipal employees.
Pressure layer: auto‑generated petitions ping city HR emails for FOI bait.
OSINT response:
Map the layers, not the tweets. Attribute capability (who can do this), not just content. Publish a diagram that a city counsel can understand; include mitigations (what to shut off first). That's the impact.
How to position yourself
Learn to design questions machines can’t shortcut: falsifiable, decision‑oriented.
Build a peer network that trades methods and reviews, not tool lists.
Invest in collection ethics and legal literacy; access will hinge on it.
Train a cadence: weekly red‑team of one high‑confidence finding to see if it breaks.
The Next 20 Years (2035–2045): Counter‑AI Intelligence (Deep Dive)
Autonomous Deception and Adversarial Feeds
Assume adversaries will tailor content for your pipeline: your languages, your past interests, your publication timing. They’ll feed you what you want to see.
Deception surfaces & mitigations:
Source similarity (everything looks independent, but timing jitter is identical) → enforce temporal diversity in corroboration.
Model‑targeted phrasing (designed to exploit LLM biases) → rotate models, use contrastive prompts.
Honeyfiles (content with embedded legal traps) → strict legal/ethics gate before any redistribution.
OSINT as Infrastructure
OSINT outputs will sit inside legal cases, newsroom decisions, crisis response, risk systems. Not as screenshots, but as verifiable evidence containers.
Evidence container blueprint:
Data (raw + derived)
Methods (parameterized, reproducible)
Provenance (capture → transform → output)
Rights/consent (why we can use it)
Counter‑arguments (logged and addressed)
Reproduction pack (enough for a peer to rerun)
Mini Case Study: Conflict Zone 2040—Workflow Under Fire
Raw: simultaneous drops of atrocity footage across five platforms; two have old watermarks.
Provenance: device signature mismatch on one clip; GPS EXIF present but inconsistent.
Multi‑sensor: thermal pass validates a fire at time T; RF logs show jamming 10 minutes prior.
Human ground truth: two phone interviews confirm the presence of evacuations.
Adversarial test: a staged set nearby would have required lighting inconsistent with grid blackout.
Output: a 6‑page evidence object + 1‑page executive brief for decision‑makers within 6 hours. Confidence high; caveat: two clips excluded for chain‑of‑custody uncertainty.
How to future‑proof
Make verification your specialization. Be the person teams call to destroy weak claims.
Build auditable pipelines: raw → analysis → brief, with checks at each step.
Teach. Mentor the next wave of thinking, not tools.
Document failure journals; institutionalise learning.
Ethics & Legality (Operational, Not Decorative)
Necessity & proportionality: collect only what the decision demands. If it’s just neat, don’t keep it.
Visibility & consent: prefer opt‑in signals where feasible; minimize personal data exposure; protect by design.
Retention discipline: set Time To Live (TTLs); tie retention to decisions, not curiosity.
Jurisdiction awareness: work to the strictest applicable standard in your stack; don’t rely on the most permissive.
Disclosure mindset: if you can’t show a method to legal/editorial, redesign it until you can, or drop it.
Team Design for the Next Two Decades
Roles you actually need:
Collection Engineer (APIs, scraping, sensor orchestration)
Verification Lead (provenance, forensics, chain‑of‑custody)
Adversarial Analyst (red‑team, deception detection)
Context Analyst (language, culture, domain)
Narrative Editor (turns proof into decision briefs)
Legal/Ethics Officer (green‑lights methods and outputs)
Pipeline Steward (reproducibility, documentation, audits)
Hiring signals:
Write methods as they go.
Admits uncertainty without drama.
Breaks their own work pre‑publication.
Understands at least one non‑OSINT domain deeply (finance, energy, maritime, healthcare, etc.).
Training cadence:
Weekly case teardown (pick a viral claim, rebuild it from raw, write a brief).
Monthly simulation drill (red vs blue team A fakes, team B verifies).
Quarterly legal/ethics workshop with updated case law and platform policies.
Metrics That Matter (and Ones That Don’t)
Good:
Decision lead time (how much earlier did the decision land because of your work?)
Verification debt (open questions logged vs. closed)
Reproduction rate (how often can a peer reproduce your core findings?)
Correction half‑life (time to detect and correct errors)
Bad:
Likes, RTs, follower counts
Raw volume collected
Number of tools installed
Mistakes I Made (and What I Changed)
Falling for speed. I shipped early “finds” without hostile review. Most were wrong. Fix: instituted a 10‑minute red pause with a named breaker.
Trusting tools. Dashboards felt like truth because they were tidy. Fix: contradiction quotas. We must actively hunt one disconfirming piece before shipping.
Underestimating adversaries. I assumed they wouldn’t target my pipeline. Fix: built deception surface maps and rotate model stacks.
Hoarding over curating. I collected terabytes with no chain of custody. Fix: evidence object spec + TTLs; if it isn’t tied to a decision, it dies.
Ambiguous ownership. “Everyone” owned verification, so nobody did. Fix: one named Verification Lead per case.
Lesson: Every mistake is survivable if you admit it fast and document the fix. Your credibility is a bank account, stop spending it on tweets.
Red Flags & Anti‑Patterns
Fast and wrong (“We’ll correct later”).
Confidence borrowed from a model.
Single‑screenshot “finds.”
Methods you can’t show to legal, editorial, or a judge.
Engagement as a success metric.
Tool lists masquerading as tradecraft.
“Trust me bro” sourcing.
Signals to Watch (for pivots)
Uptake of provenance features by major platforms and tooling.
Commercial imagery cadence and price curves.
Migration from global socials to local language/regional networks.
New legal constraints that turn “can” into “can’t show.”
Emergence of agent marketplaces (who controls them and how they’re audited).
Quality of counter‑OSINT content targeting investigators.
A Minimalist Checklist for Investigations in 2025+
Question → Decision → Deadline taped to the monitor.
Two independent sources for every material fact.
One contradiction forced before you accept a claim.
Archive + hash everything you cite.
Write uncertainty (with reasons) in the brief.
Peer‑hostile review before publishing.
Provenance appendix attached to every major claim.
The Work That Survives
OSINT isn’t screenshots with better lighting. It’s tradecraft, verification, context, accountability, outcomes. The next 20 years will produce more data, more dashboards, and more noise than the last 20 combined.
The people who matter will still be the ones who can walk past the shiny door handle, into the house, and come back out with something you can act on.
Offload grunt. Keep the brain. Make your work so defensible it scares you, then publish.