Nico Dekens

More About Nico Dekens

nico (1)

Connect with Nico Dekens

Nico Dekens is an experienced all-source intelligence analyst and the founder of Dutch Osint Guy Intelligence Services, specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT), and digital investigations. With a deep passion for intelligence gathering, analysis, and online investigations, Nico has dedicated over 20 years to the field, including extensive experience within Dutch law enforcement. Throughout his career, he has worked on a wide range of cases, from high-profile homicide and international narcotics investigations to tracking stolen art, gang violence, and online extremist networks. He has also conducted covert virtual HUMINT operations and counterterrorism investigations.

Recognized in the OSINT community as @Dutch_OsintGuy, Nico is a well-known trainer and consultant, providing expertise in OSINT methodologies, risk assessment, security awareness, and structured team workflows. As a co-founder of the OSINTCurio.us project, he actively contributes to the growth and development of OSINT professionals worldwide.

Driven by a mission to enhance global security, Nico pursued OSINT and cyber intelligence to help safeguard communities and stay ahead in an ever-evolving digital landscape. His commitment to continuous learning and knowledge-sharing has led him to train thousands of professionals in government and private sectors, including the development of OSINT units within the Dutch government.

Nico is a SANS instructor for SEC497: Practical Open-Source Intelligence (OSINT) and is the lead author of SEC587: Advanced OSINT Gathering and Analysis. His teaching philosophy revolves around practical, real-world application, emphasizing a dynamic exchange of knowledge between instructor and student. He is also a faculty member at the SANS Technology Institute, a recognized NSA Center of Academic Excellence in Cyber Defense.

Among his most impactful achievements, Nico takes pride in his role in preventing terrorist attacks and tracking down child predators. His contributions have earned recognition from organizations such as Europol, the U.S. Department of Homeland Security (DHS), NATO, and Dutch law enforcement. Additionally, the Dutch Military Cyber Intelligence and Cyber Defense department has formally expressed gratitude for his efforts.

In 2023, Nico was named Open Source Intelligence Champion of the Year by the OSMOSIS Institute in recognition of his contributions to the field. His professional credentials include certifications as a Police Detective, Operational Intelligence Analyst, Tactical Intelligence Analyst, Strategic Intelligence Analyst, Open-Source Intelligence Analyst, Cyber Intelligence Tradecraft Professional, and Online Counterterrorism Specialist.

Podcasts and Talks

Publications

More

Connect with Nico

 

Latest Posts by Nico Dekens

Security analyst with binoculars viewing network activity

12 Ways to Improve Corporate Security Awareness

By Nico Dekens | June 30, 2025

Employees are your first line of defense. No matter how sophisticated your security operations are, a single click, one misplaced device, or one overlooked warning sign can unravel your best-laid plans. That’s where corporate security awareness comes in. It equips each and every employee with the knowledge and tools they need to become part of

Attention warning attacker alert sign with exclamation mark on dark background with abstract network connections illustration

Information Security Policy: 14 Key Elements for Corporate Security

By Nico Dekens | June 27, 2025

Information security policies (ISPs) are guardrails for your business. They define who can access what, how data is handled, and what happens when something goes wrong. Without an ISP, you’re relying on guesswork, which is ineffective for stopping breaches. This article breaks down the core elements every policy should include to reduce risk, ensure accountability,

Analyst reviewing data for a corporate security investigation

20 Best Practices for Effective Corporate Security Investigations

By Nico Dekens | June 27, 2025

The stakes are high in corporate security investigations. A single misstep can erase evidence, trigger legal exposure, or leave threats unresolved. Whether you’re investigating insider leaks, external breaches, or executive threats, a disciplined approach is critical. This guide breaks down 20 best practices to help you run cleaner, faster, and more effective investigations, from preparation

World map in red

8 Best Social Media Monitoring Tools for Law Enforcement

By Nico Dekens | June 18, 2025

Law enforcement agencies depend on sophisticated tools for detecting threats and tracking suspects, and social media monitoring has become an indispensable source of intelligence. Social media can support investigators’ efforts in everything from exposing criminal networks to gauging public sentiment. The right technologies enable investigators to gather real-time data and unify digital information to speed

Social media monitoring for government

Social Media Monitoring for Government: Expert Guide

By Nico Dekens | June 13, 2025

In the current threat environment, ignoring social media is a liability governments can’t afford. Social platforms function as more than communication tools, serving as digital battlegrounds where narratives form, movements begin, and threats emerge. From lone-wolf attacks planned in comment threads to mass disinformation campaigns seeded by nation-state actors, the signals are already there. You

Monitoring social media for threats

Social Media Threat Monitoring: 10 Effective Strategies

By Nico Dekens | June 13, 2025

Social media threat monitoring is a key component of open-source intelligence (OSINT) that involves real-time tracking and analysis of social media platforms to detect security threats, harmful content, and criminal activities. Social media threat monitoring systems provide essential functionality for public safety organizations, as well as corporate security departments and risk management professionals. In this

Corporate data security best practices

Corporate Data Security: 10 Best Practices for Protecting Sensitive Business Information

By Nico Dekens | June 10, 2025

Threat actors don’t need to break down your front door; they just wait for an unpatched server, a shared password, or a misconfigured S3 bucket to seize an opportunity for illicit access. Corporate data breaches extend beyond system damage, with impact to revenue, undermining trust and harming reputations while leading to regulatory consequences. The guide

Strengthening your corporate security plan

8 Strategies to Strengthen Your Corporate Security Plan

By Nico Dekens | June 10, 2025

Modern threats operate continuously and ignore organizational boundaries between departments. Attackers target every possible vulnerability through phishing attacks, malware, insider threats, and even physical breaches. That’s why an effective corporate security plan requires more than basic locks, firewalls, and policies. It demands an intelligence-driven defense. Current threat conditions make reactive measures insufficient, and effective prevention

Corporate security

What is Corporate Security? The Complete Guide

By Nico Dekens | June 4, 2025

Corporate security isn’t just about surveillance cameras, firewalls, or background checks. It’s about protecting the entire operation, from people and data to operations and reputation. Today’s threats don’t come from one direction. They’re physical, digital, and often hiding in plain sight. This guide breaks down what corporate security really means, why it matters, and how

OSINT checklist and advanced tasks for cybersecurity pros

OSINT Checklist: Advanced Task List for Cybersecurity Pros

By Nico Dekens | May 28, 2025

Open Source Intelligence (OSINT) extends beyond passive data collection, following a structured approach to uncover hidden connections and expose vulnerabilities. Cybersecurity experts can utilize OSINT techniques to gain crucial information about threat actors as well as exposed infrastructure and organizational footprints to support cyber defense mechanisms. The advanced steps outlined in this checklist enable OSINT

OSINT Exercises: Ultimate Guide to Enhancing Your Investigative Skills

OSINT Exercises: Ultimate Guide to Enhancing Your Investigative Skills

By Nico Dekens | May 28, 2025

Open-source intelligence (OSINT) isn’t just about knowing where to look but also about knowing how to think critically. The internet holds a staggering volume of information, and much of it is hiding in plain sight. But the real challenge isn’t access, but interpretation. OSINT exercises give investigators a chance to practice the process of gathering

Futuristic digital grid with glowing nodes and red laser-like connections, representing a high-tech network or quantum computing system

What is the OSINT Framework?

By Nico Dekens | April 25, 2025

In an increasingly data-rich world, open-source intelligence (OSINT) has become a crucial part of investigative work for investigators, analysts, cybersecurity professionals, journalists, law enforcement, and researchers. Whether you’re tracking down a person of interest, digital footprint, verifying online identities, or conducting threat assessments, having access to the right tools is critical. The OSINT Framework simplifies

Globe and data connections, OSINT concept

OSINT Techniques: Complete List of Expert Tactics for Investigators

By Nico Dekens | April 10, 2025

Today, vast amounts of publicly accessible information—which is used to produce open-source intelligence (OSINT)—can be leveraged to uncover truths, verify identities, track events, and assess threats. But tapping into this digital goldmine requires more than just a basic search engine query. In this guide, we take a deep-dive into OSINT techniques to create a comprehensive

23 Best OSINT Tools for Advanced Intelligence Gathering in 2025 (Paid and Free Options)

By Nico Dekens | April 10, 2025

Open Source Intelligence (OSINT) has become an essential practice for investigators, analysts and cybersecurity professionals. Whether you’re tracking threat actors, uncovering digital footprints, or monitoring public sentiment, having the right tools can make all the difference. But with so many OSINT tools available—each with unique capabilities across areas like social media monitoring, domain reconnaissance, metadata

Just Do… OSINT: A Short Primer On Identifying Counterfeits Online

By Nico Dekens | April 4, 2025

OSINT analysts at large brands like Nike and Adidas regularly face the challenge of uncovering counterfeit sellers in a rapidly evolving digital environment. Successful brand protection depends on strategic thinking, careful research, and practical investigative skills. Understanding Counterfeiters Counterfeit sellers exploit high demand and limited availability. Their activities typically flourish in areas with minimal oversight,

The Slow Collapse of Critical Thinking in OSINT due to AI

By Nico Dekens | April 3, 2025

OSINT used to be a thinking game. Now it’s becoming a trusting game and that should terrify you. I’ve seen it firsthand, analysts running solid investigations, then slowly shifting more and more of the thinking to GenAI tools. At first, it’s small. You use ChatGPT to summarise a document or translate a foreign post. Then

Open Source Intelligence (OSINT): What It Is, How It Works, and Why It Matters (+ Tools, Techniques & Use Cases)

By Nico Dekens | February 12, 2025

Discover the power of Open Source Intelligence (OSINT), an essential tool that transforms publicly available data into actionable insights. Learn about its history, methodologies like web scraping and social media monitoring, and the ethical considerations that guide its responsible use.

CaseStudy uncover and attribute@2x

How Does OSINT Make It Hard for Cybercriminals to Work?

By Nico Dekens | October 9, 2024

OSINT leverages publicly available data from the surface, deep, and dark web to detect cyber threats, uncover cybercriminal activities, and enhance proactive defense. It aids in threat intelligence, exposing identities, and supporting law enforcement to disrupt malicious operations.

dark prism data wave

The 13 Biggest Challenges of an OSINT Investigation

By Nico Dekens | September 4, 2024

Conducting OSINT investigations can be challenging, with issues like information overload, data quality verification, technical skills, legal considerations, and misinformation. Overcoming these hurdles requires the right tools, methodologies, and expertise to streamline efforts and ensure actionable insights.

The Significance of AI and ML in OSINT to Human Investigators

By Nico Dekens | November 29, 2023

Artificial Intelligence (AI) and Machine Learning (ML) excel in processing vast amounts of data swiftly. During open-source intelligence (OSINT) investigations, you almost always gather information in overwhelming volumes. AI algorithms can efficiently sift through this data, identifying patterns and relevant information significantly quicker than a human ever could.

OSINT Methods To Investigate Suspected AI Generated Content

By Nico Dekens | May 19, 2023

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulentproduct reviews, and more. As mainstream access to AI tools spreads, the opportunities to use thetechnology for malicious purposes are on the rise.

OSINT Observations from ShadowDragon Experts: Moldova

By Nico Dekens | March 15, 2023

NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon

Scroll to Top