The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World

This open source book explores how intelligence and cyber-security analysts can uncover hidden links between threat actor infrastructure and ongoing investigations by pivoting on both classic and unconventional indicators β€” many of which are often overlooked. The material is grounded in empirical, field-tested strategies used in cyber-security, digital forensics, cyber threat intelligence, and intelligence analysis more broadly.

I released the first version of this book following the @firstdotorg CTI Conference 2025 in Berlin, where the initial idea for the project emerged.

πŸ”— PDF https://raw.githubusercontent.com/adulau/the-art-of-pivoting/refs/heads/main/output/the-art-of-pivoting.pdf

πŸ”— Source of the book in Markdown https://github.com/adulau/the-art-of-pivoting (if you want to contribute ;-)

#cti #threatintelligence #pivoting #pivot #intelligence #intelligencecommunity #cybersecurity #book #openbook #investigation #opensource

@misp
@ail_project

For more details about the background story behind this work:

https://www.foo.be/2025/12/the-art-of-pivoting

@firstdotorg @misp @ail_project

The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World

Personal webpage of Alexandre Dulaunoy - from information security to open source and art

Alexandre Dulaunoy - adulau - Home Page

I updated The Art of Pivoting based on reader feedback.

For example, the Analytical Strategies of Pivoting is now a visual overview than a difficult to read table.

Repository updated https://github.com/adulau/the-art-of-pivoting
PDF https://raw.githubusercontent.com/adulau/the-art-of-pivoting/refs/heads/main/output/the-art-of-pivoting.pdf

@firstdotorg @misp @ail_project

https://git.foo.be/adulau/the-art-of-pivoting/src/branch/main/output/the-art-of-pivoting.pdf

I just discovered that the PDF viewer on @forgejo is actually much better than the default one from Github.

the-art-of-pivoting/output/the-art-of-pivoting.pdf at main

the-art-of-pivoting - The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World

Forgejo: adulau git carryall - git.foo.be

I made some updates and clarifications in the book, including:

πŸ”— GitHub https://github.com/adulau/the-art-of-pivoting
πŸ”— HTML https://www.foo.be/the-art-of-pivoting/

The Art of Pivoting

The Art of Pivoting: Techniques for Intelligence Analysts to Discover New Relationships

I was curious, so I decided to self-publish on Lulu after a few people asked for a physical copy. I have no idea about the print quality or the final result, this is just a test. Any revenue from the book (if there is any) will be redistributed to support open-source projects.

πŸ”— https://www.lulu.com/shop/alexandre-dulaunoy/the-art-of-pivoting-techniques-for-intelligence-analysts-to-discover-new-relationships-in-a-complex-world/paperback/product-q6wyrgq.html?q=The+Art+of+Pivoting&page=1&pageSize=4

The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World

This book explores how intelligence and cyber-security analysts can uncover hidden links between threat actor infrastructure and ongoing investigations by pivoting on both classic and unconventional indicators β€” many of which are often overlooked. The material is grounded in empirical, field-tested strategies used in cyber-security, digital forensics, cyber threat intelligence, and intelligence analysis more broadly. Our goal is to provide analysts with a practical toolkit of analytical methods, supported by real-world examples, to enhance investigative workflows without locking them into a single mindset, strict model, or overly rigid technical strategy. Instead, the book encourages creative exploration, data-driven reasoning, and the use of diverse data points β€” from traditional IOCs to subtle metadata traces β€” as part of a flexible and repeatable analytical process. The approach presented throughout this book is intentionally built upon open-source tooling, most notably the MISP threat intelligence platform and the AIL Project. By relying on transparent and widely adopted tools, every technique described here can be reproduced, validated, and reused by analysts, researchers, educators, or incident response teams. This ensures that the methodology is not theoretical or proprietary, but openly verifiable, community-driven, and designed to evolve. The book itself follows the same philosophy: it is an open, living document, publicly versioned, and contributions are welcomed directly via Git. Readers are encouraged to experiment, improve, and extend the content, making the entire workflow repeatable, auditable, and collaborative within the wider defensive security community.

Lulu
@adulau neat! I was going to print this at work, so I'll bite.
@adulau ordered. This has been a super helpful learning reference for me so having a physical copy will be both convenient and aesthetically pleasing
@adulau I've published on Lulu for, eep, almost 20 years. No complaints so far!
@adulau Excellent stuff! Sent to my team as well
@CryptoLek Thank you. Feedback is more than welcome. I will update it regularly.