is when the threat actor performs research, gathers intelligence, and selects targets. This willinform the threat actor if the attack is worth performing. Any public information may help to determine the what, where, and how of the attack to be performed. There is a lot of publicly available information, especially for larger organizations including news articles, websitles, conference proceedings, and public-facing network devices.