Before any operation begins, a threat actor or group must conduct reconnaissance to gather information about their target. This process could include anything from active scanning and gathering information about networks and systems to researching executives’ and employees’ professional and personal lives.