4.2 How open source intelligence can be used in social engineering