During a cybersecurity assessment, an ethical hacker starts by gathering publicly available information about the target organization, including its employees, technologies used, and exposed assets. This information is collected without directly interacting with the target systems. Which phase of hacking is being performed?