How cybercriminals harvest information for spear phishing

Using only publicly available sources, how much can you find out about someone?