Hat tip to JIOX linking to this blog article 'How 'Open-Source Intelligence' Sculpts Targeted Attacks':http://www.internetevolution.com/aut...&doc_id=202619

Which commended this:
It was an eye opener, describing how various online applications can be used to data mine personal information and turn it into OSINT.
The presentation is a video of a session, nearly an hour and is called 'Using Social Networks To Profile, Find and 0wn Your Victims':http://www.irongeek.com/i.php?page=v...Your%20Victims