A cybersecurity responder monitors a hacker's activities covertly to prepare a containment and eradication plan. This technique involves gaining an informational advantage over an adversary by observing them without their knowledge, allowing for strategic planning and response. What threat-hunting technique is being employed?
a) Data Encryption
b) Intrusion Detection
c) Passive Reconnaissance
d) Firewall Configuration