Pattern of life (POL) is the intelligence methodology of establishing a target’s regular behavioral patterns — routines of movement, communication, association, and activity — through sustained IMINT, SIGINT, and HUMINT surveillance over time. Once the baseline pattern is established, deviations from it become analytically significant: a change in routine may signal operational preparation, a meeting with an unusual contact may indicate a new relationship, and a departure from established security protocols may create a targeting window.
POL analysis is foundational to the find-fix-finish targeting cycle. The “find” phase depends on knowing where the target normally is; the “fix” phase depends on knowing when the target deviates from or adheres to the pattern in ways that create actionable opportunities. The CIA’s surveillance of Khamenei in the months before the 2026 strikes was a pattern-of-life operation: tracking his daily movements, meeting patterns, communication habits, and security arrangements to identify the conditions under which a strike could succeed.
The method works by collecting three layers of behavioral data. The first layer is physical movement — where the target goes, by what route, at what times, with what security. The second is communication — who the target contacts, through what channels, at what frequency. The third is association — who the target meets, where, and whether the meetings follow a schedule or break from one. Each layer draws on different collection disciplines, and the composite picture is stronger than any single layer alone.
The technique’s limitation is its time requirement. Establishing a reliable pattern requires sustained collection over weeks or months — a resource commitment that competes with other intelligence requirements. It also assumes that the target’s behavior is sufficiently regular to produce a pattern, and that the target is not conducting counter-surveillance that would detect the collection and alter behavior to deny the pattern. Operational security on the adversary’s side and counterintelligence awareness are the primary defenses against POL exploitation.
POL analysis also raises ethical and legal questions. The same methodology used against military targets abroad is used by law enforcement and intelligence agencies domestically. The line between intelligence collection and surveillance of civilian populations depends on who is being watched, under what authority, and for what purpose — distinctions that the methodology itself does not enforce.