Targeting is the intelligence function of identifying adversary entities — forces, facilities, equipment, infrastructure, leadership, communications nodes — and providing the information necessary for their engagement by military or other means. It is where intelligence most directly serves the operational function of applying force, and where the distinction between understanding the adversary and acting against the adversary collapses.

The targeting process follows a doctrinal cycle: decide (establish targeting priorities based on commander’s objectives), detect (find and identify targets through collection), deliver (engage targets through appropriate means), and assess (evaluate the effects of engagement to determine whether restrike is needed). Intelligence supports every phase: analysis establishes which targets matter most, collection locates and tracks them, and battle damage assessment determines whether engagement achieved its intended effect. The cycle is continuous — each assessment generates new requirements, each engagement changes the adversary’s disposition and creates new collection needs.

Target development — the process of building a target from initial identification to actionable intelligence — requires a convergence of multiple collection disciplines. A facility identified through IMINT must be confirmed through SIGINT or HUMINT as operationally significant. Its function must be determined, its defenses assessed, its patterns of activity established, and its relationship to the adversary’s broader operational network understood. The resulting target package — coordinates, imagery, functional analysis, collateral damage estimate, recommended weapon and delivery method — represents one of the most tightly integrated products of all-source analysis.

The increasing precision of targeting — enabled by GPS-guided munitions, persistent surveillance, and real-time data links between sensors and shooters — has compressed the targeting cycle from days to minutes, creating what practitioners call the “sensor-to-shooter” loop. This compression has outpaced the capacity for deliberate analysis, creating conditions in which targeting decisions are made on the basis of pattern-of-life analysis (behavioral patterns observed through surveillance) rather than positive identification. The consequences have included strikes on misidentified targets, civilian casualties from flawed pattern-of-life analysis, and a broader ethical debate about whether the technical capacity to strike individual targets creates an obligation to do so that exceeds the intelligence system’s capacity to identify them correctly.

Targeting also intersects with attribution in ways that have grown more consequential as military operations have expanded beyond conventional interstate warfare. In counterterrorism and counterinsurgency, the target is often an individual rather than a facility or formation, and the targeting decision depends on intelligence judgments about that individual’s identity, role, and threat level. The intelligence burden of individual targeting — confirming identity, establishing pattern of life, assessing proximity to civilians, estimating second-order effects — is qualitatively different from the intelligence burden of conventional military targeting, and the intelligence failures that result from errors are correspondingly more visible and more politically consequential.