Skip to main content

Using complex filter combinations to identify and monitor suspicious vessels

Moritz Lehmann avatar
Written by Moritz Lehmann
Updated yesterday

This article is Level 4 in the Filtering training series →


Complex filter combinations for routine monitoring

When you start to combine several different filter types, noteworthy vessels begin to emerge. Your analysis may reveal high risk vessel behaviours or characteristics that would have otherwise been hidden in background traffic.

The characteristics identified through complex filtering can be used to create, save, and share custom queries for continuous monitoring and collaborative analysis. There is no limit to the number of filters you apply, but excessive filters over large areas and timeframes will result in longer processing times.

Once you have set up a complex filter-set for analysis, you can bookmark the current view to return to it later. You can also copy the web link (URL) or click the Share link button in the Filter toolbar to share it with others in your team, or use it in a Standard Operating Procedure (SOP).

Monitoring suspicious areas using filters

Once you have identified suspicious activity using filters, you can create custom areas for future alerting, as well as expanding the time-range to determine whether more of that activity has occurred there in the past (trend analysis).

Read this article on leveraging complex data analysis and predictive intelligence methods to transform potential grayzone activity detection from reactive response to proactive risk prevention–using complex filtering methods in high risk (and high traffic) areas of interest.

The following image provides an example of complex filtering methods for potential sanctions evasion.

Tip: Remember that when applying Vessel activity filters, you can select “Only show activity within the set area” if you want to enable event-based filtering rather than vessel-based filtering. This filters on specific behaviors that occur inside your defined area of interest, instead of returning every vessel that passed through the area and demonstrated that behavior at any other point in its current journey.

Learn more about area-based spoofing analysis on our YouTube channel for Operation TS


Filtering training series

Follow our Filtering training continuum to learn more advanced techniques:

Did this answer your question?