Track, attribute and analyse grey zone conflict and hostile orbital activity — from hybrid warfare on Earth to satellite proximity operations in space. Open intelligence. Structured data. Built in public.
Both platforms currently display curated historical demonstration data
Why this matters
Grey zone conflict — the space between peace and open war — is where most modern aggression happens. Satellite stalking, proxy wars, GPS jamming, maritime harassment, disinformation, cyber intrusions. Most of it goes untracked, underreported and under-attributed.
GreyZone is building open infrastructure to change that. Structured, accessible intelligence on the incidents that define modern conflict — from coastal waters to geostationary orbit.
The platforms
Two distinct products with a shared architecture — designed to become the most comprehensive open-source grey zone intelligence resource available.
GreyZone Watch
A live incident tracker for irregular, hybrid and grey zone activity across land, sea and cyberspace. GreyZone Watch surfaces the operations that are designed to be deniable, ambiguous and hard to attribute — the modern face of geopolitical aggression.
GreyZone Orbit
The first open-source space security incident tracker with a live 3D orbital globe. GreyZone Orbit maps hostile activity in orbital space — from anti-satellite weapons tests to satellite proximity operations and space-based electronic warfare.
How it works
Step 01
Incidents are sourced from open reporting, government statements, academic publications and verified journalist investigations. Every entry carries a primary source link. Confidence levels reflect the quality of available attribution evidence — from Suspected through to Confirmed.
Step 02
Each incident is structured with domain classification, adversary attribution, severity scoring and — in Orbit — full orbital parameters including actor/target NORAD IDs and orbital regime. The data model is designed to support analysis, not just display.
Step 03
Live maps, 3D orbital globes, trend charts and domain breakdowns give analysts and researchers the tools to understand patterns, identify escalation signals and track adversary behaviour across time and domain.
What we track
Current and planned coverage spans the full spectrum of grey zone activity — from terrestrial hybrid operations to counter-space capabilities in geostationary orbit.
Hybrid Warfare
Proxy operations, deniable military action and covert force employment below the threshold of open conflict
Electronic Warfare
GPS jamming, communications spoofing and spectrum denial operations against military and civilian targets
Maritime Grey Zone
Coast guard harassment, fishing fleet operations, subsea cable interference and port coercion
Cyber Operations
State-attributed cyber attacks on critical infrastructure, government networks and defence systems
RPO / Satellite Stalking
Rendezvous & proximity operations — inspector satellites shadowing high-value national intelligence assets
ASAT Weapons
Direct-ascent and co-orbital anti-satellite weapons tests, intercepts and capability demonstrations
Space-based EW
Jamming and spoofing of satellite communications, navigation signals and ground uplinks from orbit
Dual-Use & Debris
Weapons-capable platforms disguised as civil missions and deliberate debris-generating events
Where we are
Both platforms are in active development. Core functionality is live. We're building in public and shaping the roadmap with feedback from analysts, researchers and domain experts.
Demonstration Data
Both platforms currently display curated historical data to demonstrate functionality. The incidents shown are real, sourced from open reporting, and representative of the data model — but this is not yet a live feed. Automated ingestion and verified real-time data are on the roadmap. We're sharing this early so the architecture and approach can be shaped with input from the community.
Shape what we build
Both platforms are in active development and we want to hear from analysts, researchers, journalists and defence professionals. What domains are we missing? What would make this more useful to your work? What data matters most to you?
No account needed — a plain email works perfectly · info@evodefence.uk