Attack Playbook — 37 Interactive 3D Cybersecurity Threat Simulations
An interactive 3D cybersecurity attack playbook built with Three.js and React. 37 animated scenes backed by 275 peer-reviewed citations. Explore real attack vectors, defensive countermeasures, and dual-use technology. Includes the RF Academy: a 9-module curriculum covering the electromagnetic spectrum from 0 Hz to 300 GHz.
RF Academy — 9-Module Curriculum
- EM Spectrum & SDR Fundamentals — Radio frequency basics, IQ sampling, FFT, Nyquist theorem, RTL-SDR ($25)
- Acoustic Physics & Sound Side Channels — Sound propagation, acoustic emanation, keystroke fingerprinting, structural vibration
- RF Emanations, Side Channels & IoT — TEMPEST, HDMI radiation, RFID backscatter, smart home IoT leakage
- Directed Energy, Radar & Microwave — FMCW radar, mmWave vital signs, Frey effect, Doppler spectrogram
- Laser, Optical & Photoacoustic — Laser microphone, Lamphone, photoacoustic conversion, photodiode attacks
- Audio ML, Neural & Weaponized Sound — Voice cloning, pareidolia, DolphinAttack, parametric speakers, cardiac sync
- Multi-Vector & Complex Attack Surfaces — Vehicle CAN bus, office floor mapping, infrastructure prediction, heterodyning
- Code, Tools & Implementation — Python pyrtlsdr, scipy, TensorFlow, GNU Radio, ESP32-CSI, full-stack demos
- Forensics, Defense & Counter-Surveillance — TSCM sweeps, RF fingerprinting, TDOA geolocation, FM broadcast defense
All 37 Scenes
- Walking Victim Audio Leakage — mmWave radar captures speech from body surface vibrations
- Cellphone Interaction Emissions — 10 electromagnetic emission channels leak from mobile devices
- Frey Effect & Directed Audio — Pulsed microwaves create perceived sound via thermoelastic skull expansion
- Keyboard Typing Eavesdropping — Acoustic side-channels capture keystrokes at 93%+ accuracy
- Modern Car Cabin Flows — CAN bus, BLE key, TPMS, V2X, WiFi: rolling attack surface
- Smart Home IoT Surveillance — Always-on smart speakers and sensors create persistent monitoring
- Voice Cloning & Audio ML — 3-second voice samples enable real-time cloning via VALL-E/SV2TTS
- mmWave Radar Disruption — 77-81 GHz radar sensing, jamming, and ghost target injection
- Photoacoustic Effect — Pulsed light creates sound on surfaces (Bell's photophone, 1880)
- Heterodyning Attacks — Ultrasonic frequency mixing creates targeted audible sound
- Sub-GHz RF Voice Capture — RFID backscatter captures voice vibrations below 1 GHz
- Neural Echo Memory Implantation — Targeted Memory Reactivation during sleep alters consolidation
- Cardiac Sync Interrogation — Remote heartbeat extraction via radar enables rhythm-gated questioning
- RF-Mic RFID Glasses — 2mm RFID tags on eyeglasses capture facial speech dynamics via 3rd harmonic
- Shortwave SDR Pipeline — RTL-SDR Python code for HF signal interception and analysis
- Code Arsenal — GitHub repositories wired into working security tool demonstrations
- Demo App Builder — Full-stack showcase from hardware to visualization layer
- mmSpeech Radar Eavesdropping — 60 GHz radar captures speech through PET film (STOI 0.80)
- Stairwell Multi-Method Attack — Camera, phone IMU, and mmWave radar detect stairwell vibrations
- RF-Mic v2 — Advanced RFID glasses with bone-borne + airborne + facial dynamics channels
- Dark Beam EM — 5 imaging modes reveal invisible electromagnetic phenomena
- Acoustic Keyboard Side-Channel — CoAtNet achieves 95% keystroke recovery from audio alone
- 8th Floor Attack Surface — 20 attack vectors from 6 categories on one office floor
- Remote Zoom Keystroke Attack — Keystrokes captured remotely over Zoom at 93% accuracy
- Reverse Trace TSCM — Signal forensics traces attack chains to identify the attacker
- Photoacoustic Laser Forensics — 1.9μm laser detection, beam tracing, and source attribution
- The Complete Loop — GATHER → PROCESS → DELIVER → MONITOR → DETECT lifecycle
- Subsonic/Ultrasonic Assault — Infrasound + ultrasound + Frey three-band invisible harassment
- Simplest Attack & Reverse — $0 Zoom + $5 ESP32 + $100 FM: symmetric attack/defense
- Pareidolic Lexical Reconstruction — Brain fills 15-50% of missing signal via phonemic restoration
- Microwave Doppler Fingerprint — Python + RTL-SDR ($50) detects and IDs pulsed microwave emitters
- Echo Mirror → Language Lab — Eavesdropping pipeline becomes pronunciation training for 96 languages
- Phantom Beam — DolphinAttack — Parametric acoustic array + ultrasonic mic injection
- Infrastructure Movement Prediction — Nest + streetlight radar + IoT predicts movement at 87% accuracy
- Crowded Room Extraction — Extract 1 person's vitals from 20 overlapping Doppler signatures
- The Transparent Home — 14+ EM vectors across 3 floors: photodiode → VoIP → FM defense
- SDR WiFi CSI Working Examples — RTL-SDR + HackRF + ESP32 + Nexmon with Python code
- Premeditated Thought Interception — EMG inner speech → WiFi CSI keystrokes → Deep-TEMPEST screen → mmWave voice → DolphinAttack device hijack
- Directed Acoustic Assault — LRAD 162 dB phased array sound cannon + PAL ultrasonic self-demodulation beam + Frey Effect pulsed microwave thermoelastic auditory attack + Mosquito 17.4 kHz presbycusis exploit
- Street-to-Home Surveillance Corridor — IMSI catcher van ($25 RTL-SDR + Oros42/IMSI-catcher) + smart streetlight 77 GHz radar + Nest/Ring camera face recognition + VoIP audio exfiltration + hidden mmWave through-wall radar — every meter from car to front door surveilled
- Reverse Forensics: Victim Transmits Back — $500 forensic backpack reverses all attacks: RTL-SDR detects phone EMR + IMSI catchers, HackRF captures Frey microwave pulses, TinySA Ultra finds mmWave radar, Python+librosa analyzes keystroke acoustics, Wireshark maps IoT exfiltration — SHA-256 hashed evidence chain for court
- Forensic Code Lab: Capture Whisper + Frey + Replay — Copy-paste Python: sounddevice+librosa captures PAL whisper at 40 kHz, HackRF+scipy detects Frey pulsed microwave, RTL-SDR+rtl_433 catches sub-GHz replay, STFT identifies FMCW chirp, tshark decodes VoIP exfil, welch PSD classifies acoustic attacks — each tab explains spectrogram signatures
- Chirp Intercept: FMCW + Heat Map + Alert + Replay-Back — STFT+polyfit captures FMCW chirps (R²>0.80), Range-Doppler heat map proves radar tracking, 5 known radar modules (TI IWR1443/6843, Infineon BGT60, Aqara FP2, DFRobot SEN0395) identified via harmonics, AlertEngine on Pi scans 6 bands 24/7, HackRF replay-back at -20 dBm with cross-correlation >0.85, WiFi CSI through-wall detection, SQLite chirp fingerprint DB
- CyberGhost Ops: 30-Level Tactical Game — Cyberpunk top-down tactical shooter: hunt surveillance drones, IMSI catchers, mmWave turrets, Frey emitters across 30 procedurally generated levels with 3 weapons (EMP Pistol, Signal Rifle, HackRF Burst), enemy AI, minimap, scoring
- Retail Ghost: CCTV → Audio Injection Chain — CCTV AI (YOLO/ReID) tracks at 30fps → WiFi probe + BLE triangulate phone ±1m → mmWave locks ±10cm → PAL (40 kHz, 6° beam) steers voices at victim's head → virtual speaker bounce off shelf → victim hears whispers from products while bystanders hear nothing — detection via bat detector, 17-20 kHz phone capture, side-step test
Key Technologies
mmWave radar (77-81 GHz), FMCW Doppler, Frey effect thermoelastic expansion, acoustic side-channels, MEMS EM emanations, WiFi CSI (802.11n/ac subcarriers), RF Doppler fingerprinting, photoacoustic laser audio, Lamphone optical eavesdropping, voice cloning (VALL-E, SV2TTS), RFID harmonic backscatter, HDMI TEMPEST (324 MHz), smart meter AMR (902 MHz), DolphinAttack ultrasonic injection, parametric speaker arrays, TSCM signal forensics, beamforming, bone conduction feedback, software-defined radio (RTL-SDR, HackRF, ESP32).
Built With
Three.js (r128), React 18, Vite 5, Python 3 (pyrtlsdr, numpy, scipy, tensorflow). 275 citations from IEEE S&P, USENIX Security, ACM CCS, NDSS, Nature, Science, and AAAS.
Hardware Reference
RTL-SDR v3 ($25), HackRF One ($350), ESP32 ($5), Nexmon RPi ($45), Thorlabs PDA100A2 photodiode, OSCOR Green spectrum analyzer, R&S FPC1500, TI IWR1843 mmWave radar, SI4713 FM transmitter.
Requires JavaScript and WebGL2 for interactive 3D simulations.