Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| HALLUXWATER: Exploit for Huawei Eudemon firewalls. | TOTEGHOSTLY: Full remote control of Window Mobile phones. | GOURMETTHROUGH: Implant for Juniper Networks firewalls. | LIFESAFER: Imaging of the Hard Drive. | NIGHTWATCH: Portable computer used to scan VAGRANT signals. |
| OCEAN: Optical Collection System for Computer Screens. | GINSU: PCI bus device that can inject malware at boot-up. | RADON: Bi-directional Ethernet host tap. | FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | MONTANA: Tools to compromise Juniper Networks routers. |
| SPARROW II: Detecting and mapping wireless networks via drone. | MAGNETIC: Sensor Collection of Magnetic Emanations. | NSA CAPABILITIES BINGO (free square) | STELLARWIND: Data mining the communications of American citizens. | CTX4000: Radar device for recovery of "off net" information. |
| FOXACID: Installing spyware with at the packet level. | CUSTOMS: Customs opportunities. | HIGHLANDS: Collection from Implants. | HOWLERMONKEY: A radio transceiver for exploiting systems. | JETPLOW: A firmware backdoor for Cisco firewalls. |
| BLACKHEART: Collection from an FBI Implant. | SURLYSPAWN: Remote RF keystroke monitor. | COTTONMOUTH: A USB plug for communications intercept. | ANGRYMONK: Malware inserted into firmware of hard drives. | MONKEYCALENDAR: Sends a mobile phone's location by text message. |