Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| HEADWATER: A firmware backdoor into Huawai routers. | COTTONMOUTH: A USB plug for communications intercept. | MONTANA: Tools to compromise Juniper Networks routers. | IRONCHEF: BIOS malware that communicates with RF implants. | RAGEMASTER: Video cable implant / remote screen viewing via RF. |
| PICASSO: Software that collects mobile phone data, audio. | LOUDAUTO: Audio-based RF retro-reflector listening device. | NIGHTWATCH: Portable computer used to scan VAGRANT signals. | GOPHERSET: Controls phone remotely via SIM card. | DIETYBOUNCE: Dell BIOS backdoor. |
| GENIE: Multi-stage operation: jumping the airgap etc. | GINSU: PCI bus device that can inject malware at boot-up. | NSA CAPABILITIES BINGO (free square) | GOURMETTHROUGH: Implant for Juniper Networks firewalls. | HOWLERMONKEY: A radio transceiver for exploiting systems. |
| DROPMIRE: Passive collection using antenna. | MINERALIZE: Collection from LAN Implant. | HALLUXWATER: Exploit for Huawei Eudemon firewalls. | LIFESAFER: Imaging of the Hard Drive. | OCEAN: Optical Collection System for Computer Screens. |
| FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | PRISM: Mass electronic surveillance & data mining. | NIGHTSTAND: Wirelessly installs exploits of Windows. | ANGRYMONK: Malware inserted into firmware of hard drives. | BULLDOZER: Hidden wireless bridge for remote control. |