Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| TOTEGHOSTLY: Full remote control of Window Mobile phones. | ANGRYMONK: Malware inserted into firmware of hard drives. | FOXACID: Installing spyware with at the packet level. | IRONCHEF: BIOS malware that communicates with RF implants. | ECHELON: Interception and content inspection of communications. |
| HOWLERMONKEY: A radio transceiver for exploiting systems. | STELLARWIND: Data mining the communications of American citizens. | HALLUXWATER: Exploit for Huawei Eudemon firewalls. | MONKEYCALENDAR: Sends a mobile phone's location by text message. | NIGHTWATCH: Portable computer used to scan VAGRANT signals. |
| PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000. | GINSU: PCI bus device that can inject malware at boot-up. | NSA CAPABILITIES BINGO (free square) | DEWSWEEPER: USB wireless Bridge into target network. | VAGRANT: Collection of Computer Screens. |
| LOUDAUTO: Audio-based RF retro-reflector listening device. | MINERALIZE: Collection from LAN Implant. | COTTONMOUTH: A USB plug for communications intercept. | CANDYGRAM: Mimics a cellphone tower. | WATERWITCH: Tool for finding the exact location of nearby handsets. |
| GOPHERSET: Controls phone remotely via SIM card. | SOMBERKNAVE: A Windows XP implant for remote control. | DIETYBOUNCE: Dell BIOS backdoor. | RAGEMASTER: Video cable implant / remote screen viewing via RF. | JETPLOW: A firmware backdoor for Cisco firewalls. |