Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| FIREWALK: Fake RJ45 socket that allows monitoring via RF. | BLACKHEART: Collection from an FBI Implant. | HIGHLANDS: Collection from Implants. | MINERALIZE: Collection from LAN Implant. | BULLDOZER: Hidden wireless bridge for remote control. |
| LOUDAUTO: Audio-based RF retro-reflector listening device. | DIETYBOUNCE: Dell BIOS backdoor. | FOXACID: Installing spyware with at the packet level. | PRISM: Mass electronic surveillance & data mining. | WATERWITCH: Tool for finding the exact location of nearby handsets. |
| GINSU: PCI bus device that can inject malware at boot-up. | CUSTOMS: Customs opportunities. | NSA CAPABILITIES BINGO (free square) | IRONCHEF: BIOS malware that communicates with RF implants. | SWAP: Reflashes the BIOS of computer systems. |
| JETPLOW: A firmware backdoor for Cisco firewalls. | CTX4000: Radar device for recovery of "off net" information. | VAGRANT: Collection of Computer Screens. | COTTONMOUTH: A USB plug for communications intercept. | ANGRYMONK: Malware inserted into firmware of hard drives. |
| MONTANA: Tools to compromise Juniper Networks routers. | DROPMIRE: Passive collection using antenna. | DEWSWEEPER: USB wireless Bridge into target network. | SURLYSPAWN: Remote RF keystroke monitor. | SPARROW II: Detecting and mapping wireless networks via drone. |