Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| BULLDOZER: Hidden wireless bridge for remote control. | RADON: Bi-directional Ethernet host tap. | VAGRANT: Collection of Computer Screens. | FIREWALK: Fake RJ45 socket that allows monitoring via RF. | MINERALIZE: Collection from LAN Implant. |
| MAGNETIC: Sensor Collection of Magnetic Emanations. | CANDYGRAM: Mimics a cellphone tower. | TOTEGHOSTLY: Full remote control of Window Mobile phones. | IRONCHEF: BIOS malware that communicates with RF implants. | SWAP: Reflashes the BIOS of computer systems. |
| MONKEYCALENDAR: Sends a mobile phone's location by text message. | WATERWITCH: Tool for finding the exact location of nearby handsets. | NSA CAPABILITIES BINGO (free square) | NIGHTSTAND: Wirelessly installs exploits of Windows. | LIFESAFER: Imaging of the Hard Drive. |
| DROPOUTJEEP: Software implant for the Apple iPhone. | DEWSWEEPER: USB wireless Bridge into target network. | ANGRYMONK: Malware inserted into firmware of hard drives. | CUSTOMS: Customs opportunities. | NIGHTWATCH: Portable computer used to scan VAGRANT signals. |
| HOWLERMONKEY: A radio transceiver for exploiting systems. | GINSU: PCI bus device that can inject malware at boot-up. | PICASSO: Software that collects mobile phone data, audio. | MONTANA: Tools to compromise Juniper Networks routers. | JETPLOW: A firmware backdoor for Cisco firewalls. |