Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
BLACKHEART: Collection from an FBI Implant. | DIETYBOUNCE: Dell BIOS backdoor. | TOTEGHOSTLY: Full remote control of Window Mobile phones. | PICASSO: Software that collects mobile phone data, audio. | GOPHERSET: Controls phone remotely via SIM card. |
SWAP: Reflashes the BIOS of computer systems. | COTTONMOUTH: A USB plug for communications intercept. | SPARROW II: Detecting and mapping wireless networks via drone. | STELLARWIND: Data mining the communications of American citizens. | VAGRANT: Collection of Computer Screens. |
GINSU: PCI bus device that can inject malware at boot-up. | DEWSWEEPER: USB wireless Bridge into target network. | NSA CAPABILITIES BINGO (free square) | HALLUXWATER: Exploit for Huawei Eudemon firewalls. | HOWLERMONKEY: A radio transceiver for exploiting systems. |
FOXACID: Installing spyware with at the packet level. | ECHELON: Interception and content inspection of communications. | GOURMETTHROUGH: Implant for Juniper Networks firewalls. | JETPLOW: A firmware backdoor for Cisco firewalls. | MAGNETIC: Sensor Collection of Magnetic Emanations. |
MINERALIZE: Collection from LAN Implant. | PRISM: Mass electronic surveillance & data mining. | FIREWALK: Fake RJ45 socket that allows monitoring via RF. | CUSTOMS: Customs opportunities. | MONTANA: Tools to compromise Juniper Networks routers. |