Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
|GOURMETTHROUGH: Implant for Juniper Networks firewalls.||MINERALIZE: Collection from LAN Implant.||SWAP: Reflashes the BIOS of computer systems.||FOXACID: Installing spyware with at the packet level.||PRISM: Mass electronic surveillance & data mining.|
|COTTONMOUTH: A USB plug for communications intercept.||MAGNETIC: Sensor Collection of Magnetic Emanations.||JETPLOW: A firmware backdoor for Cisco firewalls.||CUSTOMS: Customs opportunities.||ANGRYMONK: Malware inserted into firmware of hard drives.|
|CANDYGRAM: Mimics a cellphone tower.||GENIE: Multi-stage operation: jumping the airgap etc.||NSA CAPABILITIES BINGO|
|TOTEGHOSTLY: Full remote control of Window Mobile phones.||PICASSO: Software that collects mobile phone data, audio.|
|DROPOUTJEEP: Software implant for the Apple iPhone.||LOUDAUTO: Audio-based RF retro-reflector listening device.||HOWLERMONKEY: A radio transceiver for exploiting systems.||CTX4000: Radar device for recovery of "off net" information.||SOMBERKNAVE: A Windows XP implant for remote control.|
|FEEDTHROUGH: Software that penetrates Juniper Networks firewalls.||SPARROW II: Detecting and mapping wireless networks via drone.||NIGHTWATCH: Portable computer used to scan VAGRANT signals.||WATERWITCH: Tool for finding the exact location of nearby handsets.||DROPMIRE: Passive collection using antenna.|