Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
|NIGHTWATCH: Portable computer used to scan VAGRANT signals.||DROPMIRE: Passive collection using antenna.||TOTEGHOSTLY: Full remote control of Window Mobile phones.||HEADWATER: A firmware backdoor into Huawai routers.||NIGHTSTAND: Wirelessly installs exploits of Windows.|
|SPARROW II: Detecting and mapping wireless networks via drone.||HOWLERMONKEY: A radio transceiver for exploiting systems.||ECHELON: Interception and content inspection of communications.||DIETYBOUNCE: Dell BIOS backdoor.||JETPLOW: A firmware backdoor for Cisco firewalls.|
|WATERWITCH: Tool for finding the exact location of nearby handsets.||MINERALIZE: Collection from LAN Implant.||NSA CAPABILITIES BINGO|
|VAGRANT: Collection of Computer Screens.||BULLDOZER: Hidden wireless bridge for remote control.|
|MONTANA: Tools to compromise Juniper Networks routers.||MAGNETIC: Sensor Collection of Magnetic Emanations.||MONKEYCALENDAR: Sends a mobile phone's location by text message.||GOURMETTHROUGH: Implant for Juniper Networks firewalls.||SOMBERKNAVE: A Windows XP implant for remote control.|
|PICASSO: Software that collects mobile phone data, audio.||DEWSWEEPER: USB wireless Bridge into target network.||BLACKHEART: Collection from an FBI Implant.||CUSTOMS: Customs opportunities.||SURLYSPAWN: Remote RF keystroke monitor.|