Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| STELLARWIND: Data mining the communications of American citizens. | SURLYSPAWN: Remote RF keystroke monitor. | SPARROW II: Detecting and mapping wireless networks via drone. | OCEAN: Optical Collection System for Computer Screens. | ECHELON: Interception and content inspection of communications. |
| GINSU: PCI bus device that can inject malware at boot-up. | MONKEYCALENDAR: Sends a mobile phone's location by text message. | CANDYGRAM: Mimics a cellphone tower. | DIETYBOUNCE: Dell BIOS backdoor. | FIREWALK: Fake RJ45 socket that allows monitoring via RF. |
| FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | NIGHTWATCH: Portable computer used to scan VAGRANT signals. | NSA CAPABILITIES BINGO (free square) | PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000. | LOUDAUTO: Audio-based RF retro-reflector listening device. |
| CUSTOMS: Customs opportunities. | HIGHLANDS: Collection from Implants. | IRONCHEF: BIOS malware that communicates with RF implants. | MINERALIZE: Collection from LAN Implant. | NIGHTSTAND: Wirelessly installs exploits of Windows. |
| PRISM: Mass electronic surveillance & data mining. | COTTONMOUTH: A USB plug for communications intercept. | GOURMETTHROUGH: Implant for Juniper Networks firewalls. | PICASSO: Software that collects mobile phone data, audio. | DROPOUTJEEP: Software implant for the Apple iPhone. |