Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
| PRISM: Mass electronic surveillance & data mining. | MONKEYCALENDAR: Sends a mobile phone's location by text message. | STELLARWIND: Data mining the communications of American citizens. | RAGEMASTER: Video cable implant / remote screen viewing via RF. | RADON: Bi-directional Ethernet host tap. |
| NIGHTWATCH: Portable computer used to scan VAGRANT signals. | PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000. | FOXACID: Installing spyware with at the packet level. | HIGHLANDS: Collection from Implants. | NIGHTSTAND: Wirelessly installs exploits of Windows. |
| BULLDOZER: Hidden wireless bridge for remote control. | MINERALIZE: Collection from LAN Implant. | NSA CAPABILITIES BINGO (free square) | GINSU: PCI bus device that can inject malware at boot-up. | FIREWALK: Fake RJ45 socket that allows monitoring via RF. |
| WATERWITCH: Tool for finding the exact location of nearby handsets. | SURLYSPAWN: Remote RF keystroke monitor. | LIFESAFER: Imaging of the Hard Drive. | IRONCHEF: BIOS malware that communicates with RF implants. | JETPLOW: A firmware backdoor for Cisco firewalls. |
| SWAP: Reflashes the BIOS of computer systems. | FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | HALLUXWATER: Exploit for Huawei Eudemon firewalls. | ECHELON: Interception and content inspection of communications. | HOWLERMONKEY: A radio transceiver for exploiting systems. |