Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
NIGHTWATCH: Portable computer used to scan VAGRANT signals. | NIGHTSTAND: Wirelessly installs exploits of Windows. | STELLARWIND: Data mining the communications of American citizens. | CUSTOMS: Customs opportunities. | DROPOUTJEEP: Software implant for the Apple iPhone. |
MAGNETIC: Sensor Collection of Magnetic Emanations. | SOMBERKNAVE: A Windows XP implant for remote control. | VAGRANT: Collection of Computer Screens. | CTX4000: Radar device for recovery of "off net" information. | CANDYGRAM: Mimics a cellphone tower. |
FOXACID: Installing spyware with at the packet level. | SWAP: Reflashes the BIOS of computer systems. | NSA CAPABILITIES BINGO (free square) | FEEDTHROUGH: Software that penetrates Juniper Networks firewalls. | MONKEYCALENDAR: Sends a mobile phone's location by text message. |
HOWLERMONKEY: A radio transceiver for exploiting systems. | HEADWATER: A firmware backdoor into Huawai routers. | MINERALIZE: Collection from LAN Implant. | IRONCHEF: BIOS malware that communicates with RF implants. | WATERWITCH: Tool for finding the exact location of nearby handsets. |
SPARROW II: Detecting and mapping wireless networks via drone. | PRISM: Mass electronic surveillance & data mining. | DEWSWEEPER: USB wireless Bridge into target network. | SURLYSPAWN: Remote RF keystroke monitor. | DROPMIRE: Passive collection using antenna. |