Visit NSA Capabilities Bingo and print one copy of this game card for each player, refreshing the page before each print, or have the players print their own bingo cards. These instructions will not be printed. You can also select an embeddable card only version of the game or a multiple card version of the game when playing on line, or with a smart phone.
Click/Mark each block when you see or hear these words and phrases. When you get five blocks horizontally, vertically, or diagonally, stand up and shout "THANKS OBAMA!". Or play as a drinking game and for every block you mark off, take a sip, and finish your drink each time you get five blocks in a row.
|BLACKHEART: Collection from an FBI Implant.||NIGHTWATCH: Portable computer used to scan VAGRANT signals.||ANGRYMONK: Malware inserted into firmware of hard drives.||NIGHTSTAND: Wirelessly installs exploits of Windows.||MONTANA: Tools to compromise Juniper Networks routers.|
|OCEAN: Optical Collection System for Computer Screens.||SURLYSPAWN: Remote RF keystroke monitor.||STELLARWIND: Data mining the communications of American citizens.||GOURMETTHROUGH: Implant for Juniper Networks firewalls.||WATERWITCH: Tool for finding the exact location of nearby handsets.|
|JETPLOW: A firmware backdoor for Cisco firewalls.||PICASSO: Software that collects mobile phone data, audio.||NSA CAPABILITIES BINGO|
|COTTONMOUTH: A USB plug for communications intercept.||SWAP: Reflashes the BIOS of computer systems.|
|DROPOUTJEEP: Software implant for the Apple iPhone.||HOWLERMONKEY: A radio transceiver for exploiting systems.||LIFESAFER: Imaging of the Hard Drive.||PRISM: Mass electronic surveillance & data mining.||ECHELON: Interception and content inspection of communications.|
|TOTEGHOSTLY: Full remote control of Window Mobile phones.||GINSU: PCI bus device that can inject malware at boot-up.||LOUDAUTO: Audio-based RF retro-reflector listening device.||RAGEMASTER: Video cable implant / remote screen viewing via RF.||MONKEYCALENDAR: Sends a mobile phone's location by text message.|