MONTANA: Tools to compromise Juniper Networks routers.GENIE: Multi-stage operation: jumping the airgap etc.COTTONMOUTH: A USB plug for communications intercept.SPARROW II: Detecting and mapping wireless networks via drone.NIGHTWATCH: Portable computer used to scan VAGRANT signals.
STELLARWIND: Data mining the communications of American citizens.CANDYGRAM: Mimics a cellphone tower.SOMBERKNAVE: A Windows XP implant for remote control.DROPOUTJEEP: Software implant for the Apple iPhone.HIGHLANDS: Collection from Implants.
DEWSWEEPER: USB wireless Bridge into target network.FOXACID: Installing spyware with at the packet level.NSA CAPABILITIES BINGO
(free square)
CTX4000: Radar device for recovery of "off net" information.HALLUXWATER: Exploit for Huawei Eudemon firewalls.
ANGRYMONK: Malware inserted into firmware of hard drives.MAGNETIC: Sensor Collection of Magnetic Emanations.GINSU: PCI bus device that can inject malware at boot-up.FIREWALK: Fake RJ45 socket that allows monitoring via RF.HEADWATER: A firmware backdoor into Huawai routers.
TOTEGHOSTLY: Full remote control of Window Mobile phones.SWAP: Reflashes the BIOS of computer systems.IRONCHEF: BIOS malware that communicates with RF implants.CUSTOMS: Customs opportunities.PICASSO: Software that collects mobile phone data, audio.
RADON: Bi-directional Ethernet host tap.PRISM: Mass electronic surveillance & data mining.LIFESAFER: Imaging of the Hard Drive.STELLARWIND: Data mining the communications of American citizens.SURLYSPAWN: Remote RF keystroke monitor.
DEWSWEEPER: USB wireless Bridge into target network.NIGHTWATCH: Portable computer used to scan VAGRANT signals.BLACKHEART: Collection from an FBI Implant.GINSU: PCI bus device that can inject malware at boot-up.MONKEYCALENDAR: Sends a mobile phone's location by text message.
CANDYGRAM: Mimics a cellphone tower.HIGHLANDS: Collection from Implants.NSA CAPABILITIES BINGO
(free square)
PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000.COTTONMOUTH: A USB plug for communications intercept.
FIREWALK: Fake RJ45 socket that allows monitoring via RF.HOWLERMONKEY: A radio transceiver for exploiting systems.CTX4000: Radar device for recovery of "off net" information.FEEDTHROUGH: Software that penetrates Juniper Networks firewalls.DIETYBOUNCE: Dell BIOS backdoor.
SOMBERKNAVE: A Windows XP implant for remote control.DROPMIRE: Passive collection using antenna.HALLUXWATER: Exploit for Huawei Eudemon firewalls.GOURMETTHROUGH: Implant for Juniper Networks firewalls.LOUDAUTO: Audio-based RF retro-reflector listening device.

Get your own card at https://www.buzzwordbingogame.com/cards/nsa/?&cardcount=2