DEWSWEEPER: USB wireless Bridge into target network.SPARROW II: Detecting and mapping wireless networks via drone.MONKEYCALENDAR: Sends a mobile phone's location by text message.HALLUXWATER: Exploit for Huawei Eudemon firewalls.NIGHTSTAND: Wirelessly installs exploits of Windows.
CTX4000: Radar device for recovery of "off net" information.GOPHERSET: Controls phone remotely via SIM card.FOXACID: Installing spyware with at the packet level.BULLDOZER: Hidden wireless bridge for remote control.IRONCHEF: BIOS malware that communicates with RF implants.
SWAP: Reflashes the BIOS of computer systems.GOURMETTHROUGH: Implant for Juniper Networks firewalls.NSA CAPABILITIES BINGO
(free square)
FIREWALK: Fake RJ45 socket that allows monitoring via RF.STELLARWIND: Data mining the communications of American citizens.
ANGRYMONK: Malware inserted into firmware of hard drives.TOTEGHOSTLY: Full remote control of Window Mobile phones.RAGEMASTER: Video cable implant / remote screen viewing via RF.DIETYBOUNCE: Dell BIOS backdoor.CANDYGRAM: Mimics a cellphone tower.
HOWLERMONKEY: A radio transceiver for exploiting systems.PRISM: Mass electronic surveillance & data mining.ECHELON: Interception and content inspection of communications.MONTANA: Tools to compromise Juniper Networks routers.VAGRANT: Collection of Computer Screens.
HALLUXWATER: Exploit for Huawei Eudemon firewalls.PHOTOANGLO: NSA/GCHQ project to develop a system to replace CTX4000.CUSTOMS: Customs opportunities.RAGEMASTER: Video cable implant / remote screen viewing via RF.SURLYSPAWN: Remote RF keystroke monitor.
DIETYBOUNCE: Dell BIOS backdoor.FIREWALK: Fake RJ45 socket that allows monitoring via RF.FOXACID: Installing spyware with at the packet level.MONKEYCALENDAR: Sends a mobile phone's location by text message.ECHELON: Interception and content inspection of communications.
COTTONMOUTH: A USB plug for communications intercept.GENIE: Multi-stage operation: jumping the airgap etc.NSA CAPABILITIES BINGO
(free square)
HIGHLANDS: Collection from Implants.PICASSO: Software that collects mobile phone data, audio.
NIGHTWATCH: Portable computer used to scan VAGRANT signals.JETPLOW: A firmware backdoor for Cisco firewalls.BULLDOZER: Hidden wireless bridge for remote control.STELLARWIND: Data mining the communications of American citizens.DROPMIRE: Passive collection using antenna.
RADON: Bi-directional Ethernet host tap.MAGNETIC: Sensor Collection of Magnetic Emanations.DEWSWEEPER: USB wireless Bridge into target network.SOMBERKNAVE: A Windows XP implant for remote control.NIGHTSTAND: Wirelessly installs exploits of Windows.

Get your own card at https://www.buzzwordbingogame.com/cards/nsa?cardcount=2&