(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Section ___ allows the government to ask for businesses for anything as long as it’s to protect against national terrorism
I can recite to the class the webcam post module
The vole’s name was ____
Does Edward Snowden miss hot pockets?
I can walk you through placing an exploit onto the Kali homepage should you navigate to it’s IP address (no notes)
I know the color of John Oliver’s tie
Is there a need for the patriot act? Why or why not? Take a stance share it with the class
Only ____ takes higher precedence in the news than section 215
Snowden was ___ when he leaked the NSA papers
I know the color of Jeff’s shoes
Between the year 1979 and 2013 the amount of FISA applications were over 35,000 and the applications that were denied in those 34 years was ____
smb_ms17_010 is also known as….
Should the government force decryption of IPhones if it means more security and less privacy? Why or why not
The childhoods pet’s name was_____
I can recite to the class the commands for the keylogger post module.
The original author of section ___ was ______
After the Snowden interview share your opinion should we spy on foreign countries?
Can perfect security and perfect privacy co-exhist? Why or why not? Which is more important? Take a stance
Section ___ holds phone records, not the calls themselves
Over the past three years, real estate phishing scams have cost consumers more than ________
____ of all attacks on enterprise networks are the result of successful spear phishing
According to a pole in the article (not john oliver) that was taken showed that ____ of Americans were not concerned with the NSA listening to their conversations
If I saw that the hash started with $_$ I could tell you what hashing algorithm it is
Different topic to some extent, should the government require cell phone companies to provide a backdoor into devices. Take a stance to check this box (I’ll bring it up at the end)