FishingExpeditionKeyloggerNo-knockwarrantsCookieAbacasWindowsEventViewerForensicWorkstationFaradaybagsFair CreditReportingAct of1970Locard'sexchangeprincipleForensicCertificationChain ofCustodySteganographyWrite-ProtectInterfacesTriangulationEvidenceHandlingHot-SwapBaysToolkitPlainViewDoctrineDataCarvingDiscoveryknock andannounceruleEncryptionProbableCauseFishingExpeditionKeyloggerNo-knockwarrantsCookieAbacasWindowsEventViewerForensicWorkstationFaradaybagsFair CreditReportingAct of1970Locard'sexchangeprincipleForensicCertificationChain ofCustodySteganographyWrite-ProtectInterfacesTriangulationEvidenceHandlingHot-SwapBaysToolkitPlainViewDoctrineDataCarvingDiscoveryknock andannounceruleEncryptionProbableCause

Computer Forenics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Fishing Expedition
  2. Keylogger
  3. No-knock warrants
  4. Cookie
  5. Abacas
  6. Windows Event Viewer
  7. Forensic Workstation
  8. Faraday bags
  9. Fair Credit Reporting Act of 1970
  10. Locard's exchange principle
  11. Forensic Certification
  12. Chain of Custody
  13. Steganography
  14. Write-Protect Interfaces
  15. Triangulation
  16. Evidence Handling
  17. Hot-Swap Bays
  18. Toolkit
  19. Plain View Doctrine
  20. Data Carving
  21. Discovery
  22. knock and announce rule
  23. Encryption
  24. Probable Cause