Trafficking in persons Drug trafficking Drug- related crime Software piracy Hacker Ethnocentrism Dangerous drug Drug offense Human smuggling Threat analysis Right- wing terrorists Data encryption Public order offense Cybercrime Globalization Computer virus Left- wing terrorists Schedule II drug Designer drugs Psychoactive substance Phishing DNA profiling Cyberspace Schedule I drug Trafficking in persons Drug trafficking Drug- related crime Software piracy Hacker Ethnocentrism Dangerous drug Drug offense Human smuggling Threat analysis Right- wing terrorists Data encryption Public order offense Cybercrime Globalization Computer virus Left- wing terrorists Schedule II drug Designer drugs Psychoactive substance Phishing DNA profiling Cyberspace Schedule I drug
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trafficking in persons
Drug trafficking
Drug-related crime
Software piracy
Hacker
Ethnocentrism
Dangerous drug
Drug offense
Human smuggling
Threat analysis
Right-wing terrorists
Data encryption
Public order offense
Cybercrime
Globalization
Computer virus
Left-wing terrorists
Schedule II drug
Designer drugs
Psychoactive substance
Phishing
DNA profiling
Cyberspace
Schedule I drug