ANCIENTDOCUMENTSPLAINVIEWDOCTRINECHECKFRAUDCOMUTERGENERATEDMD5INITIALFIELDRESPONSEKITSNIFFINGEXTENDEDFIELDRESPONSEKITHAZMATPRIVATESECTORSHA1NISTDIGITALEVIDENCEAUPWARNINGBANNERHASHVALUEWARRANTCOMMINGLINGEVIDENCEAFISCOVERTSURVEILLANCEPROFESSIONALCURIOSITYBESTEVIDENCEINNOCENTINFORMATIONHEARSAYSWGDECRCLIMITINGPHRASECOMPUTERSTOREDPROBABLECAUSEANCIENTDOCUMENTSPLAINVIEWDOCTRINECHECKFRAUDCOMUTERGENERATEDMD5INITIALFIELDRESPONSEKITSNIFFINGEXTENDEDFIELDRESPONSEKITHAZMATPRIVATESECTORSHA1NISTDIGITALEVIDENCEAUPWARNINGBANNERHASHVALUEWARRANTCOMMINGLINGEVIDENCEAFISCOVERTSURVEILLANCEPROFESSIONALCURIOSITYBESTEVIDENCEINNOCENTINFORMATIONHEARSAYSWGDECRCLIMITINGPHRASECOMPUTERSTOREDPROBABLECAUSE

Computer Forensics and Investigations, Chapter 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. ANCIENT DOCUMENTS
  2. PLAIN VIEW DOCTRINE
  3. CHECK FRAUD
  4. COMUTER GENERATED
  5. MD5
  6. INITIAL FIELD RESPONSE KIT
  7. SNIFFING
  8. EXTENDED FIELD RESPONSE KIT
  9. HAZMAT
  10. PRIVATE SECTOR
  11. SHA1
  12. NIST
  13. DIGITAL EVIDENCE
  14. AUP
  15. WARNING BANNER
  16. HASH VALUE
  17. WARRANT
  18. COMMINGLING EVIDENCE
  19. AFIS
  20. COVERT SURVEILLANCE
  21. PROFESSIONAL CURIOSITY
  22. BEST EVIDENCE
  23. INNOCENT INFORMATION
  24. HEARSAY
  25. SWGDE
  26. CRC
  27. LIMITING PHRASE
  28. COMPUTER STORED
  29. PROBABLE CAUSE