PROBABLECAUSECOVERTSURVEILLANCEPLAINVIEWDOCTRINEEXTENDEDFIELDRESPONSEKITWARRANTHASHVALUEHAZMATWARNINGBANNERAUPANCIENTDOCUMENTSMD5BESTEVIDENCEPRIVATESECTORCOMPUTERSTOREDINITIALFIELDRESPONSEKITCRCHEARSAYSWGDECOMMINGLINGEVIDENCEAFISLIMITINGPHRASECHECKFRAUDNISTCOMUTERGENERATEDSNIFFINGINNOCENTINFORMATIONSHA1DIGITALEVIDENCEPROFESSIONALCURIOSITYPROBABLECAUSECOVERTSURVEILLANCEPLAINVIEWDOCTRINEEXTENDEDFIELDRESPONSEKITWARRANTHASHVALUEHAZMATWARNINGBANNERAUPANCIENTDOCUMENTSMD5BESTEVIDENCEPRIVATESECTORCOMPUTERSTOREDINITIALFIELDRESPONSEKITCRCHEARSAYSWGDECOMMINGLINGEVIDENCEAFISLIMITINGPHRASECHECKFRAUDNISTCOMUTERGENERATEDSNIFFINGINNOCENTINFORMATIONSHA1DIGITALEVIDENCEPROFESSIONALCURIOSITY

Computer Forensics and Investigations, Chapter 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. PROBABLE CAUSE
  2. COVERT SURVEILLANCE
  3. PLAIN VIEW DOCTRINE
  4. EXTENDED FIELD RESPONSE KIT
  5. WARRANT
  6. HASH VALUE
  7. HAZMAT
  8. WARNING BANNER
  9. AUP
  10. ANCIENT DOCUMENTS
  11. MD5
  12. BEST EVIDENCE
  13. PRIVATE SECTOR
  14. COMPUTER STORED
  15. INITIAL FIELD RESPONSE KIT
  16. CRC
  17. HEARSAY
  18. SWGDE
  19. COMMINGLING EVIDENCE
  20. AFIS
  21. LIMITING PHRASE
  22. CHECK FRAUD
  23. NIST
  24. COMUTER GENERATED
  25. SNIFFING
  26. INNOCENT INFORMATION
  27. SHA1
  28. DIGITAL EVIDENCE
  29. PROFESSIONAL CURIOSITY