WARNINGBANNERSNIFFINGCRCBESTEVIDENCEPLAINVIEWDOCTRINESWGDEHASHVALUEAUPCOMMINGLINGEVIDENCEHAZMATCHECKFRAUDSHA1INNOCENTINFORMATIONCOMPUTERSTOREDPROFESSIONALCURIOSITYLIMITINGPHRASEDIGITALEVIDENCEPROBABLECAUSEAFISINITIALFIELDRESPONSEKITCOMUTERGENERATEDPRIVATESECTORCOVERTSURVEILLANCEANCIENTDOCUMENTSHEARSAYEXTENDEDFIELDRESPONSEKITWARRANTNISTMD5WARNINGBANNERSNIFFINGCRCBESTEVIDENCEPLAINVIEWDOCTRINESWGDEHASHVALUEAUPCOMMINGLINGEVIDENCEHAZMATCHECKFRAUDSHA1INNOCENTINFORMATIONCOMPUTERSTOREDPROFESSIONALCURIOSITYLIMITINGPHRASEDIGITALEVIDENCEPROBABLECAUSEAFISINITIALFIELDRESPONSEKITCOMUTERGENERATEDPRIVATESECTORCOVERTSURVEILLANCEANCIENTDOCUMENTSHEARSAYEXTENDEDFIELDRESPONSEKITWARRANTNISTMD5

Computer Forensics and Investigations, Chapter 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. WARNING BANNER
  2. SNIFFING
  3. CRC
  4. BEST EVIDENCE
  5. PLAIN VIEW DOCTRINE
  6. SWGDE
  7. HASH VALUE
  8. AUP
  9. COMMINGLING EVIDENCE
  10. HAZMAT
  11. CHECK FRAUD
  12. SHA1
  13. INNOCENT INFORMATION
  14. COMPUTER STORED
  15. PROFESSIONAL CURIOSITY
  16. LIMITING PHRASE
  17. DIGITAL EVIDENCE
  18. PROBABLE CAUSE
  19. AFIS
  20. INITIAL FIELD RESPONSE KIT
  21. COMUTER GENERATED
  22. PRIVATE SECTOR
  23. COVERT SURVEILLANCE
  24. ANCIENT DOCUMENTS
  25. HEARSAY
  26. EXTENDED FIELD RESPONSE KIT
  27. WARRANT
  28. NIST
  29. MD5