Phishing Emails (Fake Website) Hacking Personal Information Fake Social Media Profiles Social Media Identity Theft Dumpster Diving Data Breach Medical Identity Theft Account Application Fraud Phone Spoofing Phishing Email Identity Theft Online Fraud (Fake Websites) Financial Identity Theft Child Identity Theft Mail Identity Theft Fake Credit Card Charges Stolen Identity for Loans Fake Social Security Numbers Credit Card Fraud Phone Spoofing Employment Identity Theft Criminal Identity Theft Social Security Number Theft Tax Return Identity Theft Account Hijacking Phishing Emails (Fake Website) Hacking Personal Information Fake Social Media Profiles Social Media Identity Theft Dumpster Diving Data Breach Medical Identity Theft Account Application Fraud Phone Spoofing Phishing Email Identity Theft Online Fraud (Fake Websites) Financial Identity Theft Child Identity Theft Mail Identity Theft Fake Credit Card Charges Stolen Identity for Loans Fake Social Security Numbers Credit Card Fraud Phone Spoofing Employment Identity Theft Criminal Identity Theft Social Security Number Theft Tax Return Identity Theft Account Hijacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing Emails
(Fake Website)
Hacking Personal Information
Fake Social Media Profiles
Social Media Identity Theft
Dumpster Diving
Data Breach
Medical Identity Theft
Account Application Fraud
Phone Spoofing
Phishing Email Identity Theft
Online Fraud (Fake Websites)
Financial Identity Theft
Child Identity Theft
Mail Identity Theft
Fake Credit Card Charges
Stolen Identity for Loans
Fake Social Security Numbers
Credit Card Fraud
Phone Spoofing
Employment Identity Theft
Criminal Identity Theft
Social Security Number Theft
Tax Return Identity Theft
Account Hijacking