Criminal Identity Theft Stolen Identity for Loans Phone Spoofing Phishing Email Identity Theft Online Fraud (Fake Websites) Fake Credit Card Charges Dumpster Diving Data Breach Phone Spoofing Account Hijacking Social Media Identity Theft Financial Identity Theft Employment Identity Theft Tax Return Identity Theft Phishing Emails (Fake Website) Fake Social Media Profiles Fake Social Security Numbers Credit Card Fraud Medical Identity Theft Child Identity Theft Hacking Personal Information Social Security Number Theft Account Application Fraud Mail Identity Theft Criminal Identity Theft Stolen Identity for Loans Phone Spoofing Phishing Email Identity Theft Online Fraud (Fake Websites) Fake Credit Card Charges Dumpster Diving Data Breach Phone Spoofing Account Hijacking Social Media Identity Theft Financial Identity Theft Employment Identity Theft Tax Return Identity Theft Phishing Emails (Fake Website) Fake Social Media Profiles Fake Social Security Numbers Credit Card Fraud Medical Identity Theft Child Identity Theft Hacking Personal Information Social Security Number Theft Account Application Fraud Mail Identity Theft
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Criminal Identity Theft
Stolen Identity for Loans
Phone Spoofing
Phishing Email Identity Theft
Online Fraud (Fake Websites)
Fake Credit Card Charges
Dumpster Diving
Data Breach
Phone Spoofing
Account Hijacking
Social Media Identity Theft
Financial Identity Theft
Employment Identity Theft
Tax Return Identity Theft
Phishing Emails
(Fake Website)
Fake Social Media Profiles
Fake Social Security Numbers
Credit Card Fraud
Medical Identity Theft
Child Identity Theft
Hacking Personal Information
Social Security Number Theft
Account Application Fraud
Mail Identity Theft