"I'min"Female Hackerhas unusual-colored hair(blue, pink,etc.)"I havea virusfor that"SomeonegetsarrestedHackersits in adark roomHackerwearssunglassesindoorsOminoustelephonecallReally terriblehacker namelike "Ph4nt0mFr34k”Pale,VampiricHackerHackingto impressa guy/girlReallyfasttyping*Technomusic*Money inabriefcaseUSBStickusedLinuxSomeone isassassinatedSomethingexplodesBreakingandEnteringHackerchugscoffeeTeenagehackerHackerchugs anenergydrinkHackerdoesn'tweardeoderantGreen texton a blackbackgroundMeaninglessJargonHackerwears aleatherjacketGovernmentisincompententTextprojected onsomeone'sfaceHacker isrunningfor theirlifeHackerwears ahoodieHackernevertouchesthe mousePowerOutageFloppyDiskFedoraand/orTrenchcoatHackerdoesdrugsDatatheftThe"firewall" is"breached""Anonymous"is mentionedEnhanceGovernmentis the badguy"Bad"hackers arenon-Englishspeakers"I'min"Female Hackerhas unusual-colored hair(blue, pink,etc.)"I havea virusfor that"SomeonegetsarrestedHackersits in adark roomHackerwearssunglassesindoorsOminoustelephonecallReally terriblehacker namelike "Ph4nt0mFr34k”Pale,VampiricHackerHackingto impressa guy/girlReallyfasttyping*Technomusic*Money inabriefcaseUSBStickusedLinuxSomeone isassassinatedSomethingexplodesBreakingandEnteringHackerchugscoffeeTeenagehackerHackerchugs anenergydrinkHackerdoesn'tweardeoderantGreen texton a blackbackgroundMeaninglessJargonHackerwears aleatherjacketGovernmentisincompententTextprojected onsomeone'sfaceHacker isrunningfor theirlifeHackerwears ahoodieHackernevertouchesthe mousePowerOutageFloppyDiskFedoraand/orTrenchcoatHackerdoesdrugsDatatheftThe"firewall" is"breached""Anonymous"is mentionedEnhanceGovernmentis the badguy"Bad"hackers arenon-Englishspeakers

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. "I'm in"
  2. Female Hacker has unusual-colored hair (blue, pink, etc.)
  3. "I have a virus for that"
  4. Someone gets arrested
  5. Hacker sits in a dark room
  6. Hacker wears sunglasses indoors
  7. Ominous telephone call
  8. Really terrible hacker name like "Ph4nt0m Fr34k”
  9. Pale, Vampiric Hacker
  10. Hacking to impress a guy/girl
  11. Really fast typing
  12. *Techno music*
  13. Money in a briefcase
  14. USB Stick used
  15. Linux
  16. Someone is assassinated
  17. Something explodes
  18. Breaking and Entering
  19. Hacker chugs coffee
  20. Teenage hacker
  21. Hacker chugs an energy drink
  22. Hacker doesn't wear deoderant
  23. Green text on a black background
  24. Meaningless Jargon
  25. Hacker wears a leather jacket
  26. Government is incompentent
  27. Text projected on someone's face
  28. Hacker is running for their life
  29. Hacker wears a hoodie
  30. Hacker never touches the mouse
  31. Power Outage
  32. Floppy Disk
  33. Fedora and/or Trenchcoat
  34. Hacker does drugs
  35. Data theft
  36. The "firewall" is "breached"
  37. "Anonymous" is mentioned
  38. Enhance
  39. Government is the bad guy
  40. "Bad" hackers are non-English speakers