OminoustelephonecallReallyfasttypingHackerwearssunglassesindoorsBreakingandEnteringSomeonegetsarrestedHackerdoesdrugsHackingto impressa guy/girl"Anonymous"is mentionedPowerOutageTeenagehackerGreen texton a blackbackgroundFloppyDiskEnhanceLinuxFedoraand/orTrenchcoat"Bad"hackers arenon-EnglishspeakersTextprojected onsomeone'sfaceGovernmentis the badguyReally terriblehacker namelike "Ph4nt0mFr34k”Hackersits in adark roomMoney inabriefcasePale,VampiricHackerFemale Hackerhas unusual-colored hair(blue, pink,etc.)Hackernevertouchesthe mouse"I havea virusfor that""I'min"Hackerwears ahoodieDatatheftUSBStickused*Technomusic*MeaninglessJargonHackerchugs anenergydrinkSomeone isassassinatedHackerdoesn'tweardeoderantHackerwears aleatherjacketHackerchugscoffeeHacker isrunningfor theirlifeSomethingexplodesThe"firewall" is"breached"GovernmentisincompententOminoustelephonecallReallyfasttypingHackerwearssunglassesindoorsBreakingandEnteringSomeonegetsarrestedHackerdoesdrugsHackingto impressa guy/girl"Anonymous"is mentionedPowerOutageTeenagehackerGreen texton a blackbackgroundFloppyDiskEnhanceLinuxFedoraand/orTrenchcoat"Bad"hackers arenon-EnglishspeakersTextprojected onsomeone'sfaceGovernmentis the badguyReally terriblehacker namelike "Ph4nt0mFr34k”Hackersits in adark roomMoney inabriefcasePale,VampiricHackerFemale Hackerhas unusual-colored hair(blue, pink,etc.)Hackernevertouchesthe mouse"I havea virusfor that""I'min"Hackerwears ahoodieDatatheftUSBStickused*Technomusic*MeaninglessJargonHackerchugs anenergydrinkSomeone isassassinatedHackerdoesn'tweardeoderantHackerwears aleatherjacketHackerchugscoffeeHacker isrunningfor theirlifeSomethingexplodesThe"firewall" is"breached"Governmentisincompentent

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Ominous telephone call
  2. Really fast typing
  3. Hacker wears sunglasses indoors
  4. Breaking and Entering
  5. Someone gets arrested
  6. Hacker does drugs
  7. Hacking to impress a guy/girl
  8. "Anonymous" is mentioned
  9. Power Outage
  10. Teenage hacker
  11. Green text on a black background
  12. Floppy Disk
  13. Enhance
  14. Linux
  15. Fedora and/or Trenchcoat
  16. "Bad" hackers are non-English speakers
  17. Text projected on someone's face
  18. Government is the bad guy
  19. Really terrible hacker name like "Ph4nt0m Fr34k”
  20. Hacker sits in a dark room
  21. Money in a briefcase
  22. Pale, Vampiric Hacker
  23. Female Hacker has unusual-colored hair (blue, pink, etc.)
  24. Hacker never touches the mouse
  25. "I have a virus for that"
  26. "I'm in"
  27. Hacker wears a hoodie
  28. Data theft
  29. USB Stick used
  30. *Techno music*
  31. Meaningless Jargon
  32. Hacker chugs an energy drink
  33. Someone is assassinated
  34. Hacker doesn't wear deoderant
  35. Hacker wears a leather jacket
  36. Hacker chugs coffee
  37. Hacker is running for their life
  38. Something explodes
  39. The "firewall" is "breached"
  40. Government is incompentent