Hackernevertouchesthe mouseGreen texton a blackbackgroundSomethingexplodesReally terriblehacker namelike "Ph4nt0mFr34k”Hackerchugs anenergydrinkBreakingandEnteringSomeone isassassinatedReallyfasttypingHackerdoesn'tweardeoderant"Bad"hackers arenon-EnglishspeakersFedoraand/orTrenchcoatDatatheftHackerwears ahoodieHackerdoesdrugsSomeonegetsarrestedHackingto impressa guy/girlHackerwears aleatherjacketTextprojected onsomeone'sfacePowerOutagePale,VampiricHackerFemale Hackerhas unusual-colored hair(blue, pink,etc.)Money inabriefcaseTeenagehackerEnhanceHackerchugscoffeeOminoustelephonecallHackerwearssunglassesindoors*Technomusic*MeaninglessJargonLinuxHackersits in adark room"I'min"FloppyDiskGovernmentis the badguyUSBStickusedHacker isrunningfor theirlifeGovernmentisincompentent"I havea virusfor that""Anonymous"is mentionedThe"firewall" is"breached"Hackernevertouchesthe mouseGreen texton a blackbackgroundSomethingexplodesReally terriblehacker namelike "Ph4nt0mFr34k”Hackerchugs anenergydrinkBreakingandEnteringSomeone isassassinatedReallyfasttypingHackerdoesn'tweardeoderant"Bad"hackers arenon-EnglishspeakersFedoraand/orTrenchcoatDatatheftHackerwears ahoodieHackerdoesdrugsSomeonegetsarrestedHackingto impressa guy/girlHackerwears aleatherjacketTextprojected onsomeone'sfacePowerOutagePale,VampiricHackerFemale Hackerhas unusual-colored hair(blue, pink,etc.)Money inabriefcaseTeenagehackerEnhanceHackerchugscoffeeOminoustelephonecallHackerwearssunglassesindoors*Technomusic*MeaninglessJargonLinuxHackersits in adark room"I'min"FloppyDiskGovernmentis the badguyUSBStickusedHacker isrunningfor theirlifeGovernmentisincompentent"I havea virusfor that""Anonymous"is mentionedThe"firewall" is"breached"

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Hacker never touches the mouse
  2. Green text on a black background
  3. Something explodes
  4. Really terrible hacker name like "Ph4nt0m Fr34k”
  5. Hacker chugs an energy drink
  6. Breaking and Entering
  7. Someone is assassinated
  8. Really fast typing
  9. Hacker doesn't wear deoderant
  10. "Bad" hackers are non-English speakers
  11. Fedora and/or Trenchcoat
  12. Data theft
  13. Hacker wears a hoodie
  14. Hacker does drugs
  15. Someone gets arrested
  16. Hacking to impress a guy/girl
  17. Hacker wears a leather jacket
  18. Text projected on someone's face
  19. Power Outage
  20. Pale, Vampiric Hacker
  21. Female Hacker has unusual-colored hair (blue, pink, etc.)
  22. Money in a briefcase
  23. Teenage hacker
  24. Enhance
  25. Hacker chugs coffee
  26. Ominous telephone call
  27. Hacker wears sunglasses indoors
  28. *Techno music*
  29. Meaningless Jargon
  30. Linux
  31. Hacker sits in a dark room
  32. "I'm in"
  33. Floppy Disk
  34. Government is the bad guy
  35. USB Stick used
  36. Hacker is running for their life
  37. Government is incompentent
  38. "I have a virus for that"
  39. "Anonymous" is mentioned
  40. The "firewall" is "breached"