"Bad"hackers arenon-EnglishspeakersOminoustelephonecallSomethingexplodesGovernmentis the badguyHacker isrunningfor theirlifeHackerdoesdrugsHackingto impressa guy/girlEnhanceTeenagehackerHackersits in adark room"Anonymous"is mentionedUSBStickusedHackerchugscoffeeSomeonegetsarrestedSomeone isassassinated*Technomusic*Textprojected onsomeone'sfaceHackerwears aleatherjacketHackerwearssunglassesindoorsReallyfasttypingGovernmentisincompententMoney inabriefcaseHackernevertouchesthe mouseDatatheftFemale Hackerhas unusual-colored hair(blue, pink,etc.)The"firewall" is"breached"Pale,VampiricHackerFloppyDiskMeaninglessJargonReally terriblehacker namelike "Ph4nt0mFr34k”Linux"I havea virusfor that"Hackerchugs anenergydrinkHackerwears ahoodieFedoraand/orTrenchcoat"I'min"Green texton a blackbackgroundBreakingandEnteringPowerOutageHackerdoesn'tweardeoderant"Bad"hackers arenon-EnglishspeakersOminoustelephonecallSomethingexplodesGovernmentis the badguyHacker isrunningfor theirlifeHackerdoesdrugsHackingto impressa guy/girlEnhanceTeenagehackerHackersits in adark room"Anonymous"is mentionedUSBStickusedHackerchugscoffeeSomeonegetsarrestedSomeone isassassinated*Technomusic*Textprojected onsomeone'sfaceHackerwears aleatherjacketHackerwearssunglassesindoorsReallyfasttypingGovernmentisincompententMoney inabriefcaseHackernevertouchesthe mouseDatatheftFemale Hackerhas unusual-colored hair(blue, pink,etc.)The"firewall" is"breached"Pale,VampiricHackerFloppyDiskMeaninglessJargonReally terriblehacker namelike "Ph4nt0mFr34k”Linux"I havea virusfor that"Hackerchugs anenergydrinkHackerwears ahoodieFedoraand/orTrenchcoat"I'min"Green texton a blackbackgroundBreakingandEnteringPowerOutageHackerdoesn'tweardeoderant

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. "Bad" hackers are non-English speakers
  2. Ominous telephone call
  3. Something explodes
  4. Government is the bad guy
  5. Hacker is running for their life
  6. Hacker does drugs
  7. Hacking to impress a guy/girl
  8. Enhance
  9. Teenage hacker
  10. Hacker sits in a dark room
  11. "Anonymous" is mentioned
  12. USB Stick used
  13. Hacker chugs coffee
  14. Someone gets arrested
  15. Someone is assassinated
  16. *Techno music*
  17. Text projected on someone's face
  18. Hacker wears a leather jacket
  19. Hacker wears sunglasses indoors
  20. Really fast typing
  21. Government is incompentent
  22. Money in a briefcase
  23. Hacker never touches the mouse
  24. Data theft
  25. Female Hacker has unusual-colored hair (blue, pink, etc.)
  26. The "firewall" is "breached"
  27. Pale, Vampiric Hacker
  28. Floppy Disk
  29. Meaningless Jargon
  30. Really terrible hacker name like "Ph4nt0m Fr34k”
  31. Linux
  32. "I have a virus for that"
  33. Hacker chugs an energy drink
  34. Hacker wears a hoodie
  35. Fedora and/or Trenchcoat
  36. "I'm in"
  37. Green text on a black background
  38. Breaking and Entering
  39. Power Outage
  40. Hacker doesn't wear deoderant