SomeonegetsarrestedLinux"I'min"HackerdoesdrugsSomeone isassassinatedPowerOutageMoney inabriefcasePale,VampiricHackerFedoraand/orTrenchcoatHackerwears ahoodie"I havea virusfor that"MeaninglessJargonGovernmentis the badguyGreen texton a blackbackgroundHackersits in adark roomReally terriblehacker namelike "Ph4nt0mFr34k”TeenagehackerGovernmentisincompententFemale Hackerhas unusual-colored hair(blue, pink,etc.)USBStickused*Technomusic*Hackernevertouchesthe mouseHackerdoesn'tweardeoderantReallyfasttypingHacker isrunningfor theirlifeFloppyDiskOminoustelephonecall"Bad"hackers arenon-EnglishspeakersDatatheft"Anonymous"is mentionedHackerwearssunglassesindoorsBreakingandEnteringEnhanceHackingto impressa guy/girlTextprojected onsomeone'sfaceThe"firewall" is"breached"SomethingexplodesHackerchugs anenergydrinkHackerchugscoffeeHackerwears aleatherjacketSomeonegetsarrestedLinux"I'min"HackerdoesdrugsSomeone isassassinatedPowerOutageMoney inabriefcasePale,VampiricHackerFedoraand/orTrenchcoatHackerwears ahoodie"I havea virusfor that"MeaninglessJargonGovernmentis the badguyGreen texton a blackbackgroundHackersits in adark roomReally terriblehacker namelike "Ph4nt0mFr34k”TeenagehackerGovernmentisincompententFemale Hackerhas unusual-colored hair(blue, pink,etc.)USBStickused*Technomusic*Hackernevertouchesthe mouseHackerdoesn'tweardeoderantReallyfasttypingHacker isrunningfor theirlifeFloppyDiskOminoustelephonecall"Bad"hackers arenon-EnglishspeakersDatatheft"Anonymous"is mentionedHackerwearssunglassesindoorsBreakingandEnteringEnhanceHackingto impressa guy/girlTextprojected onsomeone'sfaceThe"firewall" is"breached"SomethingexplodesHackerchugs anenergydrinkHackerchugscoffeeHackerwears aleatherjacket

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Someone gets arrested
  2. Linux
  3. "I'm in"
  4. Hacker does drugs
  5. Someone is assassinated
  6. Power Outage
  7. Money in a briefcase
  8. Pale, Vampiric Hacker
  9. Fedora and/or Trenchcoat
  10. Hacker wears a hoodie
  11. "I have a virus for that"
  12. Meaningless Jargon
  13. Government is the bad guy
  14. Green text on a black background
  15. Hacker sits in a dark room
  16. Really terrible hacker name like "Ph4nt0m Fr34k”
  17. Teenage hacker
  18. Government is incompentent
  19. Female Hacker has unusual-colored hair (blue, pink, etc.)
  20. USB Stick used
  21. *Techno music*
  22. Hacker never touches the mouse
  23. Hacker doesn't wear deoderant
  24. Really fast typing
  25. Hacker is running for their life
  26. Floppy Disk
  27. Ominous telephone call
  28. "Bad" hackers are non-English speakers
  29. Data theft
  30. "Anonymous" is mentioned
  31. Hacker wears sunglasses indoors
  32. Breaking and Entering
  33. Enhance
  34. Hacking to impress a guy/girl
  35. Text projected on someone's face
  36. The "firewall" is "breached"
  37. Something explodes
  38. Hacker chugs an energy drink
  39. Hacker chugs coffee
  40. Hacker wears a leather jacket