SpamRansom-wareBugDomainEnd-UserSocialMediaNext-GenCloudBinaryScriptMainFrame1337EncryptionVPNUnixLinuxPatchDarkWebPenetrationExploitBotBruteforceSpoofingLegacyTrojanPhishingDataLogsWhiteHatIntelligenceMachineLearningHacking(as averb)VulnerabilityZero-DayBlackHatChineseGbpsCyberattackadminBreachExtortionAIMalwareCyberAnonymousKeyloggerNuclearVirusIPTrackerRootSpamRansom-wareBugDomainEnd-UserSocialMediaNext-GenCloudBinaryScriptMainFrame1337EncryptionVPNUnixLinuxPatchDarkWebPenetrationExploitBotBruteforceSpoofingLegacyTrojanPhishingDataLogsWhiteHatIntelligenceMachineLearningHacking(as averb)VulnerabilityZero-DayBlackHatChineseGbpsCyberattackadminBreachExtortionAIMalwareCyberAnonymousKeyloggerNuclearVirusIPTrackerRoot

6969Boiiii!!!1!!!! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Spam
  2. Ransom-ware
  3. Bug
  4. Domain
  5. End-User
  6. Social Media
  7. Next-Gen
  8. Cloud
  9. Binary Script
  10. Main Frame
  11. 1337
  12. Encryption
  13. VPN
  14. Unix
  15. Linux
  16. Patch
  17. Dark Web
  18. Penetration
  19. Exploit
  20. Bot
  21. Brute force
  22. Spoofing
  23. Legacy
  24. Trojan
  25. Phishing
  26. Data Logs
  27. White Hat
  28. Intelligence
  29. Machine Learning
  30. Hacking (as a verb)
  31. Vulnerability
  32. Zero-Day
  33. Black Hat
  34. Chinese
  35. Gbps
  36. Cyber attack
  37. admin
  38. Breach
  39. Extortion
  40. AI
  41. Malware
  42. Cyber
  43. Anonymous
  44. Keylogger
  45. Nuclear
  46. Virus
  47. IP Tracker
  48. Root