CloudCyberBlackHatDarkWebBotVirus1337MainFrameTrojanUnixNext-GenPatchSpoofingIntelligenceEncryptionAnonymousExploitHacking(as averb)VulnerabilityMalwareAIRansom-wareIPTrackerChineseMachineLearningBruteforceKeyloggerBreachNuclearSpamLegacyBugGbpsPhishingCyberattackDataLogsBinaryScriptPenetrationZero-DayEnd-UseradminLinuxRootDomainWhiteHatSocialMediaVPNExtortionCloudCyberBlackHatDarkWebBotVirus1337MainFrameTrojanUnixNext-GenPatchSpoofingIntelligenceEncryptionAnonymousExploitHacking(as averb)VulnerabilityMalwareAIRansom-wareIPTrackerChineseMachineLearningBruteforceKeyloggerBreachNuclearSpamLegacyBugGbpsPhishingCyberattackDataLogsBinaryScriptPenetrationZero-DayEnd-UseradminLinuxRootDomainWhiteHatSocialMediaVPNExtortion

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Cloud
  2. Cyber
  3. Black Hat
  4. Dark Web
  5. Bot
  6. Virus
  7. 1337
  8. Main Frame
  9. Trojan
  10. Unix
  11. Next-Gen
  12. Patch
  13. Spoofing
  14. Intelligence
  15. Encryption
  16. Anonymous
  17. Exploit
  18. Hacking (as a verb)
  19. Vulnerability
  20. Malware
  21. AI
  22. Ransom-ware
  23. IP Tracker
  24. Chinese
  25. Machine Learning
  26. Brute force
  27. Keylogger
  28. Breach
  29. Nuclear
  30. Spam
  31. Legacy
  32. Bug
  33. Gbps
  34. Phishing
  35. Cyber attack
  36. Data Logs
  37. Binary Script
  38. Penetration
  39. Zero-Day
  40. End-User
  41. admin
  42. Linux
  43. Root
  44. Domain
  45. White Hat
  46. Social Media
  47. VPN
  48. Extortion