VPNMachineLearningBruteforceExtortionBugBreachHacking(as averb)WhiteHatAnonymousEnd-UserGbpsIPTrackerIntelligenceTrojanPatchNext-GenLegacyLinuxAISpamadminRootExploitVulnerabilityNuclearDarkWebPenetrationDomainCloudMainFrameVirus1337SpoofingChineseSocialMediaCyberRansom-wareMalwareBlackHatPhishingBotDataLogsEncryptionZero-DayBinaryScriptKeyloggerCyberattackUnixVPNMachineLearningBruteforceExtortionBugBreachHacking(as averb)WhiteHatAnonymousEnd-UserGbpsIPTrackerIntelligenceTrojanPatchNext-GenLegacyLinuxAISpamadminRootExploitVulnerabilityNuclearDarkWebPenetrationDomainCloudMainFrameVirus1337SpoofingChineseSocialMediaCyberRansom-wareMalwareBlackHatPhishingBotDataLogsEncryptionZero-DayBinaryScriptKeyloggerCyberattackUnix

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. VPN
  2. Machine Learning
  3. Brute force
  4. Extortion
  5. Bug
  6. Breach
  7. Hacking (as a verb)
  8. White Hat
  9. Anonymous
  10. End-User
  11. Gbps
  12. IP Tracker
  13. Intelligence
  14. Trojan
  15. Patch
  16. Next-Gen
  17. Legacy
  18. Linux
  19. AI
  20. Spam
  21. admin
  22. Root
  23. Exploit
  24. Vulnerability
  25. Nuclear
  26. Dark Web
  27. Penetration
  28. Domain
  29. Cloud
  30. Main Frame
  31. Virus
  32. 1337
  33. Spoofing
  34. Chinese
  35. Social Media
  36. Cyber
  37. Ransom-ware
  38. Malware
  39. Black Hat
  40. Phishing
  41. Bot
  42. Data Logs
  43. Encryption
  44. Zero-Day
  45. Binary Script
  46. Keylogger
  47. Cyber attack
  48. Unix