BugBinaryScriptMalwareMainFrameKeyloggerDarkWebRansom-wareVPNSpoofingEncryptionPatchNuclearLegacyEnd-UserNext-GenVirusGbpsCyberBlackHatIntelligencePhishingMachineLearningSocialMediaCyberattackUnixAIIPTrackerLinuxSpamBotZero-DayRootBruteforceExploitHacking(as averb)WhiteHatAnonymousExtortionBreachTrojanVulnerabilityPenetrationChineseCloud1337DomainadminDataLogsBugBinaryScriptMalwareMainFrameKeyloggerDarkWebRansom-wareVPNSpoofingEncryptionPatchNuclearLegacyEnd-UserNext-GenVirusGbpsCyberBlackHatIntelligencePhishingMachineLearningSocialMediaCyberattackUnixAIIPTrackerLinuxSpamBotZero-DayRootBruteforceExploitHacking(as averb)WhiteHatAnonymousExtortionBreachTrojanVulnerabilityPenetrationChineseCloud1337DomainadminDataLogs

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bug
  2. Binary Script
  3. Malware
  4. Main Frame
  5. Keylogger
  6. Dark Web
  7. Ransom-ware
  8. VPN
  9. Spoofing
  10. Encryption
  11. Patch
  12. Nuclear
  13. Legacy
  14. End-User
  15. Next-Gen
  16. Virus
  17. Gbps
  18. Cyber
  19. Black Hat
  20. Intelligence
  21. Phishing
  22. Machine Learning
  23. Social Media
  24. Cyber attack
  25. Unix
  26. AI
  27. IP Tracker
  28. Linux
  29. Spam
  30. Bot
  31. Zero-Day
  32. Root
  33. Brute force
  34. Exploit
  35. Hacking (as a verb)
  36. White Hat
  37. Anonymous
  38. Extortion
  39. Breach
  40. Trojan
  41. Vulnerability
  42. Penetration
  43. Chinese
  44. Cloud
  45. 1337
  46. Domain
  47. admin
  48. Data Logs