BotLegacyDarkWebIPTrackerMainFrameBugExploitSpamIntelligenceUnixEncryptionNuclearRansom-wareBreachPenetrationadminWhiteHatHacking(as averb)CyberattackZero-DayLinuxDataLogsBlackHatAINext-GenChineseBruteforceEnd-UserCloudMachineLearningCyberPatchKeyloggerTrojanBinaryScriptVulnerabilityGbpsVirus1337PhishingExtortionAnonymousRootSpoofingSocialMediaDomainVPNMalwareBotLegacyDarkWebIPTrackerMainFrameBugExploitSpamIntelligenceUnixEncryptionNuclearRansom-wareBreachPenetrationadminWhiteHatHacking(as averb)CyberattackZero-DayLinuxDataLogsBlackHatAINext-GenChineseBruteforceEnd-UserCloudMachineLearningCyberPatchKeyloggerTrojanBinaryScriptVulnerabilityGbpsVirus1337PhishingExtortionAnonymousRootSpoofingSocialMediaDomainVPNMalware

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bot
  2. Legacy
  3. Dark Web
  4. IP Tracker
  5. Main Frame
  6. Bug
  7. Exploit
  8. Spam
  9. Intelligence
  10. Unix
  11. Encryption
  12. Nuclear
  13. Ransom-ware
  14. Breach
  15. Penetration
  16. admin
  17. White Hat
  18. Hacking (as a verb)
  19. Cyber attack
  20. Zero-Day
  21. Linux
  22. Data Logs
  23. Black Hat
  24. AI
  25. Next-Gen
  26. Chinese
  27. Brute force
  28. End-User
  29. Cloud
  30. Machine Learning
  31. Cyber
  32. Patch
  33. Keylogger
  34. Trojan
  35. Binary Script
  36. Vulnerability
  37. Gbps
  38. Virus
  39. 1337
  40. Phishing
  41. Extortion
  42. Anonymous
  43. Root
  44. Spoofing
  45. Social Media
  46. Domain
  47. VPN
  48. Malware