LegacyIPTrackerMalwareDomainBlackHatPhishingDarkWebRootZero-DayCloudadminPatchIntelligenceExploitDataLogsBinaryScriptEncryptionWhiteHatBruteforceVirusBugSpamBotHacking(as averb)LinuxBreachSocialMediaTrojanUnixVPNVulnerabilityMainFrame1337Ransom-wareChineseGbpsSpoofingEnd-UserAINuclearAnonymousCyberattackMachineLearningPenetrationExtortionCyberKeyloggerNext-GenLegacyIPTrackerMalwareDomainBlackHatPhishingDarkWebRootZero-DayCloudadminPatchIntelligenceExploitDataLogsBinaryScriptEncryptionWhiteHatBruteforceVirusBugSpamBotHacking(as averb)LinuxBreachSocialMediaTrojanUnixVPNVulnerabilityMainFrame1337Ransom-wareChineseGbpsSpoofingEnd-UserAINuclearAnonymousCyberattackMachineLearningPenetrationExtortionCyberKeyloggerNext-Gen

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Legacy
  2. IP Tracker
  3. Malware
  4. Domain
  5. Black Hat
  6. Phishing
  7. Dark Web
  8. Root
  9. Zero-Day
  10. Cloud
  11. admin
  12. Patch
  13. Intelligence
  14. Exploit
  15. Data Logs
  16. Binary Script
  17. Encryption
  18. White Hat
  19. Brute force
  20. Virus
  21. Bug
  22. Spam
  23. Bot
  24. Hacking (as a verb)
  25. Linux
  26. Breach
  27. Social Media
  28. Trojan
  29. Unix
  30. VPN
  31. Vulnerability
  32. Main Frame
  33. 1337
  34. Ransom-ware
  35. Chinese
  36. Gbps
  37. Spoofing
  38. End-User
  39. AI
  40. Nuclear
  41. Anonymous
  42. Cyber attack
  43. Machine Learning
  44. Penetration
  45. Extortion
  46. Cyber
  47. Keylogger
  48. Next-Gen