AIMachineLearningKeyloggerCloudBinaryScriptPhishingAnonymous1337Zero-DayNuclearBugSpoofingEnd-UserExtortionVulnerabilityGbpsBlackHatLinuxChineseEncryptionRansom-warePatchDataLogsIPTrackerVPNCyberIntelligenceRootLegacyTrojanBreachExploitVirusHacking(as averb)BruteforceWhiteHatadminSocialMediaDarkWebUnixBotMalwareCyberattackSpamPenetrationMainFrameNext-GenDomainAIMachineLearningKeyloggerCloudBinaryScriptPhishingAnonymous1337Zero-DayNuclearBugSpoofingEnd-UserExtortionVulnerabilityGbpsBlackHatLinuxChineseEncryptionRansom-warePatchDataLogsIPTrackerVPNCyberIntelligenceRootLegacyTrojanBreachExploitVirusHacking(as averb)BruteforceWhiteHatadminSocialMediaDarkWebUnixBotMalwareCyberattackSpamPenetrationMainFrameNext-GenDomain

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. AI
  2. Machine Learning
  3. Keylogger
  4. Cloud
  5. Binary Script
  6. Phishing
  7. Anonymous
  8. 1337
  9. Zero-Day
  10. Nuclear
  11. Bug
  12. Spoofing
  13. End-User
  14. Extortion
  15. Vulnerability
  16. Gbps
  17. Black Hat
  18. Linux
  19. Chinese
  20. Encryption
  21. Ransom-ware
  22. Patch
  23. Data Logs
  24. IP Tracker
  25. VPN
  26. Cyber
  27. Intelligence
  28. Root
  29. Legacy
  30. Trojan
  31. Breach
  32. Exploit
  33. Virus
  34. Hacking (as a verb)
  35. Brute force
  36. White Hat
  37. admin
  38. Social Media
  39. Dark Web
  40. Unix
  41. Bot
  42. Malware
  43. Cyber attack
  44. Spam
  45. Penetration
  46. Main Frame
  47. Next-Gen
  48. Domain