BugRootLegacyBinaryScriptNext-GenLinuxSocialMediaExploitZero-DayIPTrackerEncryptionHacking(as averb)WhiteHatMainFrameBruteforceCyberattackTrojanVPNDomainKeyloggerRansom-wareVirusCyberGbpsMachineLearningChinese1337SpamUnixDarkWebSpoofingBlackHatPenetrationExtortionDataLogsEnd-UserPatchPhishingIntelligenceBotBreachMalwareAINuclearadminCloudAnonymousVulnerabilityBugRootLegacyBinaryScriptNext-GenLinuxSocialMediaExploitZero-DayIPTrackerEncryptionHacking(as averb)WhiteHatMainFrameBruteforceCyberattackTrojanVPNDomainKeyloggerRansom-wareVirusCyberGbpsMachineLearningChinese1337SpamUnixDarkWebSpoofingBlackHatPenetrationExtortionDataLogsEnd-UserPatchPhishingIntelligenceBotBreachMalwareAINuclearadminCloudAnonymousVulnerability

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bug
  2. Root
  3. Legacy
  4. Binary Script
  5. Next-Gen
  6. Linux
  7. Social Media
  8. Exploit
  9. Zero-Day
  10. IP Tracker
  11. Encryption
  12. Hacking (as a verb)
  13. White Hat
  14. Main Frame
  15. Brute force
  16. Cyber attack
  17. Trojan
  18. VPN
  19. Domain
  20. Keylogger
  21. Ransom-ware
  22. Virus
  23. Cyber
  24. Gbps
  25. Machine Learning
  26. Chinese
  27. 1337
  28. Spam
  29. Unix
  30. Dark Web
  31. Spoofing
  32. Black Hat
  33. Penetration
  34. Extortion
  35. Data Logs
  36. End-User
  37. Patch
  38. Phishing
  39. Intelligence
  40. Bot
  41. Breach
  42. Malware
  43. AI
  44. Nuclear
  45. admin
  46. Cloud
  47. Anonymous
  48. Vulnerability