SocialMediaAIIntelligenceExploitChineseTrojanVPNBreachNuclearZero-DayIPTrackerMainFrameWhiteHatBruteforcePatchCyberattackRootDataLogsKeyloggerPhishingMalwareSpamEnd-UserCloudUnixLinuxBlackHatExtortionDomainEncryptionHacking(as averb)Ransom-warePenetrationNext-GenSpoofingadminBotLegacy1337VulnerabilityGbpsMachineLearningBugVirusAnonymousDarkWebCyberBinaryScriptSocialMediaAIIntelligenceExploitChineseTrojanVPNBreachNuclearZero-DayIPTrackerMainFrameWhiteHatBruteforcePatchCyberattackRootDataLogsKeyloggerPhishingMalwareSpamEnd-UserCloudUnixLinuxBlackHatExtortionDomainEncryptionHacking(as averb)Ransom-warePenetrationNext-GenSpoofingadminBotLegacy1337VulnerabilityGbpsMachineLearningBugVirusAnonymousDarkWebCyberBinaryScript

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Social Media
  2. AI
  3. Intelligence
  4. Exploit
  5. Chinese
  6. Trojan
  7. VPN
  8. Breach
  9. Nuclear
  10. Zero-Day
  11. IP Tracker
  12. Main Frame
  13. White Hat
  14. Brute force
  15. Patch
  16. Cyber attack
  17. Root
  18. Data Logs
  19. Keylogger
  20. Phishing
  21. Malware
  22. Spam
  23. End-User
  24. Cloud
  25. Unix
  26. Linux
  27. Black Hat
  28. Extortion
  29. Domain
  30. Encryption
  31. Hacking (as a verb)
  32. Ransom-ware
  33. Penetration
  34. Next-Gen
  35. Spoofing
  36. admin
  37. Bot
  38. Legacy
  39. 1337
  40. Vulnerability
  41. Gbps
  42. Machine Learning
  43. Bug
  44. Virus
  45. Anonymous
  46. Dark Web
  47. Cyber
  48. Binary Script