1337LinuxIPTrackerCloudCyberPhishingPenetrationWhiteHatBlackHatAnonymousBreachMachineLearningLegacyBugSocialMediaExploitIntelligenceChineseGbpsBinaryScriptEnd-UserVPNDarkWebHacking(as averb)SpoofingTrojanDomainBruteforceNext-GenPatchUnixMalwareRootDataLogsSpamVirusKeyloggerMainFrameExtortionEncryptionRansom-wareBotVulnerabilityNuclearZero-DayadminCyberattackAI1337LinuxIPTrackerCloudCyberPhishingPenetrationWhiteHatBlackHatAnonymousBreachMachineLearningLegacyBugSocialMediaExploitIntelligenceChineseGbpsBinaryScriptEnd-UserVPNDarkWebHacking(as averb)SpoofingTrojanDomainBruteforceNext-GenPatchUnixMalwareRootDataLogsSpamVirusKeyloggerMainFrameExtortionEncryptionRansom-wareBotVulnerabilityNuclearZero-DayadminCyberattackAI

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. 1337
  2. Linux
  3. IP Tracker
  4. Cloud
  5. Cyber
  6. Phishing
  7. Penetration
  8. White Hat
  9. Black Hat
  10. Anonymous
  11. Breach
  12. Machine Learning
  13. Legacy
  14. Bug
  15. Social Media
  16. Exploit
  17. Intelligence
  18. Chinese
  19. Gbps
  20. Binary Script
  21. End-User
  22. VPN
  23. Dark Web
  24. Hacking (as a verb)
  25. Spoofing
  26. Trojan
  27. Domain
  28. Brute force
  29. Next-Gen
  30. Patch
  31. Unix
  32. Malware
  33. Root
  34. Data Logs
  35. Spam
  36. Virus
  37. Keylogger
  38. Main Frame
  39. Extortion
  40. Encryption
  41. Ransom-ware
  42. Bot
  43. Vulnerability
  44. Nuclear
  45. Zero-Day
  46. admin
  47. Cyber attack
  48. AI