BugMachineLearningRootChinesePhishingAnonymousBreachExtortionMainFrameEnd-UserZero-DayCyberNext-GenBinaryScriptGbpsExploitTrojanVPNPatchAIHacking(as averb)CloudBlackHatVulnerabilitySocialMediaSpoofingNuclearIntelligenceCyberattackLegacyWhiteHatSpamDarkWebMalwareIPTrackerPenetration1337Ransom-wareDataLogsEncryptionVirusKeyloggerBotDomainBruteforceLinuxadminUnixBugMachineLearningRootChinesePhishingAnonymousBreachExtortionMainFrameEnd-UserZero-DayCyberNext-GenBinaryScriptGbpsExploitTrojanVPNPatchAIHacking(as averb)CloudBlackHatVulnerabilitySocialMediaSpoofingNuclearIntelligenceCyberattackLegacyWhiteHatSpamDarkWebMalwareIPTrackerPenetration1337Ransom-wareDataLogsEncryptionVirusKeyloggerBotDomainBruteforceLinuxadminUnix

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bug
  2. Machine Learning
  3. Root
  4. Chinese
  5. Phishing
  6. Anonymous
  7. Breach
  8. Extortion
  9. Main Frame
  10. End-User
  11. Zero-Day
  12. Cyber
  13. Next-Gen
  14. Binary Script
  15. Gbps
  16. Exploit
  17. Trojan
  18. VPN
  19. Patch
  20. AI
  21. Hacking (as a verb)
  22. Cloud
  23. Black Hat
  24. Vulnerability
  25. Social Media
  26. Spoofing
  27. Nuclear
  28. Intelligence
  29. Cyber attack
  30. Legacy
  31. White Hat
  32. Spam
  33. Dark Web
  34. Malware
  35. IP Tracker
  36. Penetration
  37. 1337
  38. Ransom-ware
  39. Data Logs
  40. Encryption
  41. Virus
  42. Keylogger
  43. Bot
  44. Domain
  45. Brute force
  46. Linux
  47. admin
  48. Unix