Photo*strongFree!HardfraudBurdenof proof1Tier 3:UnderinvestigationInvoice*weakInvoice*strongConfidenceTextmsg*weakCollusionfraudBurdenof proof2Burdenof proof3Non-documentedsignalsSoftFraudTextmsg*mediumInvoice*mediumPhoto*strongFree!HardfraudBurdenof proof1Tier 3:UnderinvestigationInvoice*weakInvoice*strongConfidenceTextmsg*weakCollusionfraudBurdenof proof2Burdenof proof3Non-documentedsignalsSoftFraudTextmsg*mediumInvoice*medium

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
N
3
I
4
G
5
N
6
I
7
G
8
I
9
B
10
B
11
B
12
I
13
G
14
N
15
G
16
B
  1. N-Photo *strong
  2. N-Free!
  3. I-Hard fraud
  4. G-Burden of proof 1
  5. N-Tier 3: Under investigation
  6. I-Invoice *weak
  7. G-Invoice *strong
  8. I-Confidence
  9. B-Text msg *weak
  10. B-Collusion fraud
  11. B-Burden of proof 2
  12. I-Burden of proof 3
  13. G-Non-documented signals
  14. N-Soft Fraud
  15. G-Text msg *medium
  16. B-Invoice *medium