Invoice*strongConfidenceBurdenof proof2CollusionfraudBurdenof proof1Textmsg*mediumInvoice*mediumTextmsg*weakBurdenof proof3Invoice*weakSoftFraudTier 3:UnderinvestigationFree!Photo*strongNon-documentedsignalsHardfraudInvoice*strongConfidenceBurdenof proof2CollusionfraudBurdenof proof1Textmsg*mediumInvoice*mediumTextmsg*weakBurdenof proof3Invoice*weakSoftFraudTier 3:UnderinvestigationFree!Photo*strongNon-documentedsignalsHardfraud

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
B
4
B
5
G
6
G
7
B
8
B
9
I
10
I
11
N
12
N
13
N
14
N
15
G
16
I
  1. G-Invoice *strong
  2. I-Confidence
  3. B-Burden of proof 2
  4. B-Collusion fraud
  5. G-Burden of proof 1
  6. G-Text msg *medium
  7. B-Invoice *medium
  8. B-Text msg *weak
  9. I-Burden of proof 3
  10. I-Invoice *weak
  11. N-Soft Fraud
  12. N-Tier 3: Under investigation
  13. N-Free!
  14. N-Photo *strong
  15. G-Non-documented signals
  16. I-Hard fraud