Burdenof proof2Non-documentedsignalsTextmsg*mediumConfidenceBurdenof proof3Invoice*strongHardfraudTextmsg*weakInvoice*mediumPhoto*strongCollusionfraudBurdenof proof1Tier 3:UnderinvestigationInvoice*weakSoftFraudFree!Burdenof proof2Non-documentedsignalsTextmsg*mediumConfidenceBurdenof proof3Invoice*strongHardfraudTextmsg*weakInvoice*mediumPhoto*strongCollusionfraudBurdenof proof1Tier 3:UnderinvestigationInvoice*weakSoftFraudFree!

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
G
3
G
4
I
5
I
6
G
7
I
8
B
9
B
10
N
11
B
12
G
13
N
14
I
15
N
16
N
  1. B-Burden of proof 2
  2. G-Non-documented signals
  3. G-Text msg *medium
  4. I-Confidence
  5. I-Burden of proof 3
  6. G-Invoice *strong
  7. I-Hard fraud
  8. B-Text msg *weak
  9. B-Invoice *medium
  10. N-Photo *strong
  11. B-Collusion fraud
  12. G-Burden of proof 1
  13. N-Tier 3: Under investigation
  14. I-Invoice *weak
  15. N-Soft Fraud
  16. N-Free!