Burdenof proof2Photo*strongTextmsg*weakCollusionfraudHardfraudInvoice*mediumTier 3:UnderinvestigationConfidenceSoftFraudBurdenof proof3Non-documentedsignalsTextmsg*mediumBurdenof proof1Free!Invoice*weakInvoice*strongBurdenof proof2Photo*strongTextmsg*weakCollusionfraudHardfraudInvoice*mediumTier 3:UnderinvestigationConfidenceSoftFraudBurdenof proof3Non-documentedsignalsTextmsg*mediumBurdenof proof1Free!Invoice*weakInvoice*strong

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
B
4
B
5
I
6
B
7
N
8
I
9
N
10
I
11
G
12
G
13
G
14
N
15
I
16
G
  1. B-Burden of proof 2
  2. N-Photo *strong
  3. B-Text msg *weak
  4. B-Collusion fraud
  5. I-Hard fraud
  6. B-Invoice *medium
  7. N-Tier 3: Under investigation
  8. I-Confidence
  9. N-Soft Fraud
  10. I-Burden of proof 3
  11. G-Non-documented signals
  12. G-Text msg *medium
  13. G-Burden of proof 1
  14. N-Free!
  15. I-Invoice *weak
  16. G-Invoice *strong