Burdenof proof3Textmsg*weakPhoto*strongBurdenof proof2ConfidenceInvoice*weakTextmsg*mediumNon-documentedsignalsCollusionfraudHardfraudSoftFraudInvoice*strongInvoice*mediumFree!Burdenof proof1Tier 3:UnderinvestigationBurdenof proof3Textmsg*weakPhoto*strongBurdenof proof2ConfidenceInvoice*weakTextmsg*mediumNon-documentedsignalsCollusionfraudHardfraudSoftFraudInvoice*strongInvoice*mediumFree!Burdenof proof1Tier 3:Underinvestigation

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
N
4
B
5
I
6
I
7
G
8
G
9
B
10
I
11
N
12
G
13
B
14
N
15
G
16
N
  1. I-Burden of proof 3
  2. B-Text msg *weak
  3. N-Photo *strong
  4. B-Burden of proof 2
  5. I-Confidence
  6. I-Invoice *weak
  7. G-Text msg *medium
  8. G-Non-documented signals
  9. B-Collusion fraud
  10. I-Hard fraud
  11. N-Soft Fraud
  12. G-Invoice *strong
  13. B-Invoice *medium
  14. N-Free!
  15. G-Burden of proof 1
  16. N-Tier 3: Under investigation