Invoice*strongBurdenof proof1Free!Burdenof proof2Burdenof proof3SoftFraudTextmsg*mediumCollusionfraudPhoto*strongConfidenceNon-documentedsignalsTier 3:UnderinvestigationInvoice*weakInvoice*mediumTextmsg*weakHardfraudInvoice*strongBurdenof proof1Free!Burdenof proof2Burdenof proof3SoftFraudTextmsg*mediumCollusionfraudPhoto*strongConfidenceNon-documentedsignalsTier 3:UnderinvestigationInvoice*weakInvoice*mediumTextmsg*weakHardfraud

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
G
3
N
4
B
5
I
6
N
7
G
8
B
9
N
10
I
11
G
12
N
13
I
14
B
15
B
16
I
  1. G-Invoice *strong
  2. G-Burden of proof 1
  3. N-Free!
  4. B-Burden of proof 2
  5. I-Burden of proof 3
  6. N-Soft Fraud
  7. G-Text msg *medium
  8. B-Collusion fraud
  9. N-Photo *strong
  10. I-Confidence
  11. G-Non-documented signals
  12. N-Tier 3: Under investigation
  13. I-Invoice *weak
  14. B-Invoice *medium
  15. B-Text msg *weak
  16. I-Hard fraud