Invoice*mediumFree!Photo*strongHardfraudTier 3:UnderinvestigationNon-documentedsignalsConfidenceTextmsg*mediumSoftFraudCollusionfraudBurdenof proof1Invoice*weakInvoice*strongBurdenof proof2Textmsg*weakBurdenof proof3Invoice*mediumFree!Photo*strongHardfraudTier 3:UnderinvestigationNon-documentedsignalsConfidenceTextmsg*mediumSoftFraudCollusionfraudBurdenof proof1Invoice*weakInvoice*strongBurdenof proof2Textmsg*weakBurdenof proof3

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
N
4
I
5
N
6
G
7
I
8
G
9
N
10
B
11
G
12
I
13
G
14
B
15
B
16
I
  1. B-Invoice *medium
  2. N-Free!
  3. N-Photo *strong
  4. I-Hard fraud
  5. N-Tier 3: Under investigation
  6. G-Non-documented signals
  7. I-Confidence
  8. G-Text msg *medium
  9. N-Soft Fraud
  10. B-Collusion fraud
  11. G-Burden of proof 1
  12. I-Invoice *weak
  13. G-Invoice *strong
  14. B-Burden of proof 2
  15. B-Text msg *weak
  16. I-Burden of proof 3