HardfraudCollusionfraudSoftFraudInvoice*strongInvoice*weakTier 3:UnderinvestigationTextmsg*weakBurdenof proof3Non-documentedsignalsBurdenof proof1Burdenof proof2Invoice*mediumPhoto*strongConfidenceFree!Textmsg*mediumHardfraudCollusionfraudSoftFraudInvoice*strongInvoice*weakTier 3:UnderinvestigationTextmsg*weakBurdenof proof3Non-documentedsignalsBurdenof proof1Burdenof proof2Invoice*mediumPhoto*strongConfidenceFree!Textmsg*medium

Resource Abuse - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
N
4
G
5
I
6
N
7
B
8
I
9
G
10
G
11
B
12
B
13
N
14
I
15
N
16
G
  1. I-Hard fraud
  2. B-Collusion fraud
  3. N-Soft Fraud
  4. G-Invoice *strong
  5. I-Invoice *weak
  6. N-Tier 3: Under investigation
  7. B-Text msg *weak
  8. I-Burden of proof 3
  9. G-Non-documented signals
  10. G-Burden of proof 1
  11. B-Burden of proof 2
  12. B-Invoice *medium
  13. N-Photo *strong
  14. I-Confidence
  15. N-Free!
  16. G-Text msg *medium