Educational institutions are giving out student loans and grants, and the recipients aren’t even attending school. Instead they’re spending the money any which way, while the schools have no idea they’re being ripped off.
With a database, the Education Department flags applicants who’ve applied for federal Pell grants—applicants with an “unusual enrollment history,” such as having received financial aid for at least three schools in only 12 months.
The Department forwards these suspect names to educational institutions; the schools then request that applicants provide documents including prior transcripts. What the school then gets from the applicant determines if a loan or grant is denied.
This flagging procedure has caught 126,000 applicants who sought aid for the 2013-2014 school year.
It’s so easy to scam schools because most federal aid does not require a credit check, and how the money is spent is not tightly restricted.
A school receives the money from the government and spends some on tuition. The remainder is sent as a check to the recipients to spend on books and even living expenses while (supposedly) the recipient attends classes.
Community colleges are especially vulnerable due to their open enrollment and low tuition. The lower the tuition, the more money that’s left over to be sent to the con artist.
The proliferation of this scam can be attributed to the Internet because online applications can result in receiving aid—without the applicant ever being within a mile of the campus.
Application Red Flags
The American Association of Community Colleges (AACC) names the following alerts that financial aid offices can check applications for.
- Large financial aid refunds or disbursements
- Attendance at several other colleges
- A large student loan balance but no degree
Unfortunately, these red flags won’t flutter much if the applicant is a first-time scammer.
Data Red Flags (according to the AACC)
- Several registrations coming from similar locations out of state
- Several uses of the same PO box, physical address or IP address
- Multiple uses of the same computer and/or bank account
- The emergency contact is the same person for multiple registrants.
- Certain courses getting a fast increase in number of enrollees
- Frequent communication from similar individuals or locations
Every applicant should be identity-proofed, which is easier said than done. Verification is one element of identity proofing.
To combat this fraud, Finaid.org notes:
- Families must sign a waiver allowing the financial aid office to obtain tax returns straight from the IRS. Some people have submitted fraudulent tax return copies during verification. Getting them directly from the IRS prevents falsification. Another route is to require families to provide copies of their 1099 and W-2 forms, especially when income figures seem suspect.
- Request copies of the applicant’s four most recent bank statements; inspect them for unusual transfers and unreported income.
- Conduct 100 percent verification.
- For parents claiming to be enrolled in college, require a proof of registration plus copy of the paid tuition bill. Confirm registration with the school. And if a parent with a PhD or master’s degree is returning to school for an associate’s degree, be highly suspect.
- In cases of divorce or separation, ask for the divorce decree or proof of legal separation, plus street address for each parent.
- Compare to each other two consecutive income tax returns to detect any movement of assets to hide them.
There’s more that can be done for identity proofing: biometric software. Biometric Signature ID (BSI) has designed a “Missing Link” patented software-only biometric.
This is the most potent form of ID verification on today’s market, and additional hardware is not required. It measures:
- Unique way someone moves the mouse, finger or stylus upon logging in
- Length, direction angle, speed, stroke height, of the
The password is created with BioSig-ID™. Measurement of the above can positively identify the user, regardless of what device they log into. This technology makes it impossible for a fraudster to impersonate the user.
With these unique patterns, BSI software can distinguish the user from everyone else. If the person who registered for the account is NOT the same person who is attempting access, they are stopped – avoiding any potential cheating or financial aid fraud.
Robert Siciliano, personal security and identity theft expert and BioSig-ID advisory board member. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- 15 Screening Tips for Hiring Honest Employees
Being a small business myself, I know how difficult it is to find the right employees. And everyone I speak to who is in business has the same problem. Unfortunately too many people lie, cheat and steal and when they come to work for you, they drain company resources until they are fired. It’s best
- Beware These College-Related Scams
The last group of college students has headed off to school for another semester of dorm rooms, late-night library sessions, and the occasional college party. For many students, college is the first time they’ve lived away from home. They are young, open to new things, and sometimes, naïve. These traits make them prime targets for
- School Directors Face Background Checks
When I see headlines like this I wonder what century we are in. You’d think in the year 2010 that background checks of school officials would have been implemented 20 years ago. In New Jersey background checks for school employees have been in place since 1986. But not for school officials. Still to this day municipalities
- Know the 10 Warning Signs of Identity Theft
As I have witnessed throughout the many years I have worked with victims, each type of identity theft can have a devastating impact. Victims with whom I have worked are taxpaying citizens who do the right thing and work hard to earn honest livings. When their personal information was compromised, thieves opened up financial accounts
- The World’s First Biometric Password Lockdown App is here
It’s about time: a biometric for your smartphone that will change the way you think about biometric security. This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called invasiveness of collecting body part information. The world’s first biometric password involves multi-factor authentication and