Students work hard to get into college. And, once accepted, they know they need to pay for it. Some work multiple jobs and/or rely on loans from family members to foot the bill. Many rely on the Department of Education’s student loan program – paid for by the American taxpayer – to help fund their college studies. Unfortunately, there are some with no intention of pursuing higher education who see the program as a target for fraud. That’s what’s alleged in today’s Fraud of the Day from

The article reports that a Florida couple has been indicted by a grand jury on charges of conspiracy to defraud the U.S. Department of Education, student loan fraud and mail fraud. (If true, they added a new twist to their wedding vows: to love, honor and fraud) Authorities allege that the couple formed a company and “then recruited people who did not otherwise qualify for student loans and sent fraudulent applications to local colleges seeking student aid.” The article says the checks, which totaled $17,000, were sent directly to the company. (If multiple checks went to one address shouldn’t that raise a red flag?)

The allegations describe a brazen attempt to defraud taxpayers through the student loan program. It is important to note that these are simply that: allegations. The defendants are innocent until proven guilty. Even so, the scenario posed in the story raises a key question: how can student loan fraud be stopped? The allegations here center on using multiple identities all located at the same address to perpetrate fraud. It then follows, that the solution to stopping the fraud lies in leveraging identity-based filters to detect phony identities before sending the checks.

So, the question of the day is: does your government program need an identity-based solution to detect fraud?

Post a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>