Texas aid administrators report surge in suspected fraudulent FAFSA/TASFA applications, share verification tactics
Loading...
Summary
Multiple Texas colleges and ISDs told the committee they saw clusters of suspicious financial aid applications this summer and fall; recommended practices include delaying form submission until synchronous ID verification, using IP/address monitoring and placing holds until identity is verified.
Multiple members of the Financial Aid Advisory Committee described a recent increase in suspected identity‑theft or fraudulent financial aid applications and shared operational steps used to detect and block those attempts.
The issue came up when members reported seeing clusters of applications that shared addresses, IP addresses from outside the U.S., or mismatched transcripts. Shannon Crossland of Frank Phillips College described procedures developed after detecting suspicious batches: require synchronous identity verification (via Zoom or in-person), email the editable form only when the student is on camera, require the student to show a photo ID and to move it in camera so staff can detect manipulated or static images, and place a hold so no funds are packaged or disbursed until verification is complete.
Several members said their institutions flag suspect patterns by exporting application data to look for repeated addresses or unusual geographic clusters (for example, many applications in a small community or many from the same IP). Members reported a spike in incidents during the summer-to-fall window; some campuses reported reducing incidents after adding multifactor authentication and manual checks.
ISD representatives said the federal FSA ID creation process has caused additional friction: some students could not complete FSA ID verification and needed follow-up steps or multiple attempts, which particularly affected high-school counselors working at scale. Panelists described local workarounds, including dedicated FAFSA days, one-on-one sessions, printed prefill sheets for counselors to manage student details, and volunteer-led watch parties for training.
When fraud is confirmed, practices varied by campus: some report to campus police, some to the Department of Education's OIG, and most keep the student on verification hold so no packaging or disbursement occurs until documentation is provided. Committee members asked the coordinating board to consider a future presentation on trends and mitigation strategies so the group can share playbooks and vendor‑neutral tools.
The committee agreed to record this as a potential future presentation topic and noted the practical tips exchanged as immediately actionable for many institutions.

