Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

£6.5m paid out on fraudulent student loans

 

Rose Troup Buchanan
Wednesday 07 August 2013 04:26 EDT
Comments

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Criminal gangs have targeted the student loan company, costing the taxpayer millions, according to new reports.

The Student Loan Company (SLC) issued 875 fraudulent payments before suspicions were raised. These payments were among nearly 2,450 applications that were considered suspect, according to figures obtained by Radio 4’s You&Yours programme.

A spokesperson for SLC said: “We continually strive to look at ways to make the application process more secure and less susceptible to fraudulent activity ensuring that only those students who are eligible to receive funds are able to access them.”

The money lost has increased from just over £1m last year to £6.5m in the current financial year.

Three times more student loans were cancelled last year owing to suspected fraud than the year before, which is seven times more than in 2009.

Helen Laing, a spokesperson for SLC, said: “We suspect that the rise in organised criminal fraudulent activity is partly down to the fact that the activity has migrated from other businesses and that we have been identified as a new target.”

Laing continued that SLC has a ‘robust system of checks and safeguards in place’. She continued saying: “The higher fraud detection rates have been achieved as a result of new counter-fraud tools and advanced analytical capability. These tools represent an excellent return on investment and will lead to more investment in improved fraud detection and prevention systems.”

In May of this year, thieves who stole £380,000 from the SLC were sentenced. They provided fake exam certificates to applicants who then applied to university and student loans.

The gang charged £1,000 for the exam certificates and then took a cut from the student loan payments. The group received a total of seven years in prison.

In 2011, another criminal gang directly targeted students by sending phishing emails which appeared to be from the SLC asking students to update their personal details.

Instead of the official website students were re-directed to a similar looking site which was controlled by the group.

Hundreds of students across the UK were defrauded in this way, in a fraud that cost an estimated £1.6 million.

Laing said: “In cases where students have had their loan funds stolen, liability is considered on an individual case basis. We do reimburse students where investigation establishes they have genuinely been the victim of a phishing scam.”

SLC commented that students were often targeted at the three main institution dates in September, January and April and that students need to work with the SLC to ensure their identity and financial details are protected and not compromised.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in