← Back to stories Wooden letter tiles spelling AI, representing technology and innovation.
Photo by Markus Winkler on Pexels
凤凰科技 2026-03-12

Ultraman comments on the US–China AI table: the US mounts aggressive frontier attacks, China competes out of sync with two "trump cards"

AI "ghost students" expose a gaping hole in U.S. aid systems

It has been reported that U.S. community college systems across several states were targeted last year by fraudsters using AI to create "ghost students" and siphon federal aid. Federal education officials identified roughly 150,000 suspicious identities on student aid forms, with about $90 million disbursed to ineligible accounts — roughly $30 million of which reportedly went to identities that belonged to the deceased. California emerged as a hotspot: more than 223,000 fake registrations and about $11.1 million in unrecoverable aid, it has been reported.

How the scam works — and why AI matters

The operation is simple and scalable. Scammers aggregate publicly available personal data — email addresses, online résumés, profile images — then use generative AI to stitch, fabricate or steal identities and submit thousands of enrollment and aid applications in minutes. Some operators even use AI to complete coursework until funds land, then abandon the fake accounts. Teachers have reportedly walked into full classrooms and found only empty seats. The scale recalls Gogol's satire of identity fraud — but now the con runs from a laptop, not a road trip.

Policy fallout and the larger US–China AI frame

The U.S. Department of Education has moved to require identity verification for first-time aid applicants. California, a leading AI hub, is responding with AI-based detection tools such as LightLeap.AI to find synthetic identities. It has been reported that Chinese commentators — under headlines like the "Ultraman" piece — frame the episode as evidence of the U.S. mounting "aggressive frontier attacks" in AI, while arguing China is competing with two out-of-sync "trump cards" (state backing and vast data access), though such strategic claims remain contested. Sanctions, trade policy and export controls already shape technology flows; now legislators and institutions face a new question: can policy and detection tech keep pace with an AI-driven arms race that weaponizes both fraud and defense?

AI
View original source →