schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101386", "label": "fraudulent", "label_confidence": 0.788, "severity": "critical", "timestamp": "2026-01-01T23:06:00Z", "trace_id": "c40ae42b-ae02-e7fe-4fbe-af2e0c4642bc" }
{ "account_age_days": 734, "account_id": "ACCT-B1E21D6B447C", "baseline_risk_score": 0.632, "kyc_tier": "tier_3", "session_entropy": 0.772 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 179, "timestamp": "2026-01-01T19:46:00Z", "transaction_amount_usd": 18.59 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.633, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 649668.84, "financial_exposure_usd": 1119912.05, "recoverable_pct": 0.492 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102858", "label": "fraudulent", "label_confidence": 0.86, "severity": "medium", "timestamp": "2026-01-02T23:38:00Z", "trace_id": "6db24e0a-cdce-6718-0d8e-da0fd499bae0" }
{ "account_age_days": 331, "account_id": "ACCT-AE7BD2042AD2", "baseline_risk_score": 0.503, "kyc_tier": "tier_2", "session_entropy": 0.113 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 307, "timestamp": "2026-01-02T17:21:00Z", "transaction_amount_usd": 23.09 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.737, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 272160.81, "financial_exposure_usd": 612699.2, "recoverable_pct": 0.014 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102060", "label": "fraudulent", "label_confidence": 0.939, "severity": "high", "timestamp": "2026-01-02T10:20:00Z", "trace_id": "599262ac-bc22-4537-20c8-e9da677a9ec2" }
{ "account_age_days": 526, "account_id": "ACCT-5000E8F0E15E", "baseline_risk_score": 0.433, "kyc_tier": "tier_2", "session_entropy": 0.505 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 756, "timestamp": "2026-01-02T10:20:00Z", "transaction_amount_usd": 26163.04 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.661, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 299183.3, "financial_exposure_usd": 356126.13, "recoverable_pct": 0.07 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100634", "label": "fraudulent", "label_confidence": 0.919, "severity": "critical", "timestamp": "2026-01-01T10:34:00Z", "trace_id": "c8c3e1df-d4aa-5028-a3d0-74410928f31d" }
{ "account_age_days": 483, "account_id": "ACCT-D120C9C56D27", "baseline_risk_score": 0.595, "kyc_tier": "tier_2", "session_entropy": 0.443 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 838, "timestamp": "2026-01-01T10:34:00Z", "transaction_amount_usd": 105427.96 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.837, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 672187.59, "financial_exposure_usd": 770172.41, "recoverable_pct": 0.159 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106274", "label": "fraudulent", "label_confidence": 0.628, "severity": "medium", "timestamp": "2026-01-05T08:34:00Z", "trace_id": "00f55f2d-17ff-05ea-8167-58aba4dc65d1" }
{ "account_age_days": 1399, "account_id": "ACCT-02A69AA097BA", "baseline_risk_score": 0.445, "kyc_tier": "tier_1", "session_entropy": 0.681 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 297, "timestamp": "2026-01-05T08:34:00Z", "transaction_amount_usd": 1579671.09 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.88, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 1719093.27, "financial_exposure_usd": 2230886.63, "recoverable_pct": 0.87 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103801", "label": "fraudulent", "label_confidence": 0.641, "severity": "high", "timestamp": "2026-01-03T15:21:00Z", "trace_id": "a1dfa310-e52d-4a3f-643f-005009b3ad45" }
{ "account_age_days": 1009, "account_id": "ACCT-4460B08F31F2", "baseline_risk_score": 0.338, "kyc_tier": "tier_2", "session_entropy": 0.334 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 852, "timestamp": "2026-01-03T15:21:00Z", "transaction_amount_usd": 432815.49 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.575, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 863620.45, "financial_exposure_usd": 2070493.83, "recoverable_pct": 0.531 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100966", "label": "fraudulent", "label_confidence": 0.95, "severity": "critical", "timestamp": "2026-01-01T16:06:00Z", "trace_id": "27e5de7f-f9cf-eef7-1de4-e85874aa931b" }
{ "account_age_days": 531, "account_id": "ACCT-4FEBD75E4880", "baseline_risk_score": 0.417, "kyc_tier": "tier_1", "session_entropy": 0.452 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 867, "timestamp": "2026-01-01T16:06:00Z", "transaction_amount_usd": 101080.95 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.761, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 105713.04, "financial_exposure_usd": 105907.4, "recoverable_pct": 0.082 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104510", "label": "fraudulent", "label_confidence": 0.819, "severity": "critical", "timestamp": "2026-01-04T03:10:00Z", "trace_id": "5d6e7c4a-54a1-5718-11a6-571c95c18aab" }
{ "account_age_days": 1708, "account_id": "ACCT-22765276BB9E", "baseline_risk_score": 0.229, "kyc_tier": "tier_2", "session_entropy": 0.827 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 1187, "timestamp": "2026-01-04T03:10:00Z", "transaction_amount_usd": 1968262.04 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.718, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2250679.18, "financial_exposure_usd": 4499315.04, "recoverable_pct": 0.554 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100567", "label": "fraudulent", "label_confidence": 0.755, "severity": "critical", "timestamp": "2026-01-01T09:27:00Z", "trace_id": "6a5e7b6d-ee07-5a69-3d83-ff769491f0b6" }
{ "account_age_days": 1632, "account_id": "ACCT-6EA257C20471", "baseline_risk_score": 0.261, "kyc_tier": "tier_2", "session_entropy": 0.218 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1011, "timestamp": "2026-01-01T09:27:00Z", "transaction_amount_usd": 86922.68 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.581, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 887954.78, "financial_exposure_usd": 1069334.42, "recoverable_pct": 0.272 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103386", "label": "fraudulent", "label_confidence": 0.704, "severity": "high", "timestamp": "2026-01-03T08:26:00Z", "trace_id": "e60065dd-8185-fce0-35d9-0acdefd02ca4" }
{ "account_age_days": 1191, "account_id": "ACCT-57BA25EE78C8", "baseline_risk_score": 0.212, "kyc_tier": "tier_2", "session_entropy": 0.109 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 108, "timestamp": "2026-01-03T08:26:00Z", "transaction_amount_usd": 81686.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.617, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1921186.43, "financial_exposure_usd": 3930652.69, "recoverable_pct": 0.821 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108648", "label": "benign", "label_confidence": 0.556, "severity": "low", "timestamp": "2026-01-07T00:08:00Z", "trace_id": "ff5dce3a-19c2-d5d5-6db6-7f22fd3b105a" }
{ "account_age_days": 601, "account_id": "ACCT-93D36A066A81", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.795 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 932, "timestamp": "2026-01-07T00:08:00Z", "transaction_amount_usd": 2781.09 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.464, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1693.95, "financial_exposure_usd": 2199.18, "recoverable_pct": 0.952 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102765", "label": "fraudulent", "label_confidence": 0.759, "severity": "high", "timestamp": "2026-01-02T22:05:00Z", "trace_id": "f3056f6c-2549-0b74-40d0-29300eeab12d" }
{ "account_age_days": 1658, "account_id": "ACCT-5F353F91D869", "baseline_risk_score": 0.42, "kyc_tier": "tier_1", "session_entropy": 0.103 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 357, "timestamp": "2026-01-02T22:05:00Z", "transaction_amount_usd": 19784.43 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.572, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 646661.86, "financial_exposure_usd": 774751.1, "recoverable_pct": 0.627 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102341", "label": "fraudulent", "label_confidence": 0.788, "severity": "high", "timestamp": "2026-01-02T15:01:00Z", "trace_id": "0628a48e-6be3-c846-536b-24e227e42a9b" }
{ "account_age_days": 1801, "account_id": "ACCT-6AFAB5EE09E3", "baseline_risk_score": 0.359, "kyc_tier": "tier_2", "session_entropy": 0.863 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 207, "timestamp": "2026-01-02T15:01:00Z", "transaction_amount_usd": 6132.02 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.86, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 971359.11, "financial_exposure_usd": 1032615.1, "recoverable_pct": 0.104 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109748", "label": "benign", "label_confidence": 0.535, "severity": "high", "timestamp": "2026-01-07T18:28:00Z", "trace_id": "88ce9fcb-90de-9c18-3747-add6851a16f9" }
{ "account_age_days": 998, "account_id": "ACCT-3995E4DA68D2", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.177 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 1041, "timestamp": "2026-01-07T18:28:00Z", "transaction_amount_usd": 13590.48 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.586, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 5520.88, "financial_exposure_usd": 6581.4, "recoverable_pct": 0.875 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100904", "label": "fraudulent", "label_confidence": 0.937, "severity": "high", "timestamp": "2026-01-01T15:04:00Z", "trace_id": "9ef2f1c8-380f-6624-5d24-ebb332459db3" }
{ "account_age_days": 1545, "account_id": "ACCT-A894644668CD", "baseline_risk_score": 0.31, "kyc_tier": "tier_2", "session_entropy": 0.87 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 933, "timestamp": "2026-01-01T15:04:00Z", "transaction_amount_usd": 20077.29 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.373, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 745487.58, "financial_exposure_usd": 989097.83, "recoverable_pct": 0.806 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109872", "label": "benign", "label_confidence": 0.69, "severity": "medium", "timestamp": "2026-01-07T20:32:00Z", "trace_id": "b68c044e-a0dc-18ba-3379-bafb0d1e351b" }
{ "account_age_days": 1671, "account_id": "ACCT-CB93587A89AC", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.841 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 830, "timestamp": "2026-01-07T20:32:00Z", "transaction_amount_usd": 8422.86 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.458, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 943.36, "financial_exposure_usd": 959.64, "recoverable_pct": 0.647 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108191", "label": "benign", "label_confidence": 0.657, "severity": "high", "timestamp": "2026-01-06T16:31:00Z", "trace_id": "12490800-f593-e4ea-aba2-76fa12e95be5" }
{ "account_age_days": 1449, "account_id": "ACCT-7AF0D8F165BA", "baseline_risk_score": 0.17, "kyc_tier": "tier_1", "session_entropy": 0.395 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 146, "timestamp": "2026-01-06T05:15:00Z", "transaction_amount_usd": 15.17 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.794, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 332.24, "financial_exposure_usd": 633.79, "recoverable_pct": 0.646 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102605", "label": "fraudulent", "label_confidence": 0.874, "severity": "critical", "timestamp": "2026-01-02T19:25:00Z", "trace_id": "7d981bd9-b162-901e-3a94-0600b5c99e59" }
{ "account_age_days": 389, "account_id": "ACCT-1E70579F1B12", "baseline_risk_score": 0.256, "kyc_tier": "tier_1", "session_entropy": 0.941 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 282, "timestamp": "2026-01-02T19:25:00Z", "transaction_amount_usd": 108727.81 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.457, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 126987.86, "financial_exposure_usd": 275285.43, "recoverable_pct": 0.649 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104525", "label": "fraudulent", "label_confidence": 0.771, "severity": "medium", "timestamp": "2026-01-04T03:25:00Z", "trace_id": "f1dbb842-d77e-4122-dba8-81ce7ad68486" }
{ "account_age_days": 291, "account_id": "ACCT-15C883FB6AA5", "baseline_risk_score": 0.415, "kyc_tier": "tier_1", "session_entropy": 0.404 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 723, "timestamp": "2026-01-04T03:25:00Z", "transaction_amount_usd": 1003878.65 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.756, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 996892.43, "financial_exposure_usd": 1797225.95, "recoverable_pct": 0.571 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100253", "label": "fraudulent", "label_confidence": 0.797, "severity": "medium", "timestamp": "2026-01-01T04:13:00Z", "trace_id": "de4b2801-38be-318f-96d0-d89df2314c7d" }
{ "account_age_days": 442, "account_id": "ACCT-5DB964902C6B", "baseline_risk_score": 0.581, "kyc_tier": "tier_2", "session_entropy": 0.626 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 1113, "timestamp": "2026-01-01T04:13:00Z", "transaction_amount_usd": 73148.54 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.787, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 176664.7, "financial_exposure_usd": 325415.69, "recoverable_pct": 0.362 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106869", "label": "benign", "label_confidence": 0.75, "severity": "medium", "timestamp": "2026-01-05T18:29:00Z", "trace_id": "4e7e0b1a-9969-2d3f-832a-aa5ed135d3d6" }
{ "account_age_days": 1936, "account_id": "ACCT-87B9EA3D266F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.546 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 525, "timestamp": "2026-01-05T18:29:00Z", "transaction_amount_usd": 1237.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.579, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 866.97, "financial_exposure_usd": 1664.76, "recoverable_pct": 0.611 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106105", "label": "fraudulent", "label_confidence": 0.909, "severity": "low", "timestamp": "2026-01-05T05:45:00Z", "trace_id": "ec467e6e-0072-438e-8564-6d7e37b80e6a" }
{ "account_age_days": 1551, "account_id": "ACCT-E070A7A46433", "baseline_risk_score": 0.388, "kyc_tier": "tier_1", "session_entropy": 0.122 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 628, "timestamp": "2026-01-05T05:45:00Z", "transaction_amount_usd": 2075196.07 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.586, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3181625.69, "financial_exposure_usd": 6493355.59, "recoverable_pct": 0.714 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101373", "label": "fraudulent", "label_confidence": 0.768, "severity": "high", "timestamp": "2026-01-01T22:53:00Z", "trace_id": "82c0be26-1667-63d4-a12c-c50c3914e7e6" }
{ "account_age_days": 1585, "account_id": "ACCT-01C5E090F2B5", "baseline_risk_score": 0.346, "kyc_tier": "tier_1", "session_entropy": 0.727 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 1045, "timestamp": "2026-01-01T22:53:00Z", "transaction_amount_usd": 31008.46 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.428, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 763239.03, "financial_exposure_usd": 896281.07, "recoverable_pct": 0.662 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105913", "label": "fraudulent", "label_confidence": 0.674, "severity": "high", "timestamp": "2026-01-05T02:33:00Z", "trace_id": "9a7b0e61-4991-fba3-310b-5252dccc88e8" }
{ "account_age_days": 352, "account_id": "ACCT-0549C5540505", "baseline_risk_score": 0.07, "kyc_tier": "tier_3", "session_entropy": 0.191 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 1186, "timestamp": "2026-01-05T02:33:00Z", "transaction_amount_usd": 2000631.2 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.558, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4348078.74, "financial_exposure_usd": 5175156.64, "recoverable_pct": 0.874 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107308", "label": "benign", "label_confidence": 0.503, "severity": "medium", "timestamp": "2026-01-06T01:48:00Z", "trace_id": "c84ad433-ad55-17c7-b12a-e081fe9b6741" }
{ "account_age_days": 1269, "account_id": "ACCT-9F8CA3556B35", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.673 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 243, "timestamp": "2026-01-06T01:48:00Z", "transaction_amount_usd": 13646.59 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.623, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2023.45, "financial_exposure_usd": 4314.34, "recoverable_pct": 0.682 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102122", "label": "fraudulent", "label_confidence": 0.842, "severity": "critical", "timestamp": "2026-01-02T11:22:00Z", "trace_id": "e80bd269-6301-7663-b833-e32fe41553f8" }
{ "account_age_days": 989, "account_id": "ACCT-3024AB7E4CCC", "baseline_risk_score": 0.274, "kyc_tier": "tier_1", "session_entropy": 0.433 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 170, "timestamp": "2026-01-02T11:22:00Z", "transaction_amount_usd": 18686.73 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.74, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 398142.43, "financial_exposure_usd": 509768.72, "recoverable_pct": 0.586 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102802", "label": "fraudulent", "label_confidence": 0.88, "severity": "critical", "timestamp": "2026-01-02T22:42:00Z", "trace_id": "14df7bc6-8871-b594-0a65-176d74594d7a" }
{ "account_age_days": 1394, "account_id": "ACCT-C8AF5215689D", "baseline_risk_score": 0.253, "kyc_tier": "tier_1", "session_entropy": 0.848 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 125, "timestamp": "2026-01-02T17:01:00Z", "transaction_amount_usd": 13.84 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.426, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 289447.77, "financial_exposure_usd": 459142.55, "recoverable_pct": 0.051 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100283", "label": "fraudulent", "label_confidence": 0.816, "severity": "high", "timestamp": "2026-01-01T04:43:00Z", "trace_id": "af0caa3c-122f-862e-c495-6e6a21cc0211" }
{ "account_age_days": 906, "account_id": "ACCT-4CEDC55B4136", "baseline_risk_score": 0.371, "kyc_tier": "tier_2", "session_entropy": 0.658 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 231, "timestamp": "2026-01-01T04:43:00Z", "transaction_amount_usd": 118884.87 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.938, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 425710.28, "financial_exposure_usd": 558092.28, "recoverable_pct": 0.16 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104931", "label": "fraudulent", "label_confidence": 0.926, "severity": "high", "timestamp": "2026-01-04T10:11:00Z", "trace_id": "ee5bdd44-0858-f05b-efe6-b32c6590d48b" }
{ "account_age_days": 907, "account_id": "ACCT-747038B6346D", "baseline_risk_score": 0.275, "kyc_tier": "tier_3", "session_entropy": 0.346 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 788, "timestamp": "2026-01-04T10:11:00Z", "transaction_amount_usd": 2979060.38 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.877, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2481602.7, "financial_exposure_usd": 4214190.08, "recoverable_pct": 0.565 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106576", "label": "fraudulent", "label_confidence": 0.831, "severity": "high", "timestamp": "2026-01-05T13:36:00Z", "trace_id": "224dfb6a-5288-1208-1cbb-93e9176860a2" }
{ "account_age_days": 1431, "account_id": "ACCT-800E737CA11B", "baseline_risk_score": 0.438, "kyc_tier": "tier_2", "session_entropy": 0.852 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 647, "timestamp": "2026-01-05T13:36:00Z", "transaction_amount_usd": 1526764.06 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.494, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5897168.79, "financial_exposure_usd": 6217852.77, "recoverable_pct": 0.627 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106586", "label": "fraudulent", "label_confidence": 0.929, "severity": "high", "timestamp": "2026-01-05T13:46:00Z", "trace_id": "da0a062e-06bb-d38a-1464-e8ed5513648c" }
{ "account_age_days": 307, "account_id": "ACCT-51B0103C6032", "baseline_risk_score": 0.415, "kyc_tier": "tier_2", "session_entropy": 0.799 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 276, "timestamp": "2026-01-05T02:01:00Z", "transaction_amount_usd": 13.33 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.467, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3788188.23, "financial_exposure_usd": 4030506.94, "recoverable_pct": 0.508 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102304", "label": "fraudulent", "label_confidence": 0.791, "severity": "critical", "timestamp": "2026-01-02T14:24:00Z", "trace_id": "4ba45648-d728-dc89-bbb0-96a0680aa47a" }
{ "account_age_days": 1886, "account_id": "ACCT-A8F659209991", "baseline_risk_score": 0.256, "kyc_tier": "tier_1", "session_entropy": 0.857 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 794, "timestamp": "2026-01-02T14:24:00Z", "transaction_amount_usd": 15066.98 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.363, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 294824.2, "financial_exposure_usd": 335234.49, "recoverable_pct": 0.056 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104822", "label": "fraudulent", "label_confidence": 0.895, "severity": "high", "timestamp": "2026-01-04T08:22:00Z", "trace_id": "ca209aa2-090b-0a85-642f-f09a1a12bd55" }
{ "account_age_days": 684, "account_id": "ACCT-F765C928D6F3", "baseline_risk_score": 0.097, "kyc_tier": "tier_1", "session_entropy": 0.53 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 153, "timestamp": "2026-01-04T03:52:00Z", "transaction_amount_usd": 11.85 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.728, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4208200.73, "financial_exposure_usd": 6272002.38, "recoverable_pct": 0.784 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104353", "label": "fraudulent", "label_confidence": 0.811, "severity": "high", "timestamp": "2026-01-04T00:33:00Z", "trace_id": "41fba597-0130-4b6a-5c07-00d1238e14f5" }
{ "account_age_days": 225, "account_id": "ACCT-7AF20E03A142", "baseline_risk_score": 0.208, "kyc_tier": "tier_2", "session_entropy": 0.759 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1050, "timestamp": "2026-01-04T00:33:00Z", "transaction_amount_usd": 697936.61 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.398, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 5433420.87, "financial_exposure_usd": 5879947.99, "recoverable_pct": 0.501 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101572", "label": "fraudulent", "label_confidence": 0.978, "severity": "critical", "timestamp": "2026-01-02T02:12:00Z", "trace_id": "e0e361a4-4004-b2c2-21f2-8f588f71831f" }
{ "account_age_days": 1819, "account_id": "ACCT-04ED2E2312BD", "baseline_risk_score": 0.269, "kyc_tier": "tier_3", "session_entropy": 0.779 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 631, "timestamp": "2026-01-02T02:12:00Z", "transaction_amount_usd": 71284.07 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.843, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 284884.92, "financial_exposure_usd": 490001.13, "recoverable_pct": 0.422 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100559", "label": "fraudulent", "label_confidence": 0.847, "severity": "high", "timestamp": "2026-01-01T09:19:00Z", "trace_id": "dc4a7ef6-959f-eb91-123b-e95be6f148b6" }
{ "account_age_days": 789, "account_id": "ACCT-874C5653CCC6", "baseline_risk_score": 0.41, "kyc_tier": "tier_2", "session_entropy": 0.362 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 158, "timestamp": "2026-01-01T03:10:00Z", "transaction_amount_usd": 12.1 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.522, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 619465.41, "financial_exposure_usd": 768188.69, "recoverable_pct": 0.211 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106847", "label": "benign", "label_confidence": 0.511, "severity": "low", "timestamp": "2026-01-05T18:07:00Z", "trace_id": "feabad0b-65b9-19f0-eada-65fb5e8839c2" }
{ "account_age_days": 304, "account_id": "ACCT-19A49B596785", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.172 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 946, "timestamp": "2026-01-05T18:07:00Z", "transaction_amount_usd": 4866.39 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.786, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2290.25, "financial_exposure_usd": 2391.96, "recoverable_pct": 0.901 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105418", "label": "fraudulent", "label_confidence": 0.734, "severity": "medium", "timestamp": "2026-01-04T18:18:00Z", "trace_id": "a6829e38-b01d-3f89-2927-b84f722a00b3" }
{ "account_age_days": 218, "account_id": "ACCT-34C9AC73AB33", "baseline_risk_score": 0.074, "kyc_tier": "tier_3", "session_entropy": 0.407 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 689, "timestamp": "2026-01-04T18:18:00Z", "transaction_amount_usd": 1163201.04 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.383, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3913569.06, "financial_exposure_usd": 5323198.93, "recoverable_pct": 0.51 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102506", "label": "fraudulent", "label_confidence": 0.87, "severity": "medium", "timestamp": "2026-01-02T17:46:00Z", "trace_id": "da8ce671-81af-42db-b034-848cc2ee81bc" }
{ "account_age_days": 1504, "account_id": "ACCT-F248EC2CFD19", "baseline_risk_score": 0.483, "kyc_tier": "tier_2", "session_entropy": 0.266 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 514, "timestamp": "2026-01-02T17:46:00Z", "transaction_amount_usd": 71358.33 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.466, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 766520.02, "financial_exposure_usd": 967624.57, "recoverable_pct": 0.787 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105121", "label": "fraudulent", "label_confidence": 0.654, "severity": "high", "timestamp": "2026-01-04T13:21:00Z", "trace_id": "50a8c539-c9f0-f5b2-035e-ba6ed8012bfa" }
{ "account_age_days": 1723, "account_id": "ACCT-0371AA26467D", "baseline_risk_score": 0.071, "kyc_tier": "tier_3", "session_entropy": 0.758 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 533, "timestamp": "2026-01-04T13:21:00Z", "transaction_amount_usd": 1714315.82 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.671, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6978491.09, "financial_exposure_usd": 7281813.08, "recoverable_pct": 0.98 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102839", "label": "fraudulent", "label_confidence": 0.922, "severity": "high", "timestamp": "2026-01-02T23:19:00Z", "trace_id": "0fa1ee63-fe4a-0bf3-b434-65a456246252" }
{ "account_age_days": 128, "account_id": "ACCT-D8519895A4DC", "baseline_risk_score": 0.56, "kyc_tier": "tier_2", "session_entropy": 0.676 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 867, "timestamp": "2026-01-02T23:19:00Z", "transaction_amount_usd": 70596.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.516, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 373523.89, "financial_exposure_usd": 560625.2, "recoverable_pct": 0.001 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103147", "label": "fraudulent", "label_confidence": 0.893, "severity": "high", "timestamp": "2026-01-03T04:27:00Z", "trace_id": "b3c3c89f-2c8e-faed-3db9-be749d0b98c9" }
{ "account_age_days": 863, "account_id": "ACCT-F017B68AC073", "baseline_risk_score": 0.313, "kyc_tier": "tier_1", "session_entropy": 0.721 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 590, "timestamp": "2026-01-03T04:27:00Z", "transaction_amount_usd": 71396.46 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.529, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 683404.96, "financial_exposure_usd": 970507.24, "recoverable_pct": 0.151 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108732", "label": "benign", "label_confidence": 0.672, "severity": "medium", "timestamp": "2026-01-07T01:32:00Z", "trace_id": "4a421ac6-518d-6e01-195b-526bdd0c601c" }
{ "account_age_days": 864, "account_id": "ACCT-D88E6298F643", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.742 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 728, "timestamp": "2026-01-07T01:32:00Z", "transaction_amount_usd": 5570.02 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.531, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3702.16, "financial_exposure_usd": 5763.77, "recoverable_pct": 0.778 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105595", "label": "fraudulent", "label_confidence": 0.853, "severity": "high", "timestamp": "2026-01-04T21:15:00Z", "trace_id": "e9815ee1-4ce4-c82f-36a6-8b153f752524" }
{ "account_age_days": 1676, "account_id": "ACCT-A61729F0E4F0", "baseline_risk_score": 0.154, "kyc_tier": "tier_2", "session_entropy": 0.531 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 918, "timestamp": "2026-01-04T21:15:00Z", "transaction_amount_usd": 1352115.6 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.871, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3343803.39, "financial_exposure_usd": 4812478.03, "recoverable_pct": 0.444 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104534", "label": "fraudulent", "label_confidence": 0.709, "severity": "high", "timestamp": "2026-01-04T03:34:00Z", "trace_id": "bf17af40-e47b-6f49-b06e-892b91d9de0f" }
{ "account_age_days": 832, "account_id": "ACCT-C3156A047C31", "baseline_risk_score": 0.169, "kyc_tier": "tier_3", "session_entropy": 0.652 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 80, "timestamp": "2026-01-04T03:34:00Z", "transaction_amount_usd": 638693.37 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.716, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3359474.12, "financial_exposure_usd": 5835070.68, "recoverable_pct": 0.499 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109543", "label": "benign", "label_confidence": 0.532, "severity": "low", "timestamp": "2026-01-07T15:03:00Z", "trace_id": "2e10c869-9ba5-f44e-8e8f-99283e1a0351" }
{ "account_age_days": 714, "account_id": "ACCT-E570F0477B79", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.165 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 403, "timestamp": "2026-01-07T15:03:00Z", "transaction_amount_usd": 7820.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.652, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 692.47, "financial_exposure_usd": 1656.89, "recoverable_pct": 0.853 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102145", "label": "fraudulent", "label_confidence": 0.921, "severity": "high", "timestamp": "2026-01-02T11:45:00Z", "trace_id": "a272648e-8db0-1a47-43ec-d153d70699fb" }
{ "account_age_days": 600, "account_id": "ACCT-A8BBAD159154", "baseline_risk_score": 0.314, "kyc_tier": "tier_1", "session_entropy": 0.772 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 488, "timestamp": "2026-01-02T11:45:00Z", "transaction_amount_usd": 33042.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.454, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 528718.09, "financial_exposure_usd": 605223.05, "recoverable_pct": 0.761 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101401", "label": "fraudulent", "label_confidence": 0.874, "severity": "high", "timestamp": "2026-01-01T23:21:00Z", "trace_id": "a3a0ae3e-f8f8-d2dc-8452-0f04d8ec00dd" }
{ "account_age_days": 1071, "account_id": "ACCT-E8693F3AE98D", "baseline_risk_score": 0.509, "kyc_tier": "tier_3", "session_entropy": 0.473 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 965, "timestamp": "2026-01-01T23:21:00Z", "transaction_amount_usd": 29914.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.45, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 324584.95, "financial_exposure_usd": 528844.5, "recoverable_pct": 0.569 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103521", "label": "fraudulent", "label_confidence": 0.819, "severity": "medium", "timestamp": "2026-01-03T10:41:00Z", "trace_id": "1b159de6-730f-413d-8e2c-60c134f3157f" }
{ "account_age_days": 421, "account_id": "ACCT-8387F8B39D04", "baseline_risk_score": 0.192, "kyc_tier": "tier_1", "session_entropy": 0.58 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 683, "timestamp": "2026-01-03T10:41:00Z", "transaction_amount_usd": 2054834.67 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.671, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2415977.5, "financial_exposure_usd": 3775130.76, "recoverable_pct": 0.413 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106093", "label": "fraudulent", "label_confidence": 0.871, "severity": "high", "timestamp": "2026-01-05T05:33:00Z", "trace_id": "001f0c46-65ed-6c24-7427-df760b9d4afc" }
{ "account_age_days": 1721, "account_id": "ACCT-E7932B312B2B", "baseline_risk_score": 0.226, "kyc_tier": "tier_2", "session_entropy": 0.522 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 479, "timestamp": "2026-01-05T05:33:00Z", "transaction_amount_usd": 1169336.77 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.795, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6446243.62, "financial_exposure_usd": 7010803.25, "recoverable_pct": 0.415 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106116", "label": "fraudulent", "label_confidence": 0.807, "severity": "medium", "timestamp": "2026-01-05T05:56:00Z", "trace_id": "ae742902-d3d2-f5f6-3b3a-c84f3b279de9" }
{ "account_age_days": 284, "account_id": "ACCT-058E101BC196", "baseline_risk_score": 0.129, "kyc_tier": "tier_3", "session_entropy": 0.351 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 1014, "timestamp": "2026-01-05T05:56:00Z", "transaction_amount_usd": 424384.31 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.448, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2224014.46, "financial_exposure_usd": 3795054.1, "recoverable_pct": 0.517 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109631", "label": "benign", "label_confidence": 0.623, "severity": "medium", "timestamp": "2026-01-07T16:31:00Z", "trace_id": "608f0c7e-77e8-1654-a125-f23bd263616b" }
{ "account_age_days": 31, "account_id": "ACCT-3093F46663F1", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.825 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 314, "timestamp": "2026-01-07T07:15:00Z", "transaction_amount_usd": 0.49 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.571, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1816.25, "financial_exposure_usd": 4203.25, "recoverable_pct": 0.671 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100726", "label": "fraudulent", "label_confidence": 0.759, "severity": "high", "timestamp": "2026-01-01T12:06:00Z", "trace_id": "74ca3720-6f4e-0e9f-06a8-94f5d2a5656b" }
{ "account_age_days": 630, "account_id": "ACCT-EC3ABE85CD36", "baseline_risk_score": 0.328, "kyc_tier": "tier_2", "session_entropy": 0.284 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 881, "timestamp": "2026-01-01T12:06:00Z", "transaction_amount_usd": 117029.63 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.833, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 975054.52, "financial_exposure_usd": 1119001.12, "recoverable_pct": 0.744 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109337", "label": "benign", "label_confidence": 0.547, "severity": "medium", "timestamp": "2026-01-07T11:37:00Z", "trace_id": "ee922776-0b70-6442-f43f-f3ecc64c1110" }
{ "account_age_days": 220, "account_id": "ACCT-717BCAD089EB", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.758 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 507, "timestamp": "2026-01-07T11:37:00Z", "transaction_amount_usd": 7813.31 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.66, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4992.07, "financial_exposure_usd": 9051.26, "recoverable_pct": 0.787 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102137", "label": "fraudulent", "label_confidence": 0.874, "severity": "low", "timestamp": "2026-01-02T11:37:00Z", "trace_id": "1078decd-266c-d7dd-6c5c-c90ee107c813" }
{ "account_age_days": 1149, "account_id": "ACCT-C1BA9A2A198D", "baseline_risk_score": 0.551, "kyc_tier": "tier_1", "session_entropy": 0.454 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 613, "timestamp": "2026-01-02T11:37:00Z", "transaction_amount_usd": 113001.74 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.668, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 654178.32, "financial_exposure_usd": 1470662.28, "recoverable_pct": 0.576 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100988", "label": "fraudulent", "label_confidence": 0.763, "severity": "medium", "timestamp": "2026-01-01T16:28:00Z", "trace_id": "a8c3e7fe-b69f-ed2a-f258-fad71c2a7b24" }
{ "account_age_days": 1268, "account_id": "ACCT-2EC91233B091", "baseline_risk_score": 0.521, "kyc_tier": "tier_3", "session_entropy": 0.361 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 774, "timestamp": "2026-01-01T16:28:00Z", "transaction_amount_usd": 31020.16 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.568, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 300174.64, "financial_exposure_usd": 685157.58, "recoverable_pct": 0.716 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100650", "label": "fraudulent", "label_confidence": 0.758, "severity": "critical", "timestamp": "2026-01-01T10:50:00Z", "trace_id": "7695d80a-fe75-3307-0e09-7a609b6b0003" }
{ "account_age_days": 77, "account_id": "ACCT-48E4EC7A1351", "baseline_risk_score": 0.505, "kyc_tier": "tier_3", "session_entropy": 0.614 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 130, "timestamp": "2026-01-01T07:25:00Z", "transaction_amount_usd": 1.09 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.354, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 407147.51, "financial_exposure_usd": 618940.42, "recoverable_pct": 0.302 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101009", "label": "fraudulent", "label_confidence": 0.937, "severity": "critical", "timestamp": "2026-01-01T16:49:00Z", "trace_id": "695e15d8-a5aa-338b-d3b7-875bf6c0efba" }
{ "account_age_days": 1069, "account_id": "ACCT-280BA7ECBBF0", "baseline_risk_score": 0.609, "kyc_tier": "tier_3", "session_entropy": 0.832 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 576, "timestamp": "2026-01-01T16:49:00Z", "transaction_amount_usd": 47377.48 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.469, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 220339.09, "financial_exposure_usd": 530511.26, "recoverable_pct": 0.56 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106848", "label": "benign", "label_confidence": 0.566, "severity": "low", "timestamp": "2026-01-05T18:08:00Z", "trace_id": "433ea74b-06a6-8227-a1d7-4f1014e2b039" }
{ "account_age_days": 300, "account_id": "ACCT-B6906C19AA36", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.411 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 255, "timestamp": "2026-01-05T18:08:00Z", "transaction_amount_usd": 990.22 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.556, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 796.13, "financial_exposure_usd": 1596.35, "recoverable_pct": 0.702 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103016", "label": "fraudulent", "label_confidence": 0.773, "severity": "high", "timestamp": "2026-01-03T02:16:00Z", "trace_id": "8c51e4e8-f8e9-53b8-a242-d6e168442a54" }
{ "account_age_days": 1615, "account_id": "ACCT-A9CFDD0EB82C", "baseline_risk_score": 0.259, "kyc_tier": "tier_1", "session_entropy": 0.789 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 342, "timestamp": "2026-01-03T02:16:00Z", "transaction_amount_usd": 98688.78 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.698, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 408489.86, "financial_exposure_usd": 988390.04, "recoverable_pct": 0.136 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109267", "label": "benign", "label_confidence": 0.492, "severity": "low", "timestamp": "2026-01-07T10:27:00Z", "trace_id": "f7b1d7cb-8125-3913-fff5-35b2a1d27f3c" }
{ "account_age_days": 1001, "account_id": "ACCT-65BF3A44C8C5", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.414 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 142, "timestamp": "2026-01-07T03:41:00Z", "transaction_amount_usd": 2.46 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.526, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 509.65, "financial_exposure_usd": 950.18, "recoverable_pct": 0.772 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108068", "label": "benign", "label_confidence": 0.554, "severity": "high", "timestamp": "2026-01-06T14:28:00Z", "trace_id": "06bbe5c7-3165-9f2f-b265-7a688f68172a" }
{ "account_age_days": 1138, "account_id": "ACCT-BAA5438CCF66", "baseline_risk_score": 0.097, "kyc_tier": "tier_1", "session_entropy": 0.286 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 468, "timestamp": "2026-01-06T14:28:00Z", "transaction_amount_usd": 3970.93 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.633, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 801.41, "financial_exposure_usd": 862.6, "recoverable_pct": 0.478 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107444", "label": "benign", "label_confidence": 0.575, "severity": "high", "timestamp": "2026-01-06T04:04:00Z", "trace_id": "d7f96fa4-e287-5108-6e1e-dd5f1dde1c95" }
{ "account_age_days": 1372, "account_id": "ACCT-07159848F8FF", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.367 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 1046, "timestamp": "2026-01-06T04:04:00Z", "transaction_amount_usd": 12846.98 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.553, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1354.96, "financial_exposure_usd": 2936.93, "recoverable_pct": 0.978 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106056", "label": "fraudulent", "label_confidence": 0.846, "severity": "medium", "timestamp": "2026-01-05T04:56:00Z", "trace_id": "77639eba-4706-611f-7347-41e8faf19758" }
{ "account_age_days": 297, "account_id": "ACCT-3744231F1F6A", "baseline_risk_score": 0.384, "kyc_tier": "tier_1", "session_entropy": 0.722 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 369, "timestamp": "2026-01-05T04:56:00Z", "transaction_amount_usd": 2038661.49 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.914, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4853422.51, "financial_exposure_usd": 6747739.43, "recoverable_pct": 0.985 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101613", "label": "fraudulent", "label_confidence": 0.879, "severity": "critical", "timestamp": "2026-01-02T02:53:00Z", "trace_id": "d149f273-62f6-105e-3ac0-b53a99c5eb1b" }
{ "account_age_days": 1391, "account_id": "ACCT-7E04EC0ED993", "baseline_risk_score": 0.295, "kyc_tier": "tier_3", "session_entropy": 0.573 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 243, "timestamp": "2026-01-01T23:47:00Z", "transaction_amount_usd": 8.74 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.549, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 293126.2, "financial_exposure_usd": 729168.5, "recoverable_pct": 0.554 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100782", "label": "fraudulent", "label_confidence": 0.772, "severity": "critical", "timestamp": "2026-01-01T13:02:00Z", "trace_id": "0ae985ca-c5f8-bce7-b68b-a6b6f301b46d" }
{ "account_age_days": 1622, "account_id": "ACCT-444BA860EE9D", "baseline_risk_score": 0.531, "kyc_tier": "tier_3", "session_entropy": 0.504 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 849, "timestamp": "2026-01-01T13:02:00Z", "transaction_amount_usd": 75996.9 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.78, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 223275.68, "financial_exposure_usd": 312024.16, "recoverable_pct": 0.435 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100979", "label": "fraudulent", "label_confidence": 0.944, "severity": "medium", "timestamp": "2026-01-01T16:19:00Z", "trace_id": "231bb7d0-7c1a-53d1-030c-b0a726a94d9e" }
{ "account_age_days": 998, "account_id": "ACCT-51580BD35EF9", "baseline_risk_score": 0.501, "kyc_tier": "tier_1", "session_entropy": 0.658 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 177, "timestamp": "2026-01-01T16:19:00Z", "transaction_amount_usd": 38460.82 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.423, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 574038.96, "financial_exposure_usd": 890631, "recoverable_pct": 0.002 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107330", "label": "benign", "label_confidence": 0.694, "severity": "low", "timestamp": "2026-01-06T02:10:00Z", "trace_id": "14b6d474-45e2-14cf-b885-51a03a893bbd" }
{ "account_age_days": 1387, "account_id": "ACCT-E41A56BDA401", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.348 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1084, "timestamp": "2026-01-06T02:10:00Z", "transaction_amount_usd": 1121.86 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.701, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3506.86, "financial_exposure_usd": 7960.51, "recoverable_pct": 0.974 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102237", "label": "fraudulent", "label_confidence": 0.907, "severity": "high", "timestamp": "2026-01-02T13:17:00Z", "trace_id": "8713d0e7-d259-585f-c867-e71e4b5a5ee9" }
{ "account_age_days": 1390, "account_id": "ACCT-4AB8382D26F8", "baseline_risk_score": 0.363, "kyc_tier": "tier_2", "session_entropy": 0.823 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 458, "timestamp": "2026-01-02T13:17:00Z", "transaction_amount_usd": 3996.16 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.379, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 954942.38, "financial_exposure_usd": 984404.48, "recoverable_pct": 0.017 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103230", "label": "fraudulent", "label_confidence": 0.926, "severity": "high", "timestamp": "2026-01-03T05:50:00Z", "trace_id": "d8f7cf63-cabe-5a0e-60c6-32fdd1f10cba" }
{ "account_age_days": 353, "account_id": "ACCT-717150197F2A", "baseline_risk_score": 0.4, "kyc_tier": "tier_1", "session_entropy": 0.554 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1166, "timestamp": "2026-01-03T05:50:00Z", "transaction_amount_usd": 75101.03 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.796, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 197762.36, "financial_exposure_usd": 256504.82, "recoverable_pct": 0.733 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102614", "label": "fraudulent", "label_confidence": 0.788, "severity": "critical", "timestamp": "2026-01-02T19:34:00Z", "trace_id": "93915dc5-b7ed-1092-e14a-db69fde99fb8" }
{ "account_age_days": 1311, "account_id": "ACCT-8AD6AD28F3B6", "baseline_risk_score": 0.351, "kyc_tier": "tier_1", "session_entropy": 0.441 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 524, "timestamp": "2026-01-02T19:34:00Z", "transaction_amount_usd": 2335.42 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.492, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 677914.61, "financial_exposure_usd": 754996.18, "recoverable_pct": 0.324 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101081", "label": "fraudulent", "label_confidence": 0.933, "severity": "critical", "timestamp": "2026-01-01T18:01:00Z", "trace_id": "a5e6d983-6053-c8ba-c981-58d30f61b5b9" }
{ "account_age_days": 1217, "account_id": "ACCT-26F9A22141FD", "baseline_risk_score": 0.403, "kyc_tier": "tier_3", "session_entropy": 0.594 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1084, "timestamp": "2026-01-01T18:01:00Z", "transaction_amount_usd": 87108.11 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.937, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 329729.01, "financial_exposure_usd": 369781.51, "recoverable_pct": 0.502 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107043", "label": "benign", "label_confidence": 0.679, "severity": "low", "timestamp": "2026-01-05T21:23:00Z", "trace_id": "b7472d12-0aa8-45cf-0199-8c883a3dc20d" }
{ "account_age_days": 1583, "account_id": "ACCT-F93637860EB4", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.784 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 617, "timestamp": "2026-01-05T21:23:00Z", "transaction_amount_usd": 1034.02 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.636, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 5643.49, "financial_exposure_usd": 6137.75, "recoverable_pct": 0.533 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108096", "label": "benign", "label_confidence": 0.488, "severity": "low", "timestamp": "2026-01-06T14:56:00Z", "trace_id": "f5f98828-49cb-0d90-6925-294378d3ca4e" }
{ "account_age_days": 607, "account_id": "ACCT-F09EDBB89C4E", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.515 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 192, "timestamp": "2026-01-06T14:56:00Z", "transaction_amount_usd": 7536.21 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.753, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 243.03, "financial_exposure_usd": 338.38, "recoverable_pct": 0.435 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100671", "label": "fraudulent", "label_confidence": 0.876, "severity": "high", "timestamp": "2026-01-01T11:11:00Z", "trace_id": "b01c040a-72f6-ce92-cfbb-37c4229e82a9" }
{ "account_age_days": 1259, "account_id": "ACCT-1D15A56C8DBF", "baseline_risk_score": 0.39, "kyc_tier": "tier_1", "session_entropy": 0.479 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 130, "timestamp": "2026-01-01T11:11:00Z", "transaction_amount_usd": 24773.85 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.803, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 588925.17, "financial_exposure_usd": 763784.24, "recoverable_pct": 0.768 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106327", "label": "fraudulent", "label_confidence": 0.68, "severity": "low", "timestamp": "2026-01-05T09:27:00Z", "trace_id": "3c175e42-d22d-a76d-137f-bdf2501a762a" }
{ "account_age_days": 1430, "account_id": "ACCT-571A245E3035", "baseline_risk_score": 0.217, "kyc_tier": "tier_1", "session_entropy": 0.628 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 257, "timestamp": "2026-01-05T04:53:00Z", "transaction_amount_usd": 14.18 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.422, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1682703.4, "financial_exposure_usd": 2435172.45, "recoverable_pct": 0.895 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108624", "label": "benign", "label_confidence": 0.629, "severity": "medium", "timestamp": "2026-01-06T23:44:00Z", "trace_id": "57572a2c-d29a-0582-7b06-f625e19f6af6" }
{ "account_age_days": 399, "account_id": "ACCT-BD63719620A6", "baseline_risk_score": 0.074, "kyc_tier": "tier_1", "session_entropy": 0.272 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 514, "timestamp": "2026-01-06T23:44:00Z", "transaction_amount_usd": 4098.01 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.766, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 694.32, "financial_exposure_usd": 1141.1, "recoverable_pct": 0.402 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108343", "label": "benign", "label_confidence": 0.632, "severity": "medium", "timestamp": "2026-01-06T19:03:00Z", "trace_id": "b6c46706-92ed-e74a-1fbb-eb5244584544" }
{ "account_age_days": 1292, "account_id": "ACCT-353F1DCC43C8", "baseline_risk_score": 0.183, "kyc_tier": "tier_2", "session_entropy": 0.783 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 147, "timestamp": "2026-01-06T19:03:00Z", "transaction_amount_usd": 9340.28 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.549, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 4511.73, "financial_exposure_usd": 4826.4, "recoverable_pct": 0.93 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103465", "label": "fraudulent", "label_confidence": 0.748, "severity": "medium", "timestamp": "2026-01-03T09:45:00Z", "trace_id": "c2210954-1b54-29e8-be74-994210717dee" }
{ "account_age_days": 1345, "account_id": "ACCT-01F0B65E051C", "baseline_risk_score": 0.054, "kyc_tier": "tier_1", "session_entropy": 0.816 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 518, "timestamp": "2026-01-03T09:45:00Z", "transaction_amount_usd": 1686671.01 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.443, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3066646.73, "financial_exposure_usd": 3178767.21, "recoverable_pct": 0.709 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105262", "label": "fraudulent", "label_confidence": 0.84, "severity": "medium", "timestamp": "2026-01-04T15:42:00Z", "trace_id": "b1d8ea37-d028-111d-1d31-33e954afddfe" }
{ "account_age_days": 1145, "account_id": "ACCT-169127936E1E", "baseline_risk_score": 0.166, "kyc_tier": "tier_3", "session_entropy": 0.472 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 965, "timestamp": "2026-01-04T15:42:00Z", "transaction_amount_usd": 1423399.6 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.93, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 4703319.89, "financial_exposure_usd": 5247370.06, "recoverable_pct": 0.413 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109687", "label": "benign", "label_confidence": 0.641, "severity": "low", "timestamp": "2026-01-07T17:27:00Z", "trace_id": "a0a1230c-fe99-7c9a-e7aa-976dbf5ad386" }
{ "account_age_days": 434, "account_id": "ACCT-0DFE3BD29B22", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.596 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 523, "timestamp": "2026-01-07T17:27:00Z", "transaction_amount_usd": 3788.45 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.567, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1206.3, "financial_exposure_usd": 1564.42, "recoverable_pct": 0.922 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100002", "label": "fraudulent", "label_confidence": 0.965, "severity": "medium", "timestamp": "2026-01-01T00:02:00Z", "trace_id": "8a14be62-295b-4715-c333-e8615fb8d16c" }
{ "account_age_days": 1656, "account_id": "ACCT-3E3511287900", "baseline_risk_score": 0.303, "kyc_tier": "tier_2", "session_entropy": 0.767 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 709, "timestamp": "2026-01-01T00:02:00Z", "transaction_amount_usd": 72073.88 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.407, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 685529.81, "financial_exposure_usd": 1119088.85, "recoverable_pct": 0.349 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108954", "label": "benign", "label_confidence": 0.703, "severity": "low", "timestamp": "2026-01-07T05:14:00Z", "trace_id": "941cb18a-a8b4-e386-c6b7-b4d8755f456b" }
{ "account_age_days": 795, "account_id": "ACCT-53FE17FE593F", "baseline_risk_score": 0.108, "kyc_tier": "tier_1", "session_entropy": 0.761 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 384, "timestamp": "2026-01-07T03:13:00Z", "transaction_amount_usd": 5.78 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.576, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1524.48, "financial_exposure_usd": 2250.59, "recoverable_pct": 0.848 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100702", "label": "fraudulent", "label_confidence": 0.891, "severity": "medium", "timestamp": "2026-01-01T11:42:00Z", "trace_id": "0dc29c55-0d20-274e-0b82-a3123962d144" }
{ "account_age_days": 168, "account_id": "ACCT-7646D1F8E3F2", "baseline_risk_score": 0.496, "kyc_tier": "tier_3", "session_entropy": 0.711 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 568, "timestamp": "2026-01-01T11:42:00Z", "transaction_amount_usd": 31712.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.866, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 881473.5, "financial_exposure_usd": 1325739.51, "recoverable_pct": 0.666 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106838", "label": "benign", "label_confidence": 0.498, "severity": "low", "timestamp": "2026-01-05T17:58:00Z", "trace_id": "0f303e82-2a41-40e7-dabd-c9965eee980e" }
{ "account_age_days": 762, "account_id": "ACCT-660E86AC0444", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.198 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 379, "timestamp": "2026-01-05T17:58:00Z", "transaction_amount_usd": 10198.9 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.471, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3346.16, "financial_exposure_usd": 4070.7, "recoverable_pct": 0.939 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100586", "label": "fraudulent", "label_confidence": 0.877, "severity": "medium", "timestamp": "2026-01-01T09:46:00Z", "trace_id": "6085811b-67a4-fdb6-60dc-3d2b994fe7dc" }
{ "account_age_days": 551, "account_id": "ACCT-7CCBCC753E7D", "baseline_risk_score": 0.584, "kyc_tier": "tier_1", "session_entropy": 0.428 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1042, "timestamp": "2026-01-01T09:46:00Z", "transaction_amount_usd": 26685.07 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.848, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 220074.74, "financial_exposure_usd": 257843.84, "recoverable_pct": 0.187 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103795", "label": "fraudulent", "label_confidence": 0.856, "severity": "medium", "timestamp": "2026-01-03T15:15:00Z", "trace_id": "70bf7009-0150-88ad-cca6-9fc434be4648" }
{ "account_age_days": 1899, "account_id": "ACCT-E2DA3D1AFD97", "baseline_risk_score": 0.063, "kyc_tier": "tier_1", "session_entropy": 0.69 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 1076, "timestamp": "2026-01-03T15:15:00Z", "transaction_amount_usd": 1812358.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.522, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5843870.18, "financial_exposure_usd": 6073007.84, "recoverable_pct": 0.89 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102972", "label": "fraudulent", "label_confidence": 0.827, "severity": "low", "timestamp": "2026-01-03T01:32:00Z", "trace_id": "ecc5e4e9-35f3-1e50-146e-77437c8510a9" }
{ "account_age_days": 218, "account_id": "ACCT-24DBAEE2ACE5", "baseline_risk_score": 0.37, "kyc_tier": "tier_2", "session_entropy": 0.622 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1168, "timestamp": "2026-01-03T01:32:00Z", "transaction_amount_usd": 38132.47 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.518, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 941746.67, "financial_exposure_usd": 1012569.38, "recoverable_pct": 0.46 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102276", "label": "fraudulent", "label_confidence": 0.927, "severity": "high", "timestamp": "2026-01-02T13:56:00Z", "trace_id": "adfae807-ee0d-9cd1-0fe7-ce5614155b06" }
{ "account_age_days": 242, "account_id": "ACCT-DAA5D339F04B", "baseline_risk_score": 0.261, "kyc_tier": "tier_2", "session_entropy": 0.252 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 1088, "timestamp": "2026-01-02T13:56:00Z", "transaction_amount_usd": 23062.53 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.607, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 578831.36, "financial_exposure_usd": 588938.56, "recoverable_pct": 0.829 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100613", "label": "fraudulent", "label_confidence": 0.92, "severity": "high", "timestamp": "2026-01-01T10:13:00Z", "trace_id": "20923175-1ba6-373c-6bf4-c68b3812bd11" }
{ "account_age_days": 1354, "account_id": "ACCT-5E7E0704FC6C", "baseline_risk_score": 0.567, "kyc_tier": "tier_3", "session_entropy": 0.318 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 806, "timestamp": "2026-01-01T10:13:00Z", "transaction_amount_usd": 60319.14 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.829, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 893066.95, "financial_exposure_usd": 991047.36, "recoverable_pct": 0.792 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105962", "label": "fraudulent", "label_confidence": 0.645, "severity": "critical", "timestamp": "2026-01-05T03:22:00Z", "trace_id": "5b31c78b-a6bc-3620-fa9a-61555157e006" }
{ "account_age_days": 1101, "account_id": "ACCT-812D893945E7", "baseline_risk_score": 0.11, "kyc_tier": "tier_3", "session_entropy": 0.692 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 961, "timestamp": "2026-01-05T03:22:00Z", "transaction_amount_usd": 2452062.24 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.519, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1282338.28, "financial_exposure_usd": 2630239.89, "recoverable_pct": 0.47 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103388", "label": "fraudulent", "label_confidence": 0.782, "severity": "high", "timestamp": "2026-01-03T08:28:00Z", "trace_id": "45f2f483-ba21-7bc4-a48e-7b8eac276124" }
{ "account_age_days": 1792, "account_id": "ACCT-F686601078E2", "baseline_risk_score": 0.36, "kyc_tier": "tier_3", "session_entropy": 0.718 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 148, "timestamp": "2026-01-03T04:04:00Z", "transaction_amount_usd": 1.59 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.361, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3525614.87, "financial_exposure_usd": 6396645.67, "recoverable_pct": 0.558 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101079", "label": "fraudulent", "label_confidence": 0.92, "severity": "critical", "timestamp": "2026-01-01T17:59:00Z", "trace_id": "9ed26f3d-6399-7cfe-4815-a8e770456859" }
{ "account_age_days": 295, "account_id": "ACCT-6876BAAAFD64", "baseline_risk_score": 0.457, "kyc_tier": "tier_1", "session_entropy": 0.471 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 209, "timestamp": "2026-01-01T17:59:00Z", "transaction_amount_usd": 59721.34 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.863, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1311456.07, "financial_exposure_usd": 1322450.43, "recoverable_pct": 0.544 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104433", "label": "fraudulent", "label_confidence": 0.878, "severity": "high", "timestamp": "2026-01-04T01:53:00Z", "trace_id": "025dbcb3-8da1-462c-4d90-6b4ef3618fd2" }
{ "account_age_days": 552, "account_id": "ACCT-B49951CD45F0", "baseline_risk_score": 0.073, "kyc_tier": "tier_2", "session_entropy": 0.439 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1165, "timestamp": "2026-01-04T01:53:00Z", "transaction_amount_usd": 2731541.26 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.494, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 5711421.06, "financial_exposure_usd": 5739254.07, "recoverable_pct": 0.897 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102818", "label": "fraudulent", "label_confidence": 0.814, "severity": "critical", "timestamp": "2026-01-02T22:58:00Z", "trace_id": "7d46a6b2-a888-15f1-013d-09dddbd2e24e" }
{ "account_age_days": 426, "account_id": "ACCT-D89DB10AA407", "baseline_risk_score": 0.292, "kyc_tier": "tier_2", "session_entropy": 0.893 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 348, "timestamp": "2026-01-02T22:58:00Z", "transaction_amount_usd": 20296.31 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.415, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 262885.87, "financial_exposure_usd": 318321.04, "recoverable_pct": 0.819 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108028", "label": "benign", "label_confidence": 0.48, "severity": "low", "timestamp": "2026-01-06T13:48:00Z", "trace_id": "ad9d14b3-f082-1451-e4cc-818c5f537445" }
{ "account_age_days": 157, "account_id": "ACCT-5E8D981A3B72", "baseline_risk_score": 0.143, "kyc_tier": "tier_1", "session_entropy": 0.747 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 375, "timestamp": "2026-01-06T13:48:00Z", "transaction_amount_usd": 14546.41 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.683, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 514.05, "financial_exposure_usd": 1087.14, "recoverable_pct": 0.949 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109127", "label": "benign", "label_confidence": 0.534, "severity": "high", "timestamp": "2026-01-07T08:07:00Z", "trace_id": "f2bf0fc9-d273-a104-1617-090dfca99391" }
{ "account_age_days": 663, "account_id": "ACCT-A559AB89809D", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.654 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 655, "timestamp": "2026-01-07T08:07:00Z", "transaction_amount_usd": 3360.32 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.775, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3572.12, "financial_exposure_usd": 3644.46, "recoverable_pct": 0.464 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100590", "label": "fraudulent", "label_confidence": 0.92, "severity": "medium", "timestamp": "2026-01-01T09:50:00Z", "trace_id": "f08cce25-bb96-6c6e-7202-d068469eb6ca" }
{ "account_age_days": 608, "account_id": "ACCT-DF93998B6912", "baseline_risk_score": 0.422, "kyc_tier": "tier_1", "session_entropy": 0.777 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 1071, "timestamp": "2026-01-01T09:50:00Z", "transaction_amount_usd": 100379.53 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.444, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 934605.92, "financial_exposure_usd": 1150238.23, "recoverable_pct": 0.179 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103241", "label": "fraudulent", "label_confidence": 0.782, "severity": "high", "timestamp": "2026-01-03T06:01:00Z", "trace_id": "d2539311-9622-06ab-24ab-99a2e6b3057f" }
{ "account_age_days": 1699, "account_id": "ACCT-45977E712D4C", "baseline_risk_score": 0.282, "kyc_tier": "tier_3", "session_entropy": 0.63 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 303, "timestamp": "2026-01-02T20:06:00Z", "transaction_amount_usd": 21.29 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.481, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 407840.96, "financial_exposure_usd": 653885.8, "recoverable_pct": 0.829 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102326", "label": "fraudulent", "label_confidence": 0.912, "severity": "low", "timestamp": "2026-01-02T14:46:00Z", "trace_id": "971ce449-b8b4-8afa-991d-3c9a9c4457c3" }
{ "account_age_days": 1391, "account_id": "ACCT-D1A694F986B2", "baseline_risk_score": 0.585, "kyc_tier": "tier_1", "session_entropy": 0.939 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 442, "timestamp": "2026-01-02T14:46:00Z", "transaction_amount_usd": 62217.15 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.691, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 228654.21, "financial_exposure_usd": 509708.03, "recoverable_pct": 0.576 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }