schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108715", "label": "benign", "label_confidence": 0.454, "severity": "low", "timestamp": "2026-01-07T01:15:00Z", "trace_id": "abac1ad9-510f-7713-42db-4e4d2ee559eb" }
{ "account_age_days": 1176, "account_id": "ACCT-A65607D60D7C", "baseline_risk_score": 0.083, "kyc_tier": "tier_2", "session_entropy": 0.896 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 698, "timestamp": "2026-01-07T01:15:00Z", "transaction_amount_usd": 7042.78 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.459, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2796.72, "financial_exposure_usd": 3009.02, "recoverable_pct": 0.949 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101131", "label": "fraudulent", "label_confidence": 0.762, "severity": "critical", "timestamp": "2026-01-01T18:51:00Z", "trace_id": "c0b041cd-6db0-1f7a-9bc1-ff7bcab0f0e5" }
{ "account_age_days": 486, "account_id": "ACCT-19A2CABE8AB6", "baseline_risk_score": 0.619, "kyc_tier": "tier_2", "session_entropy": 0.911 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 93, "timestamp": "2026-01-01T18:51:00Z", "transaction_amount_usd": 37645.95 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.655, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 502000.34, "financial_exposure_usd": 749240.72, "recoverable_pct": 0.292 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106674", "label": "benign", "label_confidence": 0.71, "severity": "medium", "timestamp": "2026-01-05T15:14:00Z", "trace_id": "db69dff9-5a6a-94d6-94f7-6fe583b0bcd2" }
{ "account_age_days": 1293, "account_id": "ACCT-902069732151", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.144 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 397, "timestamp": "2026-01-05T05:58:00Z", "transaction_amount_usd": 6.48 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.459, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1637.83, "financial_exposure_usd": 1990.67, "recoverable_pct": 0.897 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102792", "label": "fraudulent", "label_confidence": 0.899, "severity": "medium", "timestamp": "2026-01-02T22:32:00Z", "trace_id": "ba941c6e-5c4a-08db-6789-54b4a3d6407f" }
{ "account_age_days": 1764, "account_id": "ACCT-E8D4561AC2C7", "baseline_risk_score": 0.331, "kyc_tier": "tier_1", "session_entropy": 0.425 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 591, "timestamp": "2026-01-02T22:32:00Z", "transaction_amount_usd": 99366.07 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.738, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 215965.93, "financial_exposure_usd": 361069.11, "recoverable_pct": 0.131 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103597", "label": "fraudulent", "label_confidence": 0.762, "severity": "medium", "timestamp": "2026-01-03T11:57:00Z", "trace_id": "d485a9cf-9c9e-4c1e-1fda-f4a60eeef1a6" }
{ "account_age_days": 1095, "account_id": "ACCT-C4A43C3B4B80", "baseline_risk_score": 0.267, "kyc_tier": "tier_3", "session_entropy": 0.425 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 944, "timestamp": "2026-01-03T11:57:00Z", "transaction_amount_usd": 2657623.48 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.733, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2893049.41, "financial_exposure_usd": 3179029.64, "recoverable_pct": 0.978 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100249", "label": "fraudulent", "label_confidence": 0.94, "severity": "medium", "timestamp": "2026-01-01T04:09:00Z", "trace_id": "1307afb6-728e-a994-37df-79d830bd373a" }
{ "account_age_days": 1739, "account_id": "ACCT-3E372C8D8A13", "baseline_risk_score": 0.42, "kyc_tier": "tier_3", "session_entropy": 0.845 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 741, "timestamp": "2026-01-01T04:09:00Z", "transaction_amount_usd": 37198.24 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.676, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 338659.62, "financial_exposure_usd": 525008.82, "recoverable_pct": 0.288 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107169", "label": "benign", "label_confidence": 0.471, "severity": "medium", "timestamp": "2026-01-05T23:29:00Z", "trace_id": "a8a03545-efcf-9f6b-0b94-253b6a3b3e93" }
{ "account_age_days": 1815, "account_id": "ACCT-562A451640B6", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.173 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 135, "timestamp": "2026-01-05T12:53:00Z", "transaction_amount_usd": 22.06 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.659, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1588.56, "financial_exposure_usd": 2415.9, "recoverable_pct": 0.808 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105342", "label": "fraudulent", "label_confidence": 0.87, "severity": "high", "timestamp": "2026-01-04T17:02:00Z", "trace_id": "72665983-5ef2-0fd4-7f8b-14197b35e7a8" }
{ "account_age_days": 661, "account_id": "ACCT-D1F4BAD0B8F1", "baseline_risk_score": 0.356, "kyc_tier": "tier_2", "session_entropy": 0.52 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 486, "timestamp": "2026-01-04T17:02:00Z", "transaction_amount_usd": 2868085.27 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.473, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2385036.98, "financial_exposure_usd": 4593790.47, "recoverable_pct": 0.852 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106567", "label": "fraudulent", "label_confidence": 0.703, "severity": "high", "timestamp": "2026-01-05T13:27:00Z", "trace_id": "db7ff817-0946-5928-42fa-b3bbbe37ea27" }
{ "account_age_days": 1446, "account_id": "ACCT-ED4B61D296B9", "baseline_risk_score": 0.099, "kyc_tier": "tier_3", "session_entropy": 0.901 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 341, "timestamp": "2026-01-05T07:28:00Z", "transaction_amount_usd": 19.07 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.519, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2266817.64, "financial_exposure_usd": 5137780.41, "recoverable_pct": 0.742 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100515", "label": "fraudulent", "label_confidence": 0.845, "severity": "medium", "timestamp": "2026-01-01T08:35:00Z", "trace_id": "a7811cde-d6ae-03b4-e672-3a7f75896aab" }
{ "account_age_days": 456, "account_id": "ACCT-DB1BDA7465EC", "baseline_risk_score": 0.285, "kyc_tier": "tier_1", "session_entropy": 0.137 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 351, "timestamp": "2026-01-01T08:35:00Z", "transaction_amount_usd": 92111.36 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.402, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 666911.52, "financial_exposure_usd": 679957.82, "recoverable_pct": 0.289 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108597", "label": "benign", "label_confidence": 0.483, "severity": "medium", "timestamp": "2026-01-06T23:17:00Z", "trace_id": "d07c562d-bfe6-ccdb-21de-903720d7d794" }
{ "account_age_days": 906, "account_id": "ACCT-6628703C507F", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.941 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 681, "timestamp": "2026-01-06T23:17:00Z", "transaction_amount_usd": 2426.15 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.45, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 4783.98, "financial_exposure_usd": 6084.14, "recoverable_pct": 0.894 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104913", "label": "fraudulent", "label_confidence": 0.807, "severity": "high", "timestamp": "2026-01-04T09:53:00Z", "trace_id": "33a66b28-6063-1427-a1e9-b35cae522a25" }
{ "account_age_days": 1159, "account_id": "ACCT-34288A3DC5AA", "baseline_risk_score": 0.075, "kyc_tier": "tier_3", "session_entropy": 0.664 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 271, "timestamp": "2026-01-04T09:53:00Z", "transaction_amount_usd": 577938.15 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.51, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1850339, "financial_exposure_usd": 3703712.35, "recoverable_pct": 0.554 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100540", "label": "fraudulent", "label_confidence": 0.828, "severity": "medium", "timestamp": "2026-01-01T09:00:00Z", "trace_id": "c0d0093d-f19a-bca9-2818-62b3df14caf2" }
{ "account_age_days": 201, "account_id": "ACCT-56BA41549673", "baseline_risk_score": 0.523, "kyc_tier": "tier_2", "session_entropy": 0.589 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 742, "timestamp": "2026-01-01T09:00:00Z", "transaction_amount_usd": 101509.74 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.376, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 658265.64, "financial_exposure_usd": 1301987.27, "recoverable_pct": 0.211 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104111", "label": "fraudulent", "label_confidence": 0.786, "severity": "low", "timestamp": "2026-01-03T20:31:00Z", "trace_id": "54412efb-989a-eb0b-e297-f529a375e3d2" }
{ "account_age_days": 1777, "account_id": "ACCT-0EE7C3BDAC7F", "baseline_risk_score": 0.083, "kyc_tier": "tier_1", "session_entropy": 0.628 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 340, "timestamp": "2026-01-03T20:31:00Z", "transaction_amount_usd": 952470.92 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.626, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3362150.6, "financial_exposure_usd": 4252209.39, "recoverable_pct": 0.426 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100529", "label": "fraudulent", "label_confidence": 0.973, "severity": "critical", "timestamp": "2026-01-01T08:49:00Z", "trace_id": "809894c9-d7e1-128a-7ca3-25a0b3ba5df7" }
{ "account_age_days": 484, "account_id": "ACCT-D49D3C77AC5F", "baseline_risk_score": 0.384, "kyc_tier": "tier_3", "session_entropy": 0.122 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 433, "timestamp": "2026-01-01T08:49:00Z", "transaction_amount_usd": 114955.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.656, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 346030.47, "financial_exposure_usd": 633671.26, "recoverable_pct": 0.355 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100322", "label": "fraudulent", "label_confidence": 0.866, "severity": "critical", "timestamp": "2026-01-01T05:22:00Z", "trace_id": "a8f0d513-6650-bc24-f84b-241f0466b04d" }
{ "account_age_days": 1434, "account_id": "ACCT-33DFEFF60EF6", "baseline_risk_score": 0.507, "kyc_tier": "tier_1", "session_entropy": 0.239 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 393, "timestamp": "2025-12-31T17:06:00Z", "transaction_amount_usd": 19.16 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.707, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 238689.23, "financial_exposure_usd": 532658.69, "recoverable_pct": 0.686 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101192", "label": "fraudulent", "label_confidence": 0.82, "severity": "medium", "timestamp": "2026-01-01T19:52:00Z", "trace_id": "3c1db4bc-c009-62b6-1f7d-a28ae35a41fd" }
{ "account_age_days": 658, "account_id": "ACCT-073C1185BC51", "baseline_risk_score": 0.394, "kyc_tier": "tier_2", "session_entropy": 0.385 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 652, "timestamp": "2026-01-01T19:52:00Z", "transaction_amount_usd": 82371.46 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.492, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 615635.99, "financial_exposure_usd": 1361835.97, "recoverable_pct": 0.155 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101118", "label": "fraudulent", "label_confidence": 0.834, "severity": "medium", "timestamp": "2026-01-01T18:38:00Z", "trace_id": "80ec4df6-c8db-b191-d24b-ccb38ea6a65a" }
{ "account_age_days": 1627, "account_id": "ACCT-AE520D8BAFB1", "baseline_risk_score": 0.593, "kyc_tier": "tier_1", "session_entropy": 0.315 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 786, "timestamp": "2026-01-01T18:38:00Z", "transaction_amount_usd": 57169.22 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.601, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 625769.38, "financial_exposure_usd": 862106.54, "recoverable_pct": 0.307 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109823", "label": "benign", "label_confidence": 0.634, "severity": "high", "timestamp": "2026-01-07T19:43:00Z", "trace_id": "f0c55b3d-7c6e-ebdf-b4a4-6bd0417f6e33" }
{ "account_age_days": 567, "account_id": "ACCT-D19B02AD4DFC", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.351 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 460, "timestamp": "2026-01-07T19:43:00Z", "transaction_amount_usd": 9531.43 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.515, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 889.21, "financial_exposure_usd": 1317.9, "recoverable_pct": 0.866 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101615", "label": "fraudulent", "label_confidence": 0.847, "severity": "high", "timestamp": "2026-01-02T02:55:00Z", "trace_id": "6d701cb4-2845-4a4d-b1e0-ee1d63922685" }
{ "account_age_days": 1345, "account_id": "ACCT-D173CF765538", "baseline_risk_score": 0.254, "kyc_tier": "tier_2", "session_entropy": 0.586 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 98, "timestamp": "2026-01-02T02:55:00Z", "transaction_amount_usd": 3138.86 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.437, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 1138805.79, "financial_exposure_usd": 1185205.71, "recoverable_pct": 0.649 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101924", "label": "fraudulent", "label_confidence": 0.81, "severity": "low", "timestamp": "2026-01-02T08:04:00Z", "trace_id": "6b2f1590-24a3-9101-8a5f-2ee8a8653e07" }
{ "account_age_days": 1553, "account_id": "ACCT-5DCF11141DEB", "baseline_risk_score": 0.277, "kyc_tier": "tier_1", "session_entropy": 0.276 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 338, "timestamp": "2026-01-02T08:04:00Z", "transaction_amount_usd": 93114.33 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.517, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 374906.47, "financial_exposure_usd": 565454.31, "recoverable_pct": 0.638 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102707", "label": "fraudulent", "label_confidence": 0.763, "severity": "low", "timestamp": "2026-01-02T21:07:00Z", "trace_id": "3c60929f-7245-ec6f-10af-47df70de3983" }
{ "account_age_days": 1724, "account_id": "ACCT-8120B5871142", "baseline_risk_score": 0.447, "kyc_tier": "tier_2", "session_entropy": 0.494 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 817, "timestamp": "2026-01-02T21:07:00Z", "transaction_amount_usd": 117458.12 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.466, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 714735.87, "financial_exposure_usd": 941052.95, "recoverable_pct": 0.841 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107081", "label": "benign", "label_confidence": 0.712, "severity": "high", "timestamp": "2026-01-05T22:01:00Z", "trace_id": "ac13f4c7-3fef-7a7f-c9e0-1d3cae3198d3" }
{ "account_age_days": 34, "account_id": "ACCT-0FF76F58E508", "baseline_risk_score": 0.093, "kyc_tier": "tier_3", "session_entropy": 0.631 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 163, "timestamp": "2026-01-05T10:00:00Z", "transaction_amount_usd": 4.23 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.785, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1359.03, "financial_exposure_usd": 3242.95, "recoverable_pct": 0.484 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109866", "label": "benign", "label_confidence": 0.523, "severity": "high", "timestamp": "2026-01-07T20:26:00Z", "trace_id": "a704acd4-9b8c-2684-4db7-62b962a2ca36" }
{ "account_age_days": 1208, "account_id": "ACCT-275C8712DF75", "baseline_risk_score": 0.114, "kyc_tier": "tier_2", "session_entropy": 0.769 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1043, "timestamp": "2026-01-07T20:26:00Z", "transaction_amount_usd": 2538.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.774, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 428.75, "financial_exposure_usd": 462.98, "recoverable_pct": 0.983 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105154", "label": "fraudulent", "label_confidence": 0.62, "severity": "medium", "timestamp": "2026-01-04T13:54:00Z", "trace_id": "bc4b513e-3ea1-362c-8431-194317084995" }
{ "account_age_days": 1497, "account_id": "ACCT-90060B80EA1F", "baseline_risk_score": 0.396, "kyc_tier": "tier_1", "session_entropy": 0.729 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 464, "timestamp": "2026-01-04T13:54:00Z", "transaction_amount_usd": 558696.12 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.865, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1798171.05, "financial_exposure_usd": 3058868.94, "recoverable_pct": 0.738 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106102", "label": "fraudulent", "label_confidence": 0.887, "severity": "critical", "timestamp": "2026-01-05T05:42:00Z", "trace_id": "255a2cd3-3359-c001-3516-690d81f345e1" }
{ "account_age_days": 1478, "account_id": "ACCT-0CB757B7F3A7", "baseline_risk_score": 0.189, "kyc_tier": "tier_1", "session_entropy": 0.15 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 1111, "timestamp": "2026-01-05T05:42:00Z", "transaction_amount_usd": 137388.62 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.835, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3796514.62, "financial_exposure_usd": 5911330.89, "recoverable_pct": 0.431 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109719", "label": "benign", "label_confidence": 0.637, "severity": "medium", "timestamp": "2026-01-07T17:59:00Z", "trace_id": "cf9dd40f-de7e-52c8-e878-a20d74c56622" }
{ "account_age_days": 1042, "account_id": "ACCT-183F5AB739C7", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.51 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 856, "timestamp": "2026-01-07T17:59:00Z", "transaction_amount_usd": 2913.15 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.662, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2212.93, "financial_exposure_usd": 4109.17, "recoverable_pct": 0.471 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105605", "label": "fraudulent", "label_confidence": 0.764, "severity": "critical", "timestamp": "2026-01-04T21:25:00Z", "trace_id": "47083d39-102c-56a1-919b-93014c919d13" }
{ "account_age_days": 271, "account_id": "ACCT-5478BC3D1275", "baseline_risk_score": 0.255, "kyc_tier": "tier_2", "session_entropy": 0.604 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 254, "timestamp": "2026-01-04T12:15:00Z", "transaction_amount_usd": 2.19 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.467, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2602720.05, "financial_exposure_usd": 6377557.63, "recoverable_pct": 0.451 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103875", "label": "fraudulent", "label_confidence": 0.778, "severity": "low", "timestamp": "2026-01-03T16:35:00Z", "trace_id": "a6e5449b-fcb3-5ce0-fa2f-3f71a4df2058" }
{ "account_age_days": 712, "account_id": "ACCT-7635849D7465", "baseline_risk_score": 0.36, "kyc_tier": "tier_2", "session_entropy": 0.403 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 779, "timestamp": "2026-01-03T16:35:00Z", "transaction_amount_usd": 2031636.93 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.843, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3567447.76, "financial_exposure_usd": 5330900.99, "recoverable_pct": 0.584 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106720", "label": "benign", "label_confidence": 0.652, "severity": "high", "timestamp": "2026-01-05T16:00:00Z", "trace_id": "031ee2af-9d71-0a70-e5c6-b455d40f5e7c" }
{ "account_age_days": 1484, "account_id": "ACCT-8478D53D4DEF", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.182 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 127, "timestamp": "2026-01-05T12:44:00Z", "transaction_amount_usd": 10.81 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.46, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3665.24, "financial_exposure_usd": 3727.51, "recoverable_pct": 0.889 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105167", "label": "fraudulent", "label_confidence": 0.632, "severity": "critical", "timestamp": "2026-01-04T14:07:00Z", "trace_id": "f5e7c171-36e1-eda3-2c57-207d067c4693" }
{ "account_age_days": 679, "account_id": "ACCT-13A8964708C0", "baseline_risk_score": 0.288, "kyc_tier": "tier_3", "session_entropy": 0.832 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 589, "timestamp": "2026-01-04T14:07:00Z", "transaction_amount_usd": 517387.42 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.535, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1762944.46, "financial_exposure_usd": 2058423.89, "recoverable_pct": 0.731 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100371", "label": "fraudulent", "label_confidence": 0.764, "severity": "medium", "timestamp": "2026-01-01T06:11:00Z", "trace_id": "fe752dea-12eb-fd94-09a6-86a9376d353d" }
{ "account_age_days": 1812, "account_id": "ACCT-1950555F7B05", "baseline_risk_score": 0.467, "kyc_tier": "tier_1", "session_entropy": 0.827 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 250, "timestamp": "2026-01-01T06:11:00Z", "transaction_amount_usd": 11391.34 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.42, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 909562.75, "financial_exposure_usd": 1045937.84, "recoverable_pct": 0.083 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107108", "label": "benign", "label_confidence": 0.618, "severity": "medium", "timestamp": "2026-01-05T22:28:00Z", "trace_id": "a83c716d-14f4-8a2a-d574-233626ef0aeb" }
{ "account_age_days": 1210, "account_id": "ACCT-0BAAE2559AD4", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.477 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 835, "timestamp": "2026-01-05T22:28:00Z", "transaction_amount_usd": 13334.72 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.722, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 616.03, "financial_exposure_usd": 977.28, "recoverable_pct": 0.502 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100794", "label": "fraudulent", "label_confidence": 0.835, "severity": "medium", "timestamp": "2026-01-01T13:14:00Z", "trace_id": "92abccc7-79ee-9683-cdee-e1e2d379fa2d" }
{ "account_age_days": 1631, "account_id": "ACCT-88B4F4C67DA3", "baseline_risk_score": 0.649, "kyc_tier": "tier_1", "session_entropy": 0.883 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 391, "timestamp": "2026-01-01T13:14:00Z", "transaction_amount_usd": 111246.21 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.535, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1036197.54, "financial_exposure_usd": 1177333.84, "recoverable_pct": 0.627 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107105", "label": "benign", "label_confidence": 0.469, "severity": "low", "timestamp": "2026-01-05T22:25:00Z", "trace_id": "1731dd4a-35e9-4c7f-4b42-f99837a422fc" }
{ "account_age_days": 1657, "account_id": "ACCT-855C21B38D82", "baseline_risk_score": 0.055, "kyc_tier": "tier_2", "session_entropy": 0.325 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 1123, "timestamp": "2026-01-05T22:25:00Z", "transaction_amount_usd": 6899.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.66, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 3985.56, "financial_exposure_usd": 4547.93, "recoverable_pct": 0.889 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100048", "label": "fraudulent", "label_confidence": 0.864, "severity": "high", "timestamp": "2026-01-01T00:48:00Z", "trace_id": "2167c35e-ce73-34f2-3393-2b6c9d37efb6" }
{ "account_age_days": 657, "account_id": "ACCT-3CED4D1F13EB", "baseline_risk_score": 0.292, "kyc_tier": "tier_1", "session_entropy": 0.395 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 382, "timestamp": "2026-01-01T00:48:00Z", "transaction_amount_usd": 110294.3 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.843, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 821266.6, "financial_exposure_usd": 1229481.59, "recoverable_pct": 0.225 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105988", "label": "fraudulent", "label_confidence": 0.784, "severity": "medium", "timestamp": "2026-01-05T03:48:00Z", "trace_id": "5aff5b51-e9d5-4b0b-6677-5624ee3cf2bb" }
{ "account_age_days": 1828, "account_id": "ACCT-19E5E84DB525", "baseline_risk_score": 0.433, "kyc_tier": "tier_1", "session_entropy": 0.243 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 761, "timestamp": "2026-01-05T03:48:00Z", "transaction_amount_usd": 142421.28 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.667, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 57300.74, "financial_exposure_usd": 117569.47, "recoverable_pct": 0.872 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100348", "label": "fraudulent", "label_confidence": 0.8, "severity": "high", "timestamp": "2026-01-01T05:48:00Z", "trace_id": "e538ef54-a3fc-8e0d-eb25-09272338e0b5" }
{ "account_age_days": 1652, "account_id": "ACCT-FD0A2EB01E46", "baseline_risk_score": 0.254, "kyc_tier": "tier_3", "session_entropy": 0.24 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 373, "timestamp": "2026-01-01T01:35:00Z", "transaction_amount_usd": 1.84 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.733, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 327268.97, "financial_exposure_usd": 528789.76, "recoverable_pct": 0.02 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106155", "label": "fraudulent", "label_confidence": 0.736, "severity": "high", "timestamp": "2026-01-05T06:35:00Z", "trace_id": "106a0a9c-717e-8e15-58e2-2b57474139c9" }
{ "account_age_days": 1421, "account_id": "ACCT-07AF7B17ADA1", "baseline_risk_score": 0.306, "kyc_tier": "tier_3", "session_entropy": 0.124 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 373, "timestamp": "2026-01-05T06:35:00Z", "transaction_amount_usd": 2026127.18 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.493, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3753901.42, "financial_exposure_usd": 4228262.95, "recoverable_pct": 0.928 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103082", "label": "fraudulent", "label_confidence": 0.908, "severity": "critical", "timestamp": "2026-01-03T03:22:00Z", "trace_id": "79a192be-aaa5-6e7f-cd1f-e9c1904b1cdf" }
{ "account_age_days": 1180, "account_id": "ACCT-21B673374A61", "baseline_risk_score": 0.355, "kyc_tier": "tier_3", "session_entropy": 0.514 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 424, "timestamp": "2026-01-03T03:22:00Z", "transaction_amount_usd": 51915.45 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.688, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 255176.47, "financial_exposure_usd": 588696.94, "recoverable_pct": 0.796 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100443", "label": "fraudulent", "label_confidence": 0.788, "severity": "high", "timestamp": "2026-01-01T07:23:00Z", "trace_id": "90471f74-aa72-6452-0956-9f9bb84cc165" }
{ "account_age_days": 590, "account_id": "ACCT-3975DDC52130", "baseline_risk_score": 0.272, "kyc_tier": "tier_1", "session_entropy": 0.862 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1018, "timestamp": "2026-01-01T07:23:00Z", "transaction_amount_usd": 101230.26 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.579, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 656428.01, "financial_exposure_usd": 978334.58, "recoverable_pct": 0.721 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103272", "label": "fraudulent", "label_confidence": 0.909, "severity": "low", "timestamp": "2026-01-03T06:32:00Z", "trace_id": "f0c9abbe-710c-8768-3d51-802f68074c01" }
{ "account_age_days": 309, "account_id": "ACCT-7D5B9C69A83D", "baseline_risk_score": 0.255, "kyc_tier": "tier_2", "session_entropy": 0.44 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 377, "timestamp": "2026-01-02T20:09:00Z", "transaction_amount_usd": 5.51 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.371, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 772751.87, "financial_exposure_usd": 1545388.32, "recoverable_pct": 0.303 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109402", "label": "benign", "label_confidence": 0.521, "severity": "medium", "timestamp": "2026-01-07T12:42:00Z", "trace_id": "80770d34-ff1d-a984-3c47-4f316fc08a99" }
{ "account_age_days": 911, "account_id": "ACCT-F244ECD41F6C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.284 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 229, "timestamp": "2026-01-07T11:06:00Z", "transaction_amount_usd": 1.84 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.751, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1325.26, "financial_exposure_usd": 1527.47, "recoverable_pct": 0.907 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100178", "label": "fraudulent", "label_confidence": 0.941, "severity": "high", "timestamp": "2026-01-01T02:58:00Z", "trace_id": "d67df90d-d795-70be-bf30-25c3a2a30071" }
{ "account_age_days": 1104, "account_id": "ACCT-95D12C70D5B0", "baseline_risk_score": 0.502, "kyc_tier": "tier_3", "session_entropy": 0.428 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 256, "timestamp": "2026-01-01T02:58:00Z", "transaction_amount_usd": 67486.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.946, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 299464.37, "financial_exposure_usd": 492416.24, "recoverable_pct": 0.689 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102757", "label": "fraudulent", "label_confidence": 0.888, "severity": "critical", "timestamp": "2026-01-02T21:57:00Z", "trace_id": "7c7b1f54-a522-ba1f-d8b3-514a7640867b" }
{ "account_age_days": 1616, "account_id": "ACCT-DAD22E5B95A0", "baseline_risk_score": 0.406, "kyc_tier": "tier_1", "session_entropy": 0.825 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 942, "timestamp": "2026-01-02T21:57:00Z", "transaction_amount_usd": 61238.91 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.749, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 790918.17, "financial_exposure_usd": 1007305.92, "recoverable_pct": 0.823 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103505", "label": "fraudulent", "label_confidence": 0.849, "severity": "medium", "timestamp": "2026-01-03T10:25:00Z", "trace_id": "73d77fb9-fc7b-ab87-7a35-6e36444e04c1" }
{ "account_age_days": 1476, "account_id": "ACCT-84E76CDE2AE1", "baseline_risk_score": 0.052, "kyc_tier": "tier_3", "session_entropy": 0.673 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 800, "timestamp": "2026-01-03T10:25:00Z", "transaction_amount_usd": 1770347.16 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.665, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2160603.12, "financial_exposure_usd": 2557926.36, "recoverable_pct": 0.626 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106153", "label": "fraudulent", "label_confidence": 0.938, "severity": "high", "timestamp": "2026-01-05T06:33:00Z", "trace_id": "9e93da00-05e6-14d2-69da-965e10df3cb3" }
{ "account_age_days": 899, "account_id": "ACCT-D8E5244947E5", "baseline_risk_score": 0.412, "kyc_tier": "tier_1", "session_entropy": 0.567 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 659, "timestamp": "2026-01-05T06:33:00Z", "transaction_amount_usd": 1348033.37 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.838, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1717426.24, "financial_exposure_usd": 2411988.27, "recoverable_pct": 0.495 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106862", "label": "benign", "label_confidence": 0.509, "severity": "medium", "timestamp": "2026-01-05T18:22:00Z", "trace_id": "e6bbbaf6-7a3e-6c4b-93d6-4c4c50f312f8" }
{ "account_age_days": 778, "account_id": "ACCT-5CF5C341B748", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.212 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 840, "timestamp": "2026-01-05T18:22:00Z", "transaction_amount_usd": 1195.95 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.561, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1403.57, "financial_exposure_usd": 3479.27, "recoverable_pct": 0.449 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108463", "label": "benign", "label_confidence": 0.672, "severity": "medium", "timestamp": "2026-01-06T21:03:00Z", "trace_id": "f9537673-a456-0c81-aa7e-1ca4559272ff" }
{ "account_age_days": 305, "account_id": "ACCT-8F9870222B1F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.273 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 733, "timestamp": "2026-01-06T21:03:00Z", "transaction_amount_usd": 12424.7 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.754, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1884.49, "financial_exposure_usd": 3398.06, "recoverable_pct": 0.541 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100546", "label": "fraudulent", "label_confidence": 0.857, "severity": "high", "timestamp": "2026-01-01T09:06:00Z", "trace_id": "911152f4-fff4-8179-309e-7f64b2409091" }
{ "account_age_days": 795, "account_id": "ACCT-53B7A1D5240F", "baseline_risk_score": 0.35, "kyc_tier": "tier_1", "session_entropy": 0.903 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 214, "timestamp": "2026-01-01T03:57:00Z", "transaction_amount_usd": 2.8 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.71, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 866507.19, "financial_exposure_usd": 1001802.54, "recoverable_pct": 0.779 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100624", "label": "fraudulent", "label_confidence": 0.866, "severity": "critical", "timestamp": "2026-01-01T10:24:00Z", "trace_id": "b3bf145d-4478-9102-3cf5-4bcd3d8dccb5" }
{ "account_age_days": 1243, "account_id": "ACCT-BDB2DC52349A", "baseline_risk_score": 0.406, "kyc_tier": "tier_3", "session_entropy": 0.847 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 964, "timestamp": "2026-01-01T10:24:00Z", "transaction_amount_usd": 78699.81 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.523, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 1065613.48, "financial_exposure_usd": 1105471.45, "recoverable_pct": 0.081 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109372", "label": "benign", "label_confidence": 0.536, "severity": "medium", "timestamp": "2026-01-07T12:12:00Z", "trace_id": "641aeee2-840d-0d1d-0862-42b5f7ae7f26" }
{ "account_age_days": 1317, "account_id": "ACCT-3C63548BFC48", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.897 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 101, "timestamp": "2026-01-07T09:07:00Z", "transaction_amount_usd": 24.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.717, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1423.75, "financial_exposure_usd": 2547.14, "recoverable_pct": 0.981 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108593", "label": "benign", "label_confidence": 0.555, "severity": "low", "timestamp": "2026-01-06T23:13:00Z", "trace_id": "726354b6-e9d9-667a-1811-c735865d1814" }
{ "account_age_days": 1805, "account_id": "ACCT-58B27F72542C", "baseline_risk_score": 0.119, "kyc_tier": "tier_3", "session_entropy": 0.166 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 942, "timestamp": "2026-01-06T23:13:00Z", "transaction_amount_usd": 2339.44 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.47, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 1512.54, "financial_exposure_usd": 3669.99, "recoverable_pct": 0.999 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102165", "label": "fraudulent", "label_confidence": 0.851, "severity": "critical", "timestamp": "2026-01-02T12:05:00Z", "trace_id": "3e4bbc48-61c4-e193-a342-ce849701504f" }
{ "account_age_days": 489, "account_id": "ACCT-830813DED8C0", "baseline_risk_score": 0.625, "kyc_tier": "tier_1", "session_entropy": 0.193 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 154, "timestamp": "2026-01-02T06:52:00Z", "transaction_amount_usd": 18.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.947, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 453547.37, "financial_exposure_usd": 1109597.01, "recoverable_pct": 0.502 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101415", "label": "fraudulent", "label_confidence": 0.834, "severity": "medium", "timestamp": "2026-01-01T23:35:00Z", "trace_id": "0dcc191d-3c82-a108-d851-b7d43bfb72fe" }
{ "account_age_days": 207, "account_id": "ACCT-5D44162085BD", "baseline_risk_score": 0.559, "kyc_tier": "tier_1", "session_entropy": 0.51 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 553, "timestamp": "2026-01-01T23:35:00Z", "transaction_amount_usd": 48846.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.738, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 545409.4, "financial_exposure_usd": 681653.74, "recoverable_pct": 0.749 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108879", "label": "benign", "label_confidence": 0.55, "severity": "medium", "timestamp": "2026-01-07T03:59:00Z", "trace_id": "8bea81bd-32dd-f343-75ed-c4b7232f38ab" }
{ "account_age_days": 552, "account_id": "ACCT-987B410AF7BC", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.889 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 553, "timestamp": "2026-01-07T03:59:00Z", "transaction_amount_usd": 4729.15 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.731, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3254.77, "financial_exposure_usd": 3982.51, "recoverable_pct": 0.63 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103968", "label": "fraudulent", "label_confidence": 0.828, "severity": "high", "timestamp": "2026-01-03T18:08:00Z", "trace_id": "67ce6027-0c1d-fa0b-0b62-42db61d25de2" }
{ "account_age_days": 520, "account_id": "ACCT-AE037069B8D2", "baseline_risk_score": 0.064, "kyc_tier": "tier_3", "session_entropy": 0.912 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 768, "timestamp": "2026-01-03T18:08:00Z", "transaction_amount_usd": 485241.74 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.905, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1846036.28, "financial_exposure_usd": 3681294.92, "recoverable_pct": 0.645 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105272", "label": "fraudulent", "label_confidence": 0.828, "severity": "low", "timestamp": "2026-01-04T15:52:00Z", "trace_id": "6ebb7c13-318f-39aa-0d8c-48504a165690" }
{ "account_age_days": 1350, "account_id": "ACCT-E9BA9778ADFF", "baseline_risk_score": 0.12, "kyc_tier": "tier_2", "session_entropy": 0.708 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 681, "timestamp": "2026-01-04T15:52:00Z", "transaction_amount_usd": 1012797.53 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.384, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 739397.71, "financial_exposure_usd": 1224564.07, "recoverable_pct": 0.672 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104906", "label": "fraudulent", "label_confidence": 0.858, "severity": "medium", "timestamp": "2026-01-04T09:46:00Z", "trace_id": "4f2cc9e6-bd98-eb9c-68d6-7924f9513164" }
{ "account_age_days": 1883, "account_id": "ACCT-1DACEBF20D82", "baseline_risk_score": 0.417, "kyc_tier": "tier_3", "session_entropy": 0.632 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 743, "timestamp": "2026-01-04T09:46:00Z", "transaction_amount_usd": 755557.78 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.926, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2576880.61, "financial_exposure_usd": 3540304.08, "recoverable_pct": 0.508 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104946", "label": "fraudulent", "label_confidence": 0.773, "severity": "medium", "timestamp": "2026-01-04T10:26:00Z", "trace_id": "e0b5d4a4-cea9-322c-328c-1fc94c397022" }
{ "account_age_days": 764, "account_id": "ACCT-056574F6091F", "baseline_risk_score": 0.073, "kyc_tier": "tier_1", "session_entropy": 0.521 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 747, "timestamp": "2026-01-04T10:26:00Z", "transaction_amount_usd": 1506809.08 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.754, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5267581.49, "financial_exposure_usd": 8033570.23, "recoverable_pct": 0.734 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104403", "label": "fraudulent", "label_confidence": 0.82, "severity": "critical", "timestamp": "2026-01-04T01:23:00Z", "trace_id": "541c7968-6143-4e4b-205c-9e70705977e9" }
{ "account_age_days": 1155, "account_id": "ACCT-924FB756BEF2", "baseline_risk_score": 0.156, "kyc_tier": "tier_3", "session_entropy": 0.601 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 409, "timestamp": "2026-01-04T01:23:00Z", "transaction_amount_usd": 1583582.51 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.777, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2443268.93, "financial_exposure_usd": 3464960.38, "recoverable_pct": 0.458 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101848", "label": "fraudulent", "label_confidence": 0.948, "severity": "high", "timestamp": "2026-01-02T06:48:00Z", "trace_id": "5ac6761a-efad-d765-3b73-09b2879ccb01" }
{ "account_age_days": 1910, "account_id": "ACCT-4D6B869A93C9", "baseline_risk_score": 0.396, "kyc_tier": "tier_3", "session_entropy": 0.34 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 326, "timestamp": "2026-01-01T19:48:00Z", "transaction_amount_usd": 15 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.936, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 575122.38, "financial_exposure_usd": 873542.45, "recoverable_pct": 0.073 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107739", "label": "benign", "label_confidence": 0.618, "severity": "critical", "timestamp": "2026-01-06T08:59:00Z", "trace_id": "35389412-8f3f-477a-c5ed-49db03500b85" }
{ "account_age_days": 1446, "account_id": "ACCT-2FA6ECED83A6", "baseline_risk_score": 0.082, "kyc_tier": "tier_1", "session_entropy": 0.338 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 917, "timestamp": "2026-01-06T08:59:00Z", "transaction_amount_usd": 10597.2 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.787, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2254.28, "financial_exposure_usd": 3227.2, "recoverable_pct": 0.784 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101283", "label": "fraudulent", "label_confidence": 0.934, "severity": "medium", "timestamp": "2026-01-01T21:23:00Z", "trace_id": "8ae89090-1fcd-4686-ee8b-e4ab1c0c7311" }
{ "account_age_days": 399, "account_id": "ACCT-904E0A0D8489", "baseline_risk_score": 0.522, "kyc_tier": "tier_1", "session_entropy": 0.947 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 488, "timestamp": "2026-01-01T21:23:00Z", "transaction_amount_usd": 54604.14 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.916, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 395796.86, "financial_exposure_usd": 466461.56, "recoverable_pct": 0.528 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109234", "label": "benign", "label_confidence": 0.733, "severity": "medium", "timestamp": "2026-01-07T09:54:00Z", "trace_id": "d402fd64-a890-b5a6-d666-16d6de2de5b8" }
{ "account_age_days": 676, "account_id": "ACCT-514B749AB508", "baseline_risk_score": 0.176, "kyc_tier": "tier_2", "session_entropy": 0.365 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 562, "timestamp": "2026-01-07T09:54:00Z", "transaction_amount_usd": 2251.07 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.644, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 660.83, "financial_exposure_usd": 1110.49, "recoverable_pct": 0.643 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101519", "label": "fraudulent", "label_confidence": 0.88, "severity": "critical", "timestamp": "2026-01-02T01:19:00Z", "trace_id": "7d521537-e092-d8d0-c72d-f911a9b4e4b1" }
{ "account_age_days": 1166, "account_id": "ACCT-CEBD4A99D861", "baseline_risk_score": 0.461, "kyc_tier": "tier_1", "session_entropy": 0.264 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1119, "timestamp": "2026-01-02T01:19:00Z", "transaction_amount_usd": 33741.96 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.632, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 240982.84, "financial_exposure_usd": 334589.04, "recoverable_pct": 0.419 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106845", "label": "benign", "label_confidence": 0.512, "severity": "medium", "timestamp": "2026-01-05T18:05:00Z", "trace_id": "3eebf01c-5f30-3a6a-a786-13d1ced6c697" }
{ "account_age_days": 1728, "account_id": "ACCT-EDB27E7573D0", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.407 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 281, "timestamp": "2026-01-05T11:01:00Z", "transaction_amount_usd": 23.42 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.58, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2352.18, "financial_exposure_usd": 3504.26, "recoverable_pct": 0.85 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109829", "label": "benign", "label_confidence": 0.507, "severity": "medium", "timestamp": "2026-01-07T19:49:00Z", "trace_id": "9e4166d1-62e7-12ce-b62e-a7fea6253b1e" }
{ "account_age_days": 1606, "account_id": "ACCT-57551BC58704", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.482 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 129, "timestamp": "2026-01-07T19:49:00Z", "transaction_amount_usd": 6205.91 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.791, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 779.61, "financial_exposure_usd": 801.41, "recoverable_pct": 0.665 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102178", "label": "fraudulent", "label_confidence": 0.882, "severity": "medium", "timestamp": "2026-01-02T12:18:00Z", "trace_id": "3ac7916e-dd1b-7874-45a1-c080150c4f26" }
{ "account_age_days": 1960, "account_id": "ACCT-CD7AB574C05F", "baseline_risk_score": 0.555, "kyc_tier": "tier_1", "session_entropy": 0.508 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 327, "timestamp": "2026-01-02T12:18:00Z", "transaction_amount_usd": 58903.69 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.547, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 164228.38, "financial_exposure_usd": 317237.62, "recoverable_pct": 0.467 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105286", "label": "fraudulent", "label_confidence": 0.712, "severity": "high", "timestamp": "2026-01-04T16:06:00Z", "trace_id": "4c909005-f9e0-028e-4c93-3414aba90811" }
{ "account_age_days": 838, "account_id": "ACCT-C6EB753AAAFB", "baseline_risk_score": 0.331, "kyc_tier": "tier_2", "session_entropy": 0.404 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 330, "timestamp": "2026-01-04T09:28:00Z", "transaction_amount_usd": 14.34 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.369, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3454800.21, "financial_exposure_usd": 3862070.91, "recoverable_pct": 0.803 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102211", "label": "fraudulent", "label_confidence": 0.809, "severity": "high", "timestamp": "2026-01-02T12:51:00Z", "trace_id": "eb58fe03-60b0-5c58-3d31-23869ee526ba" }
{ "account_age_days": 1320, "account_id": "ACCT-4868FD75309E", "baseline_risk_score": 0.315, "kyc_tier": "tier_2", "session_entropy": 0.37 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 167, "timestamp": "2026-01-02T04:27:00Z", "transaction_amount_usd": 16.82 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.589, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 337354.73, "financial_exposure_usd": 811164.99, "recoverable_pct": 0.525 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103199", "label": "fraudulent", "label_confidence": 0.799, "severity": "medium", "timestamp": "2026-01-03T05:19:00Z", "trace_id": "fd6fbcf7-3cbb-7496-4dae-2842addf12e9" }
{ "account_age_days": 282, "account_id": "ACCT-889CB6FFDD9F", "baseline_risk_score": 0.578, "kyc_tier": "tier_3", "session_entropy": 0.541 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 267, "timestamp": "2026-01-03T05:19:00Z", "transaction_amount_usd": 34220.26 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.664, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 639714.03, "financial_exposure_usd": 996984.01, "recoverable_pct": 0.693 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107351", "label": "benign", "label_confidence": 0.515, "severity": "medium", "timestamp": "2026-01-06T02:31:00Z", "trace_id": "ccbce21c-c203-cec2-5203-bcfb0900f5df" }
{ "account_age_days": 375, "account_id": "ACCT-FB8FECF8C251", "baseline_risk_score": 0.114, "kyc_tier": "tier_1", "session_entropy": 0.208 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 276, "timestamp": "2026-01-06T02:31:00Z", "transaction_amount_usd": 4928.52 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.536, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2692.86, "financial_exposure_usd": 3215.72, "recoverable_pct": 0.881 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108626", "label": "benign", "label_confidence": 0.519, "severity": "low", "timestamp": "2026-01-06T23:46:00Z", "trace_id": "c327a117-b993-20ce-6e94-5f7175399544" }
{ "account_age_days": 1227, "account_id": "ACCT-3550499EA6C1", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.828 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 312, "timestamp": "2026-01-06T23:46:00Z", "transaction_amount_usd": 11165.84 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.496, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 134.86, "financial_exposure_usd": 248.42, "recoverable_pct": 0.91 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105586", "label": "fraudulent", "label_confidence": 0.676, "severity": "medium", "timestamp": "2026-01-04T21:06:00Z", "trace_id": "71dac812-29b0-113b-da83-6ce292d0c5df" }
{ "account_age_days": 540, "account_id": "ACCT-4C09968385C2", "baseline_risk_score": 0.097, "kyc_tier": "tier_2", "session_entropy": 0.116 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 379, "timestamp": "2026-01-04T21:06:00Z", "transaction_amount_usd": 1335340.76 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.613, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1020287.44, "financial_exposure_usd": 1707073.91, "recoverable_pct": 0.487 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108174", "label": "benign", "label_confidence": 0.638, "severity": "medium", "timestamp": "2026-01-06T16:14:00Z", "trace_id": "3c1a6d07-4449-6bde-6ce9-2ca15887972d" }
{ "account_age_days": 25, "account_id": "ACCT-00CCD9BC54DF", "baseline_risk_score": 0.128, "kyc_tier": "tier_1", "session_entropy": 0.792 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 398, "timestamp": "2026-01-06T16:14:00Z", "transaction_amount_usd": 8290.85 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.491, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2854.38, "financial_exposure_usd": 3464.28, "recoverable_pct": 0.495 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107450", "label": "benign", "label_confidence": 0.747, "severity": "medium", "timestamp": "2026-01-06T04:10:00Z", "trace_id": "abfee5a7-f73e-0b1b-df2b-086e6ecb6ce4" }
{ "account_age_days": 1558, "account_id": "ACCT-F5401D9572F9", "baseline_risk_score": 0.054, "kyc_tier": "tier_1", "session_entropy": 0.904 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 1119, "timestamp": "2026-01-06T04:10:00Z", "transaction_amount_usd": 2435.77 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.467, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4128.72, "financial_exposure_usd": 4749.07, "recoverable_pct": 0.818 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109357", "label": "benign", "label_confidence": 0.728, "severity": "high", "timestamp": "2026-01-07T11:57:00Z", "trace_id": "474e912e-0a98-df93-b9e5-510da7a45c36" }
{ "account_age_days": 1920, "account_id": "ACCT-C465BDDA5831", "baseline_risk_score": 0.174, "kyc_tier": "tier_2", "session_entropy": 0.743 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 811, "timestamp": "2026-01-07T11:57:00Z", "transaction_amount_usd": 2167.94 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.694, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1801.01, "financial_exposure_usd": 4185.11, "recoverable_pct": 0.612 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100734", "label": "fraudulent", "label_confidence": 0.913, "severity": "high", "timestamp": "2026-01-01T12:14:00Z", "trace_id": "5f74e071-b8bf-24cf-231e-a008613721c3" }
{ "account_age_days": 1939, "account_id": "ACCT-692F45DE9092", "baseline_risk_score": 0.53, "kyc_tier": "tier_1", "session_entropy": 0.53 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 87, "timestamp": "2026-01-01T07:20:00Z", "transaction_amount_usd": 1.63 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.418, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 325718.24, "financial_exposure_usd": 423245.04, "recoverable_pct": 0.24 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109753", "label": "benign", "label_confidence": 0.577, "severity": "low", "timestamp": "2026-01-07T18:33:00Z", "trace_id": "c56a89c6-5345-9422-2a2a-e4d7afad2037" }
{ "account_age_days": 126, "account_id": "ACCT-6E4FF6267912", "baseline_risk_score": 0.149, "kyc_tier": "tier_1", "session_entropy": 0.915 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 202, "timestamp": "2026-01-07T16:51:00Z", "transaction_amount_usd": 13.42 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.611, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 555.62, "financial_exposure_usd": 787.81, "recoverable_pct": 0.749 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103257", "label": "fraudulent", "label_confidence": 0.964, "severity": "high", "timestamp": "2026-01-03T06:17:00Z", "trace_id": "195d2e5f-5135-46b3-c397-deadf7bf7c01" }
{ "account_age_days": 809, "account_id": "ACCT-1D685C2B2FF5", "baseline_risk_score": 0.45, "kyc_tier": "tier_1", "session_entropy": 0.692 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 515, "timestamp": "2026-01-03T06:17:00Z", "transaction_amount_usd": 87763.94 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.607, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 228536.01, "financial_exposure_usd": 468135.02, "recoverable_pct": 0.215 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100789", "label": "fraudulent", "label_confidence": 0.769, "severity": "critical", "timestamp": "2026-01-01T13:09:00Z", "trace_id": "a9a47ca4-6888-07e1-277d-a450b8387d96" }
{ "account_age_days": 1937, "account_id": "ACCT-057CFB054D17", "baseline_risk_score": 0.552, "kyc_tier": "tier_2", "session_entropy": 0.44 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1015, "timestamp": "2026-01-01T13:09:00Z", "transaction_amount_usd": 64385.42 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.459, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 538044.51, "financial_exposure_usd": 838371.41, "recoverable_pct": 0.173 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100891", "label": "fraudulent", "label_confidence": 0.824, "severity": "high", "timestamp": "2026-01-01T14:51:00Z", "trace_id": "5a3b081d-a150-1014-e477-d800dec46536" }
{ "account_age_days": 828, "account_id": "ACCT-74C356920576", "baseline_risk_score": 0.47, "kyc_tier": "tier_1", "session_entropy": 0.342 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 927, "timestamp": "2026-01-01T14:51:00Z", "transaction_amount_usd": 15124.67 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.374, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 429695.95, "financial_exposure_usd": 712942, "recoverable_pct": 0.278 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102586", "label": "fraudulent", "label_confidence": 0.887, "severity": "medium", "timestamp": "2026-01-02T19:06:00Z", "trace_id": "1afbc034-b179-b1e0-5927-7d2d0db12560" }
{ "account_age_days": 1445, "account_id": "ACCT-CBEE30AB0607", "baseline_risk_score": 0.5, "kyc_tier": "tier_1", "session_entropy": 0.8 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1173, "timestamp": "2026-01-02T19:06:00Z", "transaction_amount_usd": 29450.92 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.459, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 506013.43, "financial_exposure_usd": 707911.77, "recoverable_pct": 0.66 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101779", "label": "fraudulent", "label_confidence": 0.764, "severity": "critical", "timestamp": "2026-01-02T05:39:00Z", "trace_id": "11149370-d51b-0618-75e6-990ffcd44adc" }
{ "account_age_days": 1262, "account_id": "ACCT-A525FC6B2E8C", "baseline_risk_score": 0.538, "kyc_tier": "tier_1", "session_entropy": 0.348 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 825, "timestamp": "2026-01-02T05:39:00Z", "transaction_amount_usd": 11451.79 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.637, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 175888.31, "financial_exposure_usd": 438006.53, "recoverable_pct": 0.186 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109413", "label": "benign", "label_confidence": 0.631, "severity": "high", "timestamp": "2026-01-07T12:53:00Z", "trace_id": "8942c653-2d00-2b91-a32d-b4392b26824f" }
{ "account_age_days": 1888, "account_id": "ACCT-371AD98C7F54", "baseline_risk_score": 0.15, "kyc_tier": "tier_1", "session_entropy": 0.643 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 234, "timestamp": "2026-01-07T04:17:00Z", "transaction_amount_usd": 20.84 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.543, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 673.55, "financial_exposure_usd": 1204.81, "recoverable_pct": 0.49 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102663", "label": "fraudulent", "label_confidence": 0.977, "severity": "critical", "timestamp": "2026-01-02T20:23:00Z", "trace_id": "1411ace4-0eb3-32cf-32be-cfc0f8485e5e" }
{ "account_age_days": 1452, "account_id": "ACCT-A99DA45CEC75", "baseline_risk_score": 0.367, "kyc_tier": "tier_2", "session_entropy": 0.696 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 1125, "timestamp": "2026-01-02T20:23:00Z", "transaction_amount_usd": 49221.16 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.745, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 355659.93, "financial_exposure_usd": 366289.8, "recoverable_pct": 0.739 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104623", "label": "fraudulent", "label_confidence": 0.669, "severity": "medium", "timestamp": "2026-01-04T05:03:00Z", "trace_id": "63577250-a6ec-03e0-31b4-34b2ab43f172" }
{ "account_age_days": 1184, "account_id": "ACCT-10F9B9B5C727", "baseline_risk_score": 0.349, "kyc_tier": "tier_2", "session_entropy": 0.71 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 195, "timestamp": "2026-01-04T05:03:00Z", "transaction_amount_usd": 1836599.67 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.423, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2472667.49, "financial_exposure_usd": 6018991.99, "recoverable_pct": 0.66 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103541", "label": "fraudulent", "label_confidence": 0.68, "severity": "medium", "timestamp": "2026-01-03T11:01:00Z", "trace_id": "701a9880-221c-9f47-00e5-e95128f45b09" }
{ "account_age_days": 494, "account_id": "ACCT-0D8BF465DE26", "baseline_risk_score": 0.344, "kyc_tier": "tier_1", "session_entropy": 0.637 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 1038, "timestamp": "2026-01-03T11:01:00Z", "transaction_amount_usd": 1887577.13 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.459, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2159496.21, "financial_exposure_usd": 4084776.41, "recoverable_pct": 0.49 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101500", "label": "fraudulent", "label_confidence": 0.769, "severity": "high", "timestamp": "2026-01-02T01:00:00Z", "trace_id": "6e182709-0e37-9f2f-80f1-c003d2db425d" }
{ "account_age_days": 1610, "account_id": "ACCT-27E87DD93F54", "baseline_risk_score": 0.325, "kyc_tier": "tier_2", "session_entropy": 0.853 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 212, "timestamp": "2026-01-02T01:00:00Z", "transaction_amount_usd": 25920.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.622, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 368281.19, "financial_exposure_usd": 605581.58, "recoverable_pct": 0.022 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103186", "label": "fraudulent", "label_confidence": 0.868, "severity": "high", "timestamp": "2026-01-03T05:06:00Z", "trace_id": "26a04f11-2787-f08f-08db-d35db9737bb2" }
{ "account_age_days": 123, "account_id": "ACCT-C0628F7277BF", "baseline_risk_score": 0.418, "kyc_tier": "tier_2", "session_entropy": 0.659 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 333, "timestamp": "2026-01-02T19:58:00Z", "transaction_amount_usd": 7.09 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.932, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 330172.39, "financial_exposure_usd": 798209.99, "recoverable_pct": 0.146 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105897", "label": "fraudulent", "label_confidence": 0.89, "severity": "high", "timestamp": "2026-01-05T02:17:00Z", "trace_id": "d7e2ba75-7a40-9836-3239-8af60871e4bf" }
{ "account_age_days": 668, "account_id": "ACCT-48B2270FD01D", "baseline_risk_score": 0.156, "kyc_tier": "tier_2", "session_entropy": 0.755 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1086, "timestamp": "2026-01-05T02:17:00Z", "transaction_amount_usd": 1286325.73 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.51, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 4789864.26, "financial_exposure_usd": 8690662.66, "recoverable_pct": 0.575 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102725", "label": "fraudulent", "label_confidence": 0.874, "severity": "high", "timestamp": "2026-01-02T21:25:00Z", "trace_id": "421c1e9b-d11d-ba11-31f4-35fdc8be3e54" }
{ "account_age_days": 1349, "account_id": "ACCT-773D6DBAC9DB", "baseline_risk_score": 0.479, "kyc_tier": "tier_2", "session_entropy": 0.49 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 197, "timestamp": "2026-01-02T14:04:00Z", "transaction_amount_usd": 20.6 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.942, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 587638.08, "financial_exposure_usd": 992078.47, "recoverable_pct": 0.492 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104288", "label": "fraudulent", "label_confidence": 0.775, "severity": "high", "timestamp": "2026-01-03T23:28:00Z", "trace_id": "f98cda40-1ddc-bd74-eb35-4d4e550671eb" }
{ "account_age_days": 583, "account_id": "ACCT-71CDEBF9C2D1", "baseline_risk_score": 0.222, "kyc_tier": "tier_1", "session_entropy": 0.215 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 1153, "timestamp": "2026-01-03T23:28:00Z", "transaction_amount_usd": 2380570.17 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.907, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3400499.05, "financial_exposure_usd": 5366903.35, "recoverable_pct": 0.633 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104767", "label": "fraudulent", "label_confidence": 0.883, "severity": "low", "timestamp": "2026-01-04T07:27:00Z", "trace_id": "78b9dc04-1de5-402a-6b8e-480fd06fc8b3" }
{ "account_age_days": 1771, "account_id": "ACCT-069A91092602", "baseline_risk_score": 0.188, "kyc_tier": "tier_1", "session_entropy": 0.855 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 775, "timestamp": "2026-01-04T07:27:00Z", "transaction_amount_usd": 2001402.53 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.729, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1026914.7, "financial_exposure_usd": 1473830.57, "recoverable_pct": 0.647 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102312", "label": "fraudulent", "label_confidence": 0.873, "severity": "medium", "timestamp": "2026-01-02T14:32:00Z", "trace_id": "57d38e08-2ed1-173e-bbdc-1a7b1be1bbcf" }
{ "account_age_days": 1621, "account_id": "ACCT-F226D85E64B8", "baseline_risk_score": 0.449, "kyc_tier": "tier_1", "session_entropy": 0.723 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 319, "timestamp": "2026-01-02T14:32:00Z", "transaction_amount_usd": 44875.93 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.926, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 567250.58, "financial_exposure_usd": 795361.35, "recoverable_pct": 0.441 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102231", "label": "fraudulent", "label_confidence": 0.796, "severity": "critical", "timestamp": "2026-01-02T13:11:00Z", "trace_id": "d3730c21-3a4b-c20e-0080-b1ed8d783681" }
{ "account_age_days": 1838, "account_id": "ACCT-73FF09EDE0EE", "baseline_risk_score": 0.587, "kyc_tier": "tier_1", "session_entropy": 0.494 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 734, "timestamp": "2026-01-02T13:11:00Z", "transaction_amount_usd": 13509.02 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.563, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 252067.25, "financial_exposure_usd": 517128.03, "recoverable_pct": 0.335 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101153", "label": "fraudulent", "label_confidence": 0.932, "severity": "high", "timestamp": "2026-01-01T19:13:00Z", "trace_id": "a79ef86c-9466-79eb-dadb-fba39e509c33" }
{ "account_age_days": 115, "account_id": "ACCT-C133C9411EA8", "baseline_risk_score": 0.368, "kyc_tier": "tier_3", "session_entropy": 0.566 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 209, "timestamp": "2026-01-01T08:16:00Z", "transaction_amount_usd": 12.42 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.875, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 853770.77, "financial_exposure_usd": 989984.77, "recoverable_pct": 0.386 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103132", "label": "fraudulent", "label_confidence": 0.929, "severity": "medium", "timestamp": "2026-01-03T04:12:00Z", "trace_id": "ad49e035-2312-5b96-7a58-fdcab21ed7b3" }
{ "account_age_days": 1176, "account_id": "ACCT-B5C6CBC0BEF8", "baseline_risk_score": 0.456, "kyc_tier": "tier_1", "session_entropy": 0.448 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 81, "timestamp": "2026-01-02T15:28:00Z", "transaction_amount_usd": 16 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.355, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 795177.11, "financial_exposure_usd": 1023745.26, "recoverable_pct": 0.756 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106024", "label": "fraudulent", "label_confidence": 0.906, "severity": "low", "timestamp": "2026-01-05T04:24:00Z", "trace_id": "a529f6b9-8052-1c76-6e8d-5a65b9b2a782" }
{ "account_age_days": 1213, "account_id": "ACCT-A081077A5F95", "baseline_risk_score": 0.302, "kyc_tier": "tier_1", "session_entropy": 0.582 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 328, "timestamp": "2026-01-05T04:24:00Z", "transaction_amount_usd": 464622.56 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.729, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1380038.43, "financial_exposure_usd": 1521381.85, "recoverable_pct": 0.848 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }