schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104118", "label": "fraudulent", "label_confidence": 0.735, "severity": "medium", "timestamp": "2026-01-03T20:38:00Z", "trace_id": "17d4d07f-bd41-c612-9cd4-068ca9f6df7f" }
{ "account_age_days": 746, "account_id": "ACCT-B6371BB9911A", "baseline_risk_score": 0.37, "kyc_tier": "tier_1", "session_entropy": 0.925 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 208, "timestamp": "2026-01-03T20:38:00Z", "transaction_amount_usd": 1280693.05 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.416, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2045995.42, "financial_exposure_usd": 2111934.49, "recoverable_pct": 0.539 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107736", "label": "benign", "label_confidence": 0.543, "severity": "low", "timestamp": "2026-01-06T08:56:00Z", "trace_id": "7334d5ba-ec06-8b46-15b8-73ddb834ec62" }
{ "account_age_days": 587, "account_id": "ACCT-05B4F03B473C", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.384 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 311, "timestamp": "2026-01-06T04:25:00Z", "transaction_amount_usd": 15.34 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.644, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1680.45, "financial_exposure_usd": 2157.54, "recoverable_pct": 0.679 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108158", "label": "benign", "label_confidence": 0.662, "severity": "low", "timestamp": "2026-01-06T15:58:00Z", "trace_id": "83387125-671e-afbe-837a-e23886d3c9ae" }
{ "account_age_days": 1567, "account_id": "ACCT-26E185A55596", "baseline_risk_score": 0.16, "kyc_tier": "tier_1", "session_entropy": 0.717 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 663, "timestamp": "2026-01-06T15:58:00Z", "transaction_amount_usd": 2620.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.64, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3221.13, "financial_exposure_usd": 5088.16, "recoverable_pct": 0.837 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107227", "label": "benign", "label_confidence": 0.692, "severity": "medium", "timestamp": "2026-01-06T00:27:00Z", "trace_id": "16cc9282-131b-299c-9ad5-f7854b3726b7" }
{ "account_age_days": 1288, "account_id": "ACCT-8F45C04FA179", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.677 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 657, "timestamp": "2026-01-06T00:27:00Z", "transaction_amount_usd": 11382.64 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.622, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 291.33, "financial_exposure_usd": 373.54, "recoverable_pct": 0.55 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100759", "label": "fraudulent", "label_confidence": 0.798, "severity": "high", "timestamp": "2026-01-01T12:39:00Z", "trace_id": "c2299827-e0d7-d7ff-771e-a95dab4e5cfe" }
{ "account_age_days": 1722, "account_id": "ACCT-E3C43CA8FCA9", "baseline_risk_score": 0.52, "kyc_tier": "tier_2", "session_entropy": 0.871 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 328, "timestamp": "2026-01-01T10:38:00Z", "transaction_amount_usd": 6 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_c...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.694, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 692959.3, "financial_exposure_usd": 840637.75, "recoverable_pct": 0.543 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100937", "label": "fraudulent", "label_confidence": 0.754, "severity": "medium", "timestamp": "2026-01-01T15:37:00Z", "trace_id": "83960ce5-7f53-e535-93ef-c78e4109ede3" }
{ "account_age_days": 698, "account_id": "ACCT-6D933D78DE30", "baseline_risk_score": 0.392, "kyc_tier": "tier_3", "session_entropy": 0.272 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 413, "timestamp": "2026-01-01T15:37:00Z", "transaction_amount_usd": 89417.46 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.549, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 427139.1, "financial_exposure_usd": 1057147.94, "recoverable_pct": 0.273 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108858", "label": "benign", "label_confidence": 0.561, "severity": "high", "timestamp": "2026-01-07T03:38:00Z", "trace_id": "b069b6e3-e104-8e77-9c22-4804d7e09f01" }
{ "account_age_days": 1638, "account_id": "ACCT-E0191E9A4B45", "baseline_risk_score": 0.18, "kyc_tier": "tier_2", "session_entropy": 0.427 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 143, "timestamp": "2026-01-06T17:44:00Z", "transaction_amount_usd": 11.98 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.605, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 909.11, "financial_exposure_usd": 1245.15, "recoverable_pct": 0.822 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103829", "label": "fraudulent", "label_confidence": 0.674, "severity": "medium", "timestamp": "2026-01-03T15:49:00Z", "trace_id": "f5d817c7-7cb4-c1ac-d630-94e351b29f71" }
{ "account_age_days": 167, "account_id": "ACCT-67CFF741016C", "baseline_risk_score": 0.106, "kyc_tier": "tier_1", "session_entropy": 0.77 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 730, "timestamp": "2026-01-03T15:49:00Z", "transaction_amount_usd": 380265.13 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.473, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2427206.89, "financial_exposure_usd": 2804146.92, "recoverable_pct": 0.806 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106730", "label": "benign", "label_confidence": 0.521, "severity": "medium", "timestamp": "2026-01-05T16:10:00Z", "trace_id": "343db98d-0d07-cd81-9709-f3644d7cd75f" }
{ "account_age_days": 840, "account_id": "ACCT-1C8071928B36", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.778 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 233, "timestamp": "2026-01-05T16:10:00Z", "transaction_amount_usd": 12323.21 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.469, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3980.78, "financial_exposure_usd": 5291.57, "recoverable_pct": 0.449 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108892", "label": "benign", "label_confidence": 0.595, "severity": "medium", "timestamp": "2026-01-07T04:12:00Z", "trace_id": "22cec27d-1ad9-d12f-92c5-5f47733fd10a" }
{ "account_age_days": 39, "account_id": "ACCT-1C80330B0BCC", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.256 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 988, "timestamp": "2026-01-07T04:12:00Z", "transaction_amount_usd": 7190.09 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.686, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3984.28, "financial_exposure_usd": 5267.99, "recoverable_pct": 0.678 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106202", "label": "fraudulent", "label_confidence": 0.931, "severity": "medium", "timestamp": "2026-01-05T07:22:00Z", "trace_id": "3776ddc2-c83f-35a8-94d9-c49072687b98" }
{ "account_age_days": 1166, "account_id": "ACCT-7EBB3BE923FB", "baseline_risk_score": 0.098, "kyc_tier": "tier_2", "session_entropy": 0.384 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 1185, "timestamp": "2026-01-05T07:22:00Z", "transaction_amount_usd": 1356070.36 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.937, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5735862.14, "financial_exposure_usd": 8025332.37, "recoverable_pct": 0.849 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100772", "label": "fraudulent", "label_confidence": 0.846, "severity": "high", "timestamp": "2026-01-01T12:52:00Z", "trace_id": "c6dfaf7d-c872-08ef-eff1-d1302561aee6" }
{ "account_age_days": 1241, "account_id": "ACCT-ABBC7C047BF9", "baseline_risk_score": 0.544, "kyc_tier": "tier_3", "session_entropy": 0.413 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1174, "timestamp": "2026-01-01T12:52:00Z", "transaction_amount_usd": 92217.5 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.749, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 730606.84, "financial_exposure_usd": 807509.75, "recoverable_pct": 0.523 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109949", "label": "benign", "label_confidence": 0.581, "severity": "medium", "timestamp": "2026-01-07T21:49:00Z", "trace_id": "e0c1eff5-715c-8d26-0a1d-e0c9633665f3" }
{ "account_age_days": 1634, "account_id": "ACCT-75AB8E807352", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.18 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 177, "timestamp": "2026-01-07T21:49:00Z", "transaction_amount_usd": 1237.64 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.516, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1747.72, "financial_exposure_usd": 2509.08, "recoverable_pct": 0.855 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102777", "label": "fraudulent", "label_confidence": 0.83, "severity": "medium", "timestamp": "2026-01-02T22:17:00Z", "trace_id": "57a2dd1f-a138-6c01-7419-844cf865aeae" }
{ "account_age_days": 443, "account_id": "ACCT-EA6BAAD2417E", "baseline_risk_score": 0.564, "kyc_tier": "tier_1", "session_entropy": 0.279 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 708, "timestamp": "2026-01-02T22:17:00Z", "transaction_amount_usd": 77208.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.909, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 424432.75, "financial_exposure_usd": 998205.33, "recoverable_pct": 0.198 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100645", "label": "fraudulent", "label_confidence": 0.84, "severity": "high", "timestamp": "2026-01-01T10:45:00Z", "trace_id": "17b3da76-bfa8-0526-5bde-0066064679bc" }
{ "account_age_days": 1985, "account_id": "ACCT-6E40FEEB308F", "baseline_risk_score": 0.607, "kyc_tier": "tier_2", "session_entropy": 0.353 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 101, "timestamp": "2026-01-01T05:24:00Z", "transaction_amount_usd": 0.08 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.757, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 170694.46, "financial_exposure_usd": 378964.92, "recoverable_pct": 0.26 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102536", "label": "fraudulent", "label_confidence": 0.821, "severity": "medium", "timestamp": "2026-01-02T18:16:00Z", "trace_id": "832dcac6-1b1e-787a-9502-4e018e6cf33d" }
{ "account_age_days": 645, "account_id": "ACCT-33B70589292C", "baseline_risk_score": 0.426, "kyc_tier": "tier_2", "session_entropy": 0.779 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 137, "timestamp": "2026-01-02T18:16:00Z", "transaction_amount_usd": 106238.69 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.823, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 754934.9, "financial_exposure_usd": 1004667.19, "recoverable_pct": 0.537 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106058", "label": "fraudulent", "label_confidence": 0.689, "severity": "high", "timestamp": "2026-01-05T04:58:00Z", "trace_id": "9412a88e-ad8b-2efc-5f0e-db71cca6f03b" }
{ "account_age_days": 1498, "account_id": "ACCT-947D02AE5C94", "baseline_risk_score": 0.086, "kyc_tier": "tier_2", "session_entropy": 0.575 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 285, "timestamp": "2026-01-04T20:50:00Z", "transaction_amount_usd": 4.22 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.635, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4289801.8, "financial_exposure_usd": 4441081.57, "recoverable_pct": 0.644 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102849", "label": "fraudulent", "label_confidence": 0.855, "severity": "critical", "timestamp": "2026-01-02T23:29:00Z", "trace_id": "aa1511ff-8c50-0c55-e2d1-07dd02b4effe" }
{ "account_age_days": 85, "account_id": "ACCT-4AF49D475728", "baseline_risk_score": 0.626, "kyc_tier": "tier_2", "session_entropy": 0.508 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 711, "timestamp": "2026-01-02T23:29:00Z", "transaction_amount_usd": 52456.98 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.491, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 228615.49, "financial_exposure_usd": 516145.79, "recoverable_pct": 0.161 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103912", "label": "fraudulent", "label_confidence": 0.763, "severity": "high", "timestamp": "2026-01-03T17:12:00Z", "trace_id": "d2902d9e-6b2a-169d-4f97-a98300e86156" }
{ "account_age_days": 1824, "account_id": "ACCT-616D8A2D03FA", "baseline_risk_score": 0.24, "kyc_tier": "tier_2", "session_entropy": 0.734 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 598, "timestamp": "2026-01-03T17:12:00Z", "transaction_amount_usd": 228031.41 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.933, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3730115.19, "financial_exposure_usd": 4779093.05, "recoverable_pct": 0.668 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108201", "label": "benign", "label_confidence": 0.665, "severity": "medium", "timestamp": "2026-01-06T16:41:00Z", "trace_id": "ed38e244-4c60-4330-1380-ed25ad24dd29" }
{ "account_age_days": 820, "account_id": "ACCT-7A2CCF14C042", "baseline_risk_score": 0.072, "kyc_tier": "tier_2", "session_entropy": 0.908 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 816, "timestamp": "2026-01-06T16:41:00Z", "transaction_amount_usd": 921.81 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.686, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 164.53, "financial_exposure_usd": 242.18, "recoverable_pct": 0.612 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108967", "label": "benign", "label_confidence": 0.577, "severity": "high", "timestamp": "2026-01-07T05:27:00Z", "trace_id": "02e94f8d-cef1-2c84-d695-195432551b18" }
{ "account_age_days": 1261, "account_id": "ACCT-BC4937FE2783", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.725 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 559, "timestamp": "2026-01-07T05:27:00Z", "transaction_amount_usd": 1963.53 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.761, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 647.21, "financial_exposure_usd": 1419.5, "recoverable_pct": 0.552 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109316", "label": "benign", "label_confidence": 0.524, "severity": "medium", "timestamp": "2026-01-07T11:16:00Z", "trace_id": "2c5f8f42-0145-d82c-4dd6-2eef6fa6dc76" }
{ "account_age_days": 1464, "account_id": "ACCT-8B868BA132B3", "baseline_risk_score": 0.194, "kyc_tier": "tier_2", "session_entropy": 0.831 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 114, "timestamp": "2026-01-07T11:16:00Z", "transaction_amount_usd": 697.44 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.51, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 3313.56, "financial_exposure_usd": 8059.85, "recoverable_pct": 0.658 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102524", "label": "fraudulent", "label_confidence": 0.969, "severity": "medium", "timestamp": "2026-01-02T18:04:00Z", "trace_id": "c9abc218-1f09-ea28-49c9-c5f8e4d6a677" }
{ "account_age_days": 1097, "account_id": "ACCT-CEAC7310D335", "baseline_risk_score": 0.328, "kyc_tier": "tier_3", "session_entropy": 0.335 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 867, "timestamp": "2026-01-02T18:04:00Z", "transaction_amount_usd": 94556.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.412, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 603772.74, "financial_exposure_usd": 649447.1, "recoverable_pct": 0.781 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104986", "label": "fraudulent", "label_confidence": 0.828, "severity": "medium", "timestamp": "2026-01-04T11:06:00Z", "trace_id": "b3bf6600-71fa-f977-fd7b-da803c91a909" }
{ "account_age_days": 741, "account_id": "ACCT-85EA2E9E134F", "baseline_risk_score": 0.202, "kyc_tier": "tier_3", "session_entropy": 0.67 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 374, "timestamp": "2026-01-04T00:04:00Z", "transaction_amount_usd": 11.28 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.524, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 404078.18, "financial_exposure_usd": 991434.9, "recoverable_pct": 0.908 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106384", "label": "fraudulent", "label_confidence": 0.807, "severity": "high", "timestamp": "2026-01-05T10:24:00Z", "trace_id": "9d93af1c-c3fa-84f4-a0a4-f96beb51edc8" }
{ "account_age_days": 478, "account_id": "ACCT-736969593881", "baseline_risk_score": 0.315, "kyc_tier": "tier_1", "session_entropy": 0.658 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1142, "timestamp": "2026-01-05T10:24:00Z", "transaction_amount_usd": 2903018.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.763, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3342433, "financial_exposure_usd": 5473949.82, "recoverable_pct": 0.505 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104707", "label": "fraudulent", "label_confidence": 0.607, "severity": "medium", "timestamp": "2026-01-04T06:27:00Z", "trace_id": "d60382e1-41f7-85f5-ab17-b23c741872f7" }
{ "account_age_days": 1966, "account_id": "ACCT-3140CC6A2748", "baseline_risk_score": 0.096, "kyc_tier": "tier_3", "session_entropy": 0.903 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 295, "timestamp": "2026-01-03T23:18:00Z", "transaction_amount_usd": 9.02 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.414, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2179550.96, "financial_exposure_usd": 3145704.4, "recoverable_pct": 0.429 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108372", "label": "benign", "label_confidence": 0.634, "severity": "high", "timestamp": "2026-01-06T19:32:00Z", "trace_id": "42f41a35-bb26-bd23-587f-65e0726936b1" }
{ "account_age_days": 734, "account_id": "ACCT-A5C958E296EB", "baseline_risk_score": 0.168, "kyc_tier": "tier_2", "session_entropy": 0.131 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 268, "timestamp": "2026-01-06T19:32:00Z", "transaction_amount_usd": 10627.75 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.583, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2495.13, "financial_exposure_usd": 4488.08, "recoverable_pct": 0.753 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109618", "label": "benign", "label_confidence": 0.472, "severity": "medium", "timestamp": "2026-01-07T16:18:00Z", "trace_id": "f8aff954-051b-1bb9-0421-5736f8a918d6" }
{ "account_age_days": 1622, "account_id": "ACCT-68ECF459A270", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.931 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 821, "timestamp": "2026-01-07T16:18:00Z", "transaction_amount_usd": 7714.73 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.575, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1688.19, "financial_exposure_usd": 3613.37, "recoverable_pct": 0.908 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100573", "label": "fraudulent", "label_confidence": 0.946, "severity": "medium", "timestamp": "2026-01-01T09:33:00Z", "trace_id": "7aebdb28-4dc0-7f30-9dde-83c4f04259d3" }
{ "account_age_days": 731, "account_id": "ACCT-9A87A83D8AB4", "baseline_risk_score": 0.364, "kyc_tier": "tier_1", "session_entropy": 0.161 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1135, "timestamp": "2026-01-01T09:33:00Z", "transaction_amount_usd": 78180.26 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.924, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 707253.47, "financial_exposure_usd": 1003755.85, "recoverable_pct": 0.765 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102065", "label": "fraudulent", "label_confidence": 0.94, "severity": "medium", "timestamp": "2026-01-02T10:25:00Z", "trace_id": "91670511-0c7e-4acf-3e9f-76293976d6f5" }
{ "account_age_days": 593, "account_id": "ACCT-8AA7F89641AB", "baseline_risk_score": 0.439, "kyc_tier": "tier_3", "session_entropy": 0.916 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 464, "timestamp": "2026-01-02T10:25:00Z", "transaction_amount_usd": 83756.12 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.903, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 209705.41, "financial_exposure_usd": 415232.81, "recoverable_pct": 0.555 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106738", "label": "benign", "label_confidence": 0.701, "severity": "high", "timestamp": "2026-01-05T16:18:00Z", "trace_id": "b9b26a8a-f43a-77e4-7c22-919f191762a8" }
{ "account_age_days": 853, "account_id": "ACCT-9E472A148148", "baseline_risk_score": 0.184, "kyc_tier": "tier_2", "session_entropy": 0.48 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 195, "timestamp": "2026-01-05T14:52:00Z", "transaction_amount_usd": 10.61 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.591, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1473.07, "financial_exposure_usd": 3305.17, "recoverable_pct": 0.41 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103965", "label": "fraudulent", "label_confidence": 0.702, "severity": "high", "timestamp": "2026-01-03T18:05:00Z", "trace_id": "ad65d844-b2d8-762c-824c-e8b241260ef7" }
{ "account_age_days": 41, "account_id": "ACCT-1760DD28F8B6", "baseline_risk_score": 0.166, "kyc_tier": "tier_1", "session_entropy": 0.349 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 352, "timestamp": "2026-01-03T12:19:00Z", "transaction_amount_usd": 21.77 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.397, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2406564.76, "financial_exposure_usd": 2438445.11, "recoverable_pct": 0.513 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101404", "label": "fraudulent", "label_confidence": 0.846, "severity": "medium", "timestamp": "2026-01-01T23:24:00Z", "trace_id": "6473131c-b576-4972-cb55-e034c5f3ea9d" }
{ "account_age_days": 1798, "account_id": "ACCT-3CF35263CF8D", "baseline_risk_score": 0.485, "kyc_tier": "tier_3", "session_entropy": 0.412 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 477, "timestamp": "2026-01-01T23:24:00Z", "transaction_amount_usd": 106103.43 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.451, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 766445.97, "financial_exposure_usd": 943989.84, "recoverable_pct": 0.018 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107525", "label": "benign", "label_confidence": 0.548, "severity": "low", "timestamp": "2026-01-06T05:25:00Z", "trace_id": "45c43634-699b-b64c-1441-8ccbe340f717" }
{ "account_age_days": 1370, "account_id": "ACCT-26C4344EA244", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.208 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 390, "timestamp": "2026-01-06T02:27:00Z", "transaction_amount_usd": 13.68 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.524, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1061.93, "financial_exposure_usd": 1706.49, "recoverable_pct": 0.555 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108473", "label": "benign", "label_confidence": 0.694, "severity": "high", "timestamp": "2026-01-06T21:13:00Z", "trace_id": "cbf9134c-2288-d91e-23d0-d93a867d3b21" }
{ "account_age_days": 124, "account_id": "ACCT-9CFD8AE9E09B", "baseline_risk_score": 0.074, "kyc_tier": "tier_1", "session_entropy": 0.811 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 976, "timestamp": "2026-01-06T21:13:00Z", "transaction_amount_usd": 10506.06 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.661, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2685.51, "financial_exposure_usd": 2928.52, "recoverable_pct": 0.855 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103523", "label": "fraudulent", "label_confidence": 0.699, "severity": "medium", "timestamp": "2026-01-03T10:43:00Z", "trace_id": "562e67f8-debc-c081-e99b-75fb16be316e" }
{ "account_age_days": 1414, "account_id": "ACCT-F273D087CF0C", "baseline_risk_score": 0.19, "kyc_tier": "tier_2", "session_entropy": 0.132 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 1145, "timestamp": "2026-01-03T10:43:00Z", "transaction_amount_usd": 1212586.86 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.732, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1641333.18, "financial_exposure_usd": 3792658.4, "recoverable_pct": 0.692 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100437", "label": "fraudulent", "label_confidence": 0.849, "severity": "critical", "timestamp": "2026-01-01T07:17:00Z", "trace_id": "6560624f-2ea9-d81a-d1d0-cc642f3157fa" }
{ "account_age_days": 1323, "account_id": "ACCT-114B32AA6815", "baseline_risk_score": 0.504, "kyc_tier": "tier_2", "session_entropy": 0.835 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 106, "timestamp": "2026-01-01T07:17:00Z", "transaction_amount_usd": 31405.65 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.437, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 584267.32, "financial_exposure_usd": 1062977.31, "recoverable_pct": 0.627 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102673", "label": "fraudulent", "label_confidence": 0.817, "severity": "high", "timestamp": "2026-01-02T20:33:00Z", "trace_id": "b58f981b-fa77-7757-915c-b1d2f5a83c62" }
{ "account_age_days": 1784, "account_id": "ACCT-E7FE425B3A33", "baseline_risk_score": 0.529, "kyc_tier": "tier_2", "session_entropy": 0.439 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1108, "timestamp": "2026-01-02T20:33:00Z", "transaction_amount_usd": 102448.19 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.859, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 337607.56, "financial_exposure_usd": 712496.56, "recoverable_pct": 0.128 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104088", "label": "fraudulent", "label_confidence": 0.693, "severity": "medium", "timestamp": "2026-01-03T20:08:00Z", "trace_id": "e51bb0e6-9a1c-d71f-802c-ab41835f91a0" }
{ "account_age_days": 348, "account_id": "ACCT-09FAA84B4F3C", "baseline_risk_score": 0.213, "kyc_tier": "tier_1", "session_entropy": 0.306 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 215, "timestamp": "2026-01-03T15:44:00Z", "transaction_amount_usd": 23.53 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.558, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2142260.61, "financial_exposure_usd": 3803398.82, "recoverable_pct": 0.902 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109286", "label": "benign", "label_confidence": 0.488, "severity": "high", "timestamp": "2026-01-07T10:46:00Z", "trace_id": "50a43293-63b5-eb86-910a-a478c8de28cc" }
{ "account_age_days": 488, "account_id": "ACCT-43A95FAAD962", "baseline_risk_score": 0.083, "kyc_tier": "tier_2", "session_entropy": 0.452 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 568, "timestamp": "2026-01-07T10:46:00Z", "transaction_amount_usd": 14119.17 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.756, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1955.27, "financial_exposure_usd": 2133.7, "recoverable_pct": 0.921 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102425", "label": "fraudulent", "label_confidence": 0.94, "severity": "medium", "timestamp": "2026-01-02T16:25:00Z", "trace_id": "6fcfa1bb-e560-c603-b449-dd839f112c46" }
{ "account_age_days": 1934, "account_id": "ACCT-511219443626", "baseline_risk_score": 0.626, "kyc_tier": "tier_1", "session_entropy": 0.582 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 484, "timestamp": "2026-01-02T16:25:00Z", "transaction_amount_usd": 74129.06 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.515, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 740681.48, "financial_exposure_usd": 804710.94, "recoverable_pct": 0.369 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102484", "label": "fraudulent", "label_confidence": 0.878, "severity": "critical", "timestamp": "2026-01-02T17:24:00Z", "trace_id": "d13e7911-30b2-411e-fd16-a505bdc35e12" }
{ "account_age_days": 1893, "account_id": "ACCT-62FD6687CE58", "baseline_risk_score": 0.613, "kyc_tier": "tier_3", "session_entropy": 0.471 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 115, "timestamp": "2026-01-02T17:24:00Z", "transaction_amount_usd": 48161.22 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.867, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 500355.32, "financial_exposure_usd": 546853.92, "recoverable_pct": 0.191 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102409", "label": "fraudulent", "label_confidence": 0.976, "severity": "high", "timestamp": "2026-01-02T16:09:00Z", "trace_id": "1dc80010-ebc4-7f00-b2fb-3504d2bcd618" }
{ "account_age_days": 501, "account_id": "ACCT-19DBA9BA2F03", "baseline_risk_score": 0.635, "kyc_tier": "tier_1", "session_entropy": 0.904 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 1131, "timestamp": "2026-01-02T16:09:00Z", "transaction_amount_usd": 71845.59 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.694, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 993765.66, "financial_exposure_usd": 1065664.7, "recoverable_pct": 0.06 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102128", "label": "fraudulent", "label_confidence": 0.754, "severity": "critical", "timestamp": "2026-01-02T11:28:00Z", "trace_id": "3bb42c7a-5238-72bf-2cff-3f4f0ab9c1ae" }
{ "account_age_days": 213, "account_id": "ACCT-958749D27B2F", "baseline_risk_score": 0.331, "kyc_tier": "tier_3", "session_entropy": 0.101 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 575, "timestamp": "2026-01-02T11:28:00Z", "transaction_amount_usd": 39647.22 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.756, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 415357.02, "financial_exposure_usd": 936868.83, "recoverable_pct": 0.225 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100457", "label": "fraudulent", "label_confidence": 0.941, "severity": "high", "timestamp": "2026-01-01T07:37:00Z", "trace_id": "b8b5658f-9e0f-bcff-9632-ba728426ab76" }
{ "account_age_days": 1899, "account_id": "ACCT-62B6C58122AC", "baseline_risk_score": 0.483, "kyc_tier": "tier_2", "session_entropy": 0.644 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 206, "timestamp": "2026-01-01T02:52:00Z", "transaction_amount_usd": 2.65 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.743, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 1057827.54, "financial_exposure_usd": 1228381.78, "recoverable_pct": 0.706 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103067", "label": "fraudulent", "label_confidence": 0.762, "severity": "high", "timestamp": "2026-01-03T03:07:00Z", "trace_id": "633396c9-ba1a-e3cb-beb2-143a6a1f2a69" }
{ "account_age_days": 794, "account_id": "ACCT-0C1652DB3A01", "baseline_risk_score": 0.585, "kyc_tier": "tier_3", "session_entropy": 0.249 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 761, "timestamp": "2026-01-03T03:07:00Z", "transaction_amount_usd": 15598.8 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.573, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 785468.37, "financial_exposure_usd": 925015.29, "recoverable_pct": 0.332 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103018", "label": "fraudulent", "label_confidence": 0.86, "severity": "high", "timestamp": "2026-01-03T02:18:00Z", "trace_id": "f614cc65-a723-5177-5a8c-cc82d7673d5c" }
{ "account_age_days": 192, "account_id": "ACCT-1C8CF5D82495", "baseline_risk_score": 0.264, "kyc_tier": "tier_3", "session_entropy": 0.504 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 331, "timestamp": "2026-01-03T02:18:00Z", "transaction_amount_usd": 47371.01 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.703, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 748039.53, "financial_exposure_usd": 1034432.05, "recoverable_pct": 0.706 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108117", "label": "benign", "label_confidence": 0.558, "severity": "high", "timestamp": "2026-01-06T15:17:00Z", "trace_id": "59ae3777-476f-2d00-f9f0-8be8c14d055f" }
{ "account_age_days": 1862, "account_id": "ACCT-6F5388F2AF35", "baseline_risk_score": 0.058, "kyc_tier": "tier_1", "session_entropy": 0.85 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 223, "timestamp": "2026-01-06T03:42:00Z", "transaction_amount_usd": 15.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.68, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 1338.32, "financial_exposure_usd": 2128.58, "recoverable_pct": 0.532 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100070", "label": "fraudulent", "label_confidence": 0.913, "severity": "medium", "timestamp": "2026-01-01T01:10:00Z", "trace_id": "d9719e00-e4ad-5e9b-fedd-22d9226cbc6a" }
{ "account_age_days": 1602, "account_id": "ACCT-457083E4653C", "baseline_risk_score": 0.511, "kyc_tier": "tier_2", "session_entropy": 0.855 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 177, "timestamp": "2026-01-01T01:10:00Z", "transaction_amount_usd": 86606.96 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.663, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 343096.04, "financial_exposure_usd": 529147.92, "recoverable_pct": 0.156 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106057", "label": "fraudulent", "label_confidence": 0.8, "severity": "medium", "timestamp": "2026-01-05T04:57:00Z", "trace_id": "6b590870-5264-7f36-d0e3-c3be59001763" }
{ "account_age_days": 1010, "account_id": "ACCT-71E102935C35", "baseline_risk_score": 0.323, "kyc_tier": "tier_2", "session_entropy": 0.435 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 138, "timestamp": "2026-01-04T23:38:00Z", "transaction_amount_usd": 12.78 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.522, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6026581.3, "financial_exposure_usd": 6345038.37, "recoverable_pct": 0.922 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101307", "label": "fraudulent", "label_confidence": 0.837, "severity": "critical", "timestamp": "2026-01-01T21:47:00Z", "trace_id": "2fff86a0-2011-7963-8cb3-4fe02c7a1131" }
{ "account_age_days": 203, "account_id": "ACCT-7A412E4311A9", "baseline_risk_score": 0.374, "kyc_tier": "tier_3", "session_entropy": 0.859 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 1069, "timestamp": "2026-01-01T21:47:00Z", "transaction_amount_usd": 24476.63 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.395, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 299879.48, "financial_exposure_usd": 585948.95, "recoverable_pct": 0.049 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102233", "label": "fraudulent", "label_confidence": 0.816, "severity": "medium", "timestamp": "2026-01-02T13:13:00Z", "trace_id": "a47caf78-30cf-7c21-8d16-4b9883e1edc8" }
{ "account_age_days": 1000, "account_id": "ACCT-F984620190E7", "baseline_risk_score": 0.464, "kyc_tier": "tier_1", "session_entropy": 0.436 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 194, "timestamp": "2026-01-02T12:26:00Z", "transaction_amount_usd": 19.5 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.888, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 148692.49, "financial_exposure_usd": 342045.1, "recoverable_pct": 0.565 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102254", "label": "fraudulent", "label_confidence": 0.969, "severity": "high", "timestamp": "2026-01-02T13:34:00Z", "trace_id": "98277c07-a330-d911-75d8-58a1f173108c" }
{ "account_age_days": 1367, "account_id": "ACCT-11BD3E055EFA", "baseline_risk_score": 0.613, "kyc_tier": "tier_2", "session_entropy": 0.745 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 799, "timestamp": "2026-01-02T13:34:00Z", "transaction_amount_usd": 43783.96 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.469, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 511899.03, "financial_exposure_usd": 840713.94, "recoverable_pct": 0.394 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107171", "label": "benign", "label_confidence": 0.532, "severity": "low", "timestamp": "2026-01-05T23:31:00Z", "trace_id": "fb675f1d-8894-b74e-ceb6-14bbb2d6eff7" }
{ "account_age_days": 1418, "account_id": "ACCT-F9B2A10C5FD6", "baseline_risk_score": 0.073, "kyc_tier": "tier_2", "session_entropy": 0.168 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 349, "timestamp": "2026-01-05T23:31:00Z", "transaction_amount_usd": 11869.89 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.761, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3225.18, "financial_exposure_usd": 4853.91, "recoverable_pct": 0.419 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109926", "label": "benign", "label_confidence": 0.695, "severity": "high", "timestamp": "2026-01-07T21:26:00Z", "trace_id": "833fd10a-710e-520d-cdde-9c9f26bf411b" }
{ "account_age_days": 467, "account_id": "ACCT-5A2BCCF82E16", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.764 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 671, "timestamp": "2026-01-07T21:26:00Z", "transaction_amount_usd": 1257.74 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.543, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 8000.6, "financial_exposure_usd": 8032.72, "recoverable_pct": 0.724 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109959", "label": "benign", "label_confidence": 0.669, "severity": "critical", "timestamp": "2026-01-07T21:59:00Z", "trace_id": "ec626429-46b5-f407-1637-54747c60bb46" }
{ "account_age_days": 1266, "account_id": "ACCT-1ED254DA72E5", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.551 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 184, "timestamp": "2026-01-07T17:15:00Z", "transaction_amount_usd": 18.58 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.665, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 926.91, "financial_exposure_usd": 1188.76, "recoverable_pct": 0.414 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102188", "label": "fraudulent", "label_confidence": 0.953, "severity": "high", "timestamp": "2026-01-02T12:28:00Z", "trace_id": "dacf4f26-1d82-dbae-89e3-c8ba43299dde" }
{ "account_age_days": 1006, "account_id": "ACCT-2FF43A407E9B", "baseline_risk_score": 0.562, "kyc_tier": "tier_2", "session_entropy": 0.527 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1067, "timestamp": "2026-01-02T12:28:00Z", "transaction_amount_usd": 38369.93 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.659, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 788862.05, "financial_exposure_usd": 1188944.36, "recoverable_pct": 0.809 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103674", "label": "fraudulent", "label_confidence": 0.715, "severity": "medium", "timestamp": "2026-01-03T13:14:00Z", "trace_id": "07b0447b-07af-adec-02c7-99f44389007c" }
{ "account_age_days": 1164, "account_id": "ACCT-25B40A13888F", "baseline_risk_score": 0.331, "kyc_tier": "tier_2", "session_entropy": 0.823 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 176, "timestamp": "2026-01-03T02:19:00Z", "transaction_amount_usd": 7.52 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.787, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1299850.58, "financial_exposure_usd": 3232506.64, "recoverable_pct": 0.412 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106465", "label": "fraudulent", "label_confidence": 0.914, "severity": "medium", "timestamp": "2026-01-05T11:45:00Z", "trace_id": "21c5be62-5114-a217-f804-6b1aa17803c0" }
{ "account_age_days": 681, "account_id": "ACCT-913CA26CD828", "baseline_risk_score": 0.14, "kyc_tier": "tier_1", "session_entropy": 0.554 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1168, "timestamp": "2026-01-05T11:45:00Z", "transaction_amount_usd": 683217.73 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.376, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3880144.68, "financial_exposure_usd": 5087195.56, "recoverable_pct": 0.779 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109984", "label": "benign", "label_confidence": 0.693, "severity": "low", "timestamp": "2026-01-07T22:24:00Z", "trace_id": "b9866942-2d98-7409-12a5-0749d12f5bbc" }
{ "account_age_days": 935, "account_id": "ACCT-84C710068F12", "baseline_risk_score": 0.162, "kyc_tier": "tier_1", "session_entropy": 0.171 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 210, "timestamp": "2026-01-07T13:38:00Z", "transaction_amount_usd": 15.49 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.745, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 63.47, "financial_exposure_usd": 82.32, "recoverable_pct": 0.823 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105720", "label": "fraudulent", "label_confidence": 0.633, "severity": "high", "timestamp": "2026-01-04T23:20:00Z", "trace_id": "dfb38e20-a425-8d05-e195-6eda66f5beae" }
{ "account_age_days": 572, "account_id": "ACCT-84BE45903E7A", "baseline_risk_score": 0.158, "kyc_tier": "tier_3", "session_entropy": 0.287 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 351, "timestamp": "2026-01-04T21:08:00Z", "transaction_amount_usd": 12.89 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.419, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3576084.16, "financial_exposure_usd": 5631016.06, "recoverable_pct": 0.533 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101564", "label": "fraudulent", "label_confidence": 0.939, "severity": "high", "timestamp": "2026-01-02T02:04:00Z", "trace_id": "d6138db6-3a3c-60d3-31f0-bf30f35522af" }
{ "account_age_days": 936, "account_id": "ACCT-58E188771CB8", "baseline_risk_score": 0.558, "kyc_tier": "tier_3", "session_entropy": 0.137 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 198, "timestamp": "2026-01-02T02:04:00Z", "transaction_amount_usd": 92875.62 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.595, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 814068.33, "financial_exposure_usd": 1043040.53, "recoverable_pct": 0.394 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108172", "label": "benign", "label_confidence": 0.471, "severity": "low", "timestamp": "2026-01-06T16:12:00Z", "trace_id": "e2dba38b-b4be-2eb4-44bf-5dbf14f16ae0" }
{ "account_age_days": 1523, "account_id": "ACCT-F1EA095A625D", "baseline_risk_score": 0.176, "kyc_tier": "tier_3", "session_entropy": 0.946 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 781, "timestamp": "2026-01-06T16:12:00Z", "transaction_amount_usd": 9085.31 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.651, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4630.5, "financial_exposure_usd": 5153.4, "recoverable_pct": 0.942 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102932", "label": "fraudulent", "label_confidence": 0.902, "severity": "high", "timestamp": "2026-01-03T00:52:00Z", "trace_id": "507f2356-1a36-18a1-e99a-812d1144c6f4" }
{ "account_age_days": 1091, "account_id": "ACCT-E6427E40483B", "baseline_risk_score": 0.476, "kyc_tier": "tier_2", "session_entropy": 0.369 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1104, "timestamp": "2026-01-03T00:52:00Z", "transaction_amount_usd": 75580.95 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.538, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 131591.33, "financial_exposure_usd": 292388.21, "recoverable_pct": 0.765 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100713", "label": "fraudulent", "label_confidence": 0.886, "severity": "critical", "timestamp": "2026-01-01T11:53:00Z", "trace_id": "3af72cc3-c747-a6f2-57bf-356510a678ba" }
{ "account_age_days": 837, "account_id": "ACCT-3AF0BE82F1FC", "baseline_risk_score": 0.421, "kyc_tier": "tier_1", "session_entropy": 0.791 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 969, "timestamp": "2026-01-01T11:53:00Z", "transaction_amount_usd": 13013.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.753, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 572860.92, "financial_exposure_usd": 659003.36, "recoverable_pct": 0.708 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100725", "label": "fraudulent", "label_confidence": 0.822, "severity": "critical", "timestamp": "2026-01-01T12:05:00Z", "trace_id": "a9376658-aca0-e259-bf29-d84c4f8b00fb" }
{ "account_age_days": 1144, "account_id": "ACCT-2E4478EADB84", "baseline_risk_score": 0.388, "kyc_tier": "tier_1", "session_entropy": 0.906 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 885, "timestamp": "2026-01-01T12:05:00Z", "transaction_amount_usd": 65692.07 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.55, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 161264.97, "financial_exposure_usd": 354235.94, "recoverable_pct": 0.513 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107720", "label": "benign", "label_confidence": 0.746, "severity": "medium", "timestamp": "2026-01-06T08:40:00Z", "trace_id": "d42c808e-bf09-70bc-5aee-27af222181ab" }
{ "account_age_days": 1526, "account_id": "ACCT-E000DF52C270", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.271 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1091, "timestamp": "2026-01-06T08:40:00Z", "transaction_amount_usd": 1271.64 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.5, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra...
{ "customer_funds_at_risk_usd": 848.26, "financial_exposure_usd": 1700.93, "recoverable_pct": 0.578 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105414", "label": "fraudulent", "label_confidence": 0.924, "severity": "critical", "timestamp": "2026-01-04T18:14:00Z", "trace_id": "9fc75ab9-0db8-77b4-e29c-87e8876129ef" }
{ "account_age_days": 1046, "account_id": "ACCT-DCCC545DC109", "baseline_risk_score": 0.11, "kyc_tier": "tier_2", "session_entropy": 0.578 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 224, "timestamp": "2026-01-04T18:14:00Z", "transaction_amount_usd": 1952850.46 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.534, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4090502.63, "financial_exposure_usd": 5244749.76, "recoverable_pct": 0.763 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101531", "label": "fraudulent", "label_confidence": 0.921, "severity": "medium", "timestamp": "2026-01-02T01:31:00Z", "trace_id": "19700db9-f0e7-a28d-915d-5b79ac2144c3" }
{ "account_age_days": 939, "account_id": "ACCT-05437BDBEE3D", "baseline_risk_score": 0.475, "kyc_tier": "tier_2", "session_entropy": 0.462 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 300, "timestamp": "2026-01-02T01:31:00Z", "transaction_amount_usd": 10252.45 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.392, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 226782.32, "financial_exposure_usd": 410244.68, "recoverable_pct": 0.776 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109093", "label": "benign", "label_confidence": 0.492, "severity": "low", "timestamp": "2026-01-07T07:33:00Z", "trace_id": "2551b3ef-b754-c166-7ea1-f8a8adc46c5b" }
{ "account_age_days": 310, "account_id": "ACCT-BC7ECEE9589D", "baseline_risk_score": 0.134, "kyc_tier": "tier_1", "session_entropy": 0.652 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1023, "timestamp": "2026-01-07T07:33:00Z", "transaction_amount_usd": 2028.41 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.513, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 5664.76, "financial_exposure_usd": 6033.69, "recoverable_pct": 0.493 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107704", "label": "benign", "label_confidence": 0.693, "severity": "high", "timestamp": "2026-01-06T08:24:00Z", "trace_id": "9f0c7dc8-fa11-834d-5da3-89e7b2d9d65c" }
{ "account_age_days": 502, "account_id": "ACCT-3FB62F151033", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.162 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1176, "timestamp": "2026-01-06T08:24:00Z", "transaction_amount_usd": 3580.14 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.517, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1668.78, "financial_exposure_usd": 2539.93, "recoverable_pct": 0.676 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105475", "label": "fraudulent", "label_confidence": 0.925, "severity": "medium", "timestamp": "2026-01-04T19:15:00Z", "trace_id": "7d37016e-b2ea-5ec4-b375-71a9f327594d" }
{ "account_age_days": 1772, "account_id": "ACCT-C98A68BE15D8", "baseline_risk_score": 0.232, "kyc_tier": "tier_2", "session_entropy": 0.875 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 242, "timestamp": "2026-01-04T09:12:00Z", "transaction_amount_usd": 16.52 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.891, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1781665.99, "financial_exposure_usd": 4374141.17, "recoverable_pct": 0.949 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102098", "label": "fraudulent", "label_confidence": 0.917, "severity": "low", "timestamp": "2026-01-02T10:58:00Z", "trace_id": "87c30868-69f2-45c1-be9f-8afd06499b5c" }
{ "account_age_days": 167, "account_id": "ACCT-73C308F0BB87", "baseline_risk_score": 0.266, "kyc_tier": "tier_1", "session_entropy": 0.146 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 355, "timestamp": "2026-01-02T04:32:00Z", "transaction_amount_usd": 12.64 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.935, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 566762.1, "financial_exposure_usd": 1126940.45, "recoverable_pct": 0.455 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109595", "label": "benign", "label_confidence": 0.64, "severity": "medium", "timestamp": "2026-01-07T15:55:00Z", "trace_id": "2eff01a6-e5d4-a9c1-2f51-ac83f0dc4d47" }
{ "account_age_days": 205, "account_id": "ACCT-3710A0537859", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.447 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 380, "timestamp": "2026-01-07T15:55:00Z", "transaction_amount_usd": 12827.98 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.64, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1853.63, "financial_exposure_usd": 1916.77, "recoverable_pct": 0.933 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109656", "label": "benign", "label_confidence": 0.559, "severity": "medium", "timestamp": "2026-01-07T16:56:00Z", "trace_id": "866f8c7e-b39b-7e9f-8803-f2622d3ea6f0" }
{ "account_age_days": 924, "account_id": "ACCT-FDBA7147C597", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.396 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 387, "timestamp": "2026-01-07T16:56:00Z", "transaction_amount_usd": 2523.7 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.595, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4710.02, "financial_exposure_usd": 5555.78, "recoverable_pct": 0.983 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103666", "label": "fraudulent", "label_confidence": 0.945, "severity": "high", "timestamp": "2026-01-03T13:06:00Z", "trace_id": "c3e51c93-6ff1-936d-845f-152c341ed41e" }
{ "account_age_days": 916, "account_id": "ACCT-621461A675E1", "baseline_risk_score": 0.067, "kyc_tier": "tier_1", "session_entropy": 0.902 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1080, "timestamp": "2026-01-03T13:06:00Z", "transaction_amount_usd": 1998073.06 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.548, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1896900.59, "financial_exposure_usd": 4575312.84, "recoverable_pct": 0.82 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103316", "label": "fraudulent", "label_confidence": 0.818, "severity": "medium", "timestamp": "2026-01-03T07:16:00Z", "trace_id": "3e799f60-b877-91ae-113a-4d3cfa815164" }
{ "account_age_days": 1890, "account_id": "ACCT-2C1C84E35BAF", "baseline_risk_score": 0.402, "kyc_tier": "tier_3", "session_entropy": 0.47 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 961, "timestamp": "2026-01-03T07:16:00Z", "transaction_amount_usd": 3860.03 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.648, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 489251.97, "financial_exposure_usd": 932930.3, "recoverable_pct": 0.665 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102270", "label": "fraudulent", "label_confidence": 0.962, "severity": "low", "timestamp": "2026-01-02T13:50:00Z", "trace_id": "c717cc6d-42a7-c9dd-4927-1a84229e5f33" }
{ "account_age_days": 276, "account_id": "ACCT-B5AE7DD7DBD1", "baseline_risk_score": 0.579, "kyc_tier": "tier_1", "session_entropy": 0.321 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 256, "timestamp": "2026-01-02T01:32:00Z", "transaction_amount_usd": 1.2 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.912, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 279632.86, "financial_exposure_usd": 374455.5, "recoverable_pct": 0.501 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102451", "label": "fraudulent", "label_confidence": 0.976, "severity": "high", "timestamp": "2026-01-02T16:51:00Z", "trace_id": "0758702e-0108-b206-a88e-67da4376a86c" }
{ "account_age_days": 1730, "account_id": "ACCT-C8ACCE61155F", "baseline_risk_score": 0.533, "kyc_tier": "tier_2", "session_entropy": 0.632 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 737, "timestamp": "2026-01-02T16:51:00Z", "transaction_amount_usd": 87393.83 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.834, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 708599.29, "financial_exposure_usd": 884376.96, "recoverable_pct": 0.247 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108084", "label": "benign", "label_confidence": 0.73, "severity": "low", "timestamp": "2026-01-06T14:44:00Z", "trace_id": "db33e115-d8d8-d2aa-82b0-1ed3b5d8c7d0" }
{ "account_age_days": 971, "account_id": "ACCT-A02A28A09429", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.191 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 272, "timestamp": "2026-01-06T12:43:00Z", "transaction_amount_usd": 8.34 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.462, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 919.09, "financial_exposure_usd": 1182.74, "recoverable_pct": 0.98 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102518", "label": "fraudulent", "label_confidence": 0.864, "severity": "critical", "timestamp": "2026-01-02T17:58:00Z", "trace_id": "9eaf72bc-4cff-d71c-4b20-fa8504316ea5" }
{ "account_age_days": 274, "account_id": "ACCT-74C8DBEB6501", "baseline_risk_score": 0.341, "kyc_tier": "tier_2", "session_entropy": 0.618 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1035, "timestamp": "2026-01-02T17:58:00Z", "transaction_amount_usd": 16019.99 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.922, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 427581.58, "financial_exposure_usd": 1019958.92, "recoverable_pct": 0.744 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100344", "label": "fraudulent", "label_confidence": 0.807, "severity": "critical", "timestamp": "2026-01-01T05:44:00Z", "trace_id": "976865b1-087d-f61d-21e4-a7e77856fcb3" }
{ "account_age_days": 337, "account_id": "ACCT-41F3E01C7DA1", "baseline_risk_score": 0.253, "kyc_tier": "tier_2", "session_entropy": 0.202 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 357, "timestamp": "2026-01-01T05:44:00Z", "transaction_amount_usd": 77509.07 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.929, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 333907, "financial_exposure_usd": 484416.64, "recoverable_pct": 0.526 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108952", "label": "benign", "label_confidence": 0.593, "severity": "low", "timestamp": "2026-01-07T05:12:00Z", "trace_id": "9101e63e-1d2b-2a4e-5f35-5fab3a876f17" }
{ "account_age_days": 455, "account_id": "ACCT-765D42E702D9", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.3 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1023, "timestamp": "2026-01-07T05:12:00Z", "transaction_amount_usd": 6988.39 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.728, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1465.01, "financial_exposure_usd": 2146.97, "recoverable_pct": 0.961 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106831", "label": "benign", "label_confidence": 0.547, "severity": "low", "timestamp": "2026-01-05T17:51:00Z", "trace_id": "ce947940-5a86-8d04-2180-02b542a95cc5" }
{ "account_age_days": 330, "account_id": "ACCT-7337432A9C8A", "baseline_risk_score": 0.088, "kyc_tier": "tier_1", "session_entropy": 0.436 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1026, "timestamp": "2026-01-05T17:51:00Z", "transaction_amount_usd": 7701.37 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.566, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2253.55, "financial_exposure_usd": 3742.83, "recoverable_pct": 0.412 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105267", "label": "fraudulent", "label_confidence": 0.666, "severity": "medium", "timestamp": "2026-01-04T15:47:00Z", "trace_id": "13bb58bf-30b8-9932-5f14-131221d217ab" }
{ "account_age_days": 192, "account_id": "ACCT-1F896E69E1C2", "baseline_risk_score": 0.257, "kyc_tier": "tier_2", "session_entropy": 0.155 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 1019, "timestamp": "2026-01-04T15:47:00Z", "transaction_amount_usd": 657072.71 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.569, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4096382.21, "financial_exposure_usd": 5681300.93, "recoverable_pct": 0.426 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102407", "label": "fraudulent", "label_confidence": 0.939, "severity": "critical", "timestamp": "2026-01-02T16:07:00Z", "trace_id": "96c588df-92a2-1640-a9dc-6c590b1bb371" }
{ "account_age_days": 389, "account_id": "ACCT-C5A9D1C38D77", "baseline_risk_score": 0.466, "kyc_tier": "tier_1", "session_entropy": 0.915 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 223, "timestamp": "2026-01-02T12:54:00Z", "transaction_amount_usd": 23.66 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.447, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 817984.58, "financial_exposure_usd": 947300.46, "recoverable_pct": 0.784 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106441", "label": "fraudulent", "label_confidence": 0.877, "severity": "critical", "timestamp": "2026-01-05T11:21:00Z", "trace_id": "22a1b78a-8b1f-f5b1-2d2e-0884da2e6100" }
{ "account_age_days": 1543, "account_id": "ACCT-81B7FEB16E05", "baseline_risk_score": 0.16, "kyc_tier": "tier_3", "session_entropy": 0.594 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 252, "timestamp": "2026-01-05T05:58:00Z", "transaction_amount_usd": 14.11 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.403, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4293295.89, "financial_exposure_usd": 5196544.1, "recoverable_pct": 0.948 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100568", "label": "fraudulent", "label_confidence": 0.814, "severity": "critical", "timestamp": "2026-01-01T09:28:00Z", "trace_id": "4e42fce0-4c05-2884-d32c-9257bf10cb99" }
{ "account_age_days": 614, "account_id": "ACCT-A824C9BF64C1", "baseline_risk_score": 0.53, "kyc_tier": "tier_2", "session_entropy": 0.95 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 581, "timestamp": "2026-01-01T09:28:00Z", "transaction_amount_usd": 19283.79 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.81, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 297508.21, "financial_exposure_usd": 547943.75, "recoverable_pct": 0.497 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107764", "label": "benign", "label_confidence": 0.538, "severity": "low", "timestamp": "2026-01-06T09:24:00Z", "trace_id": "e88ee301-8b08-9906-065b-9b66c38d4d9a" }
{ "account_age_days": 1473, "account_id": "ACCT-556509B42263", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.504 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 839, "timestamp": "2026-01-06T09:24:00Z", "transaction_amount_usd": 10275.4 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.77, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 2271.18, "financial_exposure_usd": 2470.42, "recoverable_pct": 0.482 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109430", "label": "benign", "label_confidence": 0.709, "severity": "critical", "timestamp": "2026-01-07T13:10:00Z", "trace_id": "342fe63b-d3f7-f2d5-ed08-1020ac5b3a93" }
{ "account_age_days": 297, "account_id": "ACCT-2A1CD63D5605", "baseline_risk_score": 0.086, "kyc_tier": "tier_3", "session_entropy": 0.284 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 750, "timestamp": "2026-01-07T13:10:00Z", "transaction_amount_usd": 788.1 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.465, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1625.38, "financial_exposure_usd": 1996.38, "recoverable_pct": 0.764 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109653", "label": "benign", "label_confidence": 0.629, "severity": "medium", "timestamp": "2026-01-07T16:53:00Z", "trace_id": "81d826bb-7d06-28cb-b0eb-5fbf6d6f7b98" }
{ "account_age_days": 790, "account_id": "ACCT-1E539C35E9E9", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.131 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 268, "timestamp": "2026-01-07T14:46:00Z", "transaction_amount_usd": 1.49 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1407.81, "financial_exposure_usd": 2234.86, "recoverable_pct": 0.873 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101664", "label": "fraudulent", "label_confidence": 0.843, "severity": "medium", "timestamp": "2026-01-02T03:44:00Z", "trace_id": "41e4b772-2d72-c1ed-bdbd-2fe3a2b655e3" }
{ "account_age_days": 837, "account_id": "ACCT-CF4863F2589D", "baseline_risk_score": 0.257, "kyc_tier": "tier_2", "session_entropy": 0.433 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 83, "timestamp": "2026-01-01T15:51:00Z", "transaction_amount_usd": 0.71 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.68, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 405259.05, "financial_exposure_usd": 500175.89, "recoverable_pct": 0.484 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107373", "label": "benign", "label_confidence": 0.616, "severity": "low", "timestamp": "2026-01-06T02:53:00Z", "trace_id": "011dd30c-39a2-9a20-cc13-1fa790853105" }
{ "account_age_days": 1332, "account_id": "ACCT-65BF7D650FED", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.927 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 369, "timestamp": "2026-01-06T00:23:00Z", "transaction_amount_usd": 20.97 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.694, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3529.49, "financial_exposure_usd": 4331.83, "recoverable_pct": 0.619 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107292", "label": "benign", "label_confidence": 0.501, "severity": "high", "timestamp": "2026-01-06T01:32:00Z", "trace_id": "3885fff4-b28b-a93f-9695-e214b6eff468" }
{ "account_age_days": 1275, "account_id": "ACCT-D715F0AE99C8", "baseline_risk_score": 0.196, "kyc_tier": "tier_1", "session_entropy": 0.773 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 509, "timestamp": "2026-01-06T01:32:00Z", "transaction_amount_usd": 4268.78 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.73, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 881.42, "financial_exposure_usd": 1096.92, "recoverable_pct": 0.642 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101856", "label": "fraudulent", "label_confidence": 0.83, "severity": "critical", "timestamp": "2026-01-02T06:56:00Z", "trace_id": "45e6b44c-b471-560a-ce58-75f675a4777c" }
{ "account_age_days": 384, "account_id": "ACCT-1E6F88F08B56", "baseline_risk_score": 0.57, "kyc_tier": "tier_2", "session_entropy": 0.279 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 116, "timestamp": "2026-01-02T06:56:00Z", "transaction_amount_usd": 109608.32 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.69, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 602780.73, "financial_exposure_usd": 830831.53, "recoverable_pct": 0.824 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101706", "label": "fraudulent", "label_confidence": 0.919, "severity": "low", "timestamp": "2026-01-02T04:26:00Z", "trace_id": "745c5434-5404-a6f3-fe78-9fee8c730c0b" }
{ "account_age_days": 1704, "account_id": "ACCT-649B1812FD27", "baseline_risk_score": 0.488, "kyc_tier": "tier_2", "session_entropy": 0.144 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 684, "timestamp": "2026-01-02T04:26:00Z", "transaction_amount_usd": 58762.53 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.86, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 574728.72, "financial_exposure_usd": 646364.02, "recoverable_pct": 0.382 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106673", "label": "benign", "label_confidence": 0.719, "severity": "medium", "timestamp": "2026-01-05T15:13:00Z", "trace_id": "d34f45e1-e6e3-5d55-657d-e3266d7a9011" }
{ "account_age_days": 687, "account_id": "ACCT-ABCA3BE919BA", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.377 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 727, "timestamp": "2026-01-05T15:13:00Z", "transaction_amount_usd": 8338.66 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 251.42, "financial_exposure_usd": 558.21, "recoverable_pct": 0.506 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102264", "label": "fraudulent", "label_confidence": 0.939, "severity": "medium", "timestamp": "2026-01-02T13:44:00Z", "trace_id": "7d13b658-cd6f-ca41-7ded-1b218de9e7bf" }
{ "account_age_days": 1346, "account_id": "ACCT-EA19C38713DF", "baseline_risk_score": 0.643, "kyc_tier": "tier_3", "session_entropy": 0.201 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 522, "timestamp": "2026-01-02T13:44:00Z", "transaction_amount_usd": 88736.28 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.555, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 548955.11, "financial_exposure_usd": 897889.87, "recoverable_pct": 0.566 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105907", "label": "fraudulent", "label_confidence": 0.763, "severity": "medium", "timestamp": "2026-01-05T02:27:00Z", "trace_id": "0107b6e4-1770-cb45-0e1c-d23595c1efbe" }
{ "account_age_days": 287, "account_id": "ACCT-09A175944D02", "baseline_risk_score": 0.234, "kyc_tier": "tier_2", "session_entropy": 0.618 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 408, "timestamp": "2026-01-05T02:27:00Z", "transaction_amount_usd": 2948700.31 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.811, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4237829.55, "financial_exposure_usd": 6193787.78, "recoverable_pct": 0.69 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106897", "label": "benign", "label_confidence": 0.549, "severity": "high", "timestamp": "2026-01-05T18:57:00Z", "trace_id": "468d7b11-53a5-64ba-23fa-abf75ee7b22a" }
{ "account_age_days": 1066, "account_id": "ACCT-B579822CCA4D", "baseline_risk_score": 0.097, "kyc_tier": "tier_1", "session_entropy": 0.535 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 115, "timestamp": "2026-01-05T18:57:00Z", "transaction_amount_usd": 10753.97 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.498, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1957.03, "financial_exposure_usd": 2955.67, "recoverable_pct": 0.743 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }