schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101316", "label": "fraudulent", "label_confidence": 0.862, "severity": "critical", "timestamp": "2026-01-01T21:56:00Z", "trace_id": "1e000dc9-8923-83f4-2463-0012166b79d1" }
{ "account_age_days": 931, "account_id": "ACCT-8D3E4EB7048F", "baseline_risk_score": 0.375, "kyc_tier": "tier_3", "session_entropy": 0.12 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 371, "timestamp": "2026-01-01T18:35:00Z", "transaction_amount_usd": 10.14 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.758, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 94860.8, "financial_exposure_usd": 189171.72, "recoverable_pct": 0.241 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106614", "label": "fraudulent", "label_confidence": 0.734, "severity": "medium", "timestamp": "2026-01-05T14:14:00Z", "trace_id": "97b462ea-bd35-a710-aca4-a9f2bafb646a" }
{ "account_age_days": 1801, "account_id": "ACCT-004D3F2E742F", "baseline_risk_score": 0.146, "kyc_tier": "tier_3", "session_entropy": 0.593 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 248, "timestamp": "2026-01-05T08:43:00Z", "transaction_amount_usd": 24.47 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.832, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2499820.93, "financial_exposure_usd": 3260948.09, "recoverable_pct": 0.637 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104043", "label": "fraudulent", "label_confidence": 0.915, "severity": "medium", "timestamp": "2026-01-03T19:23:00Z", "trace_id": "faa27461-5e7c-bee9-b56e-007713aa3b9e" }
{ "account_age_days": 1304, "account_id": "ACCT-10315BEC1DC2", "baseline_risk_score": 0.164, "kyc_tier": "tier_2", "session_entropy": 0.599 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 111, "timestamp": "2026-01-03T19:23:00Z", "transaction_amount_usd": 1889419.72 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.781, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1987531.08, "financial_exposure_usd": 1999892.16, "recoverable_pct": 0.575 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102657", "label": "fraudulent", "label_confidence": 0.965, "severity": "critical", "timestamp": "2026-01-02T20:17:00Z", "trace_id": "ac053e70-d867-45bc-48bd-01529dbb5c76" }
{ "account_age_days": 1891, "account_id": "ACCT-FD5F2B05C9ED", "baseline_risk_score": 0.305, "kyc_tier": "tier_2", "session_entropy": 0.742 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 793, "timestamp": "2026-01-02T20:17:00Z", "transaction_amount_usd": 42379.43 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.727, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 577114.36, "financial_exposure_usd": 871618.35, "recoverable_pct": 0.234 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109878", "label": "benign", "label_confidence": 0.538, "severity": "critical", "timestamp": "2026-01-07T20:38:00Z", "trace_id": "cc738481-aa67-3735-0404-ca9022bd8d72" }
{ "account_age_days": 176, "account_id": "ACCT-79F3CA342FEE", "baseline_risk_score": 0.061, "kyc_tier": "tier_2", "session_entropy": 0.683 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 937, "timestamp": "2026-01-07T20:38:00Z", "transaction_amount_usd": 7686.96 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.54, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1465.72, "financial_exposure_usd": 2342.55, "recoverable_pct": 0.782 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104648", "label": "fraudulent", "label_confidence": 0.688, "severity": "high", "timestamp": "2026-01-04T05:28:00Z", "trace_id": "9b048d96-a6ad-401c-27db-a761da1b3635" }
{ "account_age_days": 1839, "account_id": "ACCT-5AA18E065E92", "baseline_risk_score": 0.099, "kyc_tier": "tier_3", "session_entropy": 0.328 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 80, "timestamp": "2026-01-04T01:46:00Z", "transaction_amount_usd": 23.48 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.451, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2830178.28, "financial_exposure_usd": 3541794.88, "recoverable_pct": 0.474 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104922", "label": "fraudulent", "label_confidence": 0.782, "severity": "medium", "timestamp": "2026-01-04T10:02:00Z", "trace_id": "e99d1ea4-a6d1-41fa-9668-d8c51350b12d" }
{ "account_age_days": 1037, "account_id": "ACCT-B4CFCE36C259", "baseline_risk_score": 0.313, "kyc_tier": "tier_2", "session_entropy": 0.496 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 695, "timestamp": "2026-01-04T10:02:00Z", "transaction_amount_usd": 2158253.04 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.789, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3404773.07, "financial_exposure_usd": 5738470.97, "recoverable_pct": 0.792 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105793", "label": "fraudulent", "label_confidence": 0.669, "severity": "medium", "timestamp": "2026-01-05T00:33:00Z", "trace_id": "bde627c4-d0ab-228e-333e-b96b58ea01ed" }
{ "account_age_days": 960, "account_id": "ACCT-75976468FBFB", "baseline_risk_score": 0.386, "kyc_tier": "tier_2", "session_entropy": 0.864 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 172, "timestamp": "2026-01-04T17:29:00Z", "transaction_amount_usd": 15.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.713, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4022941.36, "financial_exposure_usd": 5659427.05, "recoverable_pct": 0.904 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100599", "label": "fraudulent", "label_confidence": 0.898, "severity": "low", "timestamp": "2026-01-01T09:59:00Z", "trace_id": "bf02676c-6958-ade0-4a31-1006f343eaa7" }
{ "account_age_days": 367, "account_id": "ACCT-18F056AC07B8", "baseline_risk_score": 0.47, "kyc_tier": "tier_3", "session_entropy": 0.731 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 1138, "timestamp": "2026-01-01T09:59:00Z", "transaction_amount_usd": 63278.03 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.751, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 630228.25, "financial_exposure_usd": 989264.56, "recoverable_pct": 0.272 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102836", "label": "fraudulent", "label_confidence": 0.805, "severity": "high", "timestamp": "2026-01-02T23:16:00Z", "trace_id": "fe75a5f2-168f-fbcc-2e9d-8b067a27a2ec" }
{ "account_age_days": 1011, "account_id": "ACCT-550423E2B2C4", "baseline_risk_score": 0.368, "kyc_tier": "tier_2", "session_entropy": 0.687 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 253, "timestamp": "2026-01-02T23:16:00Z", "transaction_amount_usd": 116657.88 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.606, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 345510.46, "financial_exposure_usd": 351589.66, "recoverable_pct": 0.79 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107829", "label": "benign", "label_confidence": 0.506, "severity": "critical", "timestamp": "2026-01-06T10:29:00Z", "trace_id": "c1b50d3c-9ccc-e7c4-92ca-ba3c5158c229" }
{ "account_age_days": 1023, "account_id": "ACCT-02BB57905F56", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.193 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 124, "timestamp": "2026-01-06T03:05:00Z", "transaction_amount_usd": 13.43 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.702, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1695.73, "financial_exposure_usd": 1895.38, "recoverable_pct": 0.577 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100250", "label": "fraudulent", "label_confidence": 0.97, "severity": "critical", "timestamp": "2026-01-01T04:10:00Z", "trace_id": "05ddffbf-bd21-0b7d-f5b3-50ab731bd233" }
{ "account_age_days": 484, "account_id": "ACCT-C5C734B488C5", "baseline_risk_score": 0.552, "kyc_tier": "tier_2", "session_entropy": 0.68 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 323, "timestamp": "2026-01-01T04:10:00Z", "transaction_amount_usd": 70839.09 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.715, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 500246.6, "financial_exposure_usd": 574989.75, "recoverable_pct": 0.738 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109550", "label": "benign", "label_confidence": 0.582, "severity": "low", "timestamp": "2026-01-07T15:10:00Z", "trace_id": "8c4507ba-3faf-593e-ade3-bd903b970d67" }
{ "account_age_days": 1580, "account_id": "ACCT-1476AAF1A6AD", "baseline_risk_score": 0.155, "kyc_tier": "tier_1", "session_entropy": 0.878 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 319, "timestamp": "2026-01-07T15:10:00Z", "transaction_amount_usd": 14584.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.535, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1937.72, "financial_exposure_usd": 3096.72, "recoverable_pct": 0.661 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108299", "label": "benign", "label_confidence": 0.646, "severity": "high", "timestamp": "2026-01-06T18:19:00Z", "trace_id": "75e29175-9d80-7d2a-786f-5d31a7c54cdf" }
{ "account_age_days": 1410, "account_id": "ACCT-A8B28F16D341", "baseline_risk_score": 0.15, "kyc_tier": "tier_3", "session_entropy": 0.292 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 104, "timestamp": "2026-01-06T09:34:00Z", "transaction_amount_usd": 18.32 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.651, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 595.86, "financial_exposure_usd": 1371.48, "recoverable_pct": 0.721 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109604", "label": "benign", "label_confidence": 0.748, "severity": "high", "timestamp": "2026-01-07T16:04:00Z", "trace_id": "922e62f2-fa52-20ca-aba4-72321d177674" }
{ "account_age_days": 1282, "account_id": "ACCT-91694F2AD634", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.928 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 618, "timestamp": "2026-01-07T16:04:00Z", "transaction_amount_usd": 8767.09 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.534, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 876.08, "financial_exposure_usd": 1133.73, "recoverable_pct": 0.634 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108640", "label": "benign", "label_confidence": 0.656, "severity": "low", "timestamp": "2026-01-07T00:00:00Z", "trace_id": "58eb705c-ee3f-17f4-71d9-aa1c477c4e61" }
{ "account_age_days": 234, "account_id": "ACCT-4866211418D1", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.422 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 283, "timestamp": "2026-01-06T21:40:00Z", "transaction_amount_usd": 12.23 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.666, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1490.17, "financial_exposure_usd": 1502.19, "recoverable_pct": 0.795 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101296", "label": "fraudulent", "label_confidence": 0.963, "severity": "critical", "timestamp": "2026-01-01T21:36:00Z", "trace_id": "27913868-9c9e-6623-8ba2-b87033c6906c" }
{ "account_age_days": 1646, "account_id": "ACCT-AA2977025C01", "baseline_risk_score": 0.481, "kyc_tier": "tier_1", "session_entropy": 0.916 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 485, "timestamp": "2026-01-01T21:36:00Z", "transaction_amount_usd": 66598.78 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.895, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 528967.82, "financial_exposure_usd": 1013106.78, "recoverable_pct": 0.7 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102787", "label": "fraudulent", "label_confidence": 0.899, "severity": "high", "timestamp": "2026-01-02T22:27:00Z", "trace_id": "02c55ae2-f2ff-f8ac-134c-fead3bc0c112" }
{ "account_age_days": 992, "account_id": "ACCT-5E35F27E9C05", "baseline_risk_score": 0.261, "kyc_tier": "tier_2", "session_entropy": 0.104 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 208, "timestamp": "2026-01-02T22:27:00Z", "transaction_amount_usd": 45200.09 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.548, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 655055.49, "financial_exposure_usd": 792862.77, "recoverable_pct": 0.369 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108921", "label": "benign", "label_confidence": 0.5, "severity": "medium", "timestamp": "2026-01-07T04:41:00Z", "trace_id": "63da3afe-650e-f144-441c-e6d21d9fe072" }
{ "account_age_days": 1310, "account_id": "ACCT-C8F2BFDFD626", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.714 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 189, "timestamp": "2026-01-06T21:11:00Z", "transaction_amount_usd": 22.44 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.557, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 345.84, "financial_exposure_usd": 354.2, "recoverable_pct": 0.561 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107988", "label": "benign", "label_confidence": 0.714, "severity": "low", "timestamp": "2026-01-06T13:08:00Z", "trace_id": "333cc701-29d0-07bf-75d9-fb097ab56d30" }
{ "account_age_days": 845, "account_id": "ACCT-6623A1174A93", "baseline_risk_score": 0.157, "kyc_tier": "tier_3", "session_entropy": 0.843 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 727, "timestamp": "2026-01-06T13:08:00Z", "transaction_amount_usd": 13417.42 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.784, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 385.32, "financial_exposure_usd": 533.82, "recoverable_pct": 0.779 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103872", "label": "fraudulent", "label_confidence": 0.616, "severity": "high", "timestamp": "2026-01-03T16:32:00Z", "trace_id": "48db95e3-a38b-ca5a-0c3d-667e770f08af" }
{ "account_age_days": 1936, "account_id": "ACCT-F1D469087989", "baseline_risk_score": 0.247, "kyc_tier": "tier_2", "session_entropy": 0.399 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 496, "timestamp": "2026-01-03T16:32:00Z", "transaction_amount_usd": 1171744.22 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.696, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3303908.65, "financial_exposure_usd": 3635293.37, "recoverable_pct": 0.766 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103255", "label": "fraudulent", "label_confidence": 0.969, "severity": "critical", "timestamp": "2026-01-03T06:15:00Z", "trace_id": "0823c333-27a0-a22b-4872-76f3fcfa7ead" }
{ "account_age_days": 1104, "account_id": "ACCT-849E96FF1D51", "baseline_risk_score": 0.631, "kyc_tier": "tier_1", "session_entropy": 0.168 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 815, "timestamp": "2026-01-03T06:15:00Z", "transaction_amount_usd": 6725.86 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.713, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 544740.65, "financial_exposure_usd": 632193.93, "recoverable_pct": 0.824 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107336", "label": "benign", "label_confidence": 0.656, "severity": "high", "timestamp": "2026-01-06T02:16:00Z", "trace_id": "a8792ccf-964c-9d28-4e5a-6fb965429789" }
{ "account_age_days": 1247, "account_id": "ACCT-7B25ABF313E9", "baseline_risk_score": 0.169, "kyc_tier": "tier_2", "session_entropy": 0.218 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 773, "timestamp": "2026-01-06T02:16:00Z", "transaction_amount_usd": 14064.69 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.767, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1613.08, "financial_exposure_usd": 1977.72, "recoverable_pct": 0.585 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105339", "label": "fraudulent", "label_confidence": 0.907, "severity": "critical", "timestamp": "2026-01-04T16:59:00Z", "trace_id": "c9134ab1-bc26-c66b-9410-b6575efdfce4" }
{ "account_age_days": 736, "account_id": "ACCT-0148B48F36EE", "baseline_risk_score": 0.14, "kyc_tier": "tier_1", "session_entropy": 0.322 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 980, "timestamp": "2026-01-04T16:59:00Z", "transaction_amount_usd": 65377.1 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.784, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3440365.97, "financial_exposure_usd": 5144003.38, "recoverable_pct": 0.976 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108855", "label": "benign", "label_confidence": 0.476, "severity": "medium", "timestamp": "2026-01-07T03:35:00Z", "trace_id": "8e32ff38-93cd-0bc9-a85a-8b338bdb58d2" }
{ "account_age_days": 1331, "account_id": "ACCT-EE53802A32CE", "baseline_risk_score": 0.191, "kyc_tier": "tier_2", "session_entropy": 0.614 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 289, "timestamp": "2026-01-06T22:42:00Z", "transaction_amount_usd": 3.05 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.731, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 898.41, "financial_exposure_usd": 1237.73, "recoverable_pct": 0.828 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109171", "label": "benign", "label_confidence": 0.715, "severity": "low", "timestamp": "2026-01-07T08:51:00Z", "trace_id": "2eacb3a1-3b45-5fb4-57a6-9176ce7704f4" }
{ "account_age_days": 1722, "account_id": "ACCT-47C3EC9F779A", "baseline_risk_score": 0.141, "kyc_tier": "tier_2", "session_entropy": 0.537 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 257, "timestamp": "2026-01-07T00:09:00Z", "transaction_amount_usd": 14.85 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.692, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3508.14, "financial_exposure_usd": 4110.32, "recoverable_pct": 0.824 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109647", "label": "benign", "label_confidence": 0.504, "severity": "low", "timestamp": "2026-01-07T16:47:00Z", "trace_id": "939190e8-b85c-105e-b9a5-d806ed9e7032" }
{ "account_age_days": 1677, "account_id": "ACCT-E28FE3EA42BF", "baseline_risk_score": 0.077, "kyc_tier": "tier_1", "session_entropy": 0.751 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 277, "timestamp": "2026-01-07T16:47:00Z", "transaction_amount_usd": 8287.32 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.582, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 467.53, "financial_exposure_usd": 1051.58, "recoverable_pct": 0.734 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105760", "label": "fraudulent", "label_confidence": 0.895, "severity": "high", "timestamp": "2026-01-05T00:00:00Z", "trace_id": "bc93580a-7939-5999-012c-8a65e9984e62" }
{ "account_age_days": 864, "account_id": "ACCT-522E445A46FE", "baseline_risk_score": 0.311, "kyc_tier": "tier_1", "session_entropy": 0.296 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 130, "timestamp": "2026-01-05T00:00:00Z", "transaction_amount_usd": 730833.79 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.916, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1368101.03, "financial_exposure_usd": 2278995.74, "recoverable_pct": 0.955 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105854", "label": "fraudulent", "label_confidence": 0.87, "severity": "medium", "timestamp": "2026-01-05T01:34:00Z", "trace_id": "2584708c-3f8b-ee3e-097f-1c5579da9d81" }
{ "account_age_days": 1296, "account_id": "ACCT-92B6E41173E0", "baseline_risk_score": 0.081, "kyc_tier": "tier_2", "session_entropy": 0.853 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 437, "timestamp": "2026-01-05T01:34:00Z", "transaction_amount_usd": 1009118.09 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.478, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2276434.41, "financial_exposure_usd": 3196763.99, "recoverable_pct": 0.615 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104926", "label": "fraudulent", "label_confidence": 0.942, "severity": "low", "timestamp": "2026-01-04T10:06:00Z", "trace_id": "c7687aa3-27e3-9105-195e-a8778b0b7a45" }
{ "account_age_days": 1479, "account_id": "ACCT-8508DA2D70B1", "baseline_risk_score": 0.1, "kyc_tier": "tier_2", "session_entropy": 0.522 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 1127, "timestamp": "2026-01-04T10:06:00Z", "transaction_amount_usd": 392877.48 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.824, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3874463.23, "financial_exposure_usd": 6908387.61, "recoverable_pct": 0.632 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102986", "label": "fraudulent", "label_confidence": 0.929, "severity": "critical", "timestamp": "2026-01-03T01:46:00Z", "trace_id": "1568b21a-0368-a5f4-023c-6eba460b4b61" }
{ "account_age_days": 1646, "account_id": "ACCT-5A91B840044C", "baseline_risk_score": 0.399, "kyc_tier": "tier_3", "session_entropy": 0.352 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 290, "timestamp": "2026-01-02T21:29:00Z", "transaction_amount_usd": 1.52 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.452, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 448400.91, "financial_exposure_usd": 621416.97, "recoverable_pct": 0.086 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108565", "label": "benign", "label_confidence": 0.481, "severity": "medium", "timestamp": "2026-01-06T22:45:00Z", "trace_id": "12525afd-cbda-cd3e-d47f-4f334c07afc5" }
{ "account_age_days": 227, "account_id": "ACCT-899547200ADF", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.203 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 250, "timestamp": "2026-01-06T11:23:00Z", "transaction_amount_usd": 24.9 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.585, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1409.92, "financial_exposure_usd": 1536.52, "recoverable_pct": 0.841 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100319", "label": "fraudulent", "label_confidence": 0.978, "severity": "low", "timestamp": "2026-01-01T05:19:00Z", "trace_id": "60040d0d-5257-c31b-724c-5cd007ac3372" }
{ "account_age_days": 222, "account_id": "ACCT-8D399EC423B5", "baseline_risk_score": 0.498, "kyc_tier": "tier_3", "session_entropy": 0.696 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 908, "timestamp": "2026-01-01T05:19:00Z", "transaction_amount_usd": 30420.75 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.762, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 602824.73, "financial_exposure_usd": 775831.14, "recoverable_pct": 0.668 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103068", "label": "fraudulent", "label_confidence": 0.975, "severity": "high", "timestamp": "2026-01-03T03:08:00Z", "trace_id": "18fd61e2-b48d-0e01-f245-56a982e66a76" }
{ "account_age_days": 257, "account_id": "ACCT-482EEEEEA2C4", "baseline_risk_score": 0.275, "kyc_tier": "tier_1", "session_entropy": 0.229 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 293, "timestamp": "2026-01-02T16:02:00Z", "transaction_amount_usd": 20.16 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.672, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 472910.37, "financial_exposure_usd": 788365.84, "recoverable_pct": 0.66 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101292", "label": "fraudulent", "label_confidence": 0.846, "severity": "high", "timestamp": "2026-01-01T21:32:00Z", "trace_id": "c02ff977-4b86-8cf7-be29-173f6e9c8c37" }
{ "account_age_days": 373, "account_id": "ACCT-50EFE60637D1", "baseline_risk_score": 0.629, "kyc_tier": "tier_1", "session_entropy": 0.463 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 612, "timestamp": "2026-01-01T21:32:00Z", "transaction_amount_usd": 103986.65 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.365, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 604128.04, "financial_exposure_usd": 697404.75, "recoverable_pct": 0.316 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102123", "label": "fraudulent", "label_confidence": 0.807, "severity": "low", "timestamp": "2026-01-02T11:23:00Z", "trace_id": "ed801aa3-1a00-d282-4eba-e81bbf95acda" }
{ "account_age_days": 1876, "account_id": "ACCT-088DD6C7E118", "baseline_risk_score": 0.419, "kyc_tier": "tier_3", "session_entropy": 0.349 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 437, "timestamp": "2026-01-02T11:23:00Z", "transaction_amount_usd": 7804.34 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.697, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 477654.22, "financial_exposure_usd": 1114086.35, "recoverable_pct": 0.203 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106002", "label": "fraudulent", "label_confidence": 0.947, "severity": "medium", "timestamp": "2026-01-05T04:02:00Z", "trace_id": "d9f40816-7da7-d950-c93b-b9b16c9a7053" }
{ "account_age_days": 461, "account_id": "ACCT-7E49C21BA678", "baseline_risk_score": 0.088, "kyc_tier": "tier_2", "session_entropy": 0.491 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 96, "timestamp": "2026-01-05T04:02:00Z", "transaction_amount_usd": 1534998.49 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.5, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste...
{ "customer_funds_at_risk_usd": 5613553.89, "financial_exposure_usd": 5948580.71, "recoverable_pct": 0.878 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104379", "label": "fraudulent", "label_confidence": 0.802, "severity": "high", "timestamp": "2026-01-04T00:59:00Z", "trace_id": "edd3fee6-8e82-a267-4906-dff2131fa3cb" }
{ "account_age_days": 173, "account_id": "ACCT-D7167DA21CF1", "baseline_risk_score": 0.194, "kyc_tier": "tier_1", "session_entropy": 0.852 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 814, "timestamp": "2026-01-04T00:59:00Z", "transaction_amount_usd": 1948545.79 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.401, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1596698.86, "financial_exposure_usd": 2651082.03, "recoverable_pct": 0.924 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103933", "label": "fraudulent", "label_confidence": 0.777, "severity": "low", "timestamp": "2026-01-03T17:33:00Z", "trace_id": "285bb855-c3c6-bff3-a4f3-fdf4948e49fd" }
{ "account_age_days": 279, "account_id": "ACCT-0FDC5C5BAE72", "baseline_risk_score": 0.127, "kyc_tier": "tier_2", "session_entropy": 0.638 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 371, "timestamp": "2026-01-03T09:54:00Z", "transaction_amount_usd": 4.86 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.368, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6934895.72, "financial_exposure_usd": 8616809.04, "recoverable_pct": 0.485 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102963", "label": "fraudulent", "label_confidence": 0.913, "severity": "low", "timestamp": "2026-01-03T01:23:00Z", "trace_id": "e3b44b36-f272-483a-45fd-f3578119dc5a" }
{ "account_age_days": 947, "account_id": "ACCT-B8406CAE8FDF", "baseline_risk_score": 0.313, "kyc_tier": "tier_2", "session_entropy": 0.229 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 255, "timestamp": "2026-01-02T17:50:00Z", "transaction_amount_usd": 11.89 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.538, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 315981.2, "financial_exposure_usd": 641732.25, "recoverable_pct": 0.526 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101205", "label": "fraudulent", "label_confidence": 0.924, "severity": "critical", "timestamp": "2026-01-01T20:05:00Z", "trace_id": "f3bdf446-870c-c4cb-854b-e984e3edc8ee" }
{ "account_age_days": 1679, "account_id": "ACCT-171811278F00", "baseline_risk_score": 0.296, "kyc_tier": "tier_3", "session_entropy": 0.448 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 339, "timestamp": "2026-01-01T10:11:00Z", "transaction_amount_usd": 4.96 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.784, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 606671.21, "financial_exposure_usd": 731396.42, "recoverable_pct": 0.132 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109952", "label": "benign", "label_confidence": 0.645, "severity": "low", "timestamp": "2026-01-07T21:52:00Z", "trace_id": "b3776a30-205a-0278-b9ed-6166e1952e67" }
{ "account_age_days": 317, "account_id": "ACCT-2FB3AE588021", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.276 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 168, "timestamp": "2026-01-07T18:56:00Z", "transaction_amount_usd": 13.45 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.724, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 454.84, "financial_exposure_usd": 942.06, "recoverable_pct": 0.909 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103722", "label": "fraudulent", "label_confidence": 0.764, "severity": "low", "timestamp": "2026-01-03T14:02:00Z", "trace_id": "b58dd3c4-adfe-5711-f0b5-57dd3ee33da6" }
{ "account_age_days": 690, "account_id": "ACCT-6696B3F27418", "baseline_risk_score": 0.39, "kyc_tier": "tier_2", "session_entropy": 0.159 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 861, "timestamp": "2026-01-03T14:02:00Z", "transaction_amount_usd": 2183574.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.702, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4068085.72, "financial_exposure_usd": 4796877.08, "recoverable_pct": 0.882 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106254", "label": "fraudulent", "label_confidence": 0.916, "severity": "medium", "timestamp": "2026-01-05T08:14:00Z", "trace_id": "71b8c968-93fd-5f0f-8417-c0762894c557" }
{ "account_age_days": 780, "account_id": "ACCT-AF9441EDFCBE", "baseline_risk_score": 0.389, "kyc_tier": "tier_1", "session_entropy": 0.647 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 315, "timestamp": "2026-01-05T02:18:00Z", "transaction_amount_usd": 6.61 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.717, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1878597.74, "financial_exposure_usd": 4157383.2, "recoverable_pct": 0.762 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105846", "label": "fraudulent", "label_confidence": 0.801, "severity": "high", "timestamp": "2026-01-05T01:26:00Z", "trace_id": "4b3eae18-adde-bbb8-7851-a16550e0d10e" }
{ "account_age_days": 8, "account_id": "ACCT-F8685902AD1C", "baseline_risk_score": 0.426, "kyc_tier": "tier_1", "session_entropy": 0.336 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 477, "timestamp": "2026-01-05T01:26:00Z", "transaction_amount_usd": 296695.13 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.509, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3583472.7, "financial_exposure_usd": 4305402.04, "recoverable_pct": 0.984 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106745", "label": "benign", "label_confidence": 0.681, "severity": "low", "timestamp": "2026-01-05T16:25:00Z", "trace_id": "24bc69a7-4ef4-1ad1-7d8d-9eeeb5d66b49" }
{ "account_age_days": 448, "account_id": "ACCT-12283DAFE14A", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.72 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 166, "timestamp": "2026-01-05T13:13:00Z", "transaction_amount_usd": 16.63 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.771, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 963.65, "financial_exposure_usd": 2098.02, "recoverable_pct": 0.908 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101953", "label": "fraudulent", "label_confidence": 0.867, "severity": "low", "timestamp": "2026-01-02T08:33:00Z", "trace_id": "43671b02-7cce-3532-3071-559787033d11" }
{ "account_age_days": 1748, "account_id": "ACCT-D1782BD22411", "baseline_risk_score": 0.531, "kyc_tier": "tier_2", "session_entropy": 0.623 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 390, "timestamp": "2026-01-02T07:07:00Z", "transaction_amount_usd": 24.3 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.577, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 1017154.36, "financial_exposure_usd": 1346066.84, "recoverable_pct": 0.186 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106454", "label": "fraudulent", "label_confidence": 0.892, "severity": "high", "timestamp": "2026-01-05T11:34:00Z", "trace_id": "a2132c57-6f35-6f8e-0aae-73b04d79f563" }
{ "account_age_days": 1667, "account_id": "ACCT-E844B5308A7F", "baseline_risk_score": 0.081, "kyc_tier": "tier_1", "session_entropy": 0.282 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 156, "timestamp": "2026-01-05T06:24:00Z", "transaction_amount_usd": 3.03 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.903, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1851279.25, "financial_exposure_usd": 4264420.39, "recoverable_pct": 0.676 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104189", "label": "fraudulent", "label_confidence": 0.802, "severity": "low", "timestamp": "2026-01-03T21:49:00Z", "trace_id": "8967dee6-78cb-d039-940c-42f57987d6c4" }
{ "account_age_days": 911, "account_id": "ACCT-FBE9FF272E8A", "baseline_risk_score": 0.31, "kyc_tier": "tier_1", "session_entropy": 0.314 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 241, "timestamp": "2026-01-03T16:49:00Z", "transaction_amount_usd": 1.78 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.599, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1177071.28, "financial_exposure_usd": 2201705.74, "recoverable_pct": 0.476 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101968", "label": "fraudulent", "label_confidence": 0.774, "severity": "critical", "timestamp": "2026-01-02T08:48:00Z", "trace_id": "d551e72b-4566-e004-5756-a13cabfdd5ad" }
{ "account_age_days": 1229, "account_id": "ACCT-D7C385FC2B52", "baseline_risk_score": 0.617, "kyc_tier": "tier_2", "session_entropy": 0.782 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 590, "timestamp": "2026-01-02T08:48:00Z", "transaction_amount_usd": 4771.67 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.911, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 431198.29, "financial_exposure_usd": 839373.79, "recoverable_pct": 0.71 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106876", "label": "benign", "label_confidence": 0.57, "severity": "medium", "timestamp": "2026-01-05T18:36:00Z", "trace_id": "4a6e6a1d-5b88-e2c2-bb25-37f7ec51f24e" }
{ "account_age_days": 607, "account_id": "ACCT-C042E9DE4C69", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.151 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 1026, "timestamp": "2026-01-05T18:36:00Z", "transaction_amount_usd": 9622.69 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.63, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 1669.03, "financial_exposure_usd": 2290.98, "recoverable_pct": 0.729 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100727", "label": "fraudulent", "label_confidence": 0.8, "severity": "low", "timestamp": "2026-01-01T12:07:00Z", "trace_id": "fbb7e845-cdb3-ade4-afbb-ce7f83ff7f39" }
{ "account_age_days": 1206, "account_id": "ACCT-9D7D02839790", "baseline_risk_score": 0.622, "kyc_tier": "tier_3", "session_entropy": 0.529 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 718, "timestamp": "2026-01-01T12:07:00Z", "transaction_amount_usd": 52312.93 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.413, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 765442.94, "financial_exposure_usd": 881234.03, "recoverable_pct": 0.808 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107158", "label": "benign", "label_confidence": 0.551, "severity": "medium", "timestamp": "2026-01-05T23:18:00Z", "trace_id": "d2bbcab9-d96a-3d54-90cf-6feb1e0cb933" }
{ "account_age_days": 602, "account_id": "ACCT-A2CB0592345C", "baseline_risk_score": 0.15, "kyc_tier": "tier_2", "session_entropy": 0.755 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 958, "timestamp": "2026-01-05T23:18:00Z", "transaction_amount_usd": 606.62 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.646, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 829.71, "financial_exposure_usd": 1959.67, "recoverable_pct": 0.543 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100873", "label": "fraudulent", "label_confidence": 0.774, "severity": "high", "timestamp": "2026-01-01T14:33:00Z", "trace_id": "e713ca88-5b44-4ff0-f9bd-97ea3bee00d8" }
{ "account_age_days": 915, "account_id": "ACCT-E5776900C034", "baseline_risk_score": 0.382, "kyc_tier": "tier_2", "session_entropy": 0.531 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 287, "timestamp": "2026-01-01T13:07:00Z", "transaction_amount_usd": 23.46 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.773, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 704633.37, "financial_exposure_usd": 805540.19, "recoverable_pct": 0.071 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108945", "label": "benign", "label_confidence": 0.661, "severity": "medium", "timestamp": "2026-01-07T05:05:00Z", "trace_id": "1495f555-a6b2-1c62-ef6f-1acaad2d9c1a" }
{ "account_age_days": 81, "account_id": "ACCT-24614FF202E3", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.606 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 1011, "timestamp": "2026-01-07T05:05:00Z", "transaction_amount_usd": 11797.52 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.501, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 702.69, "financial_exposure_usd": 1634.96, "recoverable_pct": 0.446 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107410", "label": "benign", "label_confidence": 0.535, "severity": "medium", "timestamp": "2026-01-06T03:30:00Z", "trace_id": "bd2fafc2-c18f-279b-d9a7-8a8a57d64bdf" }
{ "account_age_days": 237, "account_id": "ACCT-CD0B78C1AF35", "baseline_risk_score": 0.07, "kyc_tier": "tier_3", "session_entropy": 0.586 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 283, "timestamp": "2026-01-05T17:28:00Z", "transaction_amount_usd": 11.07 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.689, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2244.45, "financial_exposure_usd": 4152.58, "recoverable_pct": 0.561 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107946", "label": "benign", "label_confidence": 0.627, "severity": "medium", "timestamp": "2026-01-06T12:26:00Z", "trace_id": "f740ea39-6cf1-50b0-1368-9f5b6f4f710a" }
{ "account_age_days": 1416, "account_id": "ACCT-B8B4E2F5FAD0", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.866 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 191, "timestamp": "2026-01-06T02:54:00Z", "transaction_amount_usd": 9.05 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.636, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4716.96, "financial_exposure_usd": 4754.73, "recoverable_pct": 0.538 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102413", "label": "fraudulent", "label_confidence": 0.854, "severity": "medium", "timestamp": "2026-01-02T16:13:00Z", "trace_id": "39b48339-81e5-6da9-fb67-5ec81dae8746" }
{ "account_age_days": 280, "account_id": "ACCT-DA8266E254B7", "baseline_risk_score": 0.513, "kyc_tier": "tier_2", "session_entropy": 0.55 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 843, "timestamp": "2026-01-02T16:13:00Z", "transaction_amount_usd": 46373.36 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.556, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 582488.71, "financial_exposure_usd": 1005326.47, "recoverable_pct": 0.118 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101880", "label": "fraudulent", "label_confidence": 0.957, "severity": "medium", "timestamp": "2026-01-02T07:20:00Z", "trace_id": "5feef2a3-c4a6-7960-11a7-263a8b78fbbf" }
{ "account_age_days": 290, "account_id": "ACCT-94F57A365E7E", "baseline_risk_score": 0.591, "kyc_tier": "tier_2", "session_entropy": 0.516 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 146, "timestamp": "2026-01-02T06:04:00Z", "transaction_amount_usd": 17.7 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.483, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 735366.42, "financial_exposure_usd": 1002280.66, "recoverable_pct": 0.382 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102455", "label": "fraudulent", "label_confidence": 0.797, "severity": "high", "timestamp": "2026-01-02T16:55:00Z", "trace_id": "642c7bc2-1090-7525-efb8-c37be27137c6" }
{ "account_age_days": 1982, "account_id": "ACCT-98FC187D65E3", "baseline_risk_score": 0.418, "kyc_tier": "tier_1", "session_entropy": 0.856 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 244, "timestamp": "2026-01-02T16:55:00Z", "transaction_amount_usd": 43931.93 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.873, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 521540.34, "financial_exposure_usd": 636097.91, "recoverable_pct": 0.627 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104752", "label": "fraudulent", "label_confidence": 0.602, "severity": "medium", "timestamp": "2026-01-04T07:12:00Z", "trace_id": "b19181b5-4ff6-24dd-37be-564a83def7bb" }
{ "account_age_days": 384, "account_id": "ACCT-10F407358B07", "baseline_risk_score": 0.396, "kyc_tier": "tier_2", "session_entropy": 0.644 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 282, "timestamp": "2026-01-04T07:12:00Z", "transaction_amount_usd": 2339986.42 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.654, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3637181.07, "financial_exposure_usd": 3736436.44, "recoverable_pct": 0.815 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102924", "label": "fraudulent", "label_confidence": 0.855, "severity": "high", "timestamp": "2026-01-03T00:44:00Z", "trace_id": "ff9c02ef-db28-c70c-48ce-7edb8213ef3f" }
{ "account_age_days": 1194, "account_id": "ACCT-DF5C0C87CA58", "baseline_risk_score": 0.279, "kyc_tier": "tier_2", "session_entropy": 0.226 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 427, "timestamp": "2026-01-03T00:44:00Z", "transaction_amount_usd": 31531.43 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.466, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 591480.54, "financial_exposure_usd": 877705.06, "recoverable_pct": 0.101 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109053", "label": "benign", "label_confidence": 0.665, "severity": "high", "timestamp": "2026-01-07T06:53:00Z", "trace_id": "c7ec6979-da5a-5066-9aa0-1e8b0019944b" }
{ "account_age_days": 1304, "account_id": "ACCT-081E4442005A", "baseline_risk_score": 0.07, "kyc_tier": "tier_2", "session_entropy": 0.411 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 924, "timestamp": "2026-01-07T06:53:00Z", "transaction_amount_usd": 14506.99 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.474, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1803.82, "financial_exposure_usd": 3340.21, "recoverable_pct": 0.599 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109356", "label": "benign", "label_confidence": 0.457, "severity": "high", "timestamp": "2026-01-07T11:56:00Z", "trace_id": "e2409268-2bd7-915e-bf84-b9bac3bc3160" }
{ "account_age_days": 322, "account_id": "ACCT-AFD25B69239C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.595 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 337, "timestamp": "2026-01-07T06:36:00Z", "transaction_amount_usd": 18.13 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.45, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3430.27, "financial_exposure_usd": 5268.09, "recoverable_pct": 0.565 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102955", "label": "fraudulent", "label_confidence": 0.775, "severity": "high", "timestamp": "2026-01-03T01:15:00Z", "trace_id": "db721148-e776-5edf-1494-4fd3de8e7066" }
{ "account_age_days": 1829, "account_id": "ACCT-12498B29AB72", "baseline_risk_score": 0.477, "kyc_tier": "tier_1", "session_entropy": 0.313 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 942, "timestamp": "2026-01-03T01:15:00Z", "transaction_amount_usd": 81133.41 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.718, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 481523.68, "financial_exposure_usd": 1097662.74, "recoverable_pct": 0.684 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101881", "label": "fraudulent", "label_confidence": 0.818, "severity": "medium", "timestamp": "2026-01-02T07:21:00Z", "trace_id": "2101f2be-f9b1-5dae-3974-93dd05da85a9" }
{ "account_age_days": 609, "account_id": "ACCT-A13F034C3F84", "baseline_risk_score": 0.423, "kyc_tier": "tier_3", "session_entropy": 0.53 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 379, "timestamp": "2026-01-02T07:21:00Z", "transaction_amount_usd": 30604.76 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.571, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 95431.02, "financial_exposure_usd": 183086.13, "recoverable_pct": 0.694 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105199", "label": "fraudulent", "label_confidence": 0.687, "severity": "high", "timestamp": "2026-01-04T14:39:00Z", "trace_id": "a73f7a57-516e-725d-b291-553fc077a4a8" }
{ "account_age_days": 1073, "account_id": "ACCT-6528D3488489", "baseline_risk_score": 0.135, "kyc_tier": "tier_3", "session_entropy": 0.335 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 335, "timestamp": "2026-01-04T14:39:00Z", "transaction_amount_usd": 1068484.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.929, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3544346.2, "financial_exposure_usd": 4424353.95, "recoverable_pct": 0.88 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104781", "label": "fraudulent", "label_confidence": 0.709, "severity": "high", "timestamp": "2026-01-04T07:41:00Z", "trace_id": "505a621c-6e3b-427c-9f84-e0034b132647" }
{ "account_age_days": 1433, "account_id": "ACCT-E049D3770583", "baseline_risk_score": 0.397, "kyc_tier": "tier_1", "session_entropy": 0.239 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 163, "timestamp": "2026-01-04T05:46:00Z", "transaction_amount_usd": 3.61 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.395, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3974136.7, "financial_exposure_usd": 4072668.93, "recoverable_pct": 0.976 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101993", "label": "fraudulent", "label_confidence": 0.808, "severity": "high", "timestamp": "2026-01-02T09:13:00Z", "trace_id": "068fc40d-51ac-77d2-bf3c-a8cbf2a1beeb" }
{ "account_age_days": 465, "account_id": "ACCT-6AE632C7BB65", "baseline_risk_score": 0.304, "kyc_tier": "tier_3", "session_entropy": 0.805 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1184, "timestamp": "2026-01-02T09:13:00Z", "transaction_amount_usd": 73646.29 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.422, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 719664.13, "financial_exposure_usd": 1194229.7, "recoverable_pct": 0.588 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109716", "label": "benign", "label_confidence": 0.732, "severity": "medium", "timestamp": "2026-01-07T17:56:00Z", "trace_id": "f2101be2-f127-87fb-424a-749ca1629c4c" }
{ "account_age_days": 1037, "account_id": "ACCT-D439C4374AB3", "baseline_risk_score": 0.094, "kyc_tier": "tier_1", "session_entropy": 0.111 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 233, "timestamp": "2026-01-07T12:48:00Z", "transaction_amount_usd": 16.29 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.714, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3225.7, "financial_exposure_usd": 3915.74, "recoverable_pct": 0.729 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100886", "label": "fraudulent", "label_confidence": 0.855, "severity": "medium", "timestamp": "2026-01-01T14:46:00Z", "trace_id": "086ae1cd-d5ec-5cd5-5be1-ab7335cf7816" }
{ "account_age_days": 1178, "account_id": "ACCT-FC852065AD67", "baseline_risk_score": 0.567, "kyc_tier": "tier_1", "session_entropy": 0.32 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 286, "timestamp": "2026-01-01T13:23:00Z", "transaction_amount_usd": 6 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.905, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 382631.68, "financial_exposure_usd": 411296.58, "recoverable_pct": 0.802 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101173", "label": "fraudulent", "label_confidence": 0.84, "severity": "high", "timestamp": "2026-01-01T19:33:00Z", "trace_id": "5ba9376d-43d8-1bac-377f-3356ac8ca9fd" }
{ "account_age_days": 1130, "account_id": "ACCT-4E4DC19F9FD8", "baseline_risk_score": 0.319, "kyc_tier": "tier_2", "session_entropy": 0.778 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 758, "timestamp": "2026-01-01T19:33:00Z", "transaction_amount_usd": 27287.1 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.944, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 604447.21, "financial_exposure_usd": 923534.07, "recoverable_pct": 0.644 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102706", "label": "fraudulent", "label_confidence": 0.777, "severity": "high", "timestamp": "2026-01-02T21:06:00Z", "trace_id": "d93e71e6-4c9c-458a-4dc0-9bebb60876e8" }
{ "account_age_days": 557, "account_id": "ACCT-DD15F18FE84D", "baseline_risk_score": 0.548, "kyc_tier": "tier_3", "session_entropy": 0.718 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 146, "timestamp": "2026-01-02T11:29:00Z", "transaction_amount_usd": 21.93 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.761, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 320710.58, "financial_exposure_usd": 411664.38, "recoverable_pct": 0.838 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106431", "label": "fraudulent", "label_confidence": 0.745, "severity": "high", "timestamp": "2026-01-05T11:11:00Z", "trace_id": "d3565471-893e-05f1-4333-a7f5c0f1221e" }
{ "account_age_days": 1386, "account_id": "ACCT-036937A927A5", "baseline_risk_score": 0.146, "kyc_tier": "tier_2", "session_entropy": 0.948 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 213, "timestamp": "2026-01-05T04:44:00Z", "transaction_amount_usd": 14.06 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.799, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3914749.09, "financial_exposure_usd": 5572441.92, "recoverable_pct": 0.503 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104012", "label": "fraudulent", "label_confidence": 0.87, "severity": "high", "timestamp": "2026-01-03T18:52:00Z", "trace_id": "e49a6e0a-2830-609f-1106-916dfe624f19" }
{ "account_age_days": 679, "account_id": "ACCT-CDC15829F139", "baseline_risk_score": 0.078, "kyc_tier": "tier_1", "session_entropy": 0.228 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 1131, "timestamp": "2026-01-03T18:52:00Z", "transaction_amount_usd": 1999581.41 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.939, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1335988, "financial_exposure_usd": 2533387.24, "recoverable_pct": 0.975 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101134", "label": "fraudulent", "label_confidence": 0.79, "severity": "high", "timestamp": "2026-01-01T18:54:00Z", "trace_id": "4ceff595-3b53-7a6c-3754-1ce6d312115e" }
{ "account_age_days": 1465, "account_id": "ACCT-9C4660170096", "baseline_risk_score": 0.39, "kyc_tier": "tier_1", "session_entropy": 0.633 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 320, "timestamp": "2026-01-01T07:04:00Z", "transaction_amount_usd": 7.19 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.83, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 553418.29, "financial_exposure_usd": 1281295.9, "recoverable_pct": 0.6 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104359", "label": "fraudulent", "label_confidence": 0.733, "severity": "high", "timestamp": "2026-01-04T00:39:00Z", "trace_id": "33a067ee-0d47-7e72-5bdb-1c1b0ed9fef8" }
{ "account_age_days": 426, "account_id": "ACCT-7194DA5386DF", "baseline_risk_score": 0.081, "kyc_tier": "tier_3", "session_entropy": 0.224 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 346, "timestamp": "2026-01-04T00:39:00Z", "transaction_amount_usd": 1538128.05 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.798, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2640288.03, "financial_exposure_usd": 5442890.76, "recoverable_pct": 0.4 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100692", "label": "fraudulent", "label_confidence": 0.775, "severity": "low", "timestamp": "2026-01-01T11:32:00Z", "trace_id": "9db6679a-c69c-0c1c-b57a-9c4fcffc019f" }
{ "account_age_days": 1846, "account_id": "ACCT-0033D65C1B0F", "baseline_risk_score": 0.303, "kyc_tier": "tier_1", "session_entropy": 0.58 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 365, "timestamp": "2026-01-01T11:32:00Z", "transaction_amount_usd": 94893.31 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.95, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 80247.15, "financial_exposure_usd": 81510.09, "recoverable_pct": 0.776 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102337", "label": "fraudulent", "label_confidence": 0.789, "severity": "high", "timestamp": "2026-01-02T14:57:00Z", "trace_id": "758c70b9-992f-894d-88e9-a571971bee35" }
{ "account_age_days": 1996, "account_id": "ACCT-800EDC00EDA4", "baseline_risk_score": 0.45, "kyc_tier": "tier_3", "session_entropy": 0.714 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 131, "timestamp": "2026-01-02T08:55:00Z", "transaction_amount_usd": 19.99 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.931, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 320187.51, "financial_exposure_usd": 666553.06, "recoverable_pct": 0.229 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107052", "label": "benign", "label_confidence": 0.632, "severity": "low", "timestamp": "2026-01-05T21:32:00Z", "trace_id": "05a22085-b834-f5b9-ec99-5dcf16609a3c" }
{ "account_age_days": 7, "account_id": "ACCT-FA2DDD4CAB42", "baseline_risk_score": 0.054, "kyc_tier": "tier_1", "session_entropy": 0.728 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 805, "timestamp": "2026-01-05T21:32:00Z", "transaction_amount_usd": 12350.97 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.607, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 396.79, "financial_exposure_usd": 692.65, "recoverable_pct": 0.948 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100026", "label": "fraudulent", "label_confidence": 0.974, "severity": "critical", "timestamp": "2026-01-01T00:26:00Z", "trace_id": "4ddb1b36-272c-0588-84a2-576c1fc905f8" }
{ "account_age_days": 656, "account_id": "ACCT-83D5BCEB5EDB", "baseline_risk_score": 0.594, "kyc_tier": "tier_1", "session_entropy": 0.577 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 120, "timestamp": "2025-12-31T20:50:00Z", "transaction_amount_usd": 12.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.424, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 264103.87, "financial_exposure_usd": 481281.51, "recoverable_pct": 0.082 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108149", "label": "benign", "label_confidence": 0.453, "severity": "medium", "timestamp": "2026-01-06T15:49:00Z", "trace_id": "3203a50c-9be4-dd49-c88f-0a4148661f58" }
{ "account_age_days": 965, "account_id": "ACCT-629F53CD2C96", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.574 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 408, "timestamp": "2026-01-06T15:49:00Z", "transaction_amount_usd": 3966.06 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.728, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 501.74, "financial_exposure_usd": 570.89, "recoverable_pct": 0.587 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109215", "label": "benign", "label_confidence": 0.585, "severity": "medium", "timestamp": "2026-01-07T09:35:00Z", "trace_id": "d9840082-a8c1-72df-042d-6d26099fc48a" }
{ "account_age_days": 814, "account_id": "ACCT-FBCA0FC5A930", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.792 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 770, "timestamp": "2026-01-07T09:35:00Z", "transaction_amount_usd": 10750.49 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.732, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2807.46, "financial_exposure_usd": 4801.78, "recoverable_pct": 0.895 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102232", "label": "fraudulent", "label_confidence": 0.867, "severity": "medium", "timestamp": "2026-01-02T13:12:00Z", "trace_id": "6c22ba81-f6df-8082-b73d-4107dbd2ce10" }
{ "account_age_days": 620, "account_id": "ACCT-46773115A041", "baseline_risk_score": 0.487, "kyc_tier": "tier_2", "session_entropy": 0.341 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 958, "timestamp": "2026-01-02T13:12:00Z", "transaction_amount_usd": 115447.26 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.428, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 684813.33, "financial_exposure_usd": 892983.86, "recoverable_pct": 0.623 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104746", "label": "fraudulent", "label_confidence": 0.71, "severity": "low", "timestamp": "2026-01-04T07:06:00Z", "trace_id": "b392a294-18c3-b6d6-0bc1-4dbe530d2a7a" }
{ "account_age_days": 1509, "account_id": "ACCT-9803BF38A1FE", "baseline_risk_score": 0.335, "kyc_tier": "tier_2", "session_entropy": 0.328 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 98, "timestamp": "2026-01-04T07:06:00Z", "transaction_amount_usd": 472981.55 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.635, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1394779.92, "financial_exposure_usd": 2856218.63, "recoverable_pct": 0.7 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104411", "label": "fraudulent", "label_confidence": 0.674, "severity": "critical", "timestamp": "2026-01-04T01:31:00Z", "trace_id": "8b0ee317-cdfa-b2be-50ce-f523b33da677" }
{ "account_age_days": 1479, "account_id": "ACCT-5963847DF24B", "baseline_risk_score": 0.295, "kyc_tier": "tier_3", "session_entropy": 0.2 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 988, "timestamp": "2026-01-04T01:31:00Z", "transaction_amount_usd": 1331290.62 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.64, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3339454.99, "financial_exposure_usd": 3432116.44, "recoverable_pct": 0.54 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105905", "label": "fraudulent", "label_confidence": 0.936, "severity": "medium", "timestamp": "2026-01-05T02:25:00Z", "trace_id": "d81c28e7-ab28-ce07-1ff0-d03eff3e518c" }
{ "account_age_days": 1043, "account_id": "ACCT-A50464D098F7", "baseline_risk_score": 0.108, "kyc_tier": "tier_1", "session_entropy": 0.82 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 1061, "timestamp": "2026-01-05T02:25:00Z", "transaction_amount_usd": 2632357.45 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.705, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2846401.63, "financial_exposure_usd": 3121700.12, "recoverable_pct": 0.593 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105836", "label": "fraudulent", "label_confidence": 0.696, "severity": "low", "timestamp": "2026-01-05T01:16:00Z", "trace_id": "9dd758bc-3ba7-d815-ad2b-4b9c13ecb0d4" }
{ "account_age_days": 1431, "account_id": "ACCT-54BEB98E02C8", "baseline_risk_score": 0.099, "kyc_tier": "tier_2", "session_entropy": 0.797 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 108, "timestamp": "2026-01-04T14:35:00Z", "transaction_amount_usd": 21.97 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.808, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2041524.17, "financial_exposure_usd": 2137803.43, "recoverable_pct": 0.896 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102325", "label": "fraudulent", "label_confidence": 0.762, "severity": "high", "timestamp": "2026-01-02T14:45:00Z", "trace_id": "e059122a-5dd8-0908-c780-1e71940507eb" }
{ "account_age_days": 549, "account_id": "ACCT-BB24023CFA08", "baseline_risk_score": 0.481, "kyc_tier": "tier_2", "session_entropy": 0.698 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 301, "timestamp": "2026-01-02T10:58:00Z", "transaction_amount_usd": 12.24 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.424, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 0, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 0, "financial_exposure_usd": 0, "recoverable_pct": 0.246 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107979", "label": "benign", "label_confidence": 0.623, "severity": "low", "timestamp": "2026-01-06T12:59:00Z", "trace_id": "73424513-91c8-ce04-dc02-983db5a2aef1" }
{ "account_age_days": 74, "account_id": "ACCT-9B44C432B63D", "baseline_risk_score": 0.155, "kyc_tier": "tier_2", "session_entropy": 0.258 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 85, "timestamp": "2026-01-06T12:59:00Z", "transaction_amount_usd": 2341.25 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.692, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2560.73, "financial_exposure_usd": 3957.44, "recoverable_pct": 0.923 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100579", "label": "fraudulent", "label_confidence": 0.854, "severity": "medium", "timestamp": "2026-01-01T09:39:00Z", "trace_id": "256e7315-8826-e7b4-84a9-4794d2d76444" }
{ "account_age_days": 693, "account_id": "ACCT-DD1347515119", "baseline_risk_score": 0.558, "kyc_tier": "tier_3", "session_entropy": 0.849 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 137, "timestamp": "2026-01-01T03:40:00Z", "transaction_amount_usd": 15.09 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.862, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 9", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 389606.1, "financial_exposure_usd": 607376.71, "recoverable_pct": 0.455 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103634", "label": "fraudulent", "label_confidence": 0.808, "severity": "high", "timestamp": "2026-01-03T12:34:00Z", "trace_id": "1c144042-e3b0-f26c-7380-11a5ac79b10e" }
{ "account_age_days": 1555, "account_id": "ACCT-B681E89A4AE9", "baseline_risk_score": 0.205, "kyc_tier": "tier_2", "session_entropy": 0.511 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 1089, "timestamp": "2026-01-03T12:34:00Z", "transaction_amount_usd": 198035.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.444, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2388081.26, "financial_exposure_usd": 3175955.38, "recoverable_pct": 0.832 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105377", "label": "fraudulent", "label_confidence": 0.775, "severity": "medium", "timestamp": "2026-01-04T17:37:00Z", "trace_id": "fd2b5c22-ad1a-b969-b101-688839be56fe" }
{ "account_age_days": 803, "account_id": "ACCT-5D768E5D436A", "baseline_risk_score": 0.212, "kyc_tier": "tier_2", "session_entropy": 0.305 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 893, "timestamp": "2026-01-04T17:37:00Z", "transaction_amount_usd": 288249.46 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.826, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3479371.31, "financial_exposure_usd": 3677143.16, "recoverable_pct": 0.962 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104444", "label": "fraudulent", "label_confidence": 0.654, "severity": "high", "timestamp": "2026-01-04T02:04:00Z", "trace_id": "45715080-7f99-576c-5834-b5e7b3c6c2a1" }
{ "account_age_days": 1939, "account_id": "ACCT-609539A77B3F", "baseline_risk_score": 0.241, "kyc_tier": "tier_3", "session_entropy": 0.556 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 302, "timestamp": "2026-01-03T18:03:00Z", "transaction_amount_usd": 11.96 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.604, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1885889.06, "financial_exposure_usd": 4653751.04, "recoverable_pct": 0.912 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100588", "label": "fraudulent", "label_confidence": 0.788, "severity": "high", "timestamp": "2026-01-01T09:48:00Z", "trace_id": "7f35adcc-aca7-55e7-b4ac-cc151c088b33" }
{ "account_age_days": 1803, "account_id": "ACCT-951EB7D6AC7C", "baseline_risk_score": 0.615, "kyc_tier": "tier_2", "session_entropy": 0.154 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 410, "timestamp": "2026-01-01T09:48:00Z", "transaction_amount_usd": 76875.7 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.733, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 161815.89, "financial_exposure_usd": 351810.11, "recoverable_pct": 0.591 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106560", "label": "fraudulent", "label_confidence": 0.919, "severity": "high", "timestamp": "2026-01-05T13:20:00Z", "trace_id": "2303aebc-8fad-eae7-ff37-20764a5180ee" }
{ "account_age_days": 231, "account_id": "ACCT-925D0017438E", "baseline_risk_score": 0.12, "kyc_tier": "tier_2", "session_entropy": 0.899 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 151, "timestamp": "2026-01-05T08:37:00Z", "transaction_amount_usd": 17.04 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.384, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2174526.61, "financial_exposure_usd": 2543238.4, "recoverable_pct": 0.942 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100218", "label": "fraudulent", "label_confidence": 0.949, "severity": "medium", "timestamp": "2026-01-01T03:38:00Z", "trace_id": "b96a5305-3ed1-d8f8-153d-2c6b1790834b" }
{ "account_age_days": 1658, "account_id": "ACCT-3A8E36FD7E4C", "baseline_risk_score": 0.339, "kyc_tier": "tier_3", "session_entropy": 0.707 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 1041, "timestamp": "2026-01-01T03:38:00Z", "transaction_amount_usd": 54835 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.411, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 280038.64, "financial_exposure_usd": 584388.55, "recoverable_pct": 0.832 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109174", "label": "benign", "label_confidence": 0.575, "severity": "medium", "timestamp": "2026-01-07T08:54:00Z", "trace_id": "c30b7163-07ee-91f2-3b17-8382b53283fa" }
{ "account_age_days": 1880, "account_id": "ACCT-74C66F978D9B", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.487 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 570, "timestamp": "2026-01-07T08:54:00Z", "transaction_amount_usd": 14437.23 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.66, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 1402.83, "financial_exposure_usd": 1524.11, "recoverable_pct": 0.609 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108062", "label": "benign", "label_confidence": 0.689, "severity": "low", "timestamp": "2026-01-06T14:22:00Z", "trace_id": "31bddc9a-7cf8-13f3-400f-f3370c16a444" }
{ "account_age_days": 421, "account_id": "ACCT-407CBC3E5341", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.237 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 1198, "timestamp": "2026-01-06T14:22:00Z", "transaction_amount_usd": 10103.29 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.724, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 462.79, "financial_exposure_usd": 1024.41, "recoverable_pct": 0.561 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106306", "label": "fraudulent", "label_confidence": 0.831, "severity": "low", "timestamp": "2026-01-05T09:06:00Z", "trace_id": "cca2e445-e95e-b19b-2c0a-cad4cf327567" }
{ "account_age_days": 855, "account_id": "ACCT-8CAB5518C429", "baseline_risk_score": 0.064, "kyc_tier": "tier_2", "session_entropy": 0.679 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 196, "timestamp": "2026-01-05T01:22:00Z", "transaction_amount_usd": 0.78 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.593, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2800243.43, "financial_exposure_usd": 3353101.73, "recoverable_pct": 0.603 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }