schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109594", "label": "benign", "label_confidence": 0.732, "severity": "medium", "timestamp": "2026-01-07T15:54:00Z", "trace_id": "ccf02a86-32ca-88d6-605d-d513be5f2071" }
{ "account_age_days": 727, "account_id": "ACCT-59BE6E6ED69D", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.204 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 214, "timestamp": "2026-01-07T12:32:00Z", "transaction_amount_usd": 10.56 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.649, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1598.07, "financial_exposure_usd": 3049.75, "recoverable_pct": 0.509 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100350", "label": "fraudulent", "label_confidence": 0.856, "severity": "high", "timestamp": "2026-01-01T05:50:00Z", "trace_id": "d72199da-6b85-0f21-cf94-86881a40a57d" }
{ "account_age_days": 1912, "account_id": "ACCT-1477BA83BC3F", "baseline_risk_score": 0.378, "kyc_tier": "tier_3", "session_entropy": 0.745 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 395, "timestamp": "2026-01-01T05:50:00Z", "transaction_amount_usd": 51055.33 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.669, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 582209.32, "financial_exposure_usd": 594908.05, "recoverable_pct": 0.796 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101015", "label": "fraudulent", "label_confidence": 0.899, "severity": "critical", "timestamp": "2026-01-01T16:55:00Z", "trace_id": "d54af5d7-d79b-71a5-f91b-d964970a3a73" }
{ "account_age_days": 1694, "account_id": "ACCT-2EF3376F8342", "baseline_risk_score": 0.484, "kyc_tier": "tier_2", "session_entropy": 0.334 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 189, "timestamp": "2026-01-01T11:33:00Z", "transaction_amount_usd": 4.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.39, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 439469.48, "financial_exposure_usd": 485805.2, "recoverable_pct": 0.617 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109555", "label": "benign", "label_confidence": 0.632, "severity": "low", "timestamp": "2026-01-07T15:15:00Z", "trace_id": "543ac18f-1af7-0921-d6c9-dcc10a44939b" }
{ "account_age_days": 984, "account_id": "ACCT-4D01A14385BD", "baseline_risk_score": 0.182, "kyc_tier": "tier_1", "session_entropy": 0.723 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 520, "timestamp": "2026-01-07T15:15:00Z", "transaction_amount_usd": 7816.56 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.494, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 996.09, "financial_exposure_usd": 1834.32, "recoverable_pct": 0.756 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107621", "label": "benign", "label_confidence": 0.651, "severity": "low", "timestamp": "2026-01-06T07:01:00Z", "trace_id": "50706c93-59b7-be0d-9991-21deff079e49" }
{ "account_age_days": 1034, "account_id": "ACCT-7D0F6C02EF0F", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.799 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 335, "timestamp": "2026-01-05T21:03:00Z", "transaction_amount_usd": 17.71 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2007.91, "financial_exposure_usd": 2610.89, "recoverable_pct": 0.998 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101915", "label": "fraudulent", "label_confidence": 0.838, "severity": "critical", "timestamp": "2026-01-02T07:55:00Z", "trace_id": "5b92af06-2e57-d7be-8926-4afc25f8e854" }
{ "account_age_days": 1740, "account_id": "ACCT-8848941FFF89", "baseline_risk_score": 0.532, "kyc_tier": "tier_2", "session_entropy": 0.135 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 260, "timestamp": "2026-01-02T05:53:00Z", "transaction_amount_usd": 5 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.617, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 323842.95, "financial_exposure_usd": 489729.25, "recoverable_pct": 0.433 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102208", "label": "fraudulent", "label_confidence": 0.75, "severity": "critical", "timestamp": "2026-01-02T12:48:00Z", "trace_id": "fb37625c-70f2-027b-61f0-1d24779ce760" }
{ "account_age_days": 1779, "account_id": "ACCT-343543C4DB68", "baseline_risk_score": 0.647, "kyc_tier": "tier_2", "session_entropy": 0.255 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 783, "timestamp": "2026-01-02T12:48:00Z", "transaction_amount_usd": 81494.32 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.859, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 326685.34, "financial_exposure_usd": 407848.74, "recoverable_pct": 0.305 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107919", "label": "benign", "label_confidence": 0.628, "severity": "critical", "timestamp": "2026-01-06T11:59:00Z", "trace_id": "35cfeda0-dc6c-b7dc-5bc0-e33937cea28c" }
{ "account_age_days": 155, "account_id": "ACCT-AFEB22C3F534", "baseline_risk_score": 0.137, "kyc_tier": "tier_3", "session_entropy": 0.259 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 323, "timestamp": "2026-01-06T08:04:00Z", "transaction_amount_usd": 4.57 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.687, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2109.36, "financial_exposure_usd": 2846.53, "recoverable_pct": 0.842 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103335", "label": "fraudulent", "label_confidence": 0.773, "severity": "high", "timestamp": "2026-01-03T07:35:00Z", "trace_id": "55557e78-ae13-6dbb-e3ea-04f45df76081" }
{ "account_age_days": 1096, "account_id": "ACCT-9FA7E6585EEF", "baseline_risk_score": 0.336, "kyc_tier": "tier_3", "session_entropy": 0.537 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 622, "timestamp": "2026-01-03T07:35:00Z", "transaction_amount_usd": 1080326.37 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.721, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5792264.19, "financial_exposure_usd": 7037655.78, "recoverable_pct": 0.602 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101099", "label": "fraudulent", "label_confidence": 0.907, "severity": "high", "timestamp": "2026-01-01T18:19:00Z", "trace_id": "ff9c1f21-c6dc-661c-6fb1-166065237bb2" }
{ "account_age_days": 592, "account_id": "ACCT-3789DD8F117B", "baseline_risk_score": 0.332, "kyc_tier": "tier_1", "session_entropy": 0.378 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1097, "timestamp": "2026-01-01T18:19:00Z", "transaction_amount_usd": 36745.88 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.931, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 852209.13, "financial_exposure_usd": 1139035.16, "recoverable_pct": 0.234 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101857", "label": "fraudulent", "label_confidence": 0.834, "severity": "medium", "timestamp": "2026-01-02T06:57:00Z", "trace_id": "581239b7-d656-5aa8-4746-3292b2b0e224" }
{ "account_age_days": 1459, "account_id": "ACCT-470A4DCDBA53", "baseline_risk_score": 0.546, "kyc_tier": "tier_2", "session_entropy": 0.37 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 189, "timestamp": "2026-01-02T06:57:00Z", "transaction_amount_usd": 111315.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.528, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 314007.56, "financial_exposure_usd": 659061.59, "recoverable_pct": 0.319 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100397", "label": "fraudulent", "label_confidence": 0.907, "severity": "high", "timestamp": "2026-01-01T06:37:00Z", "trace_id": "6f95be22-3fac-dfa6-4c95-6585a59b0682" }
{ "account_age_days": 1744, "account_id": "ACCT-A4BA67D7712B", "baseline_risk_score": 0.476, "kyc_tier": "tier_3", "session_entropy": 0.348 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 401, "timestamp": "2026-01-01T06:37:00Z", "transaction_amount_usd": 109884.51 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.854, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 423492.79, "financial_exposure_usd": 678787.4, "recoverable_pct": 0.167 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105126", "label": "fraudulent", "label_confidence": 0.845, "severity": "high", "timestamp": "2026-01-04T13:26:00Z", "trace_id": "6beb2ef8-e617-82eb-27a5-de598c816520" }
{ "account_age_days": 950, "account_id": "ACCT-2E99E624F2C7", "baseline_risk_score": 0.149, "kyc_tier": "tier_3", "session_entropy": 0.584 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 505, "timestamp": "2026-01-04T13:26:00Z", "transaction_amount_usd": 1438882.97 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.711, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1873256.77, "financial_exposure_usd": 2295774.42, "recoverable_pct": 0.473 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105598", "label": "fraudulent", "label_confidence": 0.618, "severity": "medium", "timestamp": "2026-01-04T21:18:00Z", "trace_id": "732486ab-0bb8-e4b2-09a7-988a0e2941a9" }
{ "account_age_days": 1095, "account_id": "ACCT-E1AA8E42B623", "baseline_risk_score": 0.341, "kyc_tier": "tier_2", "session_entropy": 0.93 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 1046, "timestamp": "2026-01-04T21:18:00Z", "transaction_amount_usd": 2446575.64 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.687, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 811849.46, "financial_exposure_usd": 1710971.35, "recoverable_pct": 0.685 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105165", "label": "fraudulent", "label_confidence": 0.628, "severity": "high", "timestamp": "2026-01-04T14:05:00Z", "trace_id": "d743fd55-41ef-a09a-e0ff-f93af14f46fb" }
{ "account_age_days": 1868, "account_id": "ACCT-130B5C9F6037", "baseline_risk_score": 0.313, "kyc_tier": "tier_1", "session_entropy": 0.643 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 802, "timestamp": "2026-01-04T14:05:00Z", "transaction_amount_usd": 1822836.22 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.703, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1405476.79, "financial_exposure_usd": 2680583.62, "recoverable_pct": 0.548 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106088", "label": "fraudulent", "label_confidence": 0.746, "severity": "low", "timestamp": "2026-01-05T05:28:00Z", "trace_id": "b495d434-11bc-ce45-2b2a-535e3bd7bb5a" }
{ "account_age_days": 1008, "account_id": "ACCT-58D1B64ED566", "baseline_risk_score": 0.281, "kyc_tier": "tier_2", "session_entropy": 0.283 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 98, "timestamp": "2026-01-04T20:23:00Z", "transaction_amount_usd": 6.23 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED",...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.849, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5665517.07, "financial_exposure_usd": 8249672.94, "recoverable_pct": 0.544 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102621", "label": "fraudulent", "label_confidence": 0.955, "severity": "medium", "timestamp": "2026-01-02T19:41:00Z", "trace_id": "36a8befa-a8e6-0fe4-5493-61c2da1ef5b6" }
{ "account_age_days": 1616, "account_id": "ACCT-8F96BDFE086C", "baseline_risk_score": 0.553, "kyc_tier": "tier_2", "session_entropy": 0.399 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 399, "timestamp": "2026-01-02T11:56:00Z", "transaction_amount_usd": 6.91 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.541, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 495030.69, "financial_exposure_usd": 830982.14, "recoverable_pct": 0.053 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103173", "label": "fraudulent", "label_confidence": 0.801, "severity": "critical", "timestamp": "2026-01-03T04:53:00Z", "trace_id": "3fe93622-76ff-2bbe-ef21-57a94b85d087" }
{ "account_age_days": 422, "account_id": "ACCT-745BE7C6748F", "baseline_risk_score": 0.456, "kyc_tier": "tier_1", "session_entropy": 0.368 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 299, "timestamp": "2026-01-03T04:53:00Z", "transaction_amount_usd": 46418.53 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.891, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 622488.82, "financial_exposure_usd": 627801.95, "recoverable_pct": 0.714 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101686", "label": "fraudulent", "label_confidence": 0.836, "severity": "high", "timestamp": "2026-01-02T04:06:00Z", "trace_id": "021ddaec-b15b-0f25-5889-feef74a8b3d9" }
{ "account_age_days": 141, "account_id": "ACCT-759309CBA41F", "baseline_risk_score": 0.532, "kyc_tier": "tier_2", "session_entropy": 0.837 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 416, "timestamp": "2026-01-02T04:06:00Z", "transaction_amount_usd": 5448.34 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.697, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 530480.76, "financial_exposure_usd": 884133.73, "recoverable_pct": 0.85 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109226", "label": "benign", "label_confidence": 0.69, "severity": "high", "timestamp": "2026-01-07T09:46:00Z", "trace_id": "b0a2e955-23e1-b1d4-0339-41c55dfe74a5" }
{ "account_age_days": 1999, "account_id": "ACCT-88784AA605B9", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.774 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 128, "timestamp": "2026-01-07T04:57:00Z", "transaction_amount_usd": 4.31 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.759, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1088.23, "financial_exposure_usd": 1196.2, "recoverable_pct": 0.901 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100167", "label": "fraudulent", "label_confidence": 0.825, "severity": "critical", "timestamp": "2026-01-01T02:47:00Z", "trace_id": "7aeee7df-5bd5-5037-f744-459609791408" }
{ "account_age_days": 1338, "account_id": "ACCT-F9A013BE55C1", "baseline_risk_score": 0.307, "kyc_tier": "tier_2", "session_entropy": 0.447 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 723, "timestamp": "2026-01-01T02:47:00Z", "transaction_amount_usd": 26532.18 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.915, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 551925.66, "financial_exposure_usd": 713866.38, "recoverable_pct": 0.136 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109052", "label": "benign", "label_confidence": 0.536, "severity": "critical", "timestamp": "2026-01-07T06:52:00Z", "trace_id": "f9e072fe-5032-854f-88ac-5b7ae2499209" }
{ "account_age_days": 1260, "account_id": "ACCT-C35300223C01", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.564 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1118, "timestamp": "2026-01-07T06:52:00Z", "transaction_amount_usd": 8708.22 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.627, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3264.84, "financial_exposure_usd": 4922.21, "recoverable_pct": 0.755 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109943", "label": "benign", "label_confidence": 0.603, "severity": "high", "timestamp": "2026-01-07T21:43:00Z", "trace_id": "fe219059-637c-a58a-9768-168ef88556ce" }
{ "account_age_days": 473, "account_id": "ACCT-3EF19FC0098E", "baseline_risk_score": 0.068, "kyc_tier": "tier_1", "session_entropy": 0.505 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 638, "timestamp": "2026-01-07T21:43:00Z", "transaction_amount_usd": 10904.09 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.515, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3562.26, "financial_exposure_usd": 4717.13, "recoverable_pct": 0.408 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104539", "label": "fraudulent", "label_confidence": 0.762, "severity": "medium", "timestamp": "2026-01-04T03:39:00Z", "trace_id": "2acc6a84-99c8-2b07-1929-1082b957438c" }
{ "account_age_days": 1858, "account_id": "ACCT-3FAD4E9118E0", "baseline_risk_score": 0.222, "kyc_tier": "tier_1", "session_entropy": 0.764 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 306, "timestamp": "2026-01-04T03:39:00Z", "transaction_amount_usd": 1051986.73 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.667, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1788869.31, "financial_exposure_usd": 3055729.6, "recoverable_pct": 0.663 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106208", "label": "fraudulent", "label_confidence": 0.611, "severity": "high", "timestamp": "2026-01-05T07:28:00Z", "trace_id": "200d5381-cf26-b3bf-e925-b65653272433" }
{ "account_age_days": 790, "account_id": "ACCT-DCD1292A57E4", "baseline_risk_score": 0.055, "kyc_tier": "tier_1", "session_entropy": 0.217 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 234, "timestamp": "2026-01-04T21:29:00Z", "transaction_amount_usd": 5.83 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.618, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5231785.31, "financial_exposure_usd": 6108651.51, "recoverable_pct": 0.407 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102715", "label": "fraudulent", "label_confidence": 0.885, "severity": "high", "timestamp": "2026-01-02T21:15:00Z", "trace_id": "f913f4dc-6225-e2d7-9d8a-c38791a5a919" }
{ "account_age_days": 687, "account_id": "ACCT-773FAE91E789", "baseline_risk_score": 0.44, "kyc_tier": "tier_2", "session_entropy": 0.693 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1194, "timestamp": "2026-01-02T21:15:00Z", "transaction_amount_usd": 21089.01 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.738, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 521622.34, "financial_exposure_usd": 1055455.13, "recoverable_pct": 0.018 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109392", "label": "benign", "label_confidence": 0.699, "severity": "low", "timestamp": "2026-01-07T12:32:00Z", "trace_id": "fb65127a-bece-df53-d527-549c98ac229d" }
{ "account_age_days": 1477, "account_id": "ACCT-6152CC34C969", "baseline_risk_score": 0.198, "kyc_tier": "tier_3", "session_entropy": 0.11 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 1134, "timestamp": "2026-01-07T12:32:00Z", "transaction_amount_usd": 758.31 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.797, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 940.42, "financial_exposure_usd": 1736.23, "recoverable_pct": 0.663 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102520", "label": "fraudulent", "label_confidence": 0.894, "severity": "high", "timestamp": "2026-01-02T18:00:00Z", "trace_id": "45257fc0-721a-0d82-db66-d163ef3bbdf7" }
{ "account_age_days": 783, "account_id": "ACCT-816576C84254", "baseline_risk_score": 0.33, "kyc_tier": "tier_2", "session_entropy": 0.88 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 210, "timestamp": "2026-01-02T10:15:00Z", "transaction_amount_usd": 10.72 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.446, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 282080.03, "financial_exposure_usd": 531374.81, "recoverable_pct": 0.246 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100324", "label": "fraudulent", "label_confidence": 0.883, "severity": "high", "timestamp": "2026-01-01T05:24:00Z", "trace_id": "7b2acbee-4056-20d4-625a-c0d9fce35a66" }
{ "account_age_days": 1927, "account_id": "ACCT-5D5B7ADBEE77", "baseline_risk_score": 0.297, "kyc_tier": "tier_1", "session_entropy": 0.692 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 996, "timestamp": "2026-01-01T05:24:00Z", "transaction_amount_usd": 64489.12 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.543, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 602331.17, "financial_exposure_usd": 666857.84, "recoverable_pct": 0.76 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104159", "label": "fraudulent", "label_confidence": 0.941, "severity": "low", "timestamp": "2026-01-03T21:19:00Z", "trace_id": "a8a4b571-c592-5a57-c870-a218c40f7d62" }
{ "account_age_days": 394, "account_id": "ACCT-7CD007B94110", "baseline_risk_score": 0.289, "kyc_tier": "tier_2", "session_entropy": 0.126 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 1104, "timestamp": "2026-01-03T21:19:00Z", "transaction_amount_usd": 472151.2 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.575, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6210714.01, "financial_exposure_usd": 6514789.15, "recoverable_pct": 0.446 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102970", "label": "fraudulent", "label_confidence": 0.83, "severity": "high", "timestamp": "2026-01-03T01:30:00Z", "trace_id": "5cf9d918-9683-0a98-ca28-27cdb5fb1bb0" }
{ "account_age_days": 1888, "account_id": "ACCT-BE194B94F17D", "baseline_risk_score": 0.456, "kyc_tier": "tier_1", "session_entropy": 0.306 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 665, "timestamp": "2026-01-03T01:30:00Z", "transaction_amount_usd": 18899.33 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.881, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 302403.57, "financial_exposure_usd": 544401.95, "recoverable_pct": 0.607 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105111", "label": "fraudulent", "label_confidence": 0.609, "severity": "high", "timestamp": "2026-01-04T13:11:00Z", "trace_id": "a0b14cdb-afac-a63d-5e63-2b06c1245bf5" }
{ "account_age_days": 1156, "account_id": "ACCT-727DF43F7FE7", "baseline_risk_score": 0.397, "kyc_tier": "tier_1", "session_entropy": 0.542 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1161, "timestamp": "2026-01-04T13:11:00Z", "transaction_amount_usd": 1907469.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.731, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3874771.38, "financial_exposure_usd": 9273497.04, "recoverable_pct": 0.548 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101441", "label": "fraudulent", "label_confidence": 0.834, "severity": "high", "timestamp": "2026-01-02T00:01:00Z", "trace_id": "ba78f5d5-8d35-a804-67a7-00209784945d" }
{ "account_age_days": 1437, "account_id": "ACCT-54DC54BFD2DA", "baseline_risk_score": 0.448, "kyc_tier": "tier_2", "session_entropy": 0.557 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 109, "timestamp": "2026-01-02T00:01:00Z", "transaction_amount_usd": 80049.34 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.703, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 756552.29, "financial_exposure_usd": 1040119.57, "recoverable_pct": 0.33 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103667", "label": "fraudulent", "label_confidence": 0.683, "severity": "critical", "timestamp": "2026-01-03T13:07:00Z", "trace_id": "ae81c83f-21a1-8084-7a77-2aa074c5ba9b" }
{ "account_age_days": 1169, "account_id": "ACCT-F4E62ED16225", "baseline_risk_score": 0.36, "kyc_tier": "tier_3", "session_entropy": 0.202 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 834, "timestamp": "2026-01-03T13:07:00Z", "transaction_amount_usd": 2812750.08 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.51, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 1479054.54, "financial_exposure_usd": 2557670.2, "recoverable_pct": 0.732 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103482", "label": "fraudulent", "label_confidence": 0.858, "severity": "high", "timestamp": "2026-01-03T10:02:00Z", "trace_id": "0e2579f2-50f8-da02-5a57-eeaa0a4ce44e" }
{ "account_age_days": 1421, "account_id": "ACCT-777B758CF783", "baseline_risk_score": 0.446, "kyc_tier": "tier_2", "session_entropy": 0.328 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 271, "timestamp": "2026-01-03T06:49:00Z", "transaction_amount_usd": 9.73 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.42, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 3405170.55, "financial_exposure_usd": 8396606.93, "recoverable_pct": 0.76 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108572", "label": "benign", "label_confidence": 0.716, "severity": "low", "timestamp": "2026-01-06T22:52:00Z", "trace_id": "001b2cea-2e77-b27a-2600-0d142606dbaa" }
{ "account_age_days": 51, "account_id": "ACCT-ED694AA086D6", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.412 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 193, "timestamp": "2026-01-06T12:22:00Z", "transaction_amount_usd": 18.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.728, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 5344.2, "financial_exposure_usd": 8269.91, "recoverable_pct": 0.591 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109577", "label": "benign", "label_confidence": 0.499, "severity": "high", "timestamp": "2026-01-07T15:37:00Z", "trace_id": "128dce61-7da1-0158-89a2-90e0e5c54215" }
{ "account_age_days": 902, "account_id": "ACCT-0556D6ECE1A5", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.932 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 150, "timestamp": "2026-01-07T10:03:00Z", "transaction_amount_usd": 23.73 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.697, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3385.57, "financial_exposure_usd": 3414.53, "recoverable_pct": 0.869 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102162", "label": "fraudulent", "label_confidence": 0.884, "severity": "medium", "timestamp": "2026-01-02T12:02:00Z", "trace_id": "e1c20230-534d-9fc9-232c-a66a69b31064" }
{ "account_age_days": 1784, "account_id": "ACCT-7A9518A43B28", "baseline_risk_score": 0.512, "kyc_tier": "tier_1", "session_entropy": 0.633 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 1089, "timestamp": "2026-01-02T12:02:00Z", "transaction_amount_usd": 6600.5 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.353, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 576358.22, "financial_exposure_usd": 680120.71, "recoverable_pct": 0.204 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108202", "label": "benign", "label_confidence": 0.613, "severity": "low", "timestamp": "2026-01-06T16:42:00Z", "trace_id": "f849dd6d-ad18-be3f-9acc-b74a2b649970" }
{ "account_age_days": 520, "account_id": "ACCT-B9E9494CDBC4", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.663 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 1082, "timestamp": "2026-01-06T16:42:00Z", "transaction_amount_usd": 178.37 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.688, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1721.69, "financial_exposure_usd": 2104.67, "recoverable_pct": 0.901 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101883", "label": "fraudulent", "label_confidence": 0.774, "severity": "low", "timestamp": "2026-01-02T07:23:00Z", "trace_id": "248a591a-241c-5bca-3474-de29b848fc35" }
{ "account_age_days": 1141, "account_id": "ACCT-A05AF1B4491A", "baseline_risk_score": 0.273, "kyc_tier": "tier_2", "session_entropy": 0.166 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 678, "timestamp": "2026-01-02T07:23:00Z", "transaction_amount_usd": 98589.44 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.38, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 721933.88, "financial_exposure_usd": 946229.53, "recoverable_pct": 0.635 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104079", "label": "fraudulent", "label_confidence": 0.674, "severity": "medium", "timestamp": "2026-01-03T19:59:00Z", "trace_id": "86f722c1-c821-1e58-8dbd-2918be19e290" }
{ "account_age_days": 447, "account_id": "ACCT-DFC5169AAB50", "baseline_risk_score": 0.225, "kyc_tier": "tier_1", "session_entropy": 0.494 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 350, "timestamp": "2026-01-03T11:16:00Z", "transaction_amount_usd": 18.3 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.873, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2607248.08, "financial_exposure_usd": 3221320.45, "recoverable_pct": 0.936 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103948", "label": "fraudulent", "label_confidence": 0.862, "severity": "high", "timestamp": "2026-01-03T17:48:00Z", "trace_id": "7333e89f-3b52-b564-7554-8d9c73b976bd" }
{ "account_age_days": 1923, "account_id": "ACCT-3CA3D375AA22", "baseline_risk_score": 0.348, "kyc_tier": "tier_3", "session_entropy": 0.147 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 383, "timestamp": "2026-01-03T12:34:00Z", "transaction_amount_usd": 14.97 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.686, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 6194339.4, "financial_exposure_usd": 6465441.31, "recoverable_pct": 0.849 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104810", "label": "fraudulent", "label_confidence": 0.742, "severity": "high", "timestamp": "2026-01-04T08:10:00Z", "trace_id": "a0b8d381-46b3-6398-f033-5213943c8628" }
{ "account_age_days": 92, "account_id": "ACCT-8490B3BBF1AB", "baseline_risk_score": 0.383, "kyc_tier": "tier_2", "session_entropy": 0.446 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 1112, "timestamp": "2026-01-04T08:10:00Z", "transaction_amount_usd": 2220775.75 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.845, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 912384.82, "financial_exposure_usd": 1019473.29, "recoverable_pct": 0.97 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101561", "label": "fraudulent", "label_confidence": 0.751, "severity": "high", "timestamp": "2026-01-02T02:01:00Z", "trace_id": "3680f185-ad12-9264-810c-1e44c76e9d9b" }
{ "account_age_days": 1965, "account_id": "ACCT-73DDDF936BF3", "baseline_risk_score": 0.495, "kyc_tier": "tier_2", "session_entropy": 0.577 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 257, "timestamp": "2026-01-02T02:01:00Z", "transaction_amount_usd": 104870.15 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.715, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 347285.39, "financial_exposure_usd": 445117.11, "recoverable_pct": 0.124 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102694", "label": "fraudulent", "label_confidence": 0.81, "severity": "critical", "timestamp": "2026-01-02T20:54:00Z", "trace_id": "130f81cf-e0e1-1aa8-5d3c-1271d0fd51d5" }
{ "account_age_days": 1561, "account_id": "ACCT-79A5EF9F839D", "baseline_risk_score": 0.311, "kyc_tier": "tier_3", "session_entropy": 0.183 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 111, "timestamp": "2026-01-02T09:29:00Z", "transaction_amount_usd": 7.74 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.876, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 427231.41, "financial_exposure_usd": 749532.95, "recoverable_pct": 0.115 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106097", "label": "fraudulent", "label_confidence": 0.66, "severity": "low", "timestamp": "2026-01-05T05:37:00Z", "trace_id": "dce11418-3a88-2f86-1f76-20b37693a53d" }
{ "account_age_days": 1947, "account_id": "ACCT-F16E0A28C92E", "baseline_risk_score": 0.405, "kyc_tier": "tier_1", "session_entropy": 0.144 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 586, "timestamp": "2026-01-05T05:37:00Z", "transaction_amount_usd": 2854817.86 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.949, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2248349.96, "financial_exposure_usd": 5111570.47, "recoverable_pct": 0.9 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101121", "label": "fraudulent", "label_confidence": 0.777, "severity": "medium", "timestamp": "2026-01-01T18:41:00Z", "trace_id": "97772b61-50a4-d135-4704-4ab45a369481" }
{ "account_age_days": 1552, "account_id": "ACCT-C3ACB60501E8", "baseline_risk_score": 0.312, "kyc_tier": "tier_1", "session_entropy": 0.372 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 348, "timestamp": "2026-01-01T18:41:00Z", "transaction_amount_usd": 3344.08 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.573, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 503632.31, "financial_exposure_usd": 1145938.09, "recoverable_pct": 0.04 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105157", "label": "fraudulent", "label_confidence": 0.722, "severity": "high", "timestamp": "2026-01-04T13:57:00Z", "trace_id": "f2b27b6f-fc63-4499-1106-f051f875393f" }
{ "account_age_days": 103, "account_id": "ACCT-05CC490CB557", "baseline_risk_score": 0.442, "kyc_tier": "tier_3", "session_entropy": 0.465 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 214, "timestamp": "2026-01-04T13:57:00Z", "transaction_amount_usd": 2437006.32 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.807, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1528005.44, "financial_exposure_usd": 1705709.06, "recoverable_pct": 0.5 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105531", "label": "fraudulent", "label_confidence": 0.818, "severity": "high", "timestamp": "2026-01-04T20:11:00Z", "trace_id": "3efd2c53-f7d9-ddbb-fd67-d969db07e401" }
{ "account_age_days": 1348, "account_id": "ACCT-138A41C57B2E", "baseline_risk_score": 0.439, "kyc_tier": "tier_2", "session_entropy": 0.856 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 389, "timestamp": "2026-01-04T18:09:00Z", "transaction_amount_usd": 13.38 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.881, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4357398.89, "financial_exposure_usd": 7940585.47, "recoverable_pct": 0.523 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100644", "label": "fraudulent", "label_confidence": 0.859, "severity": "critical", "timestamp": "2026-01-01T10:44:00Z", "trace_id": "7d1324f7-2061-88aa-03c7-1011784ab448" }
{ "account_age_days": 743, "account_id": "ACCT-58746C41C650", "baseline_risk_score": 0.471, "kyc_tier": "tier_1", "session_entropy": 0.111 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 312, "timestamp": "2026-01-01T10:44:00Z", "transaction_amount_usd": 3320.3 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.94, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 465763.49, "financial_exposure_usd": 502797.36, "recoverable_pct": 0.54 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101243", "label": "fraudulent", "label_confidence": 0.964, "severity": "medium", "timestamp": "2026-01-01T20:43:00Z", "trace_id": "437bfa41-5854-0e55-c6f7-4f3bd1ca8fd4" }
{ "account_age_days": 863, "account_id": "ACCT-6F80A322BF86", "baseline_risk_score": 0.453, "kyc_tier": "tier_3", "session_entropy": 0.834 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 208, "timestamp": "2026-01-01T08:07:00Z", "transaction_amount_usd": 0.21 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.646, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 471598.22, "financial_exposure_usd": 786465.97, "recoverable_pct": 0.583 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102258", "label": "fraudulent", "label_confidence": 0.929, "severity": "high", "timestamp": "2026-01-02T13:38:00Z", "trace_id": "43c22d12-3e64-65b8-c3ba-2bd0d229bc0c" }
{ "account_age_days": 1838, "account_id": "ACCT-A98CDDC69FD1", "baseline_risk_score": 0.609, "kyc_tier": "tier_3", "session_entropy": 0.776 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1066, "timestamp": "2026-01-02T13:38:00Z", "transaction_amount_usd": 57911.1 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.647, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 953132.25, "financial_exposure_usd": 1457308.27, "recoverable_pct": 0.274 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100830", "label": "fraudulent", "label_confidence": 0.812, "severity": "medium", "timestamp": "2026-01-01T13:50:00Z", "trace_id": "0517fbd9-6cba-4531-1f01-ab6032650352" }
{ "account_age_days": 1042, "account_id": "ACCT-C207713A0469", "baseline_risk_score": 0.429, "kyc_tier": "tier_1", "session_entropy": 0.503 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 776, "timestamp": "2026-01-01T13:50:00Z", "transaction_amount_usd": 42132.05 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.925, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 185664.38, "financial_exposure_usd": 312003.54, "recoverable_pct": 0.615 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102183", "label": "fraudulent", "label_confidence": 0.958, "severity": "critical", "timestamp": "2026-01-02T12:23:00Z", "trace_id": "e8d5dec2-a046-dac0-8b38-ed84acc37f8e" }
{ "account_age_days": 1429, "account_id": "ACCT-DB82419AD7C3", "baseline_risk_score": 0.322, "kyc_tier": "tier_2", "session_entropy": 0.265 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 189, "timestamp": "2026-01-02T06:45:00Z", "transaction_amount_usd": 3.41 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.652, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 482359.19, "financial_exposure_usd": 551138.04, "recoverable_pct": 0.517 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102498", "label": "fraudulent", "label_confidence": 0.9, "severity": "high", "timestamp": "2026-01-02T17:38:00Z", "trace_id": "59512994-049c-77ba-390f-7223f85bca61" }
{ "account_age_days": 195, "account_id": "ACCT-684C549AB5B3", "baseline_risk_score": 0.581, "kyc_tier": "tier_1", "session_entropy": 0.577 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 605, "timestamp": "2026-01-02T17:38:00Z", "transaction_amount_usd": 77257.21 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.436, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 726086.63, "financial_exposure_usd": 831222.79, "recoverable_pct": 0.433 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102199", "label": "fraudulent", "label_confidence": 0.938, "severity": "medium", "timestamp": "2026-01-02T12:39:00Z", "trace_id": "2cdc5c97-6fb2-7dc0-b6e5-ed5887904407" }
{ "account_age_days": 706, "account_id": "ACCT-3012C1E3F423", "baseline_risk_score": 0.541, "kyc_tier": "tier_3", "session_entropy": 0.894 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 947, "timestamp": "2026-01-02T12:39:00Z", "transaction_amount_usd": 44557.15 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.559, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 670174.37, "financial_exposure_usd": 756125.56, "recoverable_pct": 0.212 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103427", "label": "fraudulent", "label_confidence": 0.701, "severity": "medium", "timestamp": "2026-01-03T09:07:00Z", "trace_id": "e84af40f-3780-1c2d-b12a-47561582c7a2" }
{ "account_age_days": 268, "account_id": "ACCT-389314701C0B", "baseline_risk_score": 0.079, "kyc_tier": "tier_3", "session_entropy": 0.373 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 229, "timestamp": "2026-01-03T01:44:00Z", "transaction_amount_usd": 13.84 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.711, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2833394.26, "financial_exposure_usd": 3373756.68, "recoverable_pct": 0.907 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107527", "label": "benign", "label_confidence": 0.71, "severity": "high", "timestamp": "2026-01-06T05:27:00Z", "trace_id": "656882b6-c483-0b51-bb4c-d67f9c7c3257" }
{ "account_age_days": 1274, "account_id": "ACCT-0F724B4367F0", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.945 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 1116, "timestamp": "2026-01-06T05:27:00Z", "transaction_amount_usd": 14108.29 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG"...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.513, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2201.1, "financial_exposure_usd": 2559.26, "recoverable_pct": 0.473 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102692", "label": "fraudulent", "label_confidence": 0.798, "severity": "medium", "timestamp": "2026-01-02T20:52:00Z", "trace_id": "f7db3361-5436-a86f-b3de-ac03eb2c384b" }
{ "account_age_days": 461, "account_id": "ACCT-24D1374F6305", "baseline_risk_score": 0.587, "kyc_tier": "tier_3", "session_entropy": 0.117 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 450, "timestamp": "2026-01-02T20:52:00Z", "transaction_amount_usd": 62908 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.534, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 335476.1, "financial_exposure_usd": 714495.17, "recoverable_pct": 0.023 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100902", "label": "fraudulent", "label_confidence": 0.924, "severity": "medium", "timestamp": "2026-01-01T15:02:00Z", "trace_id": "a42f9410-e8f3-f24f-f1de-1c28de136628" }
{ "account_age_days": 652, "account_id": "ACCT-FAB8F016C47C", "baseline_risk_score": 0.25, "kyc_tier": "tier_3", "session_entropy": 0.481 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 386, "timestamp": "2026-01-01T15:02:00Z", "transaction_amount_usd": 99299.81 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.515, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 477093.17, "financial_exposure_usd": 782910.13, "recoverable_pct": 0.756 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109349", "label": "benign", "label_confidence": 0.556, "severity": "medium", "timestamp": "2026-01-07T11:49:00Z", "trace_id": "88a1425b-1051-74c8-f951-e28951b1f64b" }
{ "account_age_days": 1229, "account_id": "ACCT-92353B74F514", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.938 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1061, "timestamp": "2026-01-07T11:49:00Z", "transaction_amount_usd": 1434.16 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.598, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 933.05, "financial_exposure_usd": 2005.91, "recoverable_pct": 0.585 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104284", "label": "fraudulent", "label_confidence": 0.808, "severity": "medium", "timestamp": "2026-01-03T23:24:00Z", "trace_id": "d1b4ff28-00a0-1c53-5511-92a8625ef3a6" }
{ "account_age_days": 202, "account_id": "ACCT-FB2E7B01A7A1", "baseline_risk_score": 0.441, "kyc_tier": "tier_3", "session_entropy": 0.358 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 181, "timestamp": "2026-01-03T16:19:00Z", "transaction_amount_usd": 3.1 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED",...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.641, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3581494.48, "financial_exposure_usd": 6417732.25, "recoverable_pct": 0.423 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105344", "label": "fraudulent", "label_confidence": 0.847, "severity": "medium", "timestamp": "2026-01-04T17:04:00Z", "trace_id": "b1abe342-4b15-a413-754c-a5a8319c546e" }
{ "account_age_days": 676, "account_id": "ACCT-9F532802D9FB", "baseline_risk_score": 0.386, "kyc_tier": "tier_2", "session_entropy": 0.839 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 101, "timestamp": "2026-01-04T17:04:00Z", "transaction_amount_usd": 532861.06 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.536, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3129956.75, "financial_exposure_usd": 5239871.61, "recoverable_pct": 0.452 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103000", "label": "fraudulent", "label_confidence": 0.975, "severity": "critical", "timestamp": "2026-01-03T02:00:00Z", "trace_id": "8bd693c8-e090-765e-aaee-37d85073cd33" }
{ "account_age_days": 574, "account_id": "ACCT-2EA8494237D9", "baseline_risk_score": 0.265, "kyc_tier": "tier_3", "session_entropy": 0.648 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "GB", "latency_ms": 183, "timestamp": "2026-01-03T02:00:00Z", "transaction_amount_usd": 62435.21 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.693, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 1137556.27, "financial_exposure_usd": 1206709.66, "recoverable_pct": 0.027 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103806", "label": "fraudulent", "label_confidence": 0.785, "severity": "high", "timestamp": "2026-01-03T15:26:00Z", "trace_id": "36492104-b541-60dc-4df6-22d23f8a4bba" }
{ "account_age_days": 1143, "account_id": "ACCT-B60BD3A63A07", "baseline_risk_score": 0.218, "kyc_tier": "tier_2", "session_entropy": 0.697 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 256, "timestamp": "2026-01-03T05:48:00Z", "transaction_amount_usd": 11.88 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.832, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1489409.3, "financial_exposure_usd": 3041927.81, "recoverable_pct": 0.404 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101935", "label": "fraudulent", "label_confidence": 0.791, "severity": "critical", "timestamp": "2026-01-02T08:15:00Z", "trace_id": "8757c819-da49-3f2e-17b5-b75a348f8d30" }
{ "account_age_days": 196, "account_id": "ACCT-C6189502EDED", "baseline_risk_score": 0.339, "kyc_tier": "tier_2", "session_entropy": 0.289 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 144, "timestamp": "2026-01-01T22:48:00Z", "transaction_amount_usd": 18.7 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.629, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 271957.09, "financial_exposure_usd": 446595.33, "recoverable_pct": 0.808 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109307", "label": "benign", "label_confidence": 0.455, "severity": "low", "timestamp": "2026-01-07T11:07:00Z", "trace_id": "2259c9a4-cc6c-50d2-c537-a99c7855ce3e" }
{ "account_age_days": 333, "account_id": "ACCT-ABD85793DE63", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.61 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 771, "timestamp": "2026-01-07T11:07:00Z", "transaction_amount_usd": 4497.96 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.707, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3846.82, "financial_exposure_usd": 6255.7, "recoverable_pct": 0.954 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106906", "label": "benign", "label_confidence": 0.632, "severity": "medium", "timestamp": "2026-01-05T19:06:00Z", "trace_id": "424d4bde-407a-90e4-0f87-9cdbf450e7ae" }
{ "account_age_days": 564, "account_id": "ACCT-679FDACAD45C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.549 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 377, "timestamp": "2026-01-05T19:06:00Z", "transaction_amount_usd": 11336.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.628, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2325.23, "financial_exposure_usd": 4310.25, "recoverable_pct": 0.607 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107193", "label": "benign", "label_confidence": 0.578, "severity": "medium", "timestamp": "2026-01-05T23:53:00Z", "trace_id": "9b15b281-0f9e-5745-1939-b0478b0d21e5" }
{ "account_age_days": 88, "account_id": "ACCT-882F707729CA", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.42 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 444, "timestamp": "2026-01-05T23:53:00Z", "transaction_amount_usd": 8321.2 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.643, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3401.24, "financial_exposure_usd": 4716.86, "recoverable_pct": 0.903 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104035", "label": "fraudulent", "label_confidence": 0.658, "severity": "medium", "timestamp": "2026-01-03T19:15:00Z", "trace_id": "2e7c0206-9f24-3b4d-8172-18dc345f44d3" }
{ "account_age_days": 1611, "account_id": "ACCT-2C4A07E6FD70", "baseline_risk_score": 0.393, "kyc_tier": "tier_2", "session_entropy": 0.244 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 197, "timestamp": "2026-01-03T19:15:00Z", "transaction_amount_usd": 2658210.58 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.407, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3536463.32, "financial_exposure_usd": 6286564.28, "recoverable_pct": 0.438 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106168", "label": "fraudulent", "label_confidence": 0.878, "severity": "high", "timestamp": "2026-01-05T06:48:00Z", "trace_id": "55b9bae2-89f1-0d8e-0a98-4df88f9a0251" }
{ "account_age_days": 1478, "account_id": "ACCT-E008BB824FB7", "baseline_risk_score": 0.156, "kyc_tier": "tier_3", "session_entropy": 0.142 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 933, "timestamp": "2026-01-05T06:48:00Z", "transaction_amount_usd": 1926614.54 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.948, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2279302.08, "financial_exposure_usd": 4817802.21, "recoverable_pct": 0.832 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109801", "label": "benign", "label_confidence": 0.598, "severity": "low", "timestamp": "2026-01-07T19:21:00Z", "trace_id": "2d8ea85b-54b1-3c26-b7f2-99cbdc70ebc3" }
{ "account_age_days": 782, "account_id": "ACCT-C31832576645", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.111 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 1098, "timestamp": "2026-01-07T19:21:00Z", "transaction_amount_usd": 10811.06 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.521, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2746.44, "financial_exposure_usd": 3294.5, "recoverable_pct": 0.586 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107656", "label": "benign", "label_confidence": 0.569, "severity": "medium", "timestamp": "2026-01-06T07:36:00Z", "trace_id": "8176126c-24ea-bea0-2ed6-1e4cf68d76b3" }
{ "account_age_days": 595, "account_id": "ACCT-26E0ECD53A61", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.116 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 883, "timestamp": "2026-01-06T07:36:00Z", "transaction_amount_usd": 2788.01 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.75, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1275.19, "financial_exposure_usd": 1841.17, "recoverable_pct": 0.861 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105770", "label": "fraudulent", "label_confidence": 0.635, "severity": "low", "timestamp": "2026-01-05T00:10:00Z", "trace_id": "a9b8b6ae-24d4-83c0-95ab-38b068aa691c" }
{ "account_age_days": 487, "account_id": "ACCT-A85CC5171F3F", "baseline_risk_score": 0.136, "kyc_tier": "tier_2", "session_entropy": 0.632 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 833, "timestamp": "2026-01-05T00:10:00Z", "transaction_amount_usd": 1062233.75 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.533, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2928099.74, "financial_exposure_usd": 3339714.25, "recoverable_pct": 0.707 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106602", "label": "fraudulent", "label_confidence": 0.758, "severity": "medium", "timestamp": "2026-01-05T14:02:00Z", "trace_id": "376f1db1-42e3-88a4-bff1-c9a347b22f4b" }
{ "account_age_days": 1446, "account_id": "ACCT-598610F3A6A5", "baseline_risk_score": 0.388, "kyc_tier": "tier_3", "session_entropy": 0.205 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 534, "timestamp": "2026-01-05T14:02:00Z", "transaction_amount_usd": 2369828.14 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.436, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2446559.54, "financial_exposure_usd": 4670005.87, "recoverable_pct": 0.45 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108253", "label": "benign", "label_confidence": 0.558, "severity": "high", "timestamp": "2026-01-06T17:33:00Z", "trace_id": "721b7328-680e-55ee-f3f6-ee456fd36119" }
{ "account_age_days": 731, "account_id": "ACCT-F7418CD2FD15", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.741 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 156, "timestamp": "2026-01-06T16:04:00Z", "transaction_amount_usd": 1.44 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.649, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1099.71, "financial_exposure_usd": 1301.96, "recoverable_pct": 0.519 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102256", "label": "fraudulent", "label_confidence": 0.754, "severity": "medium", "timestamp": "2026-01-02T13:36:00Z", "trace_id": "3006a591-2831-1595-7efd-cc8ed82a9a21" }
{ "account_age_days": 330, "account_id": "ACCT-36482324B766", "baseline_risk_score": 0.259, "kyc_tier": "tier_3", "session_entropy": 0.613 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 487, "timestamp": "2026-01-02T13:36:00Z", "transaction_amount_usd": 98432.91 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.545, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 526344.36, "financial_exposure_usd": 831234.97, "recoverable_pct": 0.29 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109030", "label": "benign", "label_confidence": 0.491, "severity": "medium", "timestamp": "2026-01-07T06:30:00Z", "trace_id": "7347989a-c38c-905e-fd5f-80bb1127ddc1" }
{ "account_age_days": 1336, "account_id": "ACCT-11C59E40C81D", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.673 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 134, "timestamp": "2026-01-07T02:40:00Z", "transaction_amount_usd": 12.48 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.769, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2334.39, "financial_exposure_usd": 3585.25, "recoverable_pct": 0.954 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109115", "label": "benign", "label_confidence": 0.71, "severity": "low", "timestamp": "2026-01-07T07:55:00Z", "trace_id": "1bbfcd64-167b-89af-9f51-804d2a026c6d" }
{ "account_age_days": 1016, "account_id": "ACCT-C374A26982C2", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.761 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 792, "timestamp": "2026-01-07T07:55:00Z", "transaction_amount_usd": 7717.94 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.735, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2799.8, "financial_exposure_usd": 2920.88, "recoverable_pct": 0.642 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106574", "label": "fraudulent", "label_confidence": 0.868, "severity": "medium", "timestamp": "2026-01-05T13:34:00Z", "trace_id": "9a299305-213d-93df-f195-8df37f1b999d" }
{ "account_age_days": 661, "account_id": "ACCT-FD3014A3D73E", "baseline_risk_score": 0.144, "kyc_tier": "tier_2", "session_entropy": 0.476 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 581, "timestamp": "2026-01-05T13:34:00Z", "transaction_amount_usd": 1285988.86 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.709, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6364676.11, "financial_exposure_usd": 6960947.23, "recoverable_pct": 0.825 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103842", "label": "fraudulent", "label_confidence": 0.817, "severity": "high", "timestamp": "2026-01-03T16:02:00Z", "trace_id": "3acf193f-bad2-834b-6d3a-9607cbd731f4" }
{ "account_age_days": 1231, "account_id": "ACCT-3DA94FB5129F", "baseline_risk_score": 0.14, "kyc_tier": "tier_2", "session_entropy": 0.575 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1060, "timestamp": "2026-01-03T16:02:00Z", "transaction_amount_usd": 577810.56 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.393, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6275012.18, "financial_exposure_usd": 6962118.96, "recoverable_pct": 0.875 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105261", "label": "fraudulent", "label_confidence": 0.72, "severity": "low", "timestamp": "2026-01-04T15:41:00Z", "trace_id": "1e4e1a09-8761-d2a6-39a4-73ff494e92ac" }
{ "account_age_days": 1794, "account_id": "ACCT-6C8024E472F9", "baseline_risk_score": 0.308, "kyc_tier": "tier_2", "session_entropy": 0.274 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 537, "timestamp": "2026-01-04T15:41:00Z", "transaction_amount_usd": 1817977 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_IM...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.815, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2175945.17, "financial_exposure_usd": 5412476.52, "recoverable_pct": 0.799 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100285", "label": "fraudulent", "label_confidence": 0.783, "severity": "medium", "timestamp": "2026-01-01T04:45:00Z", "trace_id": "ab204463-d92c-c6c8-5da7-f990d59ec42e" }
{ "account_age_days": 621, "account_id": "ACCT-936229665F07", "baseline_risk_score": 0.41, "kyc_tier": "tier_2", "session_entropy": 0.424 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 1036, "timestamp": "2026-01-01T04:45:00Z", "transaction_amount_usd": 3844.74 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.418, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 336564.06, "financial_exposure_usd": 824653.71, "recoverable_pct": 0.74 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101445", "label": "fraudulent", "label_confidence": 0.968, "severity": "high", "timestamp": "2026-01-02T00:05:00Z", "trace_id": "93115f3a-3201-491b-907e-662386549f04" }
{ "account_age_days": 421, "account_id": "ACCT-DB14C85E19D8", "baseline_risk_score": 0.46, "kyc_tier": "tier_2", "session_entropy": 0.713 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 258, "timestamp": "2026-01-02T00:05:00Z", "transaction_amount_usd": 19237.47 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.525, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 160509.17, "financial_exposure_usd": 294247.41, "recoverable_pct": 0.678 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108702", "label": "benign", "label_confidence": 0.567, "severity": "medium", "timestamp": "2026-01-07T01:02:00Z", "trace_id": "0662521a-8d4f-95af-05fe-bde4ff023e8f" }
{ "account_age_days": 91, "account_id": "ACCT-6CCCF7DD8C71", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.785 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 169, "timestamp": "2026-01-06T23:20:00Z", "transaction_amount_usd": 10.84 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.759, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3916.97, "financial_exposure_usd": 6525.14, "recoverable_pct": 0.785 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100079", "label": "fraudulent", "label_confidence": 0.94, "severity": "high", "timestamp": "2026-01-01T01:19:00Z", "trace_id": "eee9795e-a308-6e48-e4e5-b5b0d25ad576" }
{ "account_age_days": 813, "account_id": "ACCT-3EE79D31FEEF", "baseline_risk_score": 0.431, "kyc_tier": "tier_3", "session_entropy": 0.541 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 395, "timestamp": "2025-12-31T19:35:00Z", "transaction_amount_usd": 0.65 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.685, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 668603.12, "financial_exposure_usd": 1301011.57, "recoverable_pct": 0.374 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102373", "label": "fraudulent", "label_confidence": 0.943, "severity": "high", "timestamp": "2026-01-02T15:33:00Z", "trace_id": "b0b38e6a-7265-3f08-9930-463c50c2d705" }
{ "account_age_days": 1974, "account_id": "ACCT-D9F3C4893CCE", "baseline_risk_score": 0.323, "kyc_tier": "tier_3", "session_entropy": 0.382 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 125, "timestamp": "2026-01-02T05:50:00Z", "transaction_amount_usd": 10.75 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.45, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 158588.23, "financial_exposure_usd": 347907.73, "recoverable_pct": 0.499 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103998", "label": "fraudulent", "label_confidence": 0.664, "severity": "critical", "timestamp": "2026-01-03T18:38:00Z", "trace_id": "fc4e7452-3c53-6c2f-f6b4-7c222eebe675" }
{ "account_age_days": 1397, "account_id": "ACCT-3B862025B8FF", "baseline_risk_score": 0.435, "kyc_tier": "tier_2", "session_entropy": 0.38 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 1183, "timestamp": "2026-01-03T18:38:00Z", "transaction_amount_usd": 2123164.16 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.742, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4479367.39, "financial_exposure_usd": 4851515.1, "recoverable_pct": 0.501 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109409", "label": "benign", "label_confidence": 0.727, "severity": "low", "timestamp": "2026-01-07T12:49:00Z", "trace_id": "ccb1b79a-e25e-ad9c-bcc3-afc90349d1aa" }
{ "account_age_days": 867, "account_id": "ACCT-4D1F44F60ECF", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.296 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1031, "timestamp": "2026-01-07T12:49:00Z", "transaction_amount_usd": 524.62 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.482, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2659.91, "financial_exposure_usd": 4818.22, "recoverable_pct": 0.783 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102212", "label": "fraudulent", "label_confidence": 0.792, "severity": "high", "timestamp": "2026-01-02T12:52:00Z", "trace_id": "3de67e2d-c2bb-a9db-ce1c-2e27fe189cfd" }
{ "account_age_days": 485, "account_id": "ACCT-38F6A7FE4355", "baseline_risk_score": 0.369, "kyc_tier": "tier_2", "session_entropy": 0.924 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 500, "timestamp": "2026-01-02T12:52:00Z", "transaction_amount_usd": 7901.12 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.636, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 284052.45, "financial_exposure_usd": 517988.02, "recoverable_pct": 0.598 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101424", "label": "fraudulent", "label_confidence": 0.901, "severity": "critical", "timestamp": "2026-01-01T23:44:00Z", "trace_id": "f7b9ff1e-8e46-f620-58d1-9d30330a5025" }
{ "account_age_days": 698, "account_id": "ACCT-04600D00D4BF", "baseline_risk_score": 0.483, "kyc_tier": "tier_3", "session_entropy": 0.933 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 758, "timestamp": "2026-01-01T23:44:00Z", "transaction_amount_usd": 93070.35 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.38, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 594838.96, "financial_exposure_usd": 647044.56, "recoverable_pct": 0.383 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108297", "label": "benign", "label_confidence": 0.62, "severity": "medium", "timestamp": "2026-01-06T18:17:00Z", "trace_id": "42fad82f-7f9c-3ba5-2c24-b0519d0b7560" }
{ "account_age_days": 637, "account_id": "ACCT-4CD8DE09C587", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.567 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 167, "timestamp": "2026-01-06T18:17:00Z", "transaction_amount_usd": 1354.79 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.596, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1518.77, "financial_exposure_usd": 2082.64, "recoverable_pct": 0.624 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103839", "label": "fraudulent", "label_confidence": 0.739, "severity": "low", "timestamp": "2026-01-03T15:59:00Z", "trace_id": "58410526-a1f3-f982-276c-5583938507a1" }
{ "account_age_days": 282, "account_id": "ACCT-9DC36E9D2804", "baseline_risk_score": 0.373, "kyc_tier": "tier_2", "session_entropy": 0.938 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 984, "timestamp": "2026-01-03T15:59:00Z", "transaction_amount_usd": 1707779.54 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.919, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2570798.04, "financial_exposure_usd": 4522825.52, "recoverable_pct": 0.976 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105094", "label": "fraudulent", "label_confidence": 0.79, "severity": "high", "timestamp": "2026-01-04T12:54:00Z", "trace_id": "b57b6542-5d77-dd4c-9371-66ce2c37a044" }
{ "account_age_days": 1396, "account_id": "ACCT-2D781CA392E7", "baseline_risk_score": 0.371, "kyc_tier": "tier_2", "session_entropy": 0.58 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 826, "timestamp": "2026-01-04T12:54:00Z", "transaction_amount_usd": 1388046.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.538, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4426258.55, "financial_exposure_usd": 5769159.05, "recoverable_pct": 0.436 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109088", "label": "benign", "label_confidence": 0.497, "severity": "medium", "timestamp": "2026-01-07T07:28:00Z", "trace_id": "3bb43768-1c04-8252-0c4b-ee391ab58650" }
{ "account_age_days": 587, "account_id": "ACCT-5869B1890D8E", "baseline_risk_score": 0.198, "kyc_tier": "tier_1", "session_entropy": 0.433 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1112, "timestamp": "2026-01-07T07:28:00Z", "transaction_amount_usd": 14339.26 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.554, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1121.36, "financial_exposure_usd": 1168.78, "recoverable_pct": 0.815 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109934", "label": "benign", "label_confidence": 0.451, "severity": "low", "timestamp": "2026-01-07T21:34:00Z", "trace_id": "1e4f9479-66b1-6549-a5dd-4527af8abeab" }
{ "account_age_days": 1680, "account_id": "ACCT-79397933FECD", "baseline_risk_score": 0.167, "kyc_tier": "tier_2", "session_entropy": 0.78 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 672, "timestamp": "2026-01-07T21:34:00Z", "transaction_amount_usd": 245.74 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.579, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 326.39, "financial_exposure_usd": 703.73, "recoverable_pct": 0.841 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109636", "label": "benign", "label_confidence": 0.565, "severity": "low", "timestamp": "2026-01-07T16:36:00Z", "trace_id": "ce5505bb-3eca-8b80-0fbc-704302a3abec" }
{ "account_age_days": 1649, "account_id": "ACCT-16D0ADFA745C", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.104 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 106, "timestamp": "2026-01-07T07:44:00Z", "transaction_amount_usd": 8.5 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.723, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1009.17, "financial_exposure_usd": 1014.32, "recoverable_pct": 0.542 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106784", "label": "benign", "label_confidence": 0.657, "severity": "high", "timestamp": "2026-01-05T17:04:00Z", "trace_id": "e7d08370-2c3c-fae1-06c2-836451241e86" }
{ "account_age_days": 887, "account_id": "ACCT-07B134689AEB", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.358 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1156, "timestamp": "2026-01-05T17:04:00Z", "transaction_amount_usd": 12815.48 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.71, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 2404.57, "financial_exposure_usd": 4912.5, "recoverable_pct": 0.579 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101994", "label": "fraudulent", "label_confidence": 0.893, "severity": "critical", "timestamp": "2026-01-02T09:14:00Z", "trace_id": "a3c8311f-e8e4-6fbb-c664-43e0c4e0a9dc" }
{ "account_age_days": 45, "account_id": "ACCT-BC81B93D0A9A", "baseline_risk_score": 0.341, "kyc_tier": "tier_3", "session_entropy": 0.426 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 335, "timestamp": "2026-01-02T08:00:00Z", "transaction_amount_usd": 6.45 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.944, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 134940.84, "financial_exposure_usd": 243162.53, "recoverable_pct": 0.431 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105745", "label": "fraudulent", "label_confidence": 0.802, "severity": "medium", "timestamp": "2026-01-04T23:45:00Z", "trace_id": "10002549-049e-ebb6-5ceb-b0df7e67433a" }
{ "account_age_days": 1036, "account_id": "ACCT-FB0A4AA7FD8B", "baseline_risk_score": 0.324, "kyc_tier": "tier_3", "session_entropy": 0.885 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 702, "timestamp": "2026-01-04T23:45:00Z", "transaction_amount_usd": 783446.96 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.879, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4353310.45, "financial_exposure_usd": 8302185.69, "recoverable_pct": 0.546 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }