schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105880", "label": "fraudulent", "label_confidence": 0.803, "severity": "high", "timestamp": "2026-01-05T02:00:00Z", "trace_id": "d3cba997-df27-d62e-3736-2eff4e2a060a" }
{ "account_age_days": 1766, "account_id": "ACCT-4477A973569F", "baseline_risk_score": 0.402, "kyc_tier": "tier_2", "session_entropy": 0.852 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 830, "timestamp": "2026-01-05T02:00:00Z", "transaction_amount_usd": 2335704.11 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.55, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 317101.19, "financial_exposure_usd": 599467.6, "recoverable_pct": 0.749 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105303", "label": "fraudulent", "label_confidence": 0.815, "severity": "medium", "timestamp": "2026-01-04T16:23:00Z", "trace_id": "5f919b7e-06d1-c3a7-5ee2-6b2e0a8c3d0f" }
{ "account_age_days": 836, "account_id": "ACCT-821D1CDE66DA", "baseline_risk_score": 0.393, "kyc_tier": "tier_3", "session_entropy": 0.244 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 561, "timestamp": "2026-01-04T16:23:00Z", "transaction_amount_usd": 2558167.53 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.569, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3944735.67, "financial_exposure_usd": 4519392.14, "recoverable_pct": 0.599 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103813", "label": "fraudulent", "label_confidence": 0.811, "severity": "critical", "timestamp": "2026-01-03T15:33:00Z", "trace_id": "9cf0b61d-9f96-d92a-236e-303d2a388d90" }
{ "account_age_days": 1179, "account_id": "ACCT-3D86847543A5", "baseline_risk_score": 0.224, "kyc_tier": "tier_2", "session_entropy": 0.692 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 379, "timestamp": "2026-01-03T04:11:00Z", "transaction_amount_usd": 19.29 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.574, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1239706.52, "financial_exposure_usd": 1405900.9, "recoverable_pct": 0.619 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106951", "label": "benign", "label_confidence": 0.54, "severity": "high", "timestamp": "2026-01-05T19:51:00Z", "trace_id": "7994acb1-fb9e-f756-dc38-0a6db3ce9d3e" }
{ "account_age_days": 1428, "account_id": "ACCT-9ADBECDC9E44", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.48 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 125, "timestamp": "2026-01-05T19:51:00Z", "transaction_amount_usd": 7929.69 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.725, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 397.69, "financial_exposure_usd": 427.76, "recoverable_pct": 0.547 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104155", "label": "fraudulent", "label_confidence": 0.668, "severity": "low", "timestamp": "2026-01-03T21:15:00Z", "trace_id": "dcd2cab8-1ad5-af2e-7aca-c9313daeffe4" }
{ "account_age_days": 1327, "account_id": "ACCT-692600399DB7", "baseline_risk_score": 0.119, "kyc_tier": "tier_2", "session_entropy": 0.428 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 451, "timestamp": "2026-01-03T21:15:00Z", "transaction_amount_usd": 735387.73 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.633, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4219429.19, "financial_exposure_usd": 6774688.82, "recoverable_pct": 0.477 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109298", "label": "benign", "label_confidence": 0.51, "severity": "low", "timestamp": "2026-01-07T10:58:00Z", "trace_id": "b60c0382-8f98-e427-3129-395390829f22" }
{ "account_age_days": 280, "account_id": "ACCT-87560AD2976F", "baseline_risk_score": 0.089, "kyc_tier": "tier_1", "session_entropy": 0.808 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 165, "timestamp": "2026-01-07T10:58:00Z", "transaction_amount_usd": 5559.43 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.679, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 354.29, "financial_exposure_usd": 683.84, "recoverable_pct": 0.998 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106087", "label": "fraudulent", "label_confidence": 0.657, "severity": "medium", "timestamp": "2026-01-05T05:27:00Z", "trace_id": "d077725a-fa7e-13e1-2801-d85f0c7efa00" }
{ "account_age_days": 1743, "account_id": "ACCT-E31C9AA713A7", "baseline_risk_score": 0.134, "kyc_tier": "tier_2", "session_entropy": 0.218 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 724, "timestamp": "2026-01-05T05:27:00Z", "transaction_amount_usd": 900633.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.45, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 2105740.55, "financial_exposure_usd": 3652906.79, "recoverable_pct": 0.575 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103343", "label": "fraudulent", "label_confidence": 0.867, "severity": "high", "timestamp": "2026-01-03T07:43:00Z", "trace_id": "fd56c7f8-bbf0-4f15-2515-ae8cc9746b04" }
{ "account_age_days": 713, "account_id": "ACCT-F70B2A6C4074", "baseline_risk_score": 0.327, "kyc_tier": "tier_2", "session_entropy": 0.619 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 167, "timestamp": "2026-01-03T07:43:00Z", "transaction_amount_usd": 699860.91 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.587, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3089244.37, "financial_exposure_usd": 3598056.19, "recoverable_pct": 0.981 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102905", "label": "fraudulent", "label_confidence": 0.834, "severity": "medium", "timestamp": "2026-01-03T00:25:00Z", "trace_id": "adf5bcf4-7d65-1d98-278c-f501a256321d" }
{ "account_age_days": 1024, "account_id": "ACCT-7D94F2E6BC64", "baseline_risk_score": 0.588, "kyc_tier": "tier_2", "session_entropy": 0.881 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 914, "timestamp": "2026-01-03T00:25:00Z", "transaction_amount_usd": 75164.84 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.875, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 220705.21, "financial_exposure_usd": 337855.64, "recoverable_pct": 0.002 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103446", "label": "fraudulent", "label_confidence": 0.602, "severity": "critical", "timestamp": "2026-01-03T09:26:00Z", "trace_id": "4b1a5a6e-c560-a8fe-236c-f07f1a94ba3b" }
{ "account_age_days": 205, "account_id": "ACCT-D6EF056DB2F4", "baseline_risk_score": 0.1, "kyc_tier": "tier_2", "session_entropy": 0.785 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 178, "timestamp": "2026-01-03T06:24:00Z", "transaction_amount_usd": 8.92 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.469, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3775856.35, "financial_exposure_usd": 6114130.15, "recoverable_pct": 0.47 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108451", "label": "benign", "label_confidence": 0.578, "severity": "high", "timestamp": "2026-01-06T20:51:00Z", "trace_id": "37eb676f-f355-9d1e-a71d-6dbb419d49f4" }
{ "account_age_days": 1316, "account_id": "ACCT-F4E6059CA22F", "baseline_risk_score": 0.098, "kyc_tier": "tier_1", "session_entropy": 0.28 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 376, "timestamp": "2026-01-06T16:14:00Z", "transaction_amount_usd": 13.86 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.511, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1203.87, "financial_exposure_usd": 1772.19, "recoverable_pct": 0.929 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107609", "label": "benign", "label_confidence": 0.507, "severity": "medium", "timestamp": "2026-01-06T06:49:00Z", "trace_id": "8b6f61eb-be2c-c717-9926-eaf12f2b3cf4" }
{ "account_age_days": 317, "account_id": "ACCT-0B0AB3430EBF", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.109 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 237, "timestamp": "2026-01-06T06:49:00Z", "transaction_amount_usd": 8854.57 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.69, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 2948.41, "financial_exposure_usd": 3219.42, "recoverable_pct": 0.717 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105794", "label": "fraudulent", "label_confidence": 0.905, "severity": "medium", "timestamp": "2026-01-05T00:34:00Z", "trace_id": "32967891-a5ed-4873-2f91-4555ca3b448f" }
{ "account_age_days": 766, "account_id": "ACCT-BE4E8AB1888C", "baseline_risk_score": 0.188, "kyc_tier": "tier_2", "session_entropy": 0.413 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 301, "timestamp": "2026-01-05T00:34:00Z", "transaction_amount_usd": 2939341.68 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.448, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4736300.45, "financial_exposure_usd": 6330865.02, "recoverable_pct": 0.582 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101377", "label": "fraudulent", "label_confidence": 0.953, "severity": "critical", "timestamp": "2026-01-01T22:57:00Z", "trace_id": "3667a70b-6f2f-2775-863e-4b7e704bea2e" }
{ "account_age_days": 130, "account_id": "ACCT-E6ACD413D0C4", "baseline_risk_score": 0.254, "kyc_tier": "tier_2", "session_entropy": 0.166 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 333, "timestamp": "2026-01-01T22:57:00Z", "transaction_amount_usd": 7767.29 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.822, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 570725.43, "financial_exposure_usd": 667523.63, "recoverable_pct": 0.071 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109097", "label": "benign", "label_confidence": 0.726, "severity": "high", "timestamp": "2026-01-07T07:37:00Z", "trace_id": "ef48c5ed-ad53-981d-883c-45ab18a08322" }
{ "account_age_days": 114, "account_id": "ACCT-C80E8576856B", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.575 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 189, "timestamp": "2026-01-06T23:50:00Z", "transaction_amount_usd": 23.97 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.637, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2459.83, "financial_exposure_usd": 2460.83, "recoverable_pct": 0.492 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108144", "label": "benign", "label_confidence": 0.75, "severity": "low", "timestamp": "2026-01-06T15:44:00Z", "trace_id": "8b2d1894-b6d3-92e2-9e70-883982904d74" }
{ "account_age_days": 106, "account_id": "ACCT-D1EE6E0497A6", "baseline_risk_score": 0.103, "kyc_tier": "tier_2", "session_entropy": 0.19 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 508, "timestamp": "2026-01-06T15:44:00Z", "transaction_amount_usd": 10544.12 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.698, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2122.1, "financial_exposure_usd": 3800.48, "recoverable_pct": 0.634 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105096", "label": "fraudulent", "label_confidence": 0.83, "severity": "high", "timestamp": "2026-01-04T12:56:00Z", "trace_id": "478a8cf1-fb88-86b4-4157-ef1eeb9b8bea" }
{ "account_age_days": 705, "account_id": "ACCT-F387528739C5", "baseline_risk_score": 0.29, "kyc_tier": "tier_2", "session_entropy": 0.925 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 159, "timestamp": "2026-01-04T03:17:00Z", "transaction_amount_usd": 21.44 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.732, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 660308.01, "financial_exposure_usd": 766410.71, "recoverable_pct": 0.916 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104963", "label": "fraudulent", "label_confidence": 0.744, "severity": "medium", "timestamp": "2026-01-04T10:43:00Z", "trace_id": "52bc05fe-7299-29c0-b312-744502c5d059" }
{ "account_age_days": 850, "account_id": "ACCT-DE4AA8163C57", "baseline_risk_score": 0.385, "kyc_tier": "tier_3", "session_entropy": 0.585 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 274, "timestamp": "2026-01-04T03:49:00Z", "transaction_amount_usd": 13.9 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.495, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4842387.68, "financial_exposure_usd": 6946698.94, "recoverable_pct": 0.672 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103179", "label": "fraudulent", "label_confidence": 0.87, "severity": "critical", "timestamp": "2026-01-03T04:59:00Z", "trace_id": "02fe5411-1234-7739-145b-4e6d06392344" }
{ "account_age_days": 620, "account_id": "ACCT-C8C7703EDB8D", "baseline_risk_score": 0.487, "kyc_tier": "tier_1", "session_entropy": 0.18 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 851, "timestamp": "2026-01-03T04:59:00Z", "transaction_amount_usd": 45068.92 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.637, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 620895.08, "financial_exposure_usd": 886258.52, "recoverable_pct": 0.568 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109867", "label": "benign", "label_confidence": 0.717, "severity": "low", "timestamp": "2026-01-07T20:27:00Z", "trace_id": "7c15719d-065d-930a-464a-11da4a7ae5a1" }
{ "account_age_days": 1909, "account_id": "ACCT-9A4BC8E97123", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.548 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1163, "timestamp": "2026-01-07T20:27:00Z", "transaction_amount_usd": 13963 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.783, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1637.96, "financial_exposure_usd": 1759.76, "recoverable_pct": 0.866 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103290", "label": "fraudulent", "label_confidence": 0.892, "severity": "medium", "timestamp": "2026-01-03T06:50:00Z", "trace_id": "fc570fdf-7063-508a-9cb7-612bbc6ee2c6" }
{ "account_age_days": 48, "account_id": "ACCT-200F465D6D10", "baseline_risk_score": 0.616, "kyc_tier": "tier_3", "session_entropy": 0.721 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 652, "timestamp": "2026-01-03T06:50:00Z", "transaction_amount_usd": 44931.52 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.72, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 892878.09, "financial_exposure_usd": 897633.9, "recoverable_pct": 0.343 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105009", "label": "fraudulent", "label_confidence": 0.709, "severity": "critical", "timestamp": "2026-01-04T11:29:00Z", "trace_id": "bafeb4cc-7537-8b26-9d13-f04b50ddb8a4" }
{ "account_age_days": 1364, "account_id": "ACCT-B52E550AAA1C", "baseline_risk_score": 0.168, "kyc_tier": "tier_3", "session_entropy": 0.415 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 438, "timestamp": "2026-01-04T11:29:00Z", "transaction_amount_usd": 643439.65 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.368, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4000453.55, "financial_exposure_usd": 5818662.74, "recoverable_pct": 0.685 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105683", "label": "fraudulent", "label_confidence": 0.72, "severity": "high", "timestamp": "2026-01-04T22:43:00Z", "trace_id": "45025d8a-a692-2311-a46e-56c2333f0591" }
{ "account_age_days": 1015, "account_id": "ACCT-5E575C5314A0", "baseline_risk_score": 0.343, "kyc_tier": "tier_2", "session_entropy": 0.414 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 276, "timestamp": "2026-01-04T13:34:00Z", "transaction_amount_usd": 23.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.577, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3281400.82, "financial_exposure_usd": 6479168.12, "recoverable_pct": 0.77 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105652", "label": "fraudulent", "label_confidence": 0.801, "severity": "high", "timestamp": "2026-01-04T22:12:00Z", "trace_id": "95ec8ebb-5bd7-fd00-fa3c-92cc4d78110d" }
{ "account_age_days": 297, "account_id": "ACCT-9FC632C0EC54", "baseline_risk_score": 0.243, "kyc_tier": "tier_3", "session_entropy": 0.375 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 382, "timestamp": "2026-01-04T22:12:00Z", "transaction_amount_usd": 1510813.82 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.504, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 7338179.26, "financial_exposure_usd": 7648097.06, "recoverable_pct": 0.408 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100528", "label": "fraudulent", "label_confidence": 0.919, "severity": "medium", "timestamp": "2026-01-01T08:48:00Z", "trace_id": "48555e78-90fb-d067-4c2b-1f6fe702cea2" }
{ "account_age_days": 518, "account_id": "ACCT-55CE011DDA7F", "baseline_risk_score": 0.553, "kyc_tier": "tier_1", "session_entropy": 0.724 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 1014, "timestamp": "2026-01-01T08:48:00Z", "transaction_amount_usd": 73628.74 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.492, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 368668.03, "financial_exposure_usd": 761081.69, "recoverable_pct": 0.222 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100680", "label": "fraudulent", "label_confidence": 0.794, "severity": "critical", "timestamp": "2026-01-01T11:20:00Z", "trace_id": "123ce770-8e24-79e7-2601-9167a275429a" }
{ "account_age_days": 401, "account_id": "ACCT-6AFCDF872E3F", "baseline_risk_score": 0.404, "kyc_tier": "tier_1", "session_entropy": 0.118 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 887, "timestamp": "2026-01-01T11:20:00Z", "transaction_amount_usd": 80123.58 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.678, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 387131, "financial_exposure_usd": 506185.69, "recoverable_pct": 0.5 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100799", "label": "fraudulent", "label_confidence": 0.798, "severity": "medium", "timestamp": "2026-01-01T13:19:00Z", "trace_id": "d3e92b75-61f3-555d-118e-aee6e28938f4" }
{ "account_age_days": 1348, "account_id": "ACCT-6B17500A2A0F", "baseline_risk_score": 0.344, "kyc_tier": "tier_2", "session_entropy": 0.744 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 127, "timestamp": "2026-01-01T13:19:00Z", "transaction_amount_usd": 17220.54 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.704, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 233576.32, "financial_exposure_usd": 238538.07, "recoverable_pct": 0.694 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105249", "label": "fraudulent", "label_confidence": 0.894, "severity": "high", "timestamp": "2026-01-04T15:29:00Z", "trace_id": "6d9c37bb-224e-0f37-a88f-d09b9f79de13" }
{ "account_age_days": 1285, "account_id": "ACCT-769202CC75F8", "baseline_risk_score": 0.441, "kyc_tier": "tier_3", "session_entropy": 0.349 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 137, "timestamp": "2026-01-04T15:29:00Z", "transaction_amount_usd": 568315.38 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.752, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3419970.42, "financial_exposure_usd": 4246402.64, "recoverable_pct": 0.698 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100137", "label": "fraudulent", "label_confidence": 0.763, "severity": "critical", "timestamp": "2026-01-01T02:17:00Z", "trace_id": "1ae17565-f3a8-0aa0-60ee-0cbc38e3c67d" }
{ "account_age_days": 1793, "account_id": "ACCT-EDF98B8D8DDD", "baseline_risk_score": 0.316, "kyc_tier": "tier_1", "session_entropy": 0.519 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 258, "timestamp": "2025-12-31T23:38:00Z", "transaction_amount_usd": 12.24 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.756, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 393087.92, "financial_exposure_usd": 571520.21, "recoverable_pct": 0.438 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102761", "label": "fraudulent", "label_confidence": 0.969, "severity": "high", "timestamp": "2026-01-02T22:01:00Z", "trace_id": "57b0ad21-8157-d608-ccbf-33609af4bc6f" }
{ "account_age_days": 1150, "account_id": "ACCT-36B1E111F2C7", "baseline_risk_score": 0.639, "kyc_tier": "tier_3", "session_entropy": 0.703 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 1032, "timestamp": "2026-01-02T22:01:00Z", "transaction_amount_usd": 24900.88 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.771, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 432345.44, "financial_exposure_usd": 657545.76, "recoverable_pct": 0.286 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106332", "label": "fraudulent", "label_confidence": 0.642, "severity": "low", "timestamp": "2026-01-05T09:32:00Z", "trace_id": "8025f944-41e0-c9da-8a42-f6c2c71d389d" }
{ "account_age_days": 791, "account_id": "ACCT-CDA8503D6569", "baseline_risk_score": 0.064, "kyc_tier": "tier_3", "session_entropy": 0.84 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 289, "timestamp": "2026-01-05T05:01:00Z", "transaction_amount_usd": 9.85 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.921, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2099501.4, "financial_exposure_usd": 3548911.68, "recoverable_pct": 0.849 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103283", "label": "fraudulent", "label_confidence": 0.817, "severity": "critical", "timestamp": "2026-01-03T06:43:00Z", "trace_id": "1482fa30-bb53-852f-eda6-018f7bf65190" }
{ "account_age_days": 1206, "account_id": "ACCT-6720D21B9C15", "baseline_risk_score": 0.591, "kyc_tier": "tier_1", "session_entropy": 0.682 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 1023, "timestamp": "2026-01-03T06:43:00Z", "transaction_amount_usd": 71001.37 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.587, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 326667.46, "financial_exposure_usd": 482944.28, "recoverable_pct": 0.447 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107484", "label": "benign", "label_confidence": 0.54, "severity": "medium", "timestamp": "2026-01-06T04:44:00Z", "trace_id": "03f36b91-d333-fd33-224e-7d64b81ae974" }
{ "account_age_days": 1481, "account_id": "ACCT-DB66D30DB7AD", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.169 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1133, "timestamp": "2026-01-06T04:44:00Z", "transaction_amount_usd": 9150.24 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.51, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 122.75, "financial_exposure_usd": 132.24, "recoverable_pct": 0.8 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106796", "label": "benign", "label_confidence": 0.66, "severity": "medium", "timestamp": "2026-01-05T17:16:00Z", "trace_id": "087d4a62-e971-77f3-d692-9a253357b507" }
{ "account_age_days": 718, "account_id": "ACCT-21662F76F4E9", "baseline_risk_score": 0.09, "kyc_tier": "tier_2", "session_entropy": 0.206 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 769, "timestamp": "2026-01-05T17:16:00Z", "transaction_amount_usd": 14739.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.796, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1166.09, "financial_exposure_usd": 2002.11, "recoverable_pct": 0.823 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100860", "label": "fraudulent", "label_confidence": 0.788, "severity": "medium", "timestamp": "2026-01-01T14:20:00Z", "trace_id": "c464ef4a-2f9b-e194-9391-98fdcf753c1e" }
{ "account_age_days": 1423, "account_id": "ACCT-8E822794EF40", "baseline_risk_score": 0.283, "kyc_tier": "tier_1", "session_entropy": 0.545 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1015, "timestamp": "2026-01-01T14:20:00Z", "transaction_amount_usd": 56338.59 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.693, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 257029.31, "financial_exposure_usd": 457415.85, "recoverable_pct": 0.045 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104650", "label": "fraudulent", "label_confidence": 0.638, "severity": "critical", "timestamp": "2026-01-04T05:30:00Z", "trace_id": "c3214c2b-46be-b04c-2d61-631a4671abce" }
{ "account_age_days": 1026, "account_id": "ACCT-4C3166593279", "baseline_risk_score": 0.068, "kyc_tier": "tier_2", "session_entropy": 0.571 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 388, "timestamp": "2026-01-04T03:14:00Z", "transaction_amount_usd": 13.11 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.949, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2803745.49, "financial_exposure_usd": 5733974.5, "recoverable_pct": 0.448 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105336", "label": "fraudulent", "label_confidence": 0.618, "severity": "high", "timestamp": "2026-01-04T16:56:00Z", "trace_id": "35aa8266-e642-8499-9574-acc839c38f96" }
{ "account_age_days": 240, "account_id": "ACCT-C57209DA762E", "baseline_risk_score": 0.378, "kyc_tier": "tier_2", "session_entropy": 0.541 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 982, "timestamp": "2026-01-04T16:56:00Z", "transaction_amount_usd": 2826640.85 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.424, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2152955.32, "financial_exposure_usd": 2386715.84, "recoverable_pct": 0.433 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100737", "label": "fraudulent", "label_confidence": 0.952, "severity": "medium", "timestamp": "2026-01-01T12:17:00Z", "trace_id": "46fc31db-55ca-982a-ca88-276436affc77" }
{ "account_age_days": 1527, "account_id": "ACCT-4ECC42857011", "baseline_risk_score": 0.312, "kyc_tier": "tier_1", "session_entropy": 0.231 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 141, "timestamp": "2026-01-01T12:17:00Z", "transaction_amount_usd": 76135.58 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.364, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 371093.28, "financial_exposure_usd": 861459.26, "recoverable_pct": 0.062 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103084", "label": "fraudulent", "label_confidence": 0.899, "severity": "low", "timestamp": "2026-01-03T03:24:00Z", "trace_id": "490604c5-3bec-4fa7-9726-71e58f2a7fe0" }
{ "account_age_days": 638, "account_id": "ACCT-367F621C1330", "baseline_risk_score": 0.642, "kyc_tier": "tier_1", "session_entropy": 0.632 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 712, "timestamp": "2026-01-03T03:24:00Z", "transaction_amount_usd": 6130.13 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.892, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 612796.7, "financial_exposure_usd": 676896.56, "recoverable_pct": 0.644 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101909", "label": "fraudulent", "label_confidence": 0.899, "severity": "medium", "timestamp": "2026-01-02T07:49:00Z", "trace_id": "1e46fe54-ea1c-3946-4afe-448411cacd0e" }
{ "account_age_days": 129, "account_id": "ACCT-DA35C3CEB1B7", "baseline_risk_score": 0.51, "kyc_tier": "tier_1", "session_entropy": 0.931 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 981, "timestamp": "2026-01-02T07:49:00Z", "transaction_amount_usd": 85447.7 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.692, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 149085.88, "financial_exposure_usd": 176159.21, "recoverable_pct": 0.32 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102799", "label": "fraudulent", "label_confidence": 0.877, "severity": "high", "timestamp": "2026-01-02T22:39:00Z", "trace_id": "2f9ee133-e698-33d5-5130-cda543d55d6c" }
{ "account_age_days": 580, "account_id": "ACCT-38615F940068", "baseline_risk_score": 0.413, "kyc_tier": "tier_1", "session_entropy": 0.431 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 223, "timestamp": "2026-01-02T22:39:00Z", "transaction_amount_usd": 106315.23 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.751, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 813762.65, "financial_exposure_usd": 815000.14, "recoverable_pct": 0.185 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106713", "label": "benign", "label_confidence": 0.554, "severity": "low", "timestamp": "2026-01-05T15:53:00Z", "trace_id": "285503a6-9120-68b7-e0d5-a1970b193754" }
{ "account_age_days": 1047, "account_id": "ACCT-F1F8DF842D87", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.646 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 509, "timestamp": "2026-01-05T15:53:00Z", "transaction_amount_usd": 1140.92 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.762, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1787.73, "financial_exposure_usd": 3148.96, "recoverable_pct": 0.811 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101943", "label": "fraudulent", "label_confidence": 0.832, "severity": "low", "timestamp": "2026-01-02T08:23:00Z", "trace_id": "282bb3ff-2646-9b50-f722-ee1f7a7cc8cd" }
{ "account_age_days": 423, "account_id": "ACCT-0360BD533DA1", "baseline_risk_score": 0.359, "kyc_tier": "tier_1", "session_entropy": 0.237 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 1042, "timestamp": "2026-01-02T08:23:00Z", "transaction_amount_usd": 66593.26 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.458, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 514772.38, "financial_exposure_usd": 712874.46, "recoverable_pct": 0.394 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107938", "label": "benign", "label_confidence": 0.63, "severity": "high", "timestamp": "2026-01-06T12:18:00Z", "trace_id": "1e5ce5fd-4822-6bec-b9d3-04834f6398b1" }
{ "account_age_days": 235, "account_id": "ACCT-1860873DFD1E", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.834 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 867, "timestamp": "2026-01-06T12:18:00Z", "transaction_amount_usd": 7741.66 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.783, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 518.42, "financial_exposure_usd": 1192.05, "recoverable_pct": 0.604 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104877", "label": "fraudulent", "label_confidence": 0.914, "severity": "high", "timestamp": "2026-01-04T09:17:00Z", "trace_id": "fed100b5-d822-013b-3b1c-ddfa1595dcb0" }
{ "account_age_days": 843, "account_id": "ACCT-D5893A1ACCB5", "baseline_risk_score": 0.223, "kyc_tier": "tier_3", "session_entropy": 0.129 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1025, "timestamp": "2026-01-04T09:17:00Z", "transaction_amount_usd": 2942629.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.525, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2505875.64, "financial_exposure_usd": 4035697.56, "recoverable_pct": 0.868 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105537", "label": "fraudulent", "label_confidence": 0.696, "severity": "critical", "timestamp": "2026-01-04T20:17:00Z", "trace_id": "dfee2caa-491b-152d-ca4b-d82cd54fbb78" }
{ "account_age_days": 1925, "account_id": "ACCT-001052DB996F", "baseline_risk_score": 0.278, "kyc_tier": "tier_3", "session_entropy": 0.555 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 269, "timestamp": "2026-01-04T16:10:00Z", "transaction_amount_usd": 24.31 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.755, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 7243242.37, "financial_exposure_usd": 9579788.07, "recoverable_pct": 0.917 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101679", "label": "fraudulent", "label_confidence": 0.908, "severity": "medium", "timestamp": "2026-01-02T03:59:00Z", "trace_id": "71e7ae26-938d-2668-0d85-89d275b20a3f" }
{ "account_age_days": 788, "account_id": "ACCT-C8D74BF83111", "baseline_risk_score": 0.461, "kyc_tier": "tier_3", "session_entropy": 0.254 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 238, "timestamp": "2026-01-01T21:08:00Z", "transaction_amount_usd": 21.03 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.376, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 834606.36, "financial_exposure_usd": 1227664.49, "recoverable_pct": 0.548 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104794", "label": "fraudulent", "label_confidence": 0.723, "severity": "medium", "timestamp": "2026-01-04T07:54:00Z", "trace_id": "f9189519-7a52-8589-898d-57da72676be1" }
{ "account_age_days": 1259, "account_id": "ACCT-45FA42AE96DE", "baseline_risk_score": 0.259, "kyc_tier": "tier_2", "session_entropy": 0.529 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 771, "timestamp": "2026-01-04T07:54:00Z", "transaction_amount_usd": 1004933.36 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.37, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 6552647.98, "financial_exposure_usd": 9601228.89, "recoverable_pct": 0.482 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101219", "label": "fraudulent", "label_confidence": 0.9, "severity": "high", "timestamp": "2026-01-01T20:19:00Z", "trace_id": "16793705-98e3-f82f-6fac-e07a7b070ecf" }
{ "account_age_days": 509, "account_id": "ACCT-B621ABAB8C24", "baseline_risk_score": 0.431, "kyc_tier": "tier_1", "session_entropy": 0.607 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 223, "timestamp": "2026-01-01T11:35:00Z", "transaction_amount_usd": 1.69 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.405, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 298590.43, "financial_exposure_usd": 408790.93, "recoverable_pct": 0.308 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102686", "label": "fraudulent", "label_confidence": 0.926, "severity": "low", "timestamp": "2026-01-02T20:46:00Z", "trace_id": "6cac8cf4-1cbd-064b-f048-0ccfaa211c7f" }
{ "account_age_days": 54, "account_id": "ACCT-2BA9B7F69DAE", "baseline_risk_score": 0.619, "kyc_tier": "tier_3", "session_entropy": 0.78 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 617, "timestamp": "2026-01-02T20:46:00Z", "transaction_amount_usd": 34978.71 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.922, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 382344.72, "financial_exposure_usd": 474285.1, "recoverable_pct": 0.503 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103670", "label": "fraudulent", "label_confidence": 0.895, "severity": "medium", "timestamp": "2026-01-03T13:10:00Z", "trace_id": "d94184b5-b9ec-792d-dd7c-634f59aedb6b" }
{ "account_age_days": 184, "account_id": "ACCT-F27A3C9EA899", "baseline_risk_score": 0.1, "kyc_tier": "tier_3", "session_entropy": 0.363 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 141, "timestamp": "2026-01-03T12:23:00Z", "transaction_amount_usd": 18.8 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.788, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 908528.26, "financial_exposure_usd": 1795858.08, "recoverable_pct": 0.864 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105958", "label": "fraudulent", "label_confidence": 0.657, "severity": "medium", "timestamp": "2026-01-05T03:18:00Z", "trace_id": "51672c8b-40a5-5b2b-4699-5153c127c261" }
{ "account_age_days": 926, "account_id": "ACCT-D8CDE0316F55", "baseline_risk_score": 0.276, "kyc_tier": "tier_1", "session_entropy": 0.753 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 240, "timestamp": "2026-01-04T21:42:00Z", "transaction_amount_usd": 9.06 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.769, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3649060.6, "financial_exposure_usd": 4349172.87, "recoverable_pct": 0.783 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108337", "label": "benign", "label_confidence": 0.732, "severity": "low", "timestamp": "2026-01-06T18:57:00Z", "trace_id": "0a49e4ea-22fa-825b-b7fd-4a230f1a2216" }
{ "account_age_days": 418, "account_id": "ACCT-906F5CCF0D9F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.902 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 369, "timestamp": "2026-01-06T14:55:00Z", "transaction_amount_usd": 9.03 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.745, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3707.91, "financial_exposure_usd": 6227, "recoverable_pct": 0.834 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104328", "label": "fraudulent", "label_confidence": 0.724, "severity": "critical", "timestamp": "2026-01-04T00:08:00Z", "trace_id": "18525854-abd2-068e-0ac3-56b2049a4220" }
{ "account_age_days": 739, "account_id": "ACCT-8A3EB5802DBF", "baseline_risk_score": 0.271, "kyc_tier": "tier_2", "session_entropy": 0.85 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 190, "timestamp": "2026-01-03T16:14:00Z", "transaction_amount_usd": 19.55 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POST...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.85, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1579789.88, "financial_exposure_usd": 3818756.13, "recoverable_pct": 0.87 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103544", "label": "fraudulent", "label_confidence": 0.727, "severity": "critical", "timestamp": "2026-01-03T11:04:00Z", "trace_id": "f06a6ce4-322c-710f-025c-55ca5b0d9546" }
{ "account_age_days": 252, "account_id": "ACCT-364E47E93FF5", "baseline_risk_score": 0.121, "kyc_tier": "tier_1", "session_entropy": 0.606 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 265, "timestamp": "2026-01-03T01:44:00Z", "transaction_amount_usd": 5.89 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.485, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2649824.06, "financial_exposure_usd": 3683499.02, "recoverable_pct": 0.741 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100444", "label": "fraudulent", "label_confidence": 0.768, "severity": "critical", "timestamp": "2026-01-01T07:24:00Z", "trace_id": "a8c7916a-142d-0e7c-5c03-53172f384264" }
{ "account_age_days": 1714, "account_id": "ACCT-F169E2CE39F2", "baseline_risk_score": 0.344, "kyc_tier": "tier_1", "session_entropy": 0.163 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 419, "timestamp": "2026-01-01T07:24:00Z", "transaction_amount_usd": 88521.17 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.369, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 401610.5, "financial_exposure_usd": 639348.94, "recoverable_pct": 0.324 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108663", "label": "benign", "label_confidence": 0.474, "severity": "low", "timestamp": "2026-01-07T00:23:00Z", "trace_id": "0a726512-42d9-27fd-7200-a509976d79c0" }
{ "account_age_days": 1034, "account_id": "ACCT-C0C0A5729C7F", "baseline_risk_score": 0.167, "kyc_tier": "tier_1", "session_entropy": 0.532 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 688, "timestamp": "2026-01-07T00:23:00Z", "transaction_amount_usd": 13645.25 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.555, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2913.51, "financial_exposure_usd": 4677.78, "recoverable_pct": 0.797 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100947", "label": "fraudulent", "label_confidence": 0.93, "severity": "high", "timestamp": "2026-01-01T15:47:00Z", "trace_id": "330402d6-5c13-46dd-db40-ed808cbd46ae" }
{ "account_age_days": 302, "account_id": "ACCT-C1503DD944F7", "baseline_risk_score": 0.496, "kyc_tier": "tier_1", "session_entropy": 0.874 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 1028, "timestamp": "2026-01-01T15:47:00Z", "transaction_amount_usd": 15965.19 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.766, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 949269.4, "financial_exposure_usd": 955529.64, "recoverable_pct": 0.492 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102878", "label": "fraudulent", "label_confidence": 0.904, "severity": "low", "timestamp": "2026-01-02T23:58:00Z", "trace_id": "8311440f-b7f4-f05b-e88d-2d99a4ccfa6c" }
{ "account_age_days": 1420, "account_id": "ACCT-CD394997F3D7", "baseline_risk_score": 0.512, "kyc_tier": "tier_3", "session_entropy": 0.322 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 795, "timestamp": "2026-01-02T23:58:00Z", "transaction_amount_usd": 4038.33 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.68, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 635877.83, "financial_exposure_usd": 788700.06, "recoverable_pct": 0.386 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109231", "label": "benign", "label_confidence": 0.655, "severity": "low", "timestamp": "2026-01-07T09:51:00Z", "trace_id": "df1e9cab-5eae-577e-2776-02a6cdff7c65" }
{ "account_age_days": 206, "account_id": "ACCT-1A4172C8EE72", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.726 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1046, "timestamp": "2026-01-07T09:51:00Z", "transaction_amount_usd": 11189.5 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.461, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3691, "financial_exposure_usd": 5993.43, "recoverable_pct": 0.403 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104945", "label": "fraudulent", "label_confidence": 0.882, "severity": "high", "timestamp": "2026-01-04T10:25:00Z", "trace_id": "0c23bfcb-7747-259f-2dfb-18dc2d89cef1" }
{ "account_age_days": 1659, "account_id": "ACCT-0004DBB3CE51", "baseline_risk_score": 0.43, "kyc_tier": "tier_1", "session_entropy": 0.649 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 334, "timestamp": "2026-01-04T01:27:00Z", "transaction_amount_usd": 23.25 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POST...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.728, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2052879.74, "financial_exposure_usd": 2761223.72, "recoverable_pct": 0.686 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106287", "label": "fraudulent", "label_confidence": 0.949, "severity": "medium", "timestamp": "2026-01-05T08:47:00Z", "trace_id": "8096cb02-89d3-5281-11cf-7766f4d32b1a" }
{ "account_age_days": 985, "account_id": "ACCT-D369112B3C1B", "baseline_risk_score": 0.403, "kyc_tier": "tier_2", "session_entropy": 0.469 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 82, "timestamp": "2026-01-05T03:46:00Z", "transaction_amount_usd": 23.37 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.692, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5495525.02, "financial_exposure_usd": 8090789.72, "recoverable_pct": 0.818 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100545", "label": "fraudulent", "label_confidence": 0.86, "severity": "low", "timestamp": "2026-01-01T09:05:00Z", "trace_id": "66458972-d088-e438-c078-49f2733b08b8" }
{ "account_age_days": 1199, "account_id": "ACCT-F5C8A1C7DC60", "baseline_risk_score": 0.402, "kyc_tier": "tier_1", "session_entropy": 0.467 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 887, "timestamp": "2026-01-01T09:05:00Z", "transaction_amount_usd": 86489.41 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.447, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 760017.3, "financial_exposure_usd": 1371461.74, "recoverable_pct": 0.047 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101210", "label": "fraudulent", "label_confidence": 0.891, "severity": "medium", "timestamp": "2026-01-01T20:10:00Z", "trace_id": "9f04cdec-57d6-2fd6-0138-addecc71bf61" }
{ "account_age_days": 402, "account_id": "ACCT-EEA13BF79E12", "baseline_risk_score": 0.565, "kyc_tier": "tier_2", "session_entropy": 0.682 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 674, "timestamp": "2026-01-01T20:10:00Z", "transaction_amount_usd": 20093.38 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.589, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 90118.33, "financial_exposure_usd": 181781.51, "recoverable_pct": 0.612 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101053", "label": "fraudulent", "label_confidence": 0.955, "severity": "high", "timestamp": "2026-01-01T17:33:00Z", "trace_id": "e6d9011a-77af-791c-0d29-bcbe5cb8f9a2" }
{ "account_age_days": 1922, "account_id": "ACCT-90CF490D7138", "baseline_risk_score": 0.6, "kyc_tier": "tier_2", "session_entropy": 0.794 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 109, "timestamp": "2026-01-01T13:24:00Z", "transaction_amount_usd": 4.62 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.683, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 637610.97, "financial_exposure_usd": 1222090.02, "recoverable_pct": 0.377 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106718", "label": "benign", "label_confidence": 0.733, "severity": "medium", "timestamp": "2026-01-05T15:58:00Z", "trace_id": "c2b4007b-177e-af11-cc3d-37eaf2efbf42" }
{ "account_age_days": 1500, "account_id": "ACCT-1FAAECD54192", "baseline_risk_score": 0.133, "kyc_tier": "tier_3", "session_entropy": 0.74 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 398, "timestamp": "2026-01-05T09:35:00Z", "transaction_amount_usd": 23.88 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.519, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2728.13, "financial_exposure_usd": 4369.16, "recoverable_pct": 0.475 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107797", "label": "benign", "label_confidence": 0.587, "severity": "medium", "timestamp": "2026-01-06T09:57:00Z", "trace_id": "942a757a-073e-153f-28a8-30f10d932d42" }
{ "account_age_days": 895, "account_id": "ACCT-699070B454D6", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.436 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 487, "timestamp": "2026-01-06T09:57:00Z", "transaction_amount_usd": 3285.95 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.617, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1940.41, "financial_exposure_usd": 2271.5, "recoverable_pct": 0.954 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107370", "label": "benign", "label_confidence": 0.599, "severity": "high", "timestamp": "2026-01-06T02:50:00Z", "trace_id": "507133a3-655a-4e2f-2496-975087d67b04" }
{ "account_age_days": 412, "account_id": "ACCT-B9180E2DE54F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.574 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1158, "timestamp": "2026-01-06T02:50:00Z", "transaction_amount_usd": 11756.18 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.762, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 318.87, "financial_exposure_usd": 688.43, "recoverable_pct": 0.838 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105543", "label": "fraudulent", "label_confidence": 0.857, "severity": "high", "timestamp": "2026-01-04T20:23:00Z", "trace_id": "4355ca78-d566-5f5c-ad99-0ac89f81b5c3" }
{ "account_age_days": 1438, "account_id": "ACCT-8C3165D1059C", "baseline_risk_score": 0.286, "kyc_tier": "tier_3", "session_entropy": 0.713 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 395, "timestamp": "2026-01-04T14:18:00Z", "transaction_amount_usd": 23.54 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.774, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1363068.1, "financial_exposure_usd": 1422924.04, "recoverable_pct": 0.681 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105656", "label": "fraudulent", "label_confidence": 0.705, "severity": "high", "timestamp": "2026-01-04T22:16:00Z", "trace_id": "c889c979-2d8b-eda7-d0d7-394b0f8b7794" }
{ "account_age_days": 67, "account_id": "ACCT-CFD3D40722B1", "baseline_risk_score": 0.194, "kyc_tier": "tier_2", "session_entropy": 0.484 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 875, "timestamp": "2026-01-04T22:16:00Z", "transaction_amount_usd": 1993022.02 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.677, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3150460.61, "financial_exposure_usd": 4472309.7, "recoverable_pct": 0.683 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107064", "label": "benign", "label_confidence": 0.686, "severity": "medium", "timestamp": "2026-01-05T21:44:00Z", "trace_id": "275d6ef4-271b-6ca0-bcb5-8bb69e79b6f1" }
{ "account_age_days": 1204, "account_id": "ACCT-3B2DC3EC0633", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.882 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 196, "timestamp": "2026-01-05T21:44:00Z", "transaction_amount_usd": 819.45 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.598, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3415.94, "financial_exposure_usd": 3912.23, "recoverable_pct": 0.698 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106704", "label": "benign", "label_confidence": 0.734, "severity": "medium", "timestamp": "2026-01-05T15:44:00Z", "trace_id": "1cda5184-7e99-69a2-d896-9de8c3abaea8" }
{ "account_age_days": 365, "account_id": "ACCT-FDB422F60A49", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.152 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 208, "timestamp": "2026-01-05T15:44:00Z", "transaction_amount_usd": 3476.64 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.671, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2347.66, "financial_exposure_usd": 2413.27, "recoverable_pct": 0.471 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105130", "label": "fraudulent", "label_confidence": 0.705, "severity": "critical", "timestamp": "2026-01-04T13:30:00Z", "trace_id": "7385252b-c724-9e3b-8515-3fe25e16a12b" }
{ "account_age_days": 873, "account_id": "ACCT-2DBF9E485D6A", "baseline_risk_score": 0.059, "kyc_tier": "tier_1", "session_entropy": 0.163 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 91, "timestamp": "2026-01-04T07:36:00Z", "transaction_amount_usd": 18.6 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.925, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1942015.22, "financial_exposure_usd": 4200142.98, "recoverable_pct": 0.517 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107784", "label": "benign", "label_confidence": 0.643, "severity": "medium", "timestamp": "2026-01-06T09:44:00Z", "trace_id": "68f61a23-fb4d-380a-432c-876569c14359" }
{ "account_age_days": 1784, "account_id": "ACCT-6A478733AA98", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.293 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 633, "timestamp": "2026-01-06T09:44:00Z", "transaction_amount_usd": 1974.28 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.525, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 939.32, "financial_exposure_usd": 1550.96, "recoverable_pct": 0.783 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102552", "label": "fraudulent", "label_confidence": 0.792, "severity": "critical", "timestamp": "2026-01-02T18:32:00Z", "trace_id": "75c1db5a-21c7-c989-1da9-ab32baf78b6e" }
{ "account_age_days": 109, "account_id": "ACCT-4014B7B6E64D", "baseline_risk_score": 0.623, "kyc_tier": "tier_2", "session_entropy": 0.242 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 110, "timestamp": "2026-01-02T09:41:00Z", "transaction_amount_usd": 11.75 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.466, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 370703.66, "financial_exposure_usd": 468781.79, "recoverable_pct": 0.246 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102638", "label": "fraudulent", "label_confidence": 0.928, "severity": "medium", "timestamp": "2026-01-02T19:58:00Z", "trace_id": "a2cfb29e-b6a7-0d6a-b63e-b3702e181ff6" }
{ "account_age_days": 1788, "account_id": "ACCT-E404DFB4F7B4", "baseline_risk_score": 0.616, "kyc_tier": "tier_3", "session_entropy": 0.703 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1004, "timestamp": "2026-01-02T19:58:00Z", "transaction_amount_usd": 70322.22 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.351, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 517891.19, "financial_exposure_usd": 566949.75, "recoverable_pct": 0.131 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107997", "label": "benign", "label_confidence": 0.643, "severity": "low", "timestamp": "2026-01-06T13:17:00Z", "trace_id": "f0c32e8c-ebe2-ce52-8d55-a14a905f1560" }
{ "account_age_days": 962, "account_id": "ACCT-97596D9EDFBD", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.812 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 394, "timestamp": "2026-01-06T13:17:00Z", "transaction_amount_usd": 13089.29 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.457, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2637.15, "financial_exposure_usd": 3346.19, "recoverable_pct": 0.87 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104973", "label": "fraudulent", "label_confidence": 0.889, "severity": "critical", "timestamp": "2026-01-04T10:53:00Z", "trace_id": "d7c424d6-8b0d-7a51-639f-64106087bebe" }
{ "account_age_days": 1654, "account_id": "ACCT-318123304686", "baseline_risk_score": 0.428, "kyc_tier": "tier_1", "session_entropy": 0.669 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 685, "timestamp": "2026-01-04T10:53:00Z", "transaction_amount_usd": 1588978.83 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.539, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2027269.69, "financial_exposure_usd": 4640680.68, "recoverable_pct": 0.923 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100743", "label": "fraudulent", "label_confidence": 0.848, "severity": "medium", "timestamp": "2026-01-01T12:23:00Z", "trace_id": "aa2fe74b-1347-3e04-eb90-287e6a9c5812" }
{ "account_age_days": 1698, "account_id": "ACCT-BC463BFEF308", "baseline_risk_score": 0.482, "kyc_tier": "tier_2", "session_entropy": 0.908 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 89, "timestamp": "2026-01-01T03:18:00Z", "transaction_amount_usd": 18.1 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.856, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 499511.49, "financial_exposure_usd": 784077.02, "recoverable_pct": 0.259 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105133", "label": "fraudulent", "label_confidence": 0.879, "severity": "medium", "timestamp": "2026-01-04T13:33:00Z", "trace_id": "9a79fff2-3750-4856-c216-d7ebf997c8e1" }
{ "account_age_days": 1030, "account_id": "ACCT-E012BF17F02A", "baseline_risk_score": 0.178, "kyc_tier": "tier_1", "session_entropy": 0.173 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 112, "timestamp": "2026-01-04T05:15:00Z", "transaction_amount_usd": 18.06 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.908, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2419477.16, "financial_exposure_usd": 3787938.44, "recoverable_pct": 0.841 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108796", "label": "benign", "label_confidence": 0.612, "severity": "medium", "timestamp": "2026-01-07T02:36:00Z", "trace_id": "85654326-e6f9-d597-0aee-e42e0f3db362" }
{ "account_age_days": 98, "account_id": "ACCT-FE3ECA4A3201", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.848 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 170, "timestamp": "2026-01-06T22:58:00Z", "transaction_amount_usd": 4.42 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.765, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 597.64, "financial_exposure_usd": 692.1, "recoverable_pct": 0.473 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109489", "label": "benign", "label_confidence": 0.574, "severity": "low", "timestamp": "2026-01-07T14:09:00Z", "trace_id": "33575ca8-e1be-0877-ceb0-79c48655497c" }
{ "account_age_days": 495, "account_id": "ACCT-12E6EB2EA98F", "baseline_risk_score": 0.076, "kyc_tier": "tier_1", "session_entropy": 0.318 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1076, "timestamp": "2026-01-07T14:09:00Z", "transaction_amount_usd": 5374.06 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.732, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1247.41, "financial_exposure_usd": 2113.73, "recoverable_pct": 0.635 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102038", "label": "fraudulent", "label_confidence": 0.781, "severity": "high", "timestamp": "2026-01-02T09:58:00Z", "trace_id": "854fb162-5a22-5108-64fb-40ea13305707" }
{ "account_age_days": 1267, "account_id": "ACCT-00EF0A6A9972", "baseline_risk_score": 0.588, "kyc_tier": "tier_1", "session_entropy": 0.469 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 913, "timestamp": "2026-01-02T09:58:00Z", "transaction_amount_usd": 44091.4 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.4, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 543206.12, "financial_exposure_usd": 835515.41, "recoverable_pct": 0.071 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104447", "label": "fraudulent", "label_confidence": 0.85, "severity": "medium", "timestamp": "2026-01-04T02:07:00Z", "trace_id": "11f94278-ec0c-c21e-e7b9-a7f1527fcf92" }
{ "account_age_days": 148, "account_id": "ACCT-196B27112C97", "baseline_risk_score": 0.445, "kyc_tier": "tier_1", "session_entropy": 0.694 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 903, "timestamp": "2026-01-04T02:07:00Z", "transaction_amount_usd": 1562978.66 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.922, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1889092.51, "financial_exposure_usd": 3213186.31, "recoverable_pct": 0.683 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108481", "label": "benign", "label_confidence": 0.633, "severity": "low", "timestamp": "2026-01-06T21:21:00Z", "trace_id": "018a816b-c4cd-2997-b628-cee345700eed" }
{ "account_age_days": 1185, "account_id": "ACCT-9E793286B1B4", "baseline_risk_score": 0.083, "kyc_tier": "tier_1", "session_entropy": 0.281 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 293, "timestamp": "2026-01-06T17:51:00Z", "transaction_amount_usd": 0.97 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.584, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1338.78, "financial_exposure_usd": 2502.28, "recoverable_pct": 0.575 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103600", "label": "fraudulent", "label_confidence": 0.651, "severity": "medium", "timestamp": "2026-01-03T12:00:00Z", "trace_id": "2b15aff6-acac-c977-7cab-39e769f43516" }
{ "account_age_days": 807, "account_id": "ACCT-47F5AAAB6BD7", "baseline_risk_score": 0.296, "kyc_tier": "tier_1", "session_entropy": 0.676 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 366, "timestamp": "2026-01-03T06:11:00Z", "transaction_amount_usd": 22.77 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.886, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1392565.92, "financial_exposure_usd": 2302554.51, "recoverable_pct": 0.719 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101336", "label": "fraudulent", "label_confidence": 0.858, "severity": "medium", "timestamp": "2026-01-01T22:16:00Z", "trace_id": "8e37f746-b654-e7a5-922a-aec0e50cce94" }
{ "account_age_days": 318, "account_id": "ACCT-7BEAD72241D1", "baseline_risk_score": 0.454, "kyc_tier": "tier_3", "session_entropy": 0.441 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 944, "timestamp": "2026-01-01T22:16:00Z", "transaction_amount_usd": 2588.17 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.408, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 379093.93, "financial_exposure_usd": 803985.19, "recoverable_pct": 0.622 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102087", "label": "fraudulent", "label_confidence": 0.784, "severity": "low", "timestamp": "2026-01-02T10:47:00Z", "trace_id": "bf5d484f-4bb3-6135-a204-b32ff71320a2" }
{ "account_age_days": 607, "account_id": "ACCT-0DAD4A2954F9", "baseline_risk_score": 0.595, "kyc_tier": "tier_1", "session_entropy": 0.941 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 391, "timestamp": "2026-01-02T10:47:00Z", "transaction_amount_usd": 46894.69 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.662, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 191696.75, "financial_exposure_usd": 473055.57, "recoverable_pct": 0.474 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101767", "label": "fraudulent", "label_confidence": 0.88, "severity": "low", "timestamp": "2026-01-02T05:27:00Z", "trace_id": "3b0ef840-2161-8dcd-c094-31b044a28396" }
{ "account_age_days": 383, "account_id": "ACCT-D99F966DA1F6", "baseline_risk_score": 0.646, "kyc_tier": "tier_2", "session_entropy": 0.873 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 159, "timestamp": "2026-01-01T19:09:00Z", "transaction_amount_usd": 14.17 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.681, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 317558.82, "financial_exposure_usd": 658873.82, "recoverable_pct": 0.73 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106043", "label": "fraudulent", "label_confidence": 0.809, "severity": "low", "timestamp": "2026-01-05T04:43:00Z", "trace_id": "afbf3109-068f-c76e-f5c7-8daa43670f5f" }
{ "account_age_days": 128, "account_id": "ACCT-E4D0CFA05110", "baseline_risk_score": 0.141, "kyc_tier": "tier_2", "session_entropy": 0.504 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 253, "timestamp": "2026-01-05T00:12:00Z", "transaction_amount_usd": 0.83 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.729, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1837377.52, "financial_exposure_usd": 2681462.01, "recoverable_pct": 0.51 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107310", "label": "benign", "label_confidence": 0.655, "severity": "medium", "timestamp": "2026-01-06T01:50:00Z", "trace_id": "e65761f2-e208-7fdf-e183-d414f84993b4" }
{ "account_age_days": 977, "account_id": "ACCT-1BF090AB4B51", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.679 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 124, "timestamp": "2026-01-05T19:28:00Z", "transaction_amount_usd": 11.8 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.757, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2416.66, "financial_exposure_usd": 2780.36, "recoverable_pct": 0.886 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103885", "label": "fraudulent", "label_confidence": 0.646, "severity": "critical", "timestamp": "2026-01-03T16:45:00Z", "trace_id": "5e5bdd31-ab2c-a781-d31f-f942e94102b5" }
{ "account_age_days": 1727, "account_id": "ACCT-447590BEC90D", "baseline_risk_score": 0.38, "kyc_tier": "tier_2", "session_entropy": 0.407 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 310, "timestamp": "2026-01-03T11:40:00Z", "transaction_amount_usd": 2.87 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.918, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6917466.36, "financial_exposure_usd": 7552967.91, "recoverable_pct": 0.771 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109591", "label": "benign", "label_confidence": 0.468, "severity": "high", "timestamp": "2026-01-07T15:51:00Z", "trace_id": "b25cfbf9-4cc8-ce25-96b2-82dd3ade608d" }
{ "account_age_days": 1759, "account_id": "ACCT-702DEF3D661F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.687 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 82, "timestamp": "2026-01-07T15:51:00Z", "transaction_amount_usd": 1166.73 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.673, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1762.86, "financial_exposure_usd": 2924.11, "recoverable_pct": 0.718 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106436", "label": "fraudulent", "label_confidence": 0.644, "severity": "high", "timestamp": "2026-01-05T11:16:00Z", "trace_id": "df35466a-c349-134b-30b4-e66c81bb4b8b" }
{ "account_age_days": 570, "account_id": "ACCT-9225660EC207", "baseline_risk_score": 0.094, "kyc_tier": "tier_1", "session_entropy": 0.866 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 162, "timestamp": "2026-01-04T23:59:00Z", "transaction_amount_usd": 21.03 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.453, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4247992.48, "financial_exposure_usd": 5441093.63, "recoverable_pct": 0.861 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105280", "label": "fraudulent", "label_confidence": 0.664, "severity": "medium", "timestamp": "2026-01-04T16:00:00Z", "trace_id": "82d5b963-bad3-ab9f-69eb-c7d5793a7604" }
{ "account_age_days": 1523, "account_id": "ACCT-CC972DFD0E02", "baseline_risk_score": 0.436, "kyc_tier": "tier_3", "session_entropy": 0.509 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 508, "timestamp": "2026-01-04T16:00:00Z", "transaction_amount_usd": 2791429.79 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.871, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3093981.82, "financial_exposure_usd": 5735991.91, "recoverable_pct": 0.858 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107912", "label": "benign", "label_confidence": 0.701, "severity": "medium", "timestamp": "2026-01-06T11:52:00Z", "trace_id": "24fa4c12-3b2d-c721-f7a2-8be86858f54e" }
{ "account_age_days": 1150, "account_id": "ACCT-6486613C0951", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.424 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 390, "timestamp": "2026-01-06T11:52:00Z", "transaction_amount_usd": 4241.45 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.718, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1670.44, "financial_exposure_usd": 3988.72, "recoverable_pct": 0.625 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100862", "label": "fraudulent", "label_confidence": 0.956, "severity": "critical", "timestamp": "2026-01-01T14:22:00Z", "trace_id": "823ef811-0684-dfaa-f9f2-3492700b6ef6" }
{ "account_age_days": 1062, "account_id": "ACCT-21111D39DD36", "baseline_risk_score": 0.423, "kyc_tier": "tier_1", "session_entropy": 0.312 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 646, "timestamp": "2026-01-01T14:22:00Z", "transaction_amount_usd": 29279.2 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.925, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 386213.25, "financial_exposure_usd": 945965.84, "recoverable_pct": 0.541 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105179", "label": "fraudulent", "label_confidence": 0.855, "severity": "high", "timestamp": "2026-01-04T14:19:00Z", "trace_id": "f294285c-0339-36b7-a70d-cac7a5fdbd0b" }
{ "account_age_days": 1894, "account_id": "ACCT-41A036011A6D", "baseline_risk_score": 0.365, "kyc_tier": "tier_3", "session_entropy": 0.487 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 406, "timestamp": "2026-01-04T14:19:00Z", "transaction_amount_usd": 978668.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.537, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3275445.44, "financial_exposure_usd": 6239786.43, "recoverable_pct": 0.544 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101214", "label": "fraudulent", "label_confidence": 0.954, "severity": "critical", "timestamp": "2026-01-01T20:14:00Z", "trace_id": "553d10d0-f409-336a-e1f1-6016ec1f9067" }
{ "account_age_days": 782, "account_id": "ACCT-AA758D546C64", "baseline_risk_score": 0.37, "kyc_tier": "tier_3", "session_entropy": 0.737 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 891, "timestamp": "2026-01-01T20:14:00Z", "transaction_amount_usd": 9663.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.402, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 204837.09, "financial_exposure_usd": 390592.31, "recoverable_pct": 0.018 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101491", "label": "fraudulent", "label_confidence": 0.843, "severity": "high", "timestamp": "2026-01-02T00:51:00Z", "trace_id": "41b63091-612f-17ab-1355-0d402865cb3a" }
{ "account_age_days": 628, "account_id": "ACCT-4BE1702A0423", "baseline_risk_score": 0.273, "kyc_tier": "tier_2", "session_entropy": 0.126 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 386, "timestamp": "2026-01-02T00:51:00Z", "transaction_amount_usd": 115741.94 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.459, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 384930.95, "financial_exposure_usd": 404696.19, "recoverable_pct": 0.348 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }