schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102380", "label": "fraudulent", "label_confidence": 0.972, "severity": "high", "timestamp": "2026-01-02T15:40:00Z", "trace_id": "ba1468df-ab9e-f9bb-0f73-a7ca65b989c1" }
{ "account_age_days": 335, "account_id": "ACCT-282349E722D6", "baseline_risk_score": 0.446, "kyc_tier": "tier_1", "session_entropy": 0.911 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 384, "timestamp": "2026-01-02T08:41:00Z", "transaction_amount_usd": 16.42 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.696, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 444864.93, "financial_exposure_usd": 754710.81, "recoverable_pct": 0.435 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102139", "label": "fraudulent", "label_confidence": 0.938, "severity": "high", "timestamp": "2026-01-02T11:39:00Z", "trace_id": "05c1b6fe-661f-2c7c-820c-712df9aa0b77" }
{ "account_age_days": 1120, "account_id": "ACCT-6200F62EF0A9", "baseline_risk_score": 0.553, "kyc_tier": "tier_2", "session_entropy": 0.214 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 195, "timestamp": "2026-01-02T11:39:00Z", "transaction_amount_usd": 88805.73 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.664, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 661455.59, "financial_exposure_usd": 692563.02, "recoverable_pct": 0.338 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104071", "label": "fraudulent", "label_confidence": 0.677, "severity": "high", "timestamp": "2026-01-03T19:51:00Z", "trace_id": "33ebd205-6a75-d6d2-bdde-465dc7735d61" }
{ "account_age_days": 1633, "account_id": "ACCT-32CD7924F6A4", "baseline_risk_score": 0.243, "kyc_tier": "tier_1", "session_entropy": 0.172 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 229, "timestamp": "2026-01-03T13:31:00Z", "transaction_amount_usd": 7.24 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.932, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4918692.36, "financial_exposure_usd": 6343434.22, "recoverable_pct": 0.928 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103511", "label": "fraudulent", "label_confidence": 0.638, "severity": "medium", "timestamp": "2026-01-03T10:31:00Z", "trace_id": "15ee6cca-9631-3bc6-956e-f4398fed7c09" }
{ "account_age_days": 1999, "account_id": "ACCT-431C5F09D36C", "baseline_risk_score": 0.315, "kyc_tier": "tier_2", "session_entropy": 0.243 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 542, "timestamp": "2026-01-03T10:31:00Z", "transaction_amount_usd": 177759.83 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.576, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3127688.52, "financial_exposure_usd": 4656672.8, "recoverable_pct": 0.496 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102052", "label": "fraudulent", "label_confidence": 0.885, "severity": "critical", "timestamp": "2026-01-02T10:12:00Z", "trace_id": "d5bfeadb-fa1e-f202-8cc8-f4c25cd0330a" }
{ "account_age_days": 1146, "account_id": "ACCT-E0ED4D416792", "baseline_risk_score": 0.435, "kyc_tier": "tier_2", "session_entropy": 0.32 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 320, "timestamp": "2026-01-02T02:27:00Z", "transaction_amount_usd": 17.57 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.353, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 628441.75, "financial_exposure_usd": 988042.45, "recoverable_pct": 0.665 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106352", "label": "fraudulent", "label_confidence": 0.882, "severity": "high", "timestamp": "2026-01-05T09:52:00Z", "trace_id": "ef8b56f0-65be-7f32-d294-791a7cef60e1" }
{ "account_age_days": 1985, "account_id": "ACCT-69376C71DD87", "baseline_risk_score": 0.206, "kyc_tier": "tier_2", "session_entropy": 0.433 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 127, "timestamp": "2026-01-05T09:52:00Z", "transaction_amount_usd": 2533125.91 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.473, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2181166.59, "financial_exposure_usd": 3877252.22, "recoverable_pct": 0.785 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103496", "label": "fraudulent", "label_confidence": 0.92, "severity": "low", "timestamp": "2026-01-03T10:16:00Z", "trace_id": "4e4ae7ee-dc2a-870f-98a6-e5a8873495b4" }
{ "account_age_days": 722, "account_id": "ACCT-10BC4E8280DF", "baseline_risk_score": 0.091, "kyc_tier": "tier_2", "session_entropy": 0.107 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 643, "timestamp": "2026-01-03T10:16:00Z", "transaction_amount_usd": 1501396.42 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.872, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1837236.43, "financial_exposure_usd": 3169751.02, "recoverable_pct": 0.736 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101723", "label": "fraudulent", "label_confidence": 0.841, "severity": "medium", "timestamp": "2026-01-02T04:43:00Z", "trace_id": "f970bead-9725-0ec9-9e6d-d816ec4c9036" }
{ "account_age_days": 584, "account_id": "ACCT-8C9D812BC716", "baseline_risk_score": 0.481, "kyc_tier": "tier_2", "session_entropy": 0.785 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 492, "timestamp": "2026-01-02T04:43:00Z", "transaction_amount_usd": 44816.86 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.376, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 352266.26, "financial_exposure_usd": 575061.45, "recoverable_pct": 0.154 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100611", "label": "fraudulent", "label_confidence": 0.867, "severity": "medium", "timestamp": "2026-01-01T10:11:00Z", "trace_id": "6d996b2b-1e6f-1679-abce-530485e320ae" }
{ "account_age_days": 455, "account_id": "ACCT-09D35E757C09", "baseline_risk_score": 0.38, "kyc_tier": "tier_1", "session_entropy": 0.545 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 262, "timestamp": "2026-01-01T10:11:00Z", "transaction_amount_usd": 10775.87 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.389, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 624704.58, "financial_exposure_usd": 677034.78, "recoverable_pct": 0.568 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104809", "label": "fraudulent", "label_confidence": 0.805, "severity": "low", "timestamp": "2026-01-04T08:09:00Z", "trace_id": "b2ad2b67-9a0a-926c-b8cf-b9e4c12f8305" }
{ "account_age_days": 1562, "account_id": "ACCT-73CF6CCB7E23", "baseline_risk_score": 0.201, "kyc_tier": "tier_1", "session_entropy": 0.444 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 958, "timestamp": "2026-01-04T08:09:00Z", "transaction_amount_usd": 299979.78 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.805, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5570602.04, "financial_exposure_usd": 6803889.7, "recoverable_pct": 0.854 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109176", "label": "benign", "label_confidence": 0.576, "severity": "medium", "timestamp": "2026-01-07T08:56:00Z", "trace_id": "855b05a9-8c92-8cf5-46f4-949c7c7afb24" }
{ "account_age_days": 273, "account_id": "ACCT-B47423F8846F", "baseline_risk_score": 0.124, "kyc_tier": "tier_1", "session_entropy": 0.812 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 673, "timestamp": "2026-01-07T08:56:00Z", "transaction_amount_usd": 11767.95 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.788, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1673.74, "financial_exposure_usd": 3336.47, "recoverable_pct": 0.624 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109218", "label": "benign", "label_confidence": 0.715, "severity": "low", "timestamp": "2026-01-07T09:38:00Z", "trace_id": "b7a8267a-38e9-03bb-96b7-2505d1ef93e1" }
{ "account_age_days": 604, "account_id": "ACCT-C6977315B581", "baseline_risk_score": 0.124, "kyc_tier": "tier_2", "session_entropy": 0.461 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1117, "timestamp": "2026-01-07T09:38:00Z", "transaction_amount_usd": 11375.26 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.701, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2596.16, "financial_exposure_usd": 2718.84, "recoverable_pct": 0.974 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101036", "label": "fraudulent", "label_confidence": 0.919, "severity": "medium", "timestamp": "2026-01-01T17:16:00Z", "trace_id": "12b071bb-b894-8faf-f111-a610e7821d04" }
{ "account_age_days": 1202, "account_id": "ACCT-2CF41D1A8DF9", "baseline_risk_score": 0.624, "kyc_tier": "tier_3", "session_entropy": 0.162 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 98, "timestamp": "2026-01-01T13:59:00Z", "transaction_amount_usd": 2.63 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.64, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 856253.61, "financial_exposure_usd": 1033524.04, "recoverable_pct": 0.047 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103831", "label": "fraudulent", "label_confidence": 0.929, "severity": "low", "timestamp": "2026-01-03T15:51:00Z", "trace_id": "c51e37e1-2ecd-f56e-a995-866f926b7271" }
{ "account_age_days": 718, "account_id": "ACCT-CDD8D53A97E9", "baseline_risk_score": 0.21, "kyc_tier": "tier_1", "session_entropy": 0.691 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 257, "timestamp": "2026-01-03T10:20:00Z", "transaction_amount_usd": 1.36 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.442, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 5955025.49, "financial_exposure_usd": 6355515.17, "recoverable_pct": 0.54 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100523", "label": "fraudulent", "label_confidence": 0.96, "severity": "medium", "timestamp": "2026-01-01T08:43:00Z", "trace_id": "9f58ff84-f025-0b18-e4c6-460b9c7ddedf" }
{ "account_age_days": 1709, "account_id": "ACCT-9FCD0BD6CD2B", "baseline_risk_score": 0.404, "kyc_tier": "tier_2", "session_entropy": 0.887 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 269, "timestamp": "2025-12-31T21:25:00Z", "transaction_amount_usd": 15.69 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.761, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 620336.23, "financial_exposure_usd": 953963.72, "recoverable_pct": 0.677 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103494", "label": "fraudulent", "label_confidence": 0.766, "severity": "medium", "timestamp": "2026-01-03T10:14:00Z", "trace_id": "8c55d4a6-023b-e27f-48b2-af646dcd03aa" }
{ "account_age_days": 1107, "account_id": "ACCT-25A8FAECC375", "baseline_risk_score": 0.364, "kyc_tier": "tier_2", "session_entropy": 0.719 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 292, "timestamp": "2026-01-03T10:14:00Z", "transaction_amount_usd": 2813672.49 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.538, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3680148.24, "financial_exposure_usd": 3785643.54, "recoverable_pct": 0.629 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108377", "label": "benign", "label_confidence": 0.677, "severity": "medium", "timestamp": "2026-01-06T19:37:00Z", "trace_id": "e6f9a194-b5d1-50f3-6427-17bfa3087cfd" }
{ "account_age_days": 90, "account_id": "ACCT-2B31D44F757F", "baseline_risk_score": 0.11, "kyc_tier": "tier_2", "session_entropy": 0.118 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 246, "timestamp": "2026-01-06T19:37:00Z", "transaction_amount_usd": 1936.62 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.455, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1670.1, "financial_exposure_usd": 2121.37, "recoverable_pct": 0.622 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101530", "label": "fraudulent", "label_confidence": 0.859, "severity": "high", "timestamp": "2026-01-02T01:30:00Z", "trace_id": "720c3c4f-4e37-53d3-ee01-9ccce7917731" }
{ "account_age_days": 1342, "account_id": "ACCT-A3B3963A36DA", "baseline_risk_score": 0.622, "kyc_tier": "tier_1", "session_entropy": 0.638 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 925, "timestamp": "2026-01-02T01:30:00Z", "transaction_amount_usd": 117664.56 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.484, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 387598.41, "financial_exposure_usd": 563139.39, "recoverable_pct": 0.466 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104732", "label": "fraudulent", "label_confidence": 0.888, "severity": "low", "timestamp": "2026-01-04T06:52:00Z", "trace_id": "dbf77f98-3a19-4530-3be0-5e97bf1aeb19" }
{ "account_age_days": 356, "account_id": "ACCT-40189829ED03", "baseline_risk_score": 0.215, "kyc_tier": "tier_3", "session_entropy": 0.788 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 689, "timestamp": "2026-01-04T06:52:00Z", "transaction_amount_usd": 2761502.44 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.358, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2465146.84, "financial_exposure_usd": 4075222.26, "recoverable_pct": 0.432 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103577", "label": "fraudulent", "label_confidence": 0.762, "severity": "medium", "timestamp": "2026-01-03T11:37:00Z", "trace_id": "46de0da6-4b8b-5fbd-4d3d-f3166dd3ed07" }
{ "account_age_days": 271, "account_id": "ACCT-9994F0D7DF95", "baseline_risk_score": 0.312, "kyc_tier": "tier_2", "session_entropy": 0.415 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 460, "timestamp": "2026-01-03T11:37:00Z", "transaction_amount_usd": 607000.47 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.58, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 2481008.18, "financial_exposure_usd": 3387221.21, "recoverable_pct": 0.992 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101184", "label": "fraudulent", "label_confidence": 0.836, "severity": "high", "timestamp": "2026-01-01T19:44:00Z", "trace_id": "7249f515-d92e-9348-0715-e2a0ac37660f" }
{ "account_age_days": 377, "account_id": "ACCT-854D48FB96AD", "baseline_risk_score": 0.276, "kyc_tier": "tier_3", "session_entropy": 0.751 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 516, "timestamp": "2026-01-01T19:44:00Z", "transaction_amount_usd": 117183.71 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.874, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 5803.17, "financial_exposure_usd": 13127.6, "recoverable_pct": 0.335 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104634", "label": "fraudulent", "label_confidence": 0.778, "severity": "high", "timestamp": "2026-01-04T05:14:00Z", "trace_id": "74a9520e-93c2-77ac-26e5-dee00834c73b" }
{ "account_age_days": 1172, "account_id": "ACCT-D69A749328AF", "baseline_risk_score": 0.217, "kyc_tier": "tier_3", "session_entropy": 0.893 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 171, "timestamp": "2026-01-04T01:46:00Z", "transaction_amount_usd": 11.97 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.354, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3087828.01, "financial_exposure_usd": 5796456.68, "recoverable_pct": 0.803 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102046", "label": "fraudulent", "label_confidence": 0.958, "severity": "critical", "timestamp": "2026-01-02T10:06:00Z", "trace_id": "bfd22eab-9bad-b2fd-9c25-909b2443779e" }
{ "account_age_days": 1689, "account_id": "ACCT-80B118537C39", "baseline_risk_score": 0.418, "kyc_tier": "tier_1", "session_entropy": 0.688 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 161, "timestamp": "2026-01-01T22:16:00Z", "transaction_amount_usd": 17.79 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.384, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 560798.54, "financial_exposure_usd": 801252.14, "recoverable_pct": 0.693 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107789", "label": "benign", "label_confidence": 0.624, "severity": "medium", "timestamp": "2026-01-06T09:49:00Z", "trace_id": "a30f51d1-66ac-6cc1-7389-737f9765518d" }
{ "account_age_days": 541, "account_id": "ACCT-15CA56412980", "baseline_risk_score": 0.084, "kyc_tier": "tier_3", "session_entropy": 0.454 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 724, "timestamp": "2026-01-06T09:49:00Z", "transaction_amount_usd": 5290.88 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.536, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1234.02, "financial_exposure_usd": 2501.25, "recoverable_pct": 0.982 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100413", "label": "fraudulent", "label_confidence": 0.952, "severity": "high", "timestamp": "2026-01-01T06:53:00Z", "trace_id": "dd5fdcf6-4c9a-7c98-7488-750342dabc8c" }
{ "account_age_days": 624, "account_id": "ACCT-CF10869C0ED1", "baseline_risk_score": 0.381, "kyc_tier": "tier_3", "session_entropy": 0.591 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 114, "timestamp": "2026-01-01T06:53:00Z", "transaction_amount_usd": 818.2 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.9, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H...
{ "customer_funds_at_risk_usd": 317191.67, "financial_exposure_usd": 530265.45, "recoverable_pct": 0.687 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103475", "label": "fraudulent", "label_confidence": 0.656, "severity": "medium", "timestamp": "2026-01-03T09:55:00Z", "trace_id": "fc3a05aa-9f10-6648-5509-69a1528526b2" }
{ "account_age_days": 943, "account_id": "ACCT-C15C4FA041F7", "baseline_risk_score": 0.316, "kyc_tier": "tier_2", "session_entropy": 0.162 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 729, "timestamp": "2026-01-03T09:55:00Z", "transaction_amount_usd": 553707.88 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.873, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1713989.71, "financial_exposure_usd": 4186908.11, "recoverable_pct": 0.574 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109940", "label": "benign", "label_confidence": 0.482, "severity": "low", "timestamp": "2026-01-07T21:40:00Z", "trace_id": "0ad7a024-d5bf-b6db-1290-36e1838ed8b0" }
{ "account_age_days": 1725, "account_id": "ACCT-358C02F20F5F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.374 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 140, "timestamp": "2026-01-07T18:51:00Z", "transaction_amount_usd": 19.43 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.682, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1232.98, "financial_exposure_usd": 1767.16, "recoverable_pct": 0.459 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105931", "label": "fraudulent", "label_confidence": 0.716, "severity": "medium", "timestamp": "2026-01-05T02:51:00Z", "trace_id": "8e0358f7-2966-cb01-8efd-99b49ddd07da" }
{ "account_age_days": 348, "account_id": "ACCT-AD0FF6DF63CF", "baseline_risk_score": 0.344, "kyc_tier": "tier_1", "session_entropy": 0.245 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 710, "timestamp": "2026-01-05T02:51:00Z", "transaction_amount_usd": 415438.82 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.627, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4412338.53, "financial_exposure_usd": 6172519.08, "recoverable_pct": 0.519 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107281", "label": "benign", "label_confidence": 0.656, "severity": "low", "timestamp": "2026-01-06T01:21:00Z", "trace_id": "2a5de94a-87f8-029b-fa4e-88d094c454ab" }
{ "account_age_days": 1388, "account_id": "ACCT-AEF02B6BC439", "baseline_risk_score": 0.095, "kyc_tier": "tier_2", "session_entropy": 0.534 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 999, "timestamp": "2026-01-06T01:21:00Z", "transaction_amount_usd": 5948.81 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.752, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1168.62, "financial_exposure_usd": 2760.08, "recoverable_pct": 0.897 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105235", "label": "fraudulent", "label_confidence": 0.753, "severity": "critical", "timestamp": "2026-01-04T15:15:00Z", "trace_id": "681a221b-5066-a337-d985-ac44e5290773" }
{ "account_age_days": 1368, "account_id": "ACCT-6B0048C4B13E", "baseline_risk_score": 0.334, "kyc_tier": "tier_2", "session_entropy": 0.512 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 399, "timestamp": "2026-01-04T04:28:00Z", "transaction_amount_usd": 20.67 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.432, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4605580.69, "financial_exposure_usd": 5894811.41, "recoverable_pct": 0.787 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109521", "label": "benign", "label_confidence": 0.608, "severity": "low", "timestamp": "2026-01-07T14:41:00Z", "trace_id": "3f678eaf-6f0d-80f6-f6bc-6ab2e90e8594" }
{ "account_age_days": 1211, "account_id": "ACCT-C88D21047A3E", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.242 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 976, "timestamp": "2026-01-07T14:41:00Z", "transaction_amount_usd": 5662.23 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.681, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1457.27, "financial_exposure_usd": 2147.51, "recoverable_pct": 0.909 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101957", "label": "fraudulent", "label_confidence": 0.955, "severity": "high", "timestamp": "2026-01-02T08:37:00Z", "trace_id": "15ddcd9d-2f8e-c86d-8fd3-9d4ba65342d7" }
{ "account_age_days": 904, "account_id": "ACCT-705DC3FC5DA4", "baseline_risk_score": 0.645, "kyc_tier": "tier_3", "session_entropy": 0.718 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 704, "timestamp": "2026-01-02T08:37:00Z", "transaction_amount_usd": 95603.66 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.742, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 1138339.85, "financial_exposure_usd": 1177465.56, "recoverable_pct": 0.502 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108374", "label": "benign", "label_confidence": 0.622, "severity": "medium", "timestamp": "2026-01-06T19:34:00Z", "trace_id": "a137086f-b876-a08f-6b9f-f80ee15301ec" }
{ "account_age_days": 342, "account_id": "ACCT-58EBABA4CF5C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.681 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1057, "timestamp": "2026-01-06T19:34:00Z", "transaction_amount_usd": 14670.87 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.674, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1532.13, "financial_exposure_usd": 1892.21, "recoverable_pct": 0.98 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104064", "label": "fraudulent", "label_confidence": 0.777, "severity": "medium", "timestamp": "2026-01-03T19:44:00Z", "trace_id": "217eb450-5c0c-62c7-9557-685ebf6f44c2" }
{ "account_age_days": 890, "account_id": "ACCT-938D981F3119", "baseline_risk_score": 0.111, "kyc_tier": "tier_2", "session_entropy": 0.648 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 479, "timestamp": "2026-01-03T19:44:00Z", "transaction_amount_usd": 97531.7 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_IM...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.411, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3238998.78, "financial_exposure_usd": 3504122.1, "recoverable_pct": 0.979 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104280", "label": "fraudulent", "label_confidence": 0.854, "severity": "high", "timestamp": "2026-01-03T23:20:00Z", "trace_id": "240ccce5-ee2d-14a2-40e2-b003c94a9f8b" }
{ "account_age_days": 1271, "account_id": "ACCT-8089113D7775", "baseline_risk_score": 0.332, "kyc_tier": "tier_2", "session_entropy": 0.855 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 574, "timestamp": "2026-01-03T23:20:00Z", "transaction_amount_usd": 1397689.1 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.844, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3124483.99, "financial_exposure_usd": 3501683.23, "recoverable_pct": 0.533 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103112", "label": "fraudulent", "label_confidence": 0.797, "severity": "high", "timestamp": "2026-01-03T03:52:00Z", "trace_id": "7f791f84-b04e-a317-6a11-3a47c075440e" }
{ "account_age_days": 686, "account_id": "ACCT-170B2AF0494A", "baseline_risk_score": 0.35, "kyc_tier": "tier_2", "session_entropy": 0.521 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 327, "timestamp": "2026-01-02T19:37:00Z", "transaction_amount_usd": 15.88 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.431, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 219786.57, "financial_exposure_usd": 288946.72, "recoverable_pct": 0.506 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103376", "label": "fraudulent", "label_confidence": 0.832, "severity": "medium", "timestamp": "2026-01-03T08:16:00Z", "trace_id": "a8a772a4-8686-970c-7d92-6682d0648909" }
{ "account_age_days": 902, "account_id": "ACCT-909342733200", "baseline_risk_score": 0.383, "kyc_tier": "tier_2", "session_entropy": 0.327 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 112, "timestamp": "2026-01-03T00:43:00Z", "transaction_amount_usd": 19.87 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.777, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5873579, "financial_exposure_usd": 6212217.73, "recoverable_pct": 0.688 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104541", "label": "fraudulent", "label_confidence": 0.909, "severity": "medium", "timestamp": "2026-01-04T03:41:00Z", "trace_id": "0e127559-e4d6-aad2-a6bc-214e069ea311" }
{ "account_age_days": 764, "account_id": "ACCT-697966306272", "baseline_risk_score": 0.057, "kyc_tier": "tier_3", "session_entropy": 0.738 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 471, "timestamp": "2026-01-04T03:41:00Z", "transaction_amount_usd": 2011855.67 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.614, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 984622.99, "financial_exposure_usd": 2313991.37, "recoverable_pct": 0.8 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109085", "label": "benign", "label_confidence": 0.67, "severity": "low", "timestamp": "2026-01-07T07:25:00Z", "trace_id": "291fe110-ffc6-1a37-9042-cd348a5f9b83" }
{ "account_age_days": 520, "account_id": "ACCT-EE38F4875A42", "baseline_risk_score": 0.192, "kyc_tier": "tier_2", "session_entropy": 0.807 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 252, "timestamp": "2026-01-07T07:25:00Z", "transaction_amount_usd": 4871.45 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.776, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1859.39, "financial_exposure_usd": 1873.25, "recoverable_pct": 0.757 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100133", "label": "fraudulent", "label_confidence": 0.837, "severity": "high", "timestamp": "2026-01-01T02:13:00Z", "trace_id": "5719d3e4-16d1-d768-1c83-90ba1672380e" }
{ "account_age_days": 434, "account_id": "ACCT-27177E595548", "baseline_risk_score": 0.532, "kyc_tier": "tier_3", "session_entropy": 0.804 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 721, "timestamp": "2026-01-01T02:13:00Z", "transaction_amount_usd": 89481.82 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.77, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 826944.45, "financial_exposure_usd": 866913.76, "recoverable_pct": 0.66 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103064", "label": "fraudulent", "label_confidence": 0.932, "severity": "low", "timestamp": "2026-01-03T03:04:00Z", "trace_id": "8fc75f50-4490-88ca-f44a-a942952946a5" }
{ "account_age_days": 1464, "account_id": "ACCT-310005133B84", "baseline_risk_score": 0.587, "kyc_tier": "tier_2", "session_entropy": 0.617 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 795, "timestamp": "2026-01-03T03:04:00Z", "transaction_amount_usd": 116986.11 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.719, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 677613, "financial_exposure_usd": 841316.69, "recoverable_pct": 0.174 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109352", "label": "benign", "label_confidence": 0.643, "severity": "low", "timestamp": "2026-01-07T11:52:00Z", "trace_id": "c723500e-349a-f7d4-c018-de492f66285f" }
{ "account_age_days": 843, "account_id": "ACCT-91C407F9B330", "baseline_risk_score": 0.144, "kyc_tier": "tier_2", "session_entropy": 0.198 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 790, "timestamp": "2026-01-07T11:52:00Z", "transaction_amount_usd": 10450.01 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.785, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1208.27, "financial_exposure_usd": 1919.07, "recoverable_pct": 0.856 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103771", "label": "fraudulent", "label_confidence": 0.765, "severity": "low", "timestamp": "2026-01-03T14:51:00Z", "trace_id": "59158338-f946-e77f-a995-376d5b04b63f" }
{ "account_age_days": 1988, "account_id": "ACCT-B726ADE96B2D", "baseline_risk_score": 0.408, "kyc_tier": "tier_3", "session_entropy": 0.578 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 115, "timestamp": "2026-01-03T14:51:00Z", "transaction_amount_usd": 1220271.46 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.889, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3339336.59, "financial_exposure_usd": 5838366.14, "recoverable_pct": 0.713 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103305", "label": "fraudulent", "label_confidence": 0.807, "severity": "critical", "timestamp": "2026-01-03T07:05:00Z", "trace_id": "39d86473-3ded-ba49-31fd-5134cc522672" }
{ "account_age_days": 1172, "account_id": "ACCT-B6B1D72F24BC", "baseline_risk_score": 0.417, "kyc_tier": "tier_2", "session_entropy": 0.47 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 208, "timestamp": "2026-01-03T05:14:00Z", "transaction_amount_usd": 22.29 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.41, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 511273.59, "financial_exposure_usd": 740604.52, "recoverable_pct": 0.327 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102444", "label": "fraudulent", "label_confidence": 0.964, "severity": "medium", "timestamp": "2026-01-02T16:44:00Z", "trace_id": "c9128766-8658-d0f2-3c90-f0880d1f84df" }
{ "account_age_days": 1994, "account_id": "ACCT-5B10C9F4FEEC", "baseline_risk_score": 0.393, "kyc_tier": "tier_1", "session_entropy": 0.659 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 254, "timestamp": "2026-01-02T16:44:00Z", "transaction_amount_usd": 51526.16 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.916, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 580094.64, "financial_exposure_usd": 808998.15, "recoverable_pct": 0.105 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109140", "label": "benign", "label_confidence": 0.696, "severity": "critical", "timestamp": "2026-01-07T08:20:00Z", "trace_id": "f98e9afc-4669-80f1-e249-1276495a0cd3" }
{ "account_age_days": 746, "account_id": "ACCT-56E0D962122C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.344 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 926, "timestamp": "2026-01-07T08:20:00Z", "transaction_amount_usd": 13518.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.621, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3291.16, "financial_exposure_usd": 4246.14, "recoverable_pct": 0.826 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105008", "label": "fraudulent", "label_confidence": 0.627, "severity": "medium", "timestamp": "2026-01-04T11:28:00Z", "trace_id": "3f1f4674-63f3-2815-1f01-4d90370ebe5d" }
{ "account_age_days": 1935, "account_id": "ACCT-CD56B586AD4F", "baseline_risk_score": 0.241, "kyc_tier": "tier_3", "session_entropy": 0.38 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 95, "timestamp": "2026-01-04T05:15:00Z", "transaction_amount_usd": 7 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_co...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.64, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 4984138.96, "financial_exposure_usd": 5030176.38, "recoverable_pct": 0.936 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106703", "label": "benign", "label_confidence": 0.721, "severity": "low", "timestamp": "2026-01-05T15:43:00Z", "trace_id": "47be2fb2-35b1-ad2a-72b0-28a2928043fd" }
{ "account_age_days": 1467, "account_id": "ACCT-ECF80A557D13", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.689 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 754, "timestamp": "2026-01-05T15:43:00Z", "transaction_amount_usd": 14867.58 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 41.82, "financial_exposure_usd": 55.7, "recoverable_pct": 0.436 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105731", "label": "fraudulent", "label_confidence": 0.779, "severity": "high", "timestamp": "2026-01-04T23:31:00Z", "trace_id": "bfc1e047-7a60-b339-70a0-8910c55aac03" }
{ "account_age_days": 317, "account_id": "ACCT-0B2A1BFF4570", "baseline_risk_score": 0.428, "kyc_tier": "tier_2", "session_entropy": 0.399 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 933, "timestamp": "2026-01-04T23:31:00Z", "transaction_amount_usd": 1253889.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.656, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4228780.35, "financial_exposure_usd": 7129341.7, "recoverable_pct": 0.457 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102458", "label": "fraudulent", "label_confidence": 0.8, "severity": "critical", "timestamp": "2026-01-02T16:58:00Z", "trace_id": "15730fab-ba74-e1c9-f905-141f8d47aa7f" }
{ "account_age_days": 501, "account_id": "ACCT-48BB00835052", "baseline_risk_score": 0.259, "kyc_tier": "tier_3", "session_entropy": 0.548 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 323, "timestamp": "2026-01-02T13:46:00Z", "transaction_amount_usd": 9.26 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.352, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 805171.55, "financial_exposure_usd": 1194840.21, "recoverable_pct": 0.152 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103439", "label": "fraudulent", "label_confidence": 0.879, "severity": "medium", "timestamp": "2026-01-03T09:19:00Z", "trace_id": "9e29b801-aad1-8e33-225c-620cedf9d2c5" }
{ "account_age_days": 1857, "account_id": "ACCT-11B57AC98EE6", "baseline_risk_score": 0.413, "kyc_tier": "tier_1", "session_entropy": 0.816 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 155, "timestamp": "2026-01-03T09:19:00Z", "transaction_amount_usd": 828573.35 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.394, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3391404.89, "financial_exposure_usd": 4181726.49, "recoverable_pct": 0.798 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107603", "label": "benign", "label_confidence": 0.505, "severity": "medium", "timestamp": "2026-01-06T06:43:00Z", "trace_id": "e988b67c-bfea-0e0d-886f-d9254c281887" }
{ "account_age_days": 1660, "account_id": "ACCT-0FB0110F1FCB", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.141 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 358, "timestamp": "2026-01-06T00:12:00Z", "transaction_amount_usd": 21.87 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.733, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2789.15, "financial_exposure_usd": 5170.3, "recoverable_pct": 0.892 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106136", "label": "fraudulent", "label_confidence": 0.61, "severity": "medium", "timestamp": "2026-01-05T06:16:00Z", "trace_id": "56724cce-3b52-7483-7145-62ebde9a740e" }
{ "account_age_days": 53, "account_id": "ACCT-6511B95B6CAF", "baseline_risk_score": 0.187, "kyc_tier": "tier_2", "session_entropy": 0.774 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 262, "timestamp": "2026-01-05T06:16:00Z", "transaction_amount_usd": 380088.87 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.585, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4362974.12, "financial_exposure_usd": 4622903.96, "recoverable_pct": 0.606 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107233", "label": "benign", "label_confidence": 0.733, "severity": "critical", "timestamp": "2026-01-06T00:33:00Z", "trace_id": "aaaecb55-3d59-091b-6379-2d274ef28f98" }
{ "account_age_days": 805, "account_id": "ACCT-1EE6EDBD0D90", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.475 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 160, "timestamp": "2026-01-05T16:47:00Z", "transaction_amount_usd": 23.61 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.549, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3246.82, "financial_exposure_usd": 3403.28, "recoverable_pct": 0.726 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100521", "label": "fraudulent", "label_confidence": 0.965, "severity": "high", "timestamp": "2026-01-01T08:41:00Z", "trace_id": "f65067e0-6b94-1b94-918f-979216cbc3cb" }
{ "account_age_days": 1480, "account_id": "ACCT-A6A96B789152", "baseline_risk_score": 0.384, "kyc_tier": "tier_2", "session_entropy": 0.335 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 236, "timestamp": "2026-01-01T08:41:00Z", "transaction_amount_usd": 25692.85 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.852, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 318073.51, "financial_exposure_usd": 539327.49, "recoverable_pct": 0.821 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102545", "label": "fraudulent", "label_confidence": 0.856, "severity": "medium", "timestamp": "2026-01-02T18:25:00Z", "trace_id": "773d891b-1bea-4507-7729-39fcc9fde1eb" }
{ "account_age_days": 622, "account_id": "ACCT-A9DFE656F81A", "baseline_risk_score": 0.498, "kyc_tier": "tier_2", "session_entropy": 0.873 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 735, "timestamp": "2026-01-02T18:25:00Z", "transaction_amount_usd": 43346.51 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.949, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 214079.21, "financial_exposure_usd": 385403.08, "recoverable_pct": 0.047 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100778", "label": "fraudulent", "label_confidence": 0.848, "severity": "critical", "timestamp": "2026-01-01T12:58:00Z", "trace_id": "82dbf415-4a7d-8752-ab8f-8ef2a5e25aa0" }
{ "account_age_days": 42, "account_id": "ACCT-A4074EC29359", "baseline_risk_score": 0.403, "kyc_tier": "tier_3", "session_entropy": 0.673 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 88, "timestamp": "2026-01-01T12:58:00Z", "transaction_amount_usd": 114411.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.777, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 522796.66, "financial_exposure_usd": 1164028.81, "recoverable_pct": 0.04 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108417", "label": "benign", "label_confidence": 0.518, "severity": "low", "timestamp": "2026-01-06T20:17:00Z", "trace_id": "7ee91fe6-5d43-b1e0-5adc-743ff634b2b0" }
{ "account_age_days": 524, "account_id": "ACCT-C64A04DEAFF7", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.792 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 141, "timestamp": "2026-01-06T09:19:00Z", "transaction_amount_usd": 10.83 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.717, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1421.92, "financial_exposure_usd": 2829.89, "recoverable_pct": 0.841 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103537", "label": "fraudulent", "label_confidence": 0.752, "severity": "medium", "timestamp": "2026-01-03T10:57:00Z", "trace_id": "833900a8-f8ac-f563-0594-8d641b3841fe" }
{ "account_age_days": 1706, "account_id": "ACCT-E55CEA961D8C", "baseline_risk_score": 0.308, "kyc_tier": "tier_3", "session_entropy": 0.304 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 159, "timestamp": "2026-01-03T01:04:00Z", "transaction_amount_usd": 2.81 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.788, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3063579.74, "financial_exposure_usd": 3784226.38, "recoverable_pct": 0.79 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105738", "label": "fraudulent", "label_confidence": 0.757, "severity": "medium", "timestamp": "2026-01-04T23:38:00Z", "trace_id": "a652d1bb-e236-27e9-cdba-003cd12920e0" }
{ "account_age_days": 950, "account_id": "ACCT-3055E769BB66", "baseline_risk_score": 0.166, "kyc_tier": "tier_3", "session_entropy": 0.827 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 1040, "timestamp": "2026-01-04T23:38:00Z", "transaction_amount_usd": 2797792.73 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.937, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 140727.38, "financial_exposure_usd": 230464.61, "recoverable_pct": 0.768 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100751", "label": "fraudulent", "label_confidence": 0.782, "severity": "critical", "timestamp": "2026-01-01T12:31:00Z", "trace_id": "4b6a24ad-234b-f2fe-8f24-b0370d95d9a7" }
{ "account_age_days": 1810, "account_id": "ACCT-5B1AD512CB07", "baseline_risk_score": 0.558, "kyc_tier": "tier_2", "session_entropy": 0.482 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 214, "timestamp": "2026-01-01T10:17:00Z", "transaction_amount_usd": 10.14 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.819, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 686775.3, "financial_exposure_usd": 1172440.91, "recoverable_pct": 0.56 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101626", "label": "fraudulent", "label_confidence": 0.914, "severity": "high", "timestamp": "2026-01-02T03:06:00Z", "trace_id": "cb774aa6-274c-f567-d368-093b8bbdc200" }
{ "account_age_days": 759, "account_id": "ACCT-BB9BC1594F43", "baseline_risk_score": 0.356, "kyc_tier": "tier_2", "session_entropy": 0.89 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 776, "timestamp": "2026-01-02T03:06:00Z", "transaction_amount_usd": 43690.87 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.863, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 235171.45, "financial_exposure_usd": 285552.23, "recoverable_pct": 0.849 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104162", "label": "fraudulent", "label_confidence": 0.654, "severity": "medium", "timestamp": "2026-01-03T21:22:00Z", "trace_id": "f73480dc-7480-c35a-112e-25af7737c4e9" }
{ "account_age_days": 622, "account_id": "ACCT-FFD47BA73FAF", "baseline_risk_score": 0.213, "kyc_tier": "tier_1", "session_entropy": 0.605 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 630, "timestamp": "2026-01-03T21:22:00Z", "transaction_amount_usd": 2330149.88 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.525, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1109176.31, "financial_exposure_usd": 2406639.22, "recoverable_pct": 0.994 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102577", "label": "fraudulent", "label_confidence": 0.888, "severity": "high", "timestamp": "2026-01-02T18:57:00Z", "trace_id": "ed277a11-906e-c813-2388-e61de7149159" }
{ "account_age_days": 187, "account_id": "ACCT-A6C4A74DED3D", "baseline_risk_score": 0.596, "kyc_tier": "tier_1", "session_entropy": 0.704 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 502, "timestamp": "2026-01-02T18:57:00Z", "transaction_amount_usd": 112251.76 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.654, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 652553.05, "financial_exposure_usd": 1065396.2, "recoverable_pct": 0.104 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105054", "label": "fraudulent", "label_confidence": 0.927, "severity": "critical", "timestamp": "2026-01-04T12:14:00Z", "trace_id": "f2d86423-7e2e-39c6-e348-95f6371adc9e" }
{ "account_age_days": 1716, "account_id": "ACCT-6041DC012EB1", "baseline_risk_score": 0.167, "kyc_tier": "tier_1", "session_entropy": 0.547 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 307, "timestamp": "2026-01-04T09:32:00Z", "transaction_amount_usd": 22.67 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.622, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2306981.54, "financial_exposure_usd": 5356581.3, "recoverable_pct": 0.623 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100897", "label": "fraudulent", "label_confidence": 0.827, "severity": "critical", "timestamp": "2026-01-01T14:57:00Z", "trace_id": "d31e1d2c-4eb1-6c16-d733-909426b71b11" }
{ "account_age_days": 1755, "account_id": "ACCT-DE199B18574C", "baseline_risk_score": 0.592, "kyc_tier": "tier_1", "session_entropy": 0.659 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 556, "timestamp": "2026-01-01T14:57:00Z", "transaction_amount_usd": 54586.96 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.356, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 1001508.46, "financial_exposure_usd": 1603625.91, "recoverable_pct": 0.462 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105887", "label": "fraudulent", "label_confidence": 0.873, "severity": "critical", "timestamp": "2026-01-05T02:07:00Z", "trace_id": "1bd687a8-9299-5056-e5c3-bb76b26af45e" }
{ "account_age_days": 851, "account_id": "ACCT-44AF178AF19F", "baseline_risk_score": 0.281, "kyc_tier": "tier_1", "session_entropy": 0.31 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 144, "timestamp": "2026-01-05T02:07:00Z", "transaction_amount_usd": 2398218.91 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.781, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2688014.22, "financial_exposure_usd": 5742307.51, "recoverable_pct": 0.554 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100373", "label": "fraudulent", "label_confidence": 0.948, "severity": "high", "timestamp": "2026-01-01T06:13:00Z", "trace_id": "7f317011-a7ee-d52d-c1f6-00272ced976e" }
{ "account_age_days": 13, "account_id": "ACCT-1C79AC854642", "baseline_risk_score": 0.283, "kyc_tier": "tier_2", "session_entropy": 0.813 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 213, "timestamp": "2026-01-01T06:13:00Z", "transaction_amount_usd": 740.98 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.739, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 203282.43, "financial_exposure_usd": 221757.6, "recoverable_pct": 0.222 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102543", "label": "fraudulent", "label_confidence": 0.895, "severity": "medium", "timestamp": "2026-01-02T18:23:00Z", "trace_id": "e0b191ea-d973-76d7-1422-ff2313865654" }
{ "account_age_days": 143, "account_id": "ACCT-5640A1FB4894", "baseline_risk_score": 0.523, "kyc_tier": "tier_2", "session_entropy": 0.609 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 298, "timestamp": "2026-01-02T18:23:00Z", "transaction_amount_usd": 99539.99 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.838, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 369633.31, "financial_exposure_usd": 604980.26, "recoverable_pct": 0.071 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105996", "label": "fraudulent", "label_confidence": 0.939, "severity": "low", "timestamp": "2026-01-05T03:56:00Z", "trace_id": "5f5124cd-18ef-bcd6-dad2-983d34dade11" }
{ "account_age_days": 58, "account_id": "ACCT-CEEC81A67300", "baseline_risk_score": 0.272, "kyc_tier": "tier_2", "session_entropy": 0.254 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 912, "timestamp": "2026-01-05T03:56:00Z", "transaction_amount_usd": 991054.25 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.69, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 5376616.8, "financial_exposure_usd": 6527720.66, "recoverable_pct": 0.989 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109563", "label": "benign", "label_confidence": 0.506, "severity": "low", "timestamp": "2026-01-07T15:23:00Z", "trace_id": "5638d8c3-0afd-edfb-d67f-4967edd4e98e" }
{ "account_age_days": 1766, "account_id": "ACCT-B17FCFE7D961", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.154 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 290, "timestamp": "2026-01-07T13:28:00Z", "transaction_amount_usd": 19.99 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.65, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 4368.54, "financial_exposure_usd": 5966.49, "recoverable_pct": 0.956 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102700", "label": "fraudulent", "label_confidence": 0.857, "severity": "medium", "timestamp": "2026-01-02T21:00:00Z", "trace_id": "6e7294b3-17d1-12e8-d6c3-600ee2997d9f" }
{ "account_age_days": 866, "account_id": "ACCT-94BBC08505B6", "baseline_risk_score": 0.506, "kyc_tier": "tier_2", "session_entropy": 0.31 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 1124, "timestamp": "2026-01-02T21:00:00Z", "transaction_amount_usd": 2990.31 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.748, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 295889.68, "financial_exposure_usd": 336627.93, "recoverable_pct": 0.412 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106514", "label": "fraudulent", "label_confidence": 0.827, "severity": "medium", "timestamp": "2026-01-05T12:34:00Z", "trace_id": "e5b63f88-f444-44f6-a3cb-cfb98def740b" }
{ "account_age_days": 231, "account_id": "ACCT-B6B898BDCBE9", "baseline_risk_score": 0.098, "kyc_tier": "tier_1", "session_entropy": 0.14 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 940, "timestamp": "2026-01-05T12:34:00Z", "transaction_amount_usd": 1333418.03 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.93, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 332714.32, "financial_exposure_usd": 425452.1, "recoverable_pct": 0.715 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109147", "label": "benign", "label_confidence": 0.64, "severity": "medium", "timestamp": "2026-01-07T08:27:00Z", "trace_id": "107d4707-c2b3-160b-5314-ad9833af8f8b" }
{ "account_age_days": 377, "account_id": "ACCT-3ECC49E1E1CC", "baseline_risk_score": 0.118, "kyc_tier": "tier_1", "session_entropy": 0.852 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 299, "timestamp": "2026-01-07T01:51:00Z", "transaction_amount_usd": 3.33 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.48, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 2148.86, "financial_exposure_usd": 4601.94, "recoverable_pct": 0.464 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104705", "label": "fraudulent", "label_confidence": 0.639, "severity": "high", "timestamp": "2026-01-04T06:25:00Z", "trace_id": "fee7f236-4c75-8aa7-b2de-6cef27365752" }
{ "account_age_days": 1006, "account_id": "ACCT-3F1810453058", "baseline_risk_score": 0.245, "kyc_tier": "tier_2", "session_entropy": 0.455 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 328, "timestamp": "2026-01-03T20:02:00Z", "transaction_amount_usd": 19.94 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.609, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4949619.78, "financial_exposure_usd": 6992469.76, "recoverable_pct": 0.634 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108255", "label": "benign", "label_confidence": 0.667, "severity": "low", "timestamp": "2026-01-06T17:35:00Z", "trace_id": "94e34226-4b8b-18fa-34b2-ce8b1c02ece7" }
{ "account_age_days": 201, "account_id": "ACCT-614CCB2894FA", "baseline_risk_score": 0.16, "kyc_tier": "tier_2", "session_entropy": 0.346 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 241, "timestamp": "2026-01-06T17:35:00Z", "transaction_amount_usd": 3932.57 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.617, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4451.32, "financial_exposure_usd": 6704.24, "recoverable_pct": 0.684 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100682", "label": "fraudulent", "label_confidence": 0.926, "severity": "high", "timestamp": "2026-01-01T11:22:00Z", "trace_id": "ae56b5c0-a5b8-ca07-12de-13a4b2a273e9" }
{ "account_age_days": 1957, "account_id": "ACCT-9099B0323B60", "baseline_risk_score": 0.253, "kyc_tier": "tier_2", "session_entropy": 0.876 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 327, "timestamp": "2026-01-01T04:11:00Z", "transaction_amount_usd": 9.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.674, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 363094.21, "financial_exposure_usd": 611134.67, "recoverable_pct": 0.032 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101187", "label": "fraudulent", "label_confidence": 0.752, "severity": "medium", "timestamp": "2026-01-01T19:47:00Z", "trace_id": "0357085e-f77e-0dcf-f84f-68b5b08e2bad" }
{ "account_age_days": 992, "account_id": "ACCT-216680A72350", "baseline_risk_score": 0.307, "kyc_tier": "tier_2", "session_entropy": 0.33 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 307, "timestamp": "2026-01-01T19:47:00Z", "transaction_amount_usd": 44557.17 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.593, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 722266.34, "financial_exposure_usd": 1127485.59, "recoverable_pct": 0.68 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106991", "label": "benign", "label_confidence": 0.579, "severity": "high", "timestamp": "2026-01-05T20:31:00Z", "trace_id": "5d113ebb-c003-e7ae-a066-ea8e231a5273" }
{ "account_age_days": 300, "account_id": "ACCT-7DB362A844C8", "baseline_risk_score": 0.104, "kyc_tier": "tier_2", "session_entropy": 0.662 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 894, "timestamp": "2026-01-05T20:31:00Z", "transaction_amount_usd": 9699.31 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.789, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 238.65, "financial_exposure_usd": 396.36, "recoverable_pct": 0.721 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100491", "label": "fraudulent", "label_confidence": 0.961, "severity": "critical", "timestamp": "2026-01-01T08:11:00Z", "trace_id": "25c951cd-f2aa-ec2f-9c3d-e9624faa12c1" }
{ "account_age_days": 1934, "account_id": "ACCT-FF23DC199787", "baseline_risk_score": 0.51, "kyc_tier": "tier_1", "session_entropy": 0.806 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 828, "timestamp": "2026-01-01T08:11:00Z", "transaction_amount_usd": 85002.67 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.541, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 542960.58, "financial_exposure_usd": 1084162.65, "recoverable_pct": 0.1 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102549", "label": "fraudulent", "label_confidence": 0.913, "severity": "critical", "timestamp": "2026-01-02T18:29:00Z", "trace_id": "74772b3d-4246-7692-00fe-08896abb25ef" }
{ "account_age_days": 1652, "account_id": "ACCT-A86A5A8C2F5D", "baseline_risk_score": 0.271, "kyc_tier": "tier_1", "session_entropy": 0.666 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 158, "timestamp": "2026-01-02T18:29:00Z", "transaction_amount_usd": 110694.24 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.741, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 969327.98, "financial_exposure_usd": 1478098.21, "recoverable_pct": 0.181 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108516", "label": "benign", "label_confidence": 0.535, "severity": "medium", "timestamp": "2026-01-06T21:56:00Z", "trace_id": "3ca79876-1f36-6c62-8bee-338f0cf5f03b" }
{ "account_age_days": 561, "account_id": "ACCT-4EF273FAD8DD", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.846 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 220, "timestamp": "2026-01-06T09:57:00Z", "transaction_amount_usd": 6.43 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.778, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2427.29, "financial_exposure_usd": 5125.88, "recoverable_pct": 0.505 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102631", "label": "fraudulent", "label_confidence": 0.877, "severity": "high", "timestamp": "2026-01-02T19:51:00Z", "trace_id": "5d4e56c4-ae8f-8d73-36d6-e5f48c064cd5" }
{ "account_age_days": 454, "account_id": "ACCT-F690350149E2", "baseline_risk_score": 0.54, "kyc_tier": "tier_3", "session_entropy": 0.691 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 309, "timestamp": "2026-01-02T08:43:00Z", "transaction_amount_usd": 15.92 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.874, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 639162.21, "financial_exposure_usd": 699464.19, "recoverable_pct": 0.587 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109962", "label": "benign", "label_confidence": 0.73, "severity": "medium", "timestamp": "2026-01-07T22:02:00Z", "trace_id": "36f53105-55d9-cd6e-1f2b-9ebb880ed938" }
{ "account_age_days": 1945, "account_id": "ACCT-8518A7A23381", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.835 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 304, "timestamp": "2026-01-07T22:02:00Z", "transaction_amount_usd": 9446.38 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.47, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1921.5, "financial_exposure_usd": 2971.15, "recoverable_pct": 0.501 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103357", "label": "fraudulent", "label_confidence": 0.646, "severity": "low", "timestamp": "2026-01-03T07:57:00Z", "trace_id": "f5917577-571e-aaa4-40b7-ab68fc48c210" }
{ "account_age_days": 1700, "account_id": "ACCT-407854D87883", "baseline_risk_score": 0.395, "kyc_tier": "tier_3", "session_entropy": 0.717 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 734, "timestamp": "2026-01-03T07:57:00Z", "transaction_amount_usd": 1644375.12 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.435, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3018397.34, "financial_exposure_usd": 3042445.12, "recoverable_pct": 0.962 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102228", "label": "fraudulent", "label_confidence": 0.935, "severity": "high", "timestamp": "2026-01-02T13:08:00Z", "trace_id": "7479e4b5-6441-61c1-8b6f-d72dd25de7df" }
{ "account_age_days": 1803, "account_id": "ACCT-58EA7A81BA0A", "baseline_risk_score": 0.564, "kyc_tier": "tier_1", "session_entropy": 0.527 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 331, "timestamp": "2026-01-02T13:08:00Z", "transaction_amount_usd": 62695.54 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.548, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 644574.88, "financial_exposure_usd": 1096460.79, "recoverable_pct": 0.344 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102991", "label": "fraudulent", "label_confidence": 0.795, "severity": "high", "timestamp": "2026-01-03T01:51:00Z", "trace_id": "599fea40-e7c4-c137-2da7-4a4e43a9cdce" }
{ "account_age_days": 1336, "account_id": "ACCT-CD2A766372ED", "baseline_risk_score": 0.296, "kyc_tier": "tier_3", "session_entropy": 0.707 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 484, "timestamp": "2026-01-03T01:51:00Z", "transaction_amount_usd": 26698.83 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.579, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 234548.76, "financial_exposure_usd": 252580.34, "recoverable_pct": 0.09 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107962", "label": "benign", "label_confidence": 0.509, "severity": "medium", "timestamp": "2026-01-06T12:42:00Z", "trace_id": "edbae23c-8bd9-c409-466f-fbd08112d623" }
{ "account_age_days": 1479, "account_id": "ACCT-6936552F56BD", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.846 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 496, "timestamp": "2026-01-06T12:42:00Z", "transaction_amount_usd": 4952.9 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.67, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1192.73, "financial_exposure_usd": 2820.77, "recoverable_pct": 0.835 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105552", "label": "fraudulent", "label_confidence": 0.89, "severity": "medium", "timestamp": "2026-01-04T20:32:00Z", "trace_id": "c706809e-1802-ed51-9451-e35998d25efa" }
{ "account_age_days": 1313, "account_id": "ACCT-04E62179493D", "baseline_risk_score": 0.111, "kyc_tier": "tier_3", "session_entropy": 0.666 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 312, "timestamp": "2026-01-04T09:09:00Z", "transaction_amount_usd": 18.9 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.721, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4875154.43, "financial_exposure_usd": 5375204.44, "recoverable_pct": 0.577 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101003", "label": "fraudulent", "label_confidence": 0.765, "severity": "medium", "timestamp": "2026-01-01T16:43:00Z", "trace_id": "65cf46e5-434d-83fe-2058-fd249bcd1427" }
{ "account_age_days": 1210, "account_id": "ACCT-3E748545BED7", "baseline_risk_score": 0.645, "kyc_tier": "tier_3", "session_entropy": 0.686 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 328, "timestamp": "2026-01-01T14:30:00Z", "transaction_amount_usd": 0.58 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.662, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 168710.96, "financial_exposure_usd": 267181.67, "recoverable_pct": 0.671 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102473", "label": "fraudulent", "label_confidence": 0.864, "severity": "critical", "timestamp": "2026-01-02T17:13:00Z", "trace_id": "8f1694cd-6d83-ca73-755e-1890d8319254" }
{ "account_age_days": 662, "account_id": "ACCT-7285018FEB4E", "baseline_risk_score": 0.31, "kyc_tier": "tier_2", "session_entropy": 0.879 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1133, "timestamp": "2026-01-02T17:13:00Z", "transaction_amount_usd": 20173.19 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.905, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 591686.16, "financial_exposure_usd": 683896.57, "recoverable_pct": 0.364 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107411", "label": "benign", "label_confidence": 0.516, "severity": "high", "timestamp": "2026-01-06T03:31:00Z", "trace_id": "07510864-e41d-0ed9-8e12-0139d1047559" }
{ "account_age_days": 1544, "account_id": "ACCT-E51C95602D5A", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.299 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 226, "timestamp": "2026-01-06T03:31:00Z", "transaction_amount_usd": 8737.88 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.754, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 615.31, "financial_exposure_usd": 1328.58, "recoverable_pct": 0.609 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100276", "label": "fraudulent", "label_confidence": 0.973, "severity": "high", "timestamp": "2026-01-01T04:36:00Z", "trace_id": "d220f704-0da1-24c5-70ca-6f70cb3ffc4f" }
{ "account_age_days": 1076, "account_id": "ACCT-5C253A40BA76", "baseline_risk_score": 0.369, "kyc_tier": "tier_1", "session_entropy": 0.472 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 240, "timestamp": "2025-12-31T17:45:00Z", "transaction_amount_usd": 20.24 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.873, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 249836.44, "financial_exposure_usd": 382946.19, "recoverable_pct": 0.051 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101989", "label": "fraudulent", "label_confidence": 0.866, "severity": "critical", "timestamp": "2026-01-02T09:09:00Z", "trace_id": "966ac265-03d2-1bea-f389-1341d86c15e9" }
{ "account_age_days": 1254, "account_id": "ACCT-3FD643187613", "baseline_risk_score": 0.424, "kyc_tier": "tier_3", "session_entropy": 0.3 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1146, "timestamp": "2026-01-02T09:09:00Z", "transaction_amount_usd": 4517.05 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.469, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 983409.88, "financial_exposure_usd": 1142724.89, "recoverable_pct": 0.239 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100776", "label": "fraudulent", "label_confidence": 0.779, "severity": "high", "timestamp": "2026-01-01T12:56:00Z", "trace_id": "1f7dc802-082d-d7ba-ce84-04f97d4fa4db" }
{ "account_age_days": 1265, "account_id": "ACCT-000CED24277A", "baseline_risk_score": 0.331, "kyc_tier": "tier_1", "session_entropy": 0.648 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1084, "timestamp": "2026-01-01T12:56:00Z", "transaction_amount_usd": 88701.71 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.602, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 832756.72, "financial_exposure_usd": 1132982.1, "recoverable_pct": 0.13 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105462", "label": "fraudulent", "label_confidence": 0.836, "severity": "high", "timestamp": "2026-01-04T19:02:00Z", "trace_id": "447325e7-169a-306e-beba-742abd46b7c3" }
{ "account_age_days": 687, "account_id": "ACCT-B9EC02CF6379", "baseline_risk_score": 0.264, "kyc_tier": "tier_1", "session_entropy": 0.511 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 526, "timestamp": "2026-01-04T19:02:00Z", "transaction_amount_usd": 835598.29 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.571, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4549446.32, "financial_exposure_usd": 6004336.03, "recoverable_pct": 0.639 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100987", "label": "fraudulent", "label_confidence": 0.845, "severity": "high", "timestamp": "2026-01-01T16:27:00Z", "trace_id": "0e2d69d6-a334-7990-e927-e96aa0afd6c5" }
{ "account_age_days": 725, "account_id": "ACCT-B2C45CCE75A4", "baseline_risk_score": 0.535, "kyc_tier": "tier_3", "session_entropy": 0.468 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1091, "timestamp": "2026-01-01T16:27:00Z", "transaction_amount_usd": 13537.19 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.727, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 153054.74, "financial_exposure_usd": 276727.11, "recoverable_pct": 0.763 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109042", "label": "benign", "label_confidence": 0.46, "severity": "low", "timestamp": "2026-01-07T06:42:00Z", "trace_id": "e3d75ae0-2079-b4ea-0325-a6e50a844303" }
{ "account_age_days": 1332, "account_id": "ACCT-4198A3B255E8", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.895 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 754, "timestamp": "2026-01-07T06:42:00Z", "transaction_amount_usd": 766.55 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.613, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1005.58, "financial_exposure_usd": 1741.23, "recoverable_pct": 0.912 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109191", "label": "benign", "label_confidence": 0.74, "severity": "low", "timestamp": "2026-01-07T09:11:00Z", "trace_id": "63592b22-ad44-a322-d93a-4cbe8cc212ba" }
{ "account_age_days": 1799, "account_id": "ACCT-83EAF4353096", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.689 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 820, "timestamp": "2026-01-07T09:11:00Z", "transaction_amount_usd": 10184.55 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.598, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2693.12, "financial_exposure_usd": 3796.03, "recoverable_pct": 0.996 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106259", "label": "fraudulent", "label_confidence": 0.909, "severity": "low", "timestamp": "2026-01-05T08:19:00Z", "trace_id": "bb042abe-daca-c926-601c-0d356d166597" }
{ "account_age_days": 1144, "account_id": "ACCT-87FB6646F7FB", "baseline_risk_score": 0.238, "kyc_tier": "tier_1", "session_entropy": 0.228 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 364, "timestamp": "2026-01-05T04:19:00Z", "transaction_amount_usd": 0.84 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.807, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1578620.73, "financial_exposure_usd": 2058886.4, "recoverable_pct": 0.757 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }