schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105317", "label": "fraudulent", "label_confidence": 0.848, "severity": "high", "timestamp": "2026-01-04T16:37:00Z", "trace_id": "25aa7be6-daa1-080d-c0e7-ebf4e5779832" }
{ "account_age_days": 1390, "account_id": "ACCT-FB69C761AF7F", "baseline_risk_score": 0.098, "kyc_tier": "tier_2", "session_entropy": 0.473 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 159, "timestamp": "2026-01-04T14:55:00Z", "transaction_amount_usd": 11 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.691, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4143239.67, "financial_exposure_usd": 8323391.52, "recoverable_pct": 0.871 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100687", "label": "fraudulent", "label_confidence": 0.812, "severity": "critical", "timestamp": "2026-01-01T11:27:00Z", "trace_id": "44f9b23b-c4d2-db6b-50b5-66a5ef0b9584" }
{ "account_age_days": 1530, "account_id": "ACCT-358C1677A1E8", "baseline_risk_score": 0.346, "kyc_tier": "tier_3", "session_entropy": 0.904 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 962, "timestamp": "2026-01-01T11:27:00Z", "transaction_amount_usd": 9830.54 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.878, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 243365.66, "financial_exposure_usd": 586331.56, "recoverable_pct": 0.281 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104818", "label": "fraudulent", "label_confidence": 0.74, "severity": "high", "timestamp": "2026-01-04T08:18:00Z", "trace_id": "a9fae246-e3b8-a4a3-01c2-f0e95dda3a08" }
{ "account_age_days": 1921, "account_id": "ACCT-E905A25922D7", "baseline_risk_score": 0.056, "kyc_tier": "tier_3", "session_entropy": 0.53 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 459, "timestamp": "2026-01-04T08:18:00Z", "transaction_amount_usd": 1092014.84 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.777, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 447493.78, "financial_exposure_usd": 766322.47, "recoverable_pct": 0.988 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103694", "label": "fraudulent", "label_confidence": 0.676, "severity": "medium", "timestamp": "2026-01-03T13:34:00Z", "trace_id": "e3bb1ef8-d12a-8912-0266-0aa7e3fe8171" }
{ "account_age_days": 1715, "account_id": "ACCT-DF84917032CB", "baseline_risk_score": 0.411, "kyc_tier": "tier_3", "session_entropy": 0.274 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 287, "timestamp": "2026-01-03T08:41:00Z", "transaction_amount_usd": 4.29 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.733, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1948081.41, "financial_exposure_usd": 2569596.08, "recoverable_pct": 0.9 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105910", "label": "fraudulent", "label_confidence": 0.921, "severity": "medium", "timestamp": "2026-01-05T02:30:00Z", "trace_id": "e7996c69-fc6b-f7ed-f4a1-c8094964d4b7" }
{ "account_age_days": 204, "account_id": "ACCT-B0FF81E2499F", "baseline_risk_score": 0.41, "kyc_tier": "tier_1", "session_entropy": 0.595 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 310, "timestamp": "2026-01-04T16:02:00Z", "transaction_amount_usd": 20.74 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.716, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1288882.04, "financial_exposure_usd": 3009459.8, "recoverable_pct": 0.781 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108282", "label": "benign", "label_confidence": 0.629, "severity": "medium", "timestamp": "2026-01-06T18:02:00Z", "trace_id": "687bb52a-796d-cefd-b6d4-68c248a8aba4" }
{ "account_age_days": 106, "account_id": "ACCT-2579570852CE", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.217 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 550, "timestamp": "2026-01-06T18:02:00Z", "transaction_amount_usd": 6114.49 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.645, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1222.57, "financial_exposure_usd": 1564.18, "recoverable_pct": 0.522 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100153", "label": "fraudulent", "label_confidence": 0.887, "severity": "high", "timestamp": "2026-01-01T02:33:00Z", "trace_id": "f9d59f7f-1e01-4975-080d-2370dad4c20f" }
{ "account_age_days": 787, "account_id": "ACCT-9F7717CA5199", "baseline_risk_score": 0.428, "kyc_tier": "tier_2", "session_entropy": 0.191 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 1148, "timestamp": "2026-01-01T02:33:00Z", "transaction_amount_usd": 58327.36 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.69, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 342200.34, "financial_exposure_usd": 364532.78, "recoverable_pct": 0.696 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100845", "label": "fraudulent", "label_confidence": 0.776, "severity": "critical", "timestamp": "2026-01-01T14:05:00Z", "trace_id": "78a2bbc2-3f83-c0da-7d04-681eb87d4b50" }
{ "account_age_days": 1964, "account_id": "ACCT-33B5F5132DF6", "baseline_risk_score": 0.5, "kyc_tier": "tier_2", "session_entropy": 0.326 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 378, "timestamp": "2026-01-01T14:05:00Z", "transaction_amount_usd": 73833.34 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.574, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 701013.52, "financial_exposure_usd": 1074714.33, "recoverable_pct": 0.695 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107164", "label": "benign", "label_confidence": 0.707, "severity": "low", "timestamp": "2026-01-05T23:24:00Z", "trace_id": "a11acf29-4907-4c85-819d-8c98d5d3f8ac" }
{ "account_age_days": 970, "account_id": "ACCT-A3E9A13D2F24", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.205 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 1111, "timestamp": "2026-01-05T23:24:00Z", "transaction_amount_usd": 9264.13 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.601, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2903.57, "financial_exposure_usd": 3177.66, "recoverable_pct": 0.953 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101164", "label": "fraudulent", "label_confidence": 0.771, "severity": "critical", "timestamp": "2026-01-01T19:24:00Z", "trace_id": "a5b5fc5e-9b27-2454-a924-ead5439412db" }
{ "account_age_days": 1052, "account_id": "ACCT-76F6C1A6E71E", "baseline_risk_score": 0.642, "kyc_tier": "tier_3", "session_entropy": 0.321 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 176, "timestamp": "2026-01-01T19:24:00Z", "transaction_amount_usd": 48181 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.58, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 594817.85, "financial_exposure_usd": 702194.39, "recoverable_pct": 0.531 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107010", "label": "benign", "label_confidence": 0.701, "severity": "low", "timestamp": "2026-01-05T20:50:00Z", "trace_id": "7dd05a13-596e-aced-c22f-2808e6e1c908" }
{ "account_age_days": 215, "account_id": "ACCT-2791C98A8844", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.573 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 338, "timestamp": "2026-01-05T14:02:00Z", "transaction_amount_usd": 23.08 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.715, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2045.33, "financial_exposure_usd": 4900.34, "recoverable_pct": 0.864 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103527", "label": "fraudulent", "label_confidence": 0.916, "severity": "high", "timestamp": "2026-01-03T10:47:00Z", "trace_id": "423b00ef-de67-6166-d4bf-485ff8329d08" }
{ "account_age_days": 1538, "account_id": "ACCT-C580FA681137", "baseline_risk_score": 0.318, "kyc_tier": "tier_2", "session_entropy": 0.33 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 774, "timestamp": "2026-01-03T10:47:00Z", "transaction_amount_usd": 540179.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.415, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3522023.35, "financial_exposure_usd": 5119010.67, "recoverable_pct": 0.674 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102696", "label": "fraudulent", "label_confidence": 0.971, "severity": "high", "timestamp": "2026-01-02T20:56:00Z", "trace_id": "0035c9b0-79e3-5a96-42fc-8011238ae54a" }
{ "account_age_days": 724, "account_id": "ACCT-3BD8645790EE", "baseline_risk_score": 0.497, "kyc_tier": "tier_1", "session_entropy": 0.627 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 287, "timestamp": "2026-01-02T14:36:00Z", "transaction_amount_usd": 22.37 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.889, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 468884.01, "financial_exposure_usd": 1139002.91, "recoverable_pct": 0.039 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107821", "label": "benign", "label_confidence": 0.726, "severity": "high", "timestamp": "2026-01-06T10:21:00Z", "trace_id": "9a811be3-8203-4582-0456-0d81730f766f" }
{ "account_age_days": 927, "account_id": "ACCT-50EF969F2648", "baseline_risk_score": 0.098, "kyc_tier": "tier_2", "session_entropy": 0.405 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 233, "timestamp": "2026-01-06T10:21:00Z", "transaction_amount_usd": 14230.56 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.634, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2584.89, "financial_exposure_usd": 5147.39, "recoverable_pct": 0.626 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103540", "label": "fraudulent", "label_confidence": 0.795, "severity": "high", "timestamp": "2026-01-03T11:00:00Z", "trace_id": "fc93faad-7866-36a6-c0ea-96de49427a1b" }
{ "account_age_days": 1359, "account_id": "ACCT-8BE7E213FA5F", "baseline_risk_score": 0.249, "kyc_tier": "tier_3", "session_entropy": 0.662 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 765, "timestamp": "2026-01-03T11:00:00Z", "transaction_amount_usd": 173451.44 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.529, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3064630.59, "financial_exposure_usd": 4732611.31, "recoverable_pct": 0.471 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107211", "label": "benign", "label_confidence": 0.661, "severity": "low", "timestamp": "2026-01-06T00:11:00Z", "trace_id": "721cfe6b-7c70-56f4-37a6-340a3a915dc3" }
{ "account_age_days": 842, "account_id": "ACCT-5B9AB3AF8BF4", "baseline_risk_score": 0.101, "kyc_tier": "tier_3", "session_entropy": 0.662 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 256, "timestamp": "2026-01-05T18:48:00Z", "transaction_amount_usd": 21.5 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.533, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1116.12, "financial_exposure_usd": 1712.26, "recoverable_pct": 0.908 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101690", "label": "fraudulent", "label_confidence": 0.971, "severity": "low", "timestamp": "2026-01-02T04:10:00Z", "trace_id": "dbadbf57-09ac-9f48-11d6-d51699f480d3" }
{ "account_age_days": 644, "account_id": "ACCT-36394339C373", "baseline_risk_score": 0.529, "kyc_tier": "tier_1", "session_entropy": 0.534 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 580, "timestamp": "2026-01-02T04:10:00Z", "transaction_amount_usd": 73904.14 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.885, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 51268.78, "financial_exposure_usd": 88104.15, "recoverable_pct": 0.32 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108740", "label": "benign", "label_confidence": 0.499, "severity": "low", "timestamp": "2026-01-07T01:40:00Z", "trace_id": "2c1e15e4-3313-0941-98ed-c1fb3f1721e8" }
{ "account_age_days": 262, "account_id": "ACCT-0A5B5E71C422", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.492 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 554, "timestamp": "2026-01-07T01:40:00Z", "transaction_amount_usd": 12385.99 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.645, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1671.41, "financial_exposure_usd": 2100.74, "recoverable_pct": 0.617 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106393", "label": "fraudulent", "label_confidence": 0.919, "severity": "high", "timestamp": "2026-01-05T10:33:00Z", "trace_id": "766c0338-d6f3-038b-dc14-02fbd8869c73" }
{ "account_age_days": 1705, "account_id": "ACCT-D5753F614F23", "baseline_risk_score": 0.156, "kyc_tier": "tier_1", "session_entropy": 0.322 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 351, "timestamp": "2026-01-05T10:33:00Z", "transaction_amount_usd": 2869696.29 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.905, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2660970.21, "financial_exposure_usd": 4477024.45, "recoverable_pct": 0.643 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103351", "label": "fraudulent", "label_confidence": 0.667, "severity": "critical", "timestamp": "2026-01-03T07:51:00Z", "trace_id": "34992b07-dee6-aa90-b8a7-bb0c5f2166a4" }
{ "account_age_days": 702, "account_id": "ACCT-465A13C98201", "baseline_risk_score": 0.423, "kyc_tier": "tier_3", "session_entropy": 0.24 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 990, "timestamp": "2026-01-03T07:51:00Z", "transaction_amount_usd": 645367.39 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.948, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1447368.01, "financial_exposure_usd": 2473954.31, "recoverable_pct": 0.994 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103553", "label": "fraudulent", "label_confidence": 0.711, "severity": "medium", "timestamp": "2026-01-03T11:13:00Z", "trace_id": "b310bf08-2dfc-7bfa-3345-1b02bda29f0b" }
{ "account_age_days": 742, "account_id": "ACCT-EB5529362E9F", "baseline_risk_score": 0.314, "kyc_tier": "tier_1", "session_entropy": 0.496 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 661, "timestamp": "2026-01-03T11:13:00Z", "transaction_amount_usd": 2812798.43 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.612, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1234700.38, "financial_exposure_usd": 1783141.16, "recoverable_pct": 0.572 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107350", "label": "benign", "label_confidence": 0.605, "severity": "low", "timestamp": "2026-01-06T02:30:00Z", "trace_id": "7970b41a-81f1-8e5e-344d-9cce6938c7c0" }
{ "account_age_days": 406, "account_id": "ACCT-7E705921FAC3", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.845 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 942, "timestamp": "2026-01-06T02:30:00Z", "transaction_amount_usd": 5152.6 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.463, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1567.59, "financial_exposure_usd": 3528.02, "recoverable_pct": 0.626 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103491", "label": "fraudulent", "label_confidence": 0.678, "severity": "high", "timestamp": "2026-01-03T10:11:00Z", "trace_id": "6d3c8436-c3eb-93d0-f6f4-26385bca49c8" }
{ "account_age_days": 232, "account_id": "ACCT-233359E7630C", "baseline_risk_score": 0.084, "kyc_tier": "tier_2", "session_entropy": 0.179 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 178, "timestamp": "2026-01-03T08:30:00Z", "transaction_amount_usd": 14.87 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.731, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4847715.12, "financial_exposure_usd": 6422470.28, "recoverable_pct": 0.535 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108947", "label": "benign", "label_confidence": 0.541, "severity": "high", "timestamp": "2026-01-07T05:07:00Z", "trace_id": "5c7fbc8f-7869-c5ed-f166-ac67748f041a" }
{ "account_age_days": 1582, "account_id": "ACCT-B64FAEF5BBD8", "baseline_risk_score": 0.071, "kyc_tier": "tier_1", "session_entropy": 0.367 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 329, "timestamp": "2026-01-07T05:07:00Z", "transaction_amount_usd": 2824.14 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.452, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2651.32, "financial_exposure_usd": 4056.36, "recoverable_pct": 0.584 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104645", "label": "fraudulent", "label_confidence": 0.818, "severity": "high", "timestamp": "2026-01-04T05:25:00Z", "trace_id": "7279d87c-9329-0547-6dd5-5ad317b452cb" }
{ "account_age_days": 525, "account_id": "ACCT-E80CF98341C6", "baseline_risk_score": 0.315, "kyc_tier": "tier_1", "session_entropy": 0.573 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 958, "timestamp": "2026-01-04T05:25:00Z", "transaction_amount_usd": 2355916.2 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.905, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2226996.19, "financial_exposure_usd": 3411379.59, "recoverable_pct": 0.858 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101136", "label": "fraudulent", "label_confidence": 0.949, "severity": "critical", "timestamp": "2026-01-01T18:56:00Z", "trace_id": "59740ae7-0bd0-4798-0953-0dfa33b40e68" }
{ "account_age_days": 1015, "account_id": "ACCT-E89573CBBB89", "baseline_risk_score": 0.49, "kyc_tier": "tier_3", "session_entropy": 0.114 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 339, "timestamp": "2026-01-01T10:06:00Z", "transaction_amount_usd": 24.4 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.41, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 446185.51, "financial_exposure_usd": 447278.9, "recoverable_pct": 0.401 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104017", "label": "fraudulent", "label_confidence": 0.613, "severity": "high", "timestamp": "2026-01-03T18:57:00Z", "trace_id": "fde7d8df-1573-821d-902d-73b88f947f51" }
{ "account_age_days": 320, "account_id": "ACCT-856234C8BF88", "baseline_risk_score": 0.15, "kyc_tier": "tier_1", "session_entropy": 0.925 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 666, "timestamp": "2026-01-03T18:57:00Z", "transaction_amount_usd": 2074061.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.507, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3158440.18, "financial_exposure_usd": 6667485.5, "recoverable_pct": 0.485 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109846", "label": "benign", "label_confidence": 0.54, "severity": "medium", "timestamp": "2026-01-07T20:06:00Z", "trace_id": "1d50e09b-35ec-912d-f9d7-8d2e2164669b" }
{ "account_age_days": 897, "account_id": "ACCT-1D3FCDD9EC99", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.204 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 280, "timestamp": "2026-01-07T08:01:00Z", "transaction_amount_usd": 5.2 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.595, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2229.42, "financial_exposure_usd": 2492.49, "recoverable_pct": 0.675 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109272", "label": "benign", "label_confidence": 0.565, "severity": "low", "timestamp": "2026-01-07T10:32:00Z", "trace_id": "be9ec7e3-33c5-679d-1f6f-5839ebe0ccf6" }
{ "account_age_days": 1385, "account_id": "ACCT-242E5421FE01", "baseline_risk_score": 0.177, "kyc_tier": "tier_3", "session_entropy": 0.539 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1153, "timestamp": "2026-01-07T10:32:00Z", "transaction_amount_usd": 11910.57 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.68, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 3563.97, "financial_exposure_usd": 5174.11, "recoverable_pct": 0.714 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107009", "label": "benign", "label_confidence": 0.599, "severity": "high", "timestamp": "2026-01-05T20:49:00Z", "trace_id": "e26dcb8f-7602-43cb-94ab-cf6b407db826" }
{ "account_age_days": 594, "account_id": "ACCT-25DC0DFD64CD", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.807 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 342, "timestamp": "2026-01-05T08:40:00Z", "transaction_amount_usd": 11.3 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1774.16, "financial_exposure_usd": 3480.43, "recoverable_pct": 0.63 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105091", "label": "fraudulent", "label_confidence": 0.713, "severity": "high", "timestamp": "2026-01-04T12:51:00Z", "trace_id": "e7c218c4-bbb9-ae44-a4b5-cc6ba394488c" }
{ "account_age_days": 671, "account_id": "ACCT-91A9DC9CA351", "baseline_risk_score": 0.285, "kyc_tier": "tier_2", "session_entropy": 0.343 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 394, "timestamp": "2026-01-04T00:31:00Z", "transaction_amount_usd": 7.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.849, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1213318.37, "financial_exposure_usd": 2329953.31, "recoverable_pct": 0.549 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108402", "label": "benign", "label_confidence": 0.715, "severity": "high", "timestamp": "2026-01-06T20:02:00Z", "trace_id": "2abb27ef-34c2-0c95-5191-7c151e222df7" }
{ "account_age_days": 30, "account_id": "ACCT-1DD4CA7BC731", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.279 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 382, "timestamp": "2026-01-06T10:21:00Z", "transaction_amount_usd": 14.91 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.765, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2742.42, "financial_exposure_usd": 3100.98, "recoverable_pct": 0.59 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100931", "label": "fraudulent", "label_confidence": 0.958, "severity": "medium", "timestamp": "2026-01-01T15:31:00Z", "trace_id": "49e1850c-6071-5481-b0e6-88bb996ab5f7" }
{ "account_age_days": 552, "account_id": "ACCT-98FCAD7BBE29", "baseline_risk_score": 0.341, "kyc_tier": "tier_1", "session_entropy": 0.417 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 213, "timestamp": "2026-01-01T15:31:00Z", "transaction_amount_usd": 29030.15 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.497, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 541081.66, "financial_exposure_usd": 833487.61, "recoverable_pct": 0.186 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104720", "label": "fraudulent", "label_confidence": 0.647, "severity": "low", "timestamp": "2026-01-04T06:40:00Z", "trace_id": "fb655994-d116-cf22-92e4-7787cb2e3f51" }
{ "account_age_days": 1322, "account_id": "ACCT-E033EDA13163", "baseline_risk_score": 0.132, "kyc_tier": "tier_3", "session_entropy": 0.772 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 983, "timestamp": "2026-01-04T06:40:00Z", "transaction_amount_usd": 2634652 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.745, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6767942.38, "financial_exposure_usd": 9007109.61, "recoverable_pct": 0.872 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100304", "label": "fraudulent", "label_confidence": 0.835, "severity": "critical", "timestamp": "2026-01-01T05:04:00Z", "trace_id": "50e7ceb8-4a3e-7903-43e5-87b9072804aa" }
{ "account_age_days": 709, "account_id": "ACCT-367D9AAD0029", "baseline_risk_score": 0.429, "kyc_tier": "tier_3", "session_entropy": 0.139 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 749, "timestamp": "2026-01-01T05:04:00Z", "transaction_amount_usd": 20416.5 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.806, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 322546.28, "financial_exposure_usd": 699524.65, "recoverable_pct": 0.755 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100274", "label": "fraudulent", "label_confidence": 0.791, "severity": "critical", "timestamp": "2026-01-01T04:34:00Z", "trace_id": "2e3c7679-6dc2-d7db-9763-7e6ccd87a06a" }
{ "account_age_days": 1206, "account_id": "ACCT-7A3F4573F16A", "baseline_risk_score": 0.424, "kyc_tier": "tier_1", "session_entropy": 0.384 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 564, "timestamp": "2026-01-01T04:34:00Z", "transaction_amount_usd": 9765.36 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.382, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 766383.01, "financial_exposure_usd": 920465.58, "recoverable_pct": 0.311 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101041", "label": "fraudulent", "label_confidence": 0.957, "severity": "medium", "timestamp": "2026-01-01T17:21:00Z", "trace_id": "669d4e54-05f8-9735-b553-7adc14622316" }
{ "account_age_days": 1221, "account_id": "ACCT-73B1519DF394", "baseline_risk_score": 0.272, "kyc_tier": "tier_3", "session_entropy": 0.792 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1095, "timestamp": "2026-01-01T17:21:00Z", "transaction_amount_usd": 93528.13 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.78, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 1105844.15, "financial_exposure_usd": 1217006.61, "recoverable_pct": 0.046 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106627", "label": "fraudulent", "label_confidence": 0.795, "severity": "medium", "timestamp": "2026-01-05T14:27:00Z", "trace_id": "766e7b43-a99f-fab1-b863-173810645a6f" }
{ "account_age_days": 613, "account_id": "ACCT-A13C342189E9", "baseline_risk_score": 0.366, "kyc_tier": "tier_1", "session_entropy": 0.283 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 137, "timestamp": "2026-01-05T07:57:00Z", "transaction_amount_usd": 11.9 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.782, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3229590.17, "financial_exposure_usd": 3795713.57, "recoverable_pct": 0.73 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102450", "label": "fraudulent", "label_confidence": 0.928, "severity": "high", "timestamp": "2026-01-02T16:50:00Z", "trace_id": "d2ad5044-67d5-f454-15e4-71e816da2f1b" }
{ "account_age_days": 1696, "account_id": "ACCT-E1DBD253843E", "baseline_risk_score": 0.268, "kyc_tier": "tier_3", "session_entropy": 0.106 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 416, "timestamp": "2026-01-02T16:50:00Z", "transaction_amount_usd": 69235.29 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.624, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 812428.62, "financial_exposure_usd": 1201401.06, "recoverable_pct": 0.572 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103473", "label": "fraudulent", "label_confidence": 0.8, "severity": "medium", "timestamp": "2026-01-03T09:53:00Z", "trace_id": "20f021d0-8350-9867-8731-975da1e68cdc" }
{ "account_age_days": 536, "account_id": "ACCT-08B30CE24C90", "baseline_risk_score": 0.4, "kyc_tier": "tier_3", "session_entropy": 0.759 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 92, "timestamp": "2026-01-03T09:53:00Z", "transaction_amount_usd": 859504.78 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.354, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 6543242.2, "financial_exposure_usd": 7352458.54, "recoverable_pct": 0.907 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106409", "label": "fraudulent", "label_confidence": 0.648, "severity": "low", "timestamp": "2026-01-05T10:49:00Z", "trace_id": "9e3c0719-3898-bfff-0f14-7742d381d444" }
{ "account_age_days": 750, "account_id": "ACCT-8D3CF7132627", "baseline_risk_score": 0.333, "kyc_tier": "tier_2", "session_entropy": 0.149 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 114, "timestamp": "2026-01-05T09:15:00Z", "transaction_amount_usd": 12.6 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.833, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4948086.12, "financial_exposure_usd": 7102704.67, "recoverable_pct": 0.84 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105758", "label": "fraudulent", "label_confidence": 0.61, "severity": "medium", "timestamp": "2026-01-04T23:58:00Z", "trace_id": "43bfbee9-fe31-950c-0989-a7e01ac02dcd" }
{ "account_age_days": 1952, "account_id": "ACCT-08A5E16B9F76", "baseline_risk_score": 0.39, "kyc_tier": "tier_1", "session_entropy": 0.518 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 673, "timestamp": "2026-01-04T23:58:00Z", "transaction_amount_usd": 2933860.73 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.494, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 5312992.04, "financial_exposure_usd": 5348506.83, "recoverable_pct": 0.961 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104757", "label": "fraudulent", "label_confidence": 0.839, "severity": "high", "timestamp": "2026-01-04T07:17:00Z", "trace_id": "15538c88-51a3-ac79-c22f-c6d666d335c2" }
{ "account_age_days": 1428, "account_id": "ACCT-BC353E733600", "baseline_risk_score": 0.428, "kyc_tier": "tier_2", "session_entropy": 0.303 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 392, "timestamp": "2026-01-04T07:17:00Z", "transaction_amount_usd": 809099.62 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.918, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4574454.68, "financial_exposure_usd": 6114728.95, "recoverable_pct": 0.745 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103038", "label": "fraudulent", "label_confidence": 0.91, "severity": "high", "timestamp": "2026-01-03T02:38:00Z", "trace_id": "d515e617-fed9-07e2-e2c3-0e84aba6cd72" }
{ "account_age_days": 1965, "account_id": "ACCT-16CCF38A3B87", "baseline_risk_score": 0.281, "kyc_tier": "tier_1", "session_entropy": 0.871 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 670, "timestamp": "2026-01-03T02:38:00Z", "transaction_amount_usd": 103628.81 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.413, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 450337.65, "financial_exposure_usd": 556544.95, "recoverable_pct": 0.027 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107772", "label": "benign", "label_confidence": 0.536, "severity": "low", "timestamp": "2026-01-06T09:32:00Z", "trace_id": "730b7ca8-f6b4-e525-d405-c91eb39f6e83" }
{ "account_age_days": 1932, "account_id": "ACCT-A9F4C2E47343", "baseline_risk_score": 0.175, "kyc_tier": "tier_3", "session_entropy": 0.355 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 260, "timestamp": "2026-01-06T06:13:00Z", "transaction_amount_usd": 6.71 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.573, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1055.13, "financial_exposure_usd": 2409.91, "recoverable_pct": 0.724 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101154", "label": "fraudulent", "label_confidence": 0.852, "severity": "high", "timestamp": "2026-01-01T19:14:00Z", "trace_id": "b9a00071-2c8c-8e08-f88c-20cbe122967f" }
{ "account_age_days": 412, "account_id": "ACCT-35197F1813D4", "baseline_risk_score": 0.525, "kyc_tier": "tier_3", "session_entropy": 0.527 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 255, "timestamp": "2026-01-01T11:24:00Z", "transaction_amount_usd": 18.34 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.39, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 449347.07, "financial_exposure_usd": 819871.59, "recoverable_pct": 0.247 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107934", "label": "benign", "label_confidence": 0.729, "severity": "low", "timestamp": "2026-01-06T12:14:00Z", "trace_id": "3fc1b9b4-d94e-e0a2-5a33-ed6c549910b0" }
{ "account_age_days": 609, "account_id": "ACCT-86C83FD2D2E2", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.816 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 801, "timestamp": "2026-01-06T12:14:00Z", "transaction_amount_usd": 11331.61 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.733, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3634.09, "financial_exposure_usd": 3689.12, "recoverable_pct": 0.635 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101846", "label": "fraudulent", "label_confidence": 0.962, "severity": "critical", "timestamp": "2026-01-02T06:46:00Z", "trace_id": "e51a1a4e-8c85-59d6-aad3-f8fda1ba954d" }
{ "account_age_days": 1734, "account_id": "ACCT-33E862AAFE08", "baseline_risk_score": 0.367, "kyc_tier": "tier_2", "session_entropy": 0.519 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 795, "timestamp": "2026-01-02T06:46:00Z", "transaction_amount_usd": 81798.81 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.519, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1028954.54, "financial_exposure_usd": 1479746.81, "recoverable_pct": 0.337 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101476", "label": "fraudulent", "label_confidence": 0.832, "severity": "medium", "timestamp": "2026-01-02T00:36:00Z", "trace_id": "88daaf92-ae46-6ccb-3522-39c5739451da" }
{ "account_age_days": 1359, "account_id": "ACCT-7492C0950AED", "baseline_risk_score": 0.287, "kyc_tier": "tier_3", "session_entropy": 0.61 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 152, "timestamp": "2026-01-01T18:49:00Z", "transaction_amount_usd": 9.51 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.681, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 904386.43, "financial_exposure_usd": 1107518.52, "recoverable_pct": 0.666 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102679", "label": "fraudulent", "label_confidence": 0.927, "severity": "high", "timestamp": "2026-01-02T20:39:00Z", "trace_id": "7b488ee0-af00-223a-8df3-b70a481471fd" }
{ "account_age_days": 344, "account_id": "ACCT-1014F7FFF252", "baseline_risk_score": 0.432, "kyc_tier": "tier_1", "session_entropy": 0.549 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 1080, "timestamp": "2026-01-02T20:39:00Z", "transaction_amount_usd": 55895.35 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.513, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 654163.2, "financial_exposure_usd": 656577.94, "recoverable_pct": 0.357 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100141", "label": "fraudulent", "label_confidence": 0.818, "severity": "medium", "timestamp": "2026-01-01T02:21:00Z", "trace_id": "33b636dc-c2d0-1c42-fd59-5978796512e3" }
{ "account_age_days": 1095, "account_id": "ACCT-2BCDCE431E7D", "baseline_risk_score": 0.591, "kyc_tier": "tier_1", "session_entropy": 0.29 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 791, "timestamp": "2026-01-01T02:21:00Z", "transaction_amount_usd": 5735.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.373, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1084993.38, "financial_exposure_usd": 1124080.35, "recoverable_pct": 0.236 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101090", "label": "fraudulent", "label_confidence": 0.773, "severity": "critical", "timestamp": "2026-01-01T18:10:00Z", "trace_id": "b24209d9-ff22-920d-5d23-e94b9f6b2e44" }
{ "account_age_days": 1760, "account_id": "ACCT-5066ECA45AB0", "baseline_risk_score": 0.487, "kyc_tier": "tier_2", "session_entropy": 0.768 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 712, "timestamp": "2026-01-01T18:10:00Z", "transaction_amount_usd": 31978.98 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.383, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 870071.06, "financial_exposure_usd": 910286.01, "recoverable_pct": 0.716 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101525", "label": "fraudulent", "label_confidence": 0.928, "severity": "critical", "timestamp": "2026-01-02T01:25:00Z", "trace_id": "b057a269-6f5b-a62f-3aaa-a13492dfac62" }
{ "account_age_days": 1983, "account_id": "ACCT-EA680F2810B4", "baseline_risk_score": 0.465, "kyc_tier": "tier_2", "session_entropy": 0.48 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 189, "timestamp": "2026-01-02T01:25:00Z", "transaction_amount_usd": 107094.02 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.452, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 610047.11, "financial_exposure_usd": 1380450.68, "recoverable_pct": 0.228 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106326", "label": "fraudulent", "label_confidence": 0.604, "severity": "medium", "timestamp": "2026-01-05T09:26:00Z", "trace_id": "c5a8cf31-26a5-9328-222d-afdc8266b5e3" }
{ "account_age_days": 1936, "account_id": "ACCT-CC0E7C20E728", "baseline_risk_score": 0.104, "kyc_tier": "tier_3", "session_entropy": 0.877 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 87, "timestamp": "2026-01-05T09:26:00Z", "transaction_amount_usd": 2257892.67 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.632, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1144792.05, "financial_exposure_usd": 1274331.72, "recoverable_pct": 0.924 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108114", "label": "benign", "label_confidence": 0.715, "severity": "critical", "timestamp": "2026-01-06T15:14:00Z", "trace_id": "d626398c-acf2-afe9-94cf-49a06a115c08" }
{ "account_age_days": 861, "account_id": "ACCT-1AEA8BF1EA25", "baseline_risk_score": 0.154, "kyc_tier": "tier_3", "session_entropy": 0.859 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 715, "timestamp": "2026-01-06T15:14:00Z", "transaction_amount_usd": 6690.64 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.751, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3497.76, "financial_exposure_usd": 5246.25, "recoverable_pct": 0.78 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100733", "label": "fraudulent", "label_confidence": 0.899, "severity": "medium", "timestamp": "2026-01-01T12:13:00Z", "trace_id": "86534d3b-296c-6d2e-4534-24dbf859df6f" }
{ "account_age_days": 690, "account_id": "ACCT-086263F92546", "baseline_risk_score": 0.293, "kyc_tier": "tier_2", "session_entropy": 0.366 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 171, "timestamp": "2026-01-01T00:32:00Z", "transaction_amount_usd": 23.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.802, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 456300.55, "financial_exposure_usd": 983377.24, "recoverable_pct": 0.308 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100299", "label": "fraudulent", "label_confidence": 0.93, "severity": "low", "timestamp": "2026-01-01T04:59:00Z", "trace_id": "285cecb9-ed6d-216d-b9a1-f8c5929cc513" }
{ "account_age_days": 1812, "account_id": "ACCT-82E89B5E4BCB", "baseline_risk_score": 0.582, "kyc_tier": "tier_1", "session_entropy": 0.663 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 920, "timestamp": "2026-01-01T04:59:00Z", "transaction_amount_usd": 14484.56 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.673, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 785667.59, "financial_exposure_usd": 1082091.49, "recoverable_pct": 0.455 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106329", "label": "fraudulent", "label_confidence": 0.628, "severity": "low", "timestamp": "2026-01-05T09:29:00Z", "trace_id": "3798d6ea-4a79-94bb-ecc5-a26ca069a4a2" }
{ "account_age_days": 1823, "account_id": "ACCT-33F1BCFF8961", "baseline_risk_score": 0.086, "kyc_tier": "tier_3", "session_entropy": 0.115 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 938, "timestamp": "2026-01-05T09:29:00Z", "transaction_amount_usd": 1271611.06 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.882, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3416932.01, "financial_exposure_usd": 4653602.08, "recoverable_pct": 0.711 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109939", "label": "benign", "label_confidence": 0.679, "severity": "low", "timestamp": "2026-01-07T21:39:00Z", "trace_id": "895196f9-9fb3-b58e-ad53-9ab378a5a96a" }
{ "account_age_days": 789, "account_id": "ACCT-62021FA2C19D", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.339 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 822, "timestamp": "2026-01-07T21:39:00Z", "transaction_amount_usd": 2949.61 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.731, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 459.94, "financial_exposure_usd": 1050.81, "recoverable_pct": 0.655 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106594", "label": "fraudulent", "label_confidence": 0.743, "severity": "medium", "timestamp": "2026-01-05T13:54:00Z", "trace_id": "57823eab-1c15-2748-9ffe-6d779bc3a346" }
{ "account_age_days": 999, "account_id": "ACCT-95551EF59997", "baseline_risk_score": 0.275, "kyc_tier": "tier_2", "session_entropy": 0.948 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 888, "timestamp": "2026-01-05T13:54:00Z", "transaction_amount_usd": 1424860.3 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.775, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3228723.13, "financial_exposure_usd": 4845698.1, "recoverable_pct": 0.651 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101610", "label": "fraudulent", "label_confidence": 0.883, "severity": "high", "timestamp": "2026-01-02T02:50:00Z", "trace_id": "27988393-f04a-d86d-1f48-50525dd36cd2" }
{ "account_age_days": 1067, "account_id": "ACCT-A1030186580B", "baseline_risk_score": 0.365, "kyc_tier": "tier_2", "session_entropy": 0.344 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1100, "timestamp": "2026-01-02T02:50:00Z", "transaction_amount_usd": 5634.51 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.811, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 538406.75, "financial_exposure_usd": 1008364.09, "recoverable_pct": 0.73 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101000", "label": "fraudulent", "label_confidence": 0.757, "severity": "critical", "timestamp": "2026-01-01T16:40:00Z", "trace_id": "010eedfd-ebe3-9482-71b7-3321e6b50ee9" }
{ "account_age_days": 1031, "account_id": "ACCT-64DC618A8022", "baseline_risk_score": 0.425, "kyc_tier": "tier_1", "session_entropy": 0.95 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 500, "timestamp": "2026-01-01T16:40:00Z", "transaction_amount_usd": 119301.95 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.681, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 123114.81, "financial_exposure_usd": 260943.51, "recoverable_pct": 0.332 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104041", "label": "fraudulent", "label_confidence": 0.647, "severity": "critical", "timestamp": "2026-01-03T19:21:00Z", "trace_id": "3814e9bf-e693-475b-6a14-4e5c8fadb121" }
{ "account_age_days": 987, "account_id": "ACCT-105660B407D4", "baseline_risk_score": 0.243, "kyc_tier": "tier_1", "session_entropy": 0.384 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 894, "timestamp": "2026-01-03T19:21:00Z", "transaction_amount_usd": 431418.02 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.479, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2800656.99, "financial_exposure_usd": 5628865.72, "recoverable_pct": 0.615 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108448", "label": "benign", "label_confidence": 0.671, "severity": "low", "timestamp": "2026-01-06T20:48:00Z", "trace_id": "7d078412-5427-5ead-f861-64ae12325557" }
{ "account_age_days": 1266, "account_id": "ACCT-9D8BB32D2B00", "baseline_risk_score": 0.187, "kyc_tier": "tier_2", "session_entropy": 0.737 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 299, "timestamp": "2026-01-06T20:48:00Z", "transaction_amount_usd": 7729.11 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.676, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1155.42, "financial_exposure_usd": 1727.98, "recoverable_pct": 0.997 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103331", "label": "fraudulent", "label_confidence": 0.933, "severity": "high", "timestamp": "2026-01-03T07:31:00Z", "trace_id": "e9f8815e-9978-b2e8-3791-0ddd7f2bca93" }
{ "account_age_days": 1270, "account_id": "ACCT-614D05E6F1E4", "baseline_risk_score": 0.527, "kyc_tier": "tier_2", "session_entropy": 0.883 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 126, "timestamp": "2026-01-03T02:12:00Z", "transaction_amount_usd": 19.98 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.555, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 731726.85, "financial_exposure_usd": 1437920.33, "recoverable_pct": 0.163 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102084", "label": "fraudulent", "label_confidence": 0.762, "severity": "medium", "timestamp": "2026-01-02T10:44:00Z", "trace_id": "77d10ca0-a9d1-119c-6d91-7df65254d5fd" }
{ "account_age_days": 1125, "account_id": "ACCT-552F1A1DFD46", "baseline_risk_score": 0.472, "kyc_tier": "tier_2", "session_entropy": 0.912 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 558, "timestamp": "2026-01-02T10:44:00Z", "transaction_amount_usd": 10395.45 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.521, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 268652.68, "financial_exposure_usd": 392234.6, "recoverable_pct": 0.208 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109765", "label": "benign", "label_confidence": 0.684, "severity": "low", "timestamp": "2026-01-07T18:45:00Z", "trace_id": "a40d2cf3-92fc-2503-4b82-528eb31d2cdd" }
{ "account_age_days": 1566, "account_id": "ACCT-D21CB9D96B08", "baseline_risk_score": 0.159, "kyc_tier": "tier_2", "session_entropy": 0.16 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 369, "timestamp": "2026-01-07T18:45:00Z", "transaction_amount_usd": 8659.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.505, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3598.35, "financial_exposure_usd": 4955.83, "recoverable_pct": 0.778 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108406", "label": "benign", "label_confidence": 0.648, "severity": "low", "timestamp": "2026-01-06T20:06:00Z", "trace_id": "617e42e4-b5c6-b7b0-a8d5-cd0bdc99db78" }
{ "account_age_days": 356, "account_id": "ACCT-66DFE063061D", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.195 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 309, "timestamp": "2026-01-06T20:06:00Z", "transaction_amount_usd": 8498.59 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.55, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4479.36, "financial_exposure_usd": 4589.19, "recoverable_pct": 0.655 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102929", "label": "fraudulent", "label_confidence": 0.821, "severity": "high", "timestamp": "2026-01-03T00:49:00Z", "trace_id": "7537831c-f059-0cfa-aa37-84ae6f87f226" }
{ "account_age_days": 1261, "account_id": "ACCT-9FD748F18064", "baseline_risk_score": 0.265, "kyc_tier": "tier_3", "session_entropy": 0.386 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 1165, "timestamp": "2026-01-03T00:49:00Z", "transaction_amount_usd": 101617.25 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.81, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 283111.87, "financial_exposure_usd": 438442.42, "recoverable_pct": 0.514 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101984", "label": "fraudulent", "label_confidence": 0.915, "severity": "critical", "timestamp": "2026-01-02T09:04:00Z", "trace_id": "386b44f7-8268-23eb-cf64-61b669d6dfcf" }
{ "account_age_days": 80, "account_id": "ACCT-69F7A946F880", "baseline_risk_score": 0.302, "kyc_tier": "tier_3", "session_entropy": 0.823 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 793, "timestamp": "2026-01-02T09:04:00Z", "transaction_amount_usd": 41362.18 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.739, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 255326.36, "financial_exposure_usd": 342820.93, "recoverable_pct": 0.609 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108998", "label": "benign", "label_confidence": 0.677, "severity": "low", "timestamp": "2026-01-07T05:58:00Z", "trace_id": "a82a144a-6ce8-8f35-04b3-5d28c535f3a0" }
{ "account_age_days": 680, "account_id": "ACCT-59D82CC4AA6A", "baseline_risk_score": 0.121, "kyc_tier": "tier_2", "session_entropy": 0.292 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 215, "timestamp": "2026-01-07T00:54:00Z", "transaction_amount_usd": 9.58 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.663, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4451.94, "financial_exposure_usd": 4460.66, "recoverable_pct": 0.733 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100663", "label": "fraudulent", "label_confidence": 0.897, "severity": "critical", "timestamp": "2026-01-01T11:03:00Z", "trace_id": "78761e68-346c-9f49-ef62-52a6e7d975d4" }
{ "account_age_days": 782, "account_id": "ACCT-768957F2F3A5", "baseline_risk_score": 0.313, "kyc_tier": "tier_1", "session_entropy": 0.715 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 165, "timestamp": "2026-01-01T04:22:00Z", "transaction_amount_usd": 2.94 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.386, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 553043.03, "financial_exposure_usd": 764827.38, "recoverable_pct": 0.702 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109056", "label": "benign", "label_confidence": 0.688, "severity": "high", "timestamp": "2026-01-07T06:56:00Z", "trace_id": "ce03a542-55d4-b5dd-a816-e763dd5a9264" }
{ "account_age_days": 349, "account_id": "ACCT-52FC9401597C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.113 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 287, "timestamp": "2026-01-07T03:16:00Z", "transaction_amount_usd": 21.79 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.454, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1629.92, "financial_exposure_usd": 1678.53, "recoverable_pct": 0.979 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104124", "label": "fraudulent", "label_confidence": 0.624, "severity": "medium", "timestamp": "2026-01-03T20:44:00Z", "trace_id": "c87ea77c-c146-8fa1-d9cb-12477976eaa4" }
{ "account_age_days": 1047, "account_id": "ACCT-1F77370083D4", "baseline_risk_score": 0.359, "kyc_tier": "tier_1", "session_entropy": 0.304 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 816, "timestamp": "2026-01-03T20:44:00Z", "transaction_amount_usd": 372547.11 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.849, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5293417.38, "financial_exposure_usd": 7085925.73, "recoverable_pct": 0.487 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103071", "label": "fraudulent", "label_confidence": 0.866, "severity": "high", "timestamp": "2026-01-03T03:11:00Z", "trace_id": "7653d383-3c62-8852-51b6-3b0035fe0122" }
{ "account_age_days": 1835, "account_id": "ACCT-97E396296D0C", "baseline_risk_score": 0.302, "kyc_tier": "tier_3", "session_entropy": 0.508 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 366, "timestamp": "2026-01-02T23:04:00Z", "transaction_amount_usd": 20.64 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.621, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 344301.77, "financial_exposure_usd": 638347.24, "recoverable_pct": 0.357 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108850", "label": "benign", "label_confidence": 0.721, "severity": "medium", "timestamp": "2026-01-07T03:30:00Z", "trace_id": "9b2dbf59-e850-6042-99bb-5559b22943ac" }
{ "account_age_days": 658, "account_id": "ACCT-5E90FA65705F", "baseline_risk_score": 0.084, "kyc_tier": "tier_1", "session_entropy": 0.246 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 332, "timestamp": "2026-01-07T03:30:00Z", "transaction_amount_usd": 9967.16 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.49, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1304.43, "financial_exposure_usd": 2317.66, "recoverable_pct": 0.884 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103141", "label": "fraudulent", "label_confidence": 0.798, "severity": "low", "timestamp": "2026-01-03T04:21:00Z", "trace_id": "17560b27-cd4a-7ef6-3f2a-44900ff82a68" }
{ "account_age_days": 1822, "account_id": "ACCT-E9BAC747BD8B", "baseline_risk_score": 0.363, "kyc_tier": "tier_2", "session_entropy": 0.862 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 153, "timestamp": "2026-01-03T01:39:00Z", "transaction_amount_usd": 17.92 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.838, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 415403.78, "financial_exposure_usd": 717578.75, "recoverable_pct": 0.837 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108228", "label": "benign", "label_confidence": 0.452, "severity": "critical", "timestamp": "2026-01-06T17:08:00Z", "trace_id": "8cf300f4-cc6d-3528-7426-5c7e5d0b7bb1" }
{ "account_age_days": 750, "account_id": "ACCT-ADC7362B3944", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.361 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 158, "timestamp": "2026-01-06T13:53:00Z", "transaction_amount_usd": 17.81 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.587, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 948.59, "financial_exposure_usd": 1643.4, "recoverable_pct": 0.648 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107276", "label": "benign", "label_confidence": 0.672, "severity": "medium", "timestamp": "2026-01-06T01:16:00Z", "trace_id": "8f806f62-34a4-d9a9-e7f3-5bff1ea4bea4" }
{ "account_age_days": 1109, "account_id": "ACCT-42B7F839EDFC", "baseline_risk_score": 0.191, "kyc_tier": "tier_3", "session_entropy": 0.353 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 270, "timestamp": "2026-01-06T01:16:00Z", "transaction_amount_usd": 11065.63 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.69, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 194.06, "financial_exposure_usd": 217.16, "recoverable_pct": 0.822 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103472", "label": "fraudulent", "label_confidence": 0.736, "severity": "medium", "timestamp": "2026-01-03T09:52:00Z", "trace_id": "62478b59-f57e-1894-823d-3f0140932e68" }
{ "account_age_days": 1359, "account_id": "ACCT-9A2D8B4A577F", "baseline_risk_score": 0.078, "kyc_tier": "tier_2", "session_entropy": 0.23 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 1183, "timestamp": "2026-01-03T09:52:00Z", "transaction_amount_usd": 1047938.82 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.649, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 5879507.97, "financial_exposure_usd": 6230655.78, "recoverable_pct": 0.586 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103727", "label": "fraudulent", "label_confidence": 0.889, "severity": "critical", "timestamp": "2026-01-03T14:07:00Z", "trace_id": "0fe4331b-8e67-fdcc-4726-3441e314cde5" }
{ "account_age_days": 1661, "account_id": "ACCT-C43E278D6901", "baseline_risk_score": 0.1, "kyc_tier": "tier_3", "session_entropy": 0.242 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 332, "timestamp": "2026-01-03T14:07:00Z", "transaction_amount_usd": 2802953.36 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.479, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2831585.77, "financial_exposure_usd": 2834895.27, "recoverable_pct": 0.725 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107549", "label": "benign", "label_confidence": 0.669, "severity": "medium", "timestamp": "2026-01-06T05:49:00Z", "trace_id": "b7c4923e-33da-1997-954f-b6e0d16e9efd" }
{ "account_age_days": 1446, "account_id": "ACCT-6270F0D530C2", "baseline_risk_score": 0.191, "kyc_tier": "tier_3", "session_entropy": 0.762 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 262, "timestamp": "2026-01-06T05:49:00Z", "transaction_amount_usd": 3144.19 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.699, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1205.89, "financial_exposure_usd": 1377.65, "recoverable_pct": 0.615 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108678", "label": "benign", "label_confidence": 0.654, "severity": "low", "timestamp": "2026-01-07T00:38:00Z", "trace_id": "8ecbeffb-0038-7e8e-fda4-7977a076ed36" }
{ "account_age_days": 603, "account_id": "ACCT-2FB656788263", "baseline_risk_score": 0.089, "kyc_tier": "tier_3", "session_entropy": 0.41 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 328, "timestamp": "2026-01-07T00:38:00Z", "transaction_amount_usd": 8741.46 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.691, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2113.57, "financial_exposure_usd": 2240.4, "recoverable_pct": 0.576 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109592", "label": "benign", "label_confidence": 0.528, "severity": "low", "timestamp": "2026-01-07T15:52:00Z", "trace_id": "e0dc844f-f279-1de8-2fd8-b09dc2180d98" }
{ "account_age_days": 1674, "account_id": "ACCT-6E016F6FEAE6", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.767 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1112, "timestamp": "2026-01-07T15:52:00Z", "transaction_amount_usd": 9486.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.725, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1747.51, "financial_exposure_usd": 2242.2, "recoverable_pct": 0.689 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104836", "label": "fraudulent", "label_confidence": 0.718, "severity": "medium", "timestamp": "2026-01-04T08:36:00Z", "trace_id": "37eb4d70-225d-e5c6-e3a6-b18c4588f121" }
{ "account_age_days": 701, "account_id": "ACCT-F53BEEB12DBD", "baseline_risk_score": 0.215, "kyc_tier": "tier_3", "session_entropy": 0.737 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 199, "timestamp": "2026-01-03T21:41:00Z", "transaction_amount_usd": 15.75 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.502, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6576485.53, "financial_exposure_usd": 7816478.32, "recoverable_pct": 0.846 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107029", "label": "benign", "label_confidence": 0.646, "severity": "low", "timestamp": "2026-01-05T21:09:00Z", "trace_id": "3bfd2d24-b32e-4c8e-91c0-6e798411fa00" }
{ "account_age_days": 692, "account_id": "ACCT-E1DE9F4608A9", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.599 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 173, "timestamp": "2026-01-05T12:47:00Z", "transaction_amount_usd": 2.21 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.791, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 5475.34, "financial_exposure_usd": 5823.7, "recoverable_pct": 0.718 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102881", "label": "fraudulent", "label_confidence": 0.903, "severity": "high", "timestamp": "2026-01-03T00:01:00Z", "trace_id": "548152da-5613-4edf-3703-fe96a7b480b1" }
{ "account_age_days": 467, "account_id": "ACCT-E814F3E23886", "baseline_risk_score": 0.349, "kyc_tier": "tier_1", "session_entropy": 0.159 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 240, "timestamp": "2026-01-02T18:59:00Z", "transaction_amount_usd": 3.47 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.374, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 680985.54, "financial_exposure_usd": 970951.17, "recoverable_pct": 0.548 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102661", "label": "fraudulent", "label_confidence": 0.781, "severity": "critical", "timestamp": "2026-01-02T20:21:00Z", "trace_id": "91abdc13-ca5c-40e1-ac9b-e4f48c8464db" }
{ "account_age_days": 1730, "account_id": "ACCT-CFAAD868BC43", "baseline_risk_score": 0.65, "kyc_tier": "tier_2", "session_entropy": 0.612 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 1130, "timestamp": "2026-01-02T20:21:00Z", "transaction_amount_usd": 36661.07 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.895, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 398420.07, "financial_exposure_usd": 614023.96, "recoverable_pct": 0.133 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108672", "label": "benign", "label_confidence": 0.74, "severity": "medium", "timestamp": "2026-01-07T00:32:00Z", "trace_id": "683bcd79-0b30-8716-2bac-fcbed09d813b" }
{ "account_age_days": 309, "account_id": "ACCT-D4D1A7BE9832", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.116 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 315, "timestamp": "2026-01-06T23:07:00Z", "transaction_amount_usd": 22.25 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.66, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 3291.43, "financial_exposure_usd": 5753.48, "recoverable_pct": 0.976 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103498", "label": "fraudulent", "label_confidence": 0.817, "severity": "critical", "timestamp": "2026-01-03T10:18:00Z", "trace_id": "997feef4-0ebe-6480-4ce2-39107e454f89" }
{ "account_age_days": 733, "account_id": "ACCT-F7EFFB492C1B", "baseline_risk_score": 0.129, "kyc_tier": "tier_1", "session_entropy": 0.832 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 212, "timestamp": "2026-01-03T01:28:00Z", "transaction_amount_usd": 18.33 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.578, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3643472.05, "financial_exposure_usd": 4060692.25, "recoverable_pct": 0.972 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100284", "label": "fraudulent", "label_confidence": 0.793, "severity": "critical", "timestamp": "2026-01-01T04:44:00Z", "trace_id": "4d6396fe-022f-6ca5-5802-9d896ab584fd" }
{ "account_age_days": 463, "account_id": "ACCT-5D5B0BD90EBF", "baseline_risk_score": 0.64, "kyc_tier": "tier_1", "session_entropy": 0.552 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 355, "timestamp": "2026-01-01T04:44:00Z", "transaction_amount_usd": 20489.34 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.92, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 599402.8, "financial_exposure_usd": 677023.48, "recoverable_pct": 0.205 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109526", "label": "benign", "label_confidence": 0.696, "severity": "medium", "timestamp": "2026-01-07T14:46:00Z", "trace_id": "9d4145da-e42c-53ec-005a-e8d175814de5" }
{ "account_age_days": 1312, "account_id": "ACCT-3890B954DA74", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.391 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 848, "timestamp": "2026-01-07T14:46:00Z", "transaction_amount_usd": 9603.96 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.608, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1864.51, "financial_exposure_usd": 3330.49, "recoverable_pct": 0.598 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105299", "label": "fraudulent", "label_confidence": 0.714, "severity": "medium", "timestamp": "2026-01-04T16:19:00Z", "trace_id": "6ab40a30-075e-1fb8-c8dc-dc962d0dcaee" }
{ "account_age_days": 803, "account_id": "ACCT-53E2A21B149D", "baseline_risk_score": 0.332, "kyc_tier": "tier_2", "session_entropy": 0.856 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 583, "timestamp": "2026-01-04T16:19:00Z", "transaction_amount_usd": 2824955.42 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.69, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 2560363.15, "financial_exposure_usd": 3014851.36, "recoverable_pct": 0.66 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101172", "label": "fraudulent", "label_confidence": 0.766, "severity": "high", "timestamp": "2026-01-01T19:32:00Z", "trace_id": "a8399fc3-2300-3c5f-7a67-e276ff918616" }
{ "account_age_days": 631, "account_id": "ACCT-B161DD161F35", "baseline_risk_score": 0.472, "kyc_tier": "tier_2", "session_entropy": 0.296 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 204, "timestamp": "2026-01-01T12:47:00Z", "transaction_amount_usd": 15.8 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.838, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 190980.34, "financial_exposure_usd": 365854.44, "recoverable_pct": 0.533 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100327", "label": "fraudulent", "label_confidence": 0.752, "severity": "high", "timestamp": "2026-01-01T05:27:00Z", "trace_id": "e4bc9bef-25c2-98e5-fb34-31dd671fa59b" }
{ "account_age_days": 925, "account_id": "ACCT-BCE4D414A7FF", "baseline_risk_score": 0.353, "kyc_tier": "tier_1", "session_entropy": 0.373 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 85, "timestamp": "2025-12-31T20:38:00Z", "transaction_amount_usd": 10.72 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.65, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 492464.32, "financial_exposure_usd": 703634.17, "recoverable_pct": 0.288 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104451", "label": "fraudulent", "label_confidence": 0.767, "severity": "high", "timestamp": "2026-01-04T02:11:00Z", "trace_id": "605544e8-d38b-679b-90ad-4f54d26656f1" }
{ "account_age_days": 996, "account_id": "ACCT-7F477346D62D", "baseline_risk_score": 0.162, "kyc_tier": "tier_1", "session_entropy": 0.363 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 85, "timestamp": "2026-01-04T00:52:00Z", "transaction_amount_usd": 1.83 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.919, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5915444.4, "financial_exposure_usd": 7646152.96, "recoverable_pct": 0.987 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100019", "label": "fraudulent", "label_confidence": 0.867, "severity": "medium", "timestamp": "2026-01-01T00:19:00Z", "trace_id": "372f871a-45ee-432d-6a07-f2137129cec7" }
{ "account_age_days": 718, "account_id": "ACCT-31A3AC4D828C", "baseline_risk_score": 0.317, "kyc_tier": "tier_2", "session_entropy": 0.87 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 349, "timestamp": "2025-12-31T14:32:00Z", "transaction_amount_usd": 16.96 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.492, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 604135.42, "financial_exposure_usd": 1091322.66, "recoverable_pct": 0.147 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107228", "label": "benign", "label_confidence": 0.715, "severity": "critical", "timestamp": "2026-01-06T00:28:00Z", "trace_id": "c289b2f4-58e4-c6a1-8b2c-123da91c52ea" }
{ "account_age_days": 393, "account_id": "ACCT-F374D2A487A7", "baseline_risk_score": 0.168, "kyc_tier": "tier_1", "session_entropy": 0.211 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 176, "timestamp": "2026-01-05T22:59:00Z", "transaction_amount_usd": 10.66 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.757, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2477.22, "financial_exposure_usd": 3767.09, "recoverable_pct": 0.743 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107641", "label": "benign", "label_confidence": 0.731, "severity": "medium", "timestamp": "2026-01-06T07:21:00Z", "trace_id": "64dd29e1-afdd-5196-2f2d-0161071afdad" }
{ "account_age_days": 1880, "account_id": "ACCT-FB1F9A7D8244", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.115 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 979, "timestamp": "2026-01-06T07:21:00Z", "transaction_amount_usd": 4518.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.489, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 899.26, "financial_exposure_usd": 1222.13, "recoverable_pct": 0.996 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109008", "label": "benign", "label_confidence": 0.479, "severity": "high", "timestamp": "2026-01-07T06:08:00Z", "trace_id": "498850da-2b5d-ba67-87be-0bbff5266d47" }
{ "account_age_days": 1020, "account_id": "ACCT-51D090C32CF4", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.301 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 870, "timestamp": "2026-01-07T06:08:00Z", "transaction_amount_usd": 2730.86 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.564, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 5283.74, "financial_exposure_usd": 5599.36, "recoverable_pct": 0.833 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }