schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109916", "label": "benign", "label_confidence": 0.504, "severity": "low", "timestamp": "2026-01-07T21:16:00Z", "trace_id": "ba5caa35-6459-bd95-3df3-ea53aa4a101a" }
{ "account_age_days": 1444, "account_id": "ACCT-99B29FB4DD78", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.91 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 311, "timestamp": "2026-01-07T21:16:00Z", "transaction_amount_usd": 3246.99 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.454, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 688.36, "financial_exposure_usd": 994.94, "recoverable_pct": 0.867 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102533", "label": "fraudulent", "label_confidence": 0.917, "severity": "medium", "timestamp": "2026-01-02T18:13:00Z", "trace_id": "dfc01bce-0d8f-f655-79dd-de3210c55fe3" }
{ "account_age_days": 1555, "account_id": "ACCT-0C49D6DB15F3", "baseline_risk_score": 0.507, "kyc_tier": "tier_2", "session_entropy": 0.82 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 387, "timestamp": "2026-01-02T11:02:00Z", "transaction_amount_usd": 19.64 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.505, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 891030.2, "financial_exposure_usd": 1239691.06, "recoverable_pct": 0.441 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100791", "label": "fraudulent", "label_confidence": 0.921, "severity": "medium", "timestamp": "2026-01-01T13:11:00Z", "trace_id": "5d027966-c671-3eeb-75d0-9c8c22c486ba" }
{ "account_age_days": 174, "account_id": "ACCT-4F23DB5C9D72", "baseline_risk_score": 0.288, "kyc_tier": "tier_1", "session_entropy": 0.338 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1043, "timestamp": "2026-01-01T13:11:00Z", "transaction_amount_usd": 57412.34 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.831, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 398540, "financial_exposure_usd": 502209.97, "recoverable_pct": 0.773 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101063", "label": "fraudulent", "label_confidence": 0.921, "severity": "high", "timestamp": "2026-01-01T17:43:00Z", "trace_id": "5b4b9be5-e43f-9c60-e4ec-aa0827b7f8c0" }
{ "account_age_days": 1928, "account_id": "ACCT-33898C456582", "baseline_risk_score": 0.255, "kyc_tier": "tier_1", "session_entropy": 0.514 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 989, "timestamp": "2026-01-01T17:43:00Z", "transaction_amount_usd": 41999.61 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.677, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 427496.92, "financial_exposure_usd": 588727.17, "recoverable_pct": 0.497 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109474", "label": "benign", "label_confidence": 0.585, "severity": "medium", "timestamp": "2026-01-07T13:54:00Z", "trace_id": "efa9b620-0b58-fcd9-0453-dff220d44c71" }
{ "account_age_days": 1919, "account_id": "ACCT-394666934E23", "baseline_risk_score": 0.176, "kyc_tier": "tier_2", "session_entropy": 0.903 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 397, "timestamp": "2026-01-07T13:54:00Z", "transaction_amount_usd": 3813.57 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.754, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1603.77, "financial_exposure_usd": 2279.39, "recoverable_pct": 0.802 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106379", "label": "fraudulent", "label_confidence": 0.701, "severity": "high", "timestamp": "2026-01-05T10:19:00Z", "trace_id": "20c45980-a7b6-e44d-55a4-986b67a8b18b" }
{ "account_age_days": 1995, "account_id": "ACCT-FD0A7A73A02B", "baseline_risk_score": 0.279, "kyc_tier": "tier_1", "session_entropy": 0.618 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 770, "timestamp": "2026-01-05T10:19:00Z", "transaction_amount_usd": 1487424.43 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.529, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1400356.67, "financial_exposure_usd": 3139317.98, "recoverable_pct": 0.505 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102720", "label": "fraudulent", "label_confidence": 0.88, "severity": "medium", "timestamp": "2026-01-02T21:20:00Z", "trace_id": "0d581264-a7df-9854-900d-7b19ae1177c3" }
{ "account_age_days": 68, "account_id": "ACCT-3244868612B3", "baseline_risk_score": 0.396, "kyc_tier": "tier_3", "session_entropy": 0.632 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 1069, "timestamp": "2026-01-02T21:20:00Z", "transaction_amount_usd": 62694.85 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.602, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 480942.2, "financial_exposure_usd": 655077.7, "recoverable_pct": 0.202 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108419", "label": "benign", "label_confidence": 0.665, "severity": "critical", "timestamp": "2026-01-06T20:19:00Z", "trace_id": "2b5880fa-a740-a106-72b0-e1c543a3ff88" }
{ "account_age_days": 1955, "account_id": "ACCT-D16E5141CD53", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.177 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 504, "timestamp": "2026-01-06T20:19:00Z", "transaction_amount_usd": 5637.27 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.478, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 379.89, "financial_exposure_usd": 429.07, "recoverable_pct": 0.519 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101300", "label": "fraudulent", "label_confidence": 0.827, "severity": "critical", "timestamp": "2026-01-01T21:40:00Z", "trace_id": "8f669e7a-51fc-c5dc-e6ed-306985a7f513" }
{ "account_age_days": 1875, "account_id": "ACCT-63478F830931", "baseline_risk_score": 0.515, "kyc_tier": "tier_2", "session_entropy": 0.64 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 886, "timestamp": "2026-01-01T21:40:00Z", "transaction_amount_usd": 83457.59 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.741, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 181402.45, "financial_exposure_usd": 206197.76, "recoverable_pct": 0.289 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101175", "label": "fraudulent", "label_confidence": 0.817, "severity": "critical", "timestamp": "2026-01-01T19:35:00Z", "trace_id": "c416ac5b-fa48-ef41-e44a-442d3ee8178d" }
{ "account_age_days": 959, "account_id": "ACCT-F3A42514DBF0", "baseline_risk_score": 0.521, "kyc_tier": "tier_2", "session_entropy": 0.236 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 378, "timestamp": "2026-01-01T14:20:00Z", "transaction_amount_usd": 4.07 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.929, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 758900.27, "financial_exposure_usd": 854904.4, "recoverable_pct": 0.356 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103060", "label": "fraudulent", "label_confidence": 0.871, "severity": "high", "timestamp": "2026-01-03T03:00:00Z", "trace_id": "450975d9-03b4-532f-7710-c298f200aac8" }
{ "account_age_days": 279, "account_id": "ACCT-7556CE987BF7", "baseline_risk_score": 0.464, "kyc_tier": "tier_2", "session_entropy": 0.192 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 649, "timestamp": "2026-01-03T03:00:00Z", "transaction_amount_usd": 111540.43 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.38, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 436604.16, "financial_exposure_usd": 1003011.77, "recoverable_pct": 0.393 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106754", "label": "benign", "label_confidence": 0.638, "severity": "medium", "timestamp": "2026-01-05T16:34:00Z", "trace_id": "61848869-abd1-caed-913b-7262ffd4690a" }
{ "account_age_days": 1688, "account_id": "ACCT-5452760A36E4", "baseline_risk_score": 0.122, "kyc_tier": "tier_3", "session_entropy": 0.384 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 768, "timestamp": "2026-01-05T16:34:00Z", "transaction_amount_usd": 9100.72 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.465, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3063.65, "financial_exposure_usd": 3167.57, "recoverable_pct": 0.831 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100340", "label": "fraudulent", "label_confidence": 0.968, "severity": "critical", "timestamp": "2026-01-01T05:40:00Z", "trace_id": "016db752-ed6b-9872-dc2b-15378082efd4" }
{ "account_age_days": 1042, "account_id": "ACCT-75281C2C04EC", "baseline_risk_score": 0.38, "kyc_tier": "tier_3", "session_entropy": 0.225 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 783, "timestamp": "2026-01-01T05:40:00Z", "transaction_amount_usd": 114484.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.93, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 970678.54, "financial_exposure_usd": 1236609.48, "recoverable_pct": 0.397 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108342", "label": "benign", "label_confidence": 0.63, "severity": "high", "timestamp": "2026-01-06T19:02:00Z", "trace_id": "29d28c7e-f4dc-63dd-767b-d0a3aa6712a2" }
{ "account_age_days": 1396, "account_id": "ACCT-2096D92FCDC7", "baseline_risk_score": 0.196, "kyc_tier": "tier_2", "session_entropy": 0.29 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 212, "timestamp": "2026-01-06T12:44:00Z", "transaction_amount_usd": 8.31 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.549, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 319.96, "financial_exposure_usd": 553.63, "recoverable_pct": 0.642 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109694", "label": "benign", "label_confidence": 0.608, "severity": "low", "timestamp": "2026-01-07T17:34:00Z", "trace_id": "20f227bc-304b-85b3-030e-0410fcd082e5" }
{ "account_age_days": 1796, "account_id": "ACCT-8063B2EBB15D", "baseline_risk_score": 0.092, "kyc_tier": "tier_1", "session_entropy": 0.221 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 447, "timestamp": "2026-01-07T17:34:00Z", "transaction_amount_usd": 4466.28 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.641, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2606.71, "financial_exposure_usd": 4868.6, "recoverable_pct": 0.721 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103289", "label": "fraudulent", "label_confidence": 0.752, "severity": "high", "timestamp": "2026-01-03T06:49:00Z", "trace_id": "289762d8-09b8-e775-4dd4-be499c914648" }
{ "account_age_days": 265, "account_id": "ACCT-519DB2B02837", "baseline_risk_score": 0.604, "kyc_tier": "tier_3", "session_entropy": 0.734 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 214, "timestamp": "2026-01-02T19:10:00Z", "transaction_amount_usd": 5.79 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.653, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 427451.86, "financial_exposure_usd": 870370.43, "recoverable_pct": 0.098 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100831", "label": "fraudulent", "label_confidence": 0.831, "severity": "critical", "timestamp": "2026-01-01T13:51:00Z", "trace_id": "3923db19-3917-aff4-b097-06dc8accd5c0" }
{ "account_age_days": 761, "account_id": "ACCT-04D44A65A603", "baseline_risk_score": 0.389, "kyc_tier": "tier_2", "session_entropy": 0.528 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 508, "timestamp": "2026-01-01T13:51:00Z", "transaction_amount_usd": 92587.47 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.627, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 840129.28, "financial_exposure_usd": 867759.11, "recoverable_pct": 0.18 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102106", "label": "fraudulent", "label_confidence": 0.939, "severity": "medium", "timestamp": "2026-01-02T11:06:00Z", "trace_id": "c774ea29-f27c-cdce-b19f-7fd64ef42a83" }
{ "account_age_days": 1502, "account_id": "ACCT-8624DC8F1972", "baseline_risk_score": 0.443, "kyc_tier": "tier_1", "session_entropy": 0.161 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1019, "timestamp": "2026-01-02T11:06:00Z", "transaction_amount_usd": 73477.84 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.423, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 661081.8, "financial_exposure_usd": 1331610.76, "recoverable_pct": 0.799 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104493", "label": "fraudulent", "label_confidence": 0.726, "severity": "low", "timestamp": "2026-01-04T02:53:00Z", "trace_id": "039fc730-3f71-5f6d-f254-85e40416faf8" }
{ "account_age_days": 883, "account_id": "ACCT-FEAF6D9A4534", "baseline_risk_score": 0.424, "kyc_tier": "tier_3", "session_entropy": 0.717 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 372, "timestamp": "2026-01-04T02:53:00Z", "transaction_amount_usd": 1126977.59 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.874, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 6380759.41, "financial_exposure_usd": 6925372.19, "recoverable_pct": 0.648 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103398", "label": "fraudulent", "label_confidence": 0.762, "severity": "low", "timestamp": "2026-01-03T08:38:00Z", "trace_id": "e10755d1-edd2-1dd1-cc55-8cb896bae688" }
{ "account_age_days": 1112, "account_id": "ACCT-98D81ECCB5BB", "baseline_risk_score": 0.398, "kyc_tier": "tier_1", "session_entropy": 0.172 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 850, "timestamp": "2026-01-03T08:38:00Z", "transaction_amount_usd": 634957.14 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.81, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 948121.87, "financial_exposure_usd": 1687267.95, "recoverable_pct": 0.781 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109094", "label": "benign", "label_confidence": 0.718, "severity": "medium", "timestamp": "2026-01-07T07:34:00Z", "trace_id": "f0c40fc6-9b3a-c639-4907-a9c8c1ae5c18" }
{ "account_age_days": 1880, "account_id": "ACCT-F57047E8C641", "baseline_risk_score": 0.137, "kyc_tier": "tier_3", "session_entropy": 0.414 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1069, "timestamp": "2026-01-07T07:34:00Z", "transaction_amount_usd": 12929.59 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.47, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 1532.79, "financial_exposure_usd": 2529.26, "recoverable_pct": 0.652 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100096", "label": "fraudulent", "label_confidence": 0.831, "severity": "high", "timestamp": "2026-01-01T01:36:00Z", "trace_id": "27f31b78-51f9-cd77-ed85-0a6d75422851" }
{ "account_age_days": 1493, "account_id": "ACCT-8F9FDC15DFD2", "baseline_risk_score": 0.364, "kyc_tier": "tier_2", "session_entropy": 0.174 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1050, "timestamp": "2026-01-01T01:36:00Z", "transaction_amount_usd": 65764.4 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.832, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 609017.56, "financial_exposure_usd": 1222253.84, "recoverable_pct": 0.619 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104964", "label": "fraudulent", "label_confidence": 0.876, "severity": "medium", "timestamp": "2026-01-04T10:44:00Z", "trace_id": "81db9c2e-01f5-65de-9e66-c83f05a748e0" }
{ "account_age_days": 1681, "account_id": "ACCT-89AD14C99343", "baseline_risk_score": 0.197, "kyc_tier": "tier_2", "session_entropy": 0.274 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 765, "timestamp": "2026-01-04T10:44:00Z", "transaction_amount_usd": 2442242.42 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.733, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3498025.29, "financial_exposure_usd": 6681404.61, "recoverable_pct": 0.658 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105894", "label": "fraudulent", "label_confidence": 0.87, "severity": "high", "timestamp": "2026-01-05T02:14:00Z", "trace_id": "cd5ec12b-2f8d-7576-d18c-258bbe0333e6" }
{ "account_age_days": 606, "account_id": "ACCT-2FDFA28B3BDD", "baseline_risk_score": 0.155, "kyc_tier": "tier_2", "session_entropy": 0.667 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 581, "timestamp": "2026-01-05T02:14:00Z", "transaction_amount_usd": 1910070.58 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.783, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2150251.85, "financial_exposure_usd": 3250828.78, "recoverable_pct": 0.686 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101966", "label": "fraudulent", "label_confidence": 0.884, "severity": "medium", "timestamp": "2026-01-02T08:46:00Z", "trace_id": "1222cd8f-ffa8-d3a2-9c88-9910b69fb70e" }
{ "account_age_days": 987, "account_id": "ACCT-AB400BF0F784", "baseline_risk_score": 0.477, "kyc_tier": "tier_3", "session_entropy": 0.267 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 487, "timestamp": "2026-01-02T08:46:00Z", "transaction_amount_usd": 87697.77 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.714, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 682232.96, "financial_exposure_usd": 898228.89, "recoverable_pct": 0.175 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107027", "label": "benign", "label_confidence": 0.599, "severity": "medium", "timestamp": "2026-01-05T21:07:00Z", "trace_id": "57e57b2e-b799-7eb2-773a-cdefe5950903" }
{ "account_age_days": 1250, "account_id": "ACCT-545151941E16", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.869 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 791, "timestamp": "2026-01-05T21:07:00Z", "transaction_amount_usd": 4812.44 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.593, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2462.49, "financial_exposure_usd": 3674.01, "recoverable_pct": 0.652 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102166", "label": "fraudulent", "label_confidence": 0.845, "severity": "high", "timestamp": "2026-01-02T12:06:00Z", "trace_id": "8cb8f5e7-a67f-0b39-ee62-a85df550b9ef" }
{ "account_age_days": 1906, "account_id": "ACCT-743A6F09DD7D", "baseline_risk_score": 0.458, "kyc_tier": "tier_1", "session_entropy": 0.837 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 430, "timestamp": "2026-01-02T12:06:00Z", "transaction_amount_usd": 43449.3 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.598, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 365342.05, "financial_exposure_usd": 563552.74, "recoverable_pct": 0.801 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104479", "label": "fraudulent", "label_confidence": 0.797, "severity": "high", "timestamp": "2026-01-04T02:39:00Z", "trace_id": "378a35c3-3e57-fb00-0015-d52d4d399d41" }
{ "account_age_days": 1578, "account_id": "ACCT-41055882BDEB", "baseline_risk_score": 0.195, "kyc_tier": "tier_3", "session_entropy": 0.778 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 365, "timestamp": "2026-01-03T21:38:00Z", "transaction_amount_usd": 14.21 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.542, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3530402.09, "financial_exposure_usd": 4301522.81, "recoverable_pct": 0.466 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103030", "label": "fraudulent", "label_confidence": 0.763, "severity": "low", "timestamp": "2026-01-03T02:30:00Z", "trace_id": "611681c9-d12b-bf94-09e0-f40d38033617" }
{ "account_age_days": 494, "account_id": "ACCT-DED16110C957", "baseline_risk_score": 0.312, "kyc_tier": "tier_3", "session_entropy": 0.172 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 873, "timestamp": "2026-01-03T02:30:00Z", "transaction_amount_usd": 83958.98 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.7, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ...
{ "customer_funds_at_risk_usd": 155254.06, "financial_exposure_usd": 188860.49, "recoverable_pct": 0.838 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108308", "label": "benign", "label_confidence": 0.5, "severity": "medium", "timestamp": "2026-01-06T18:28:00Z", "trace_id": "0a416851-9169-f672-8459-9aaeb1b4344e" }
{ "account_age_days": 906, "account_id": "ACCT-9D9B36B8EF7C", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.325 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 274, "timestamp": "2026-01-06T07:28:00Z", "transaction_amount_usd": 18.14 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.788, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1102.96, "financial_exposure_usd": 2236.37, "recoverable_pct": 0.606 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104866", "label": "fraudulent", "label_confidence": 0.874, "severity": "low", "timestamp": "2026-01-04T09:06:00Z", "trace_id": "0e857468-100c-6668-a783-8e3ee12bbdf9" }
{ "account_age_days": 1959, "account_id": "ACCT-A0887C8F2ADD", "baseline_risk_score": 0.132, "kyc_tier": "tier_1", "session_entropy": 0.175 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 696, "timestamp": "2026-01-04T09:06:00Z", "transaction_amount_usd": 2583320.68 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.932, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3955909.79, "financial_exposure_usd": 6060588.83, "recoverable_pct": 0.721 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109481", "label": "benign", "label_confidence": 0.605, "severity": "medium", "timestamp": "2026-01-07T14:01:00Z", "trace_id": "5e2ede75-b073-2f8d-3e27-4075201330e4" }
{ "account_age_days": 870, "account_id": "ACCT-EAFDAE1C8A22", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.48 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 528, "timestamp": "2026-01-07T14:01:00Z", "transaction_amount_usd": 7014.95 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.506, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1956.12, "financial_exposure_usd": 2089.58, "recoverable_pct": 0.429 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103499", "label": "fraudulent", "label_confidence": 0.64, "severity": "high", "timestamp": "2026-01-03T10:19:00Z", "trace_id": "3ac27ae8-3657-271e-63e8-feb10d33d521" }
{ "account_age_days": 1703, "account_id": "ACCT-3CB6EB0A06CF", "baseline_risk_score": 0.147, "kyc_tier": "tier_3", "session_entropy": 0.929 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 325, "timestamp": "2026-01-03T02:10:00Z", "transaction_amount_usd": 23.01 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.614, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3355763.21, "financial_exposure_usd": 5490289.44, "recoverable_pct": 0.98 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103137", "label": "fraudulent", "label_confidence": 0.948, "severity": "low", "timestamp": "2026-01-03T04:17:00Z", "trace_id": "32634e42-304d-7cee-d45d-55cc3ca2fd73" }
{ "account_age_days": 601, "account_id": "ACCT-39A2B5FB971C", "baseline_risk_score": 0.426, "kyc_tier": "tier_3", "session_entropy": 0.114 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 781, "timestamp": "2026-01-03T04:17:00Z", "transaction_amount_usd": 103670.96 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.624, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 42196.81, "financial_exposure_usd": 103684.88, "recoverable_pct": 0.132 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103197", "label": "fraudulent", "label_confidence": 0.865, "severity": "low", "timestamp": "2026-01-03T05:17:00Z", "trace_id": "12cdc6c4-c08b-074c-20fd-015dfb973ed4" }
{ "account_age_days": 306, "account_id": "ACCT-5E4199332717", "baseline_risk_score": 0.329, "kyc_tier": "tier_1", "session_entropy": 0.31 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 951, "timestamp": "2026-01-03T05:17:00Z", "transaction_amount_usd": 6920.8 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.879, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 194524.74, "financial_exposure_usd": 274172.94, "recoverable_pct": 0.502 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100672", "label": "fraudulent", "label_confidence": 0.872, "severity": "low", "timestamp": "2026-01-01T11:12:00Z", "trace_id": "e3a8be79-c364-20ef-f5a6-5283eacabeff" }
{ "account_age_days": 90, "account_id": "ACCT-C5788B389ACF", "baseline_risk_score": 0.39, "kyc_tier": "tier_2", "session_entropy": 0.95 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 149, "timestamp": "2026-01-01T01:27:00Z", "transaction_amount_usd": 8.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.359, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 894700.34, "financial_exposure_usd": 1290324.48, "recoverable_pct": 0.756 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108350", "label": "benign", "label_confidence": 0.678, "severity": "medium", "timestamp": "2026-01-06T19:10:00Z", "trace_id": "8756f735-e4fc-efa0-8763-a332d1cf69a2" }
{ "account_age_days": 42, "account_id": "ACCT-AD4628850681", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.563 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 522, "timestamp": "2026-01-06T19:10:00Z", "transaction_amount_usd": 2093.38 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.508, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 951.04, "financial_exposure_usd": 2052.53, "recoverable_pct": 0.71 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106039", "label": "fraudulent", "label_confidence": 0.944, "severity": "medium", "timestamp": "2026-01-05T04:39:00Z", "trace_id": "4fd549ab-40c5-d7d5-272a-a0c0c3be6154" }
{ "account_age_days": 847, "account_id": "ACCT-531155CC3F53", "baseline_risk_score": 0.175, "kyc_tier": "tier_2", "session_entropy": 0.496 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 384, "timestamp": "2026-01-05T04:39:00Z", "transaction_amount_usd": 525315.15 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.579, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2353311.16, "financial_exposure_usd": 4896980.78, "recoverable_pct": 0.699 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108170", "label": "benign", "label_confidence": 0.504, "severity": "critical", "timestamp": "2026-01-06T16:10:00Z", "trace_id": "d89e9a0c-3b4c-8043-9031-7a1f32d1db85" }
{ "account_age_days": 757, "account_id": "ACCT-0716F2C53816", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.889 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 793, "timestamp": "2026-01-06T16:10:00Z", "transaction_amount_usd": 2647.29 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.636, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3717.14, "financial_exposure_usd": 5474.61, "recoverable_pct": 0.534 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108023", "label": "benign", "label_confidence": 0.616, "severity": "medium", "timestamp": "2026-01-06T13:43:00Z", "trace_id": "78b5ab1c-473d-a49c-88ba-68ebe79f8c05" }
{ "account_age_days": 225, "account_id": "ACCT-962877C86088", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.595 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 186, "timestamp": "2026-01-06T13:43:00Z", "transaction_amount_usd": 4435.45 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.584, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 390.74, "financial_exposure_usd": 578.73, "recoverable_pct": 0.599 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100513", "label": "fraudulent", "label_confidence": 0.86, "severity": "critical", "timestamp": "2026-01-01T08:33:00Z", "trace_id": "2559506f-ca69-6526-c810-88d8939806fa" }
{ "account_age_days": 543, "account_id": "ACCT-41650E8AA39F", "baseline_risk_score": 0.505, "kyc_tier": "tier_1", "session_entropy": 0.9 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 1084, "timestamp": "2026-01-01T08:33:00Z", "transaction_amount_usd": 78166.21 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.899, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 144704.56, "financial_exposure_usd": 212758.5, "recoverable_pct": 0.312 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108556", "label": "benign", "label_confidence": 0.686, "severity": "medium", "timestamp": "2026-01-06T22:36:00Z", "trace_id": "d93733a8-0705-f92f-7b3a-e75ca607db23" }
{ "account_age_days": 1122, "account_id": "ACCT-722C4B2373FF", "baseline_risk_score": 0.19, "kyc_tier": "tier_3", "session_entropy": 0.495 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 102, "timestamp": "2026-01-06T12:09:00Z", "transaction_amount_usd": 11.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.726, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1553.13, "financial_exposure_usd": 1658.56, "recoverable_pct": 0.759 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104082", "label": "fraudulent", "label_confidence": 0.901, "severity": "medium", "timestamp": "2026-01-03T20:02:00Z", "trace_id": "93f5c7e8-f6fd-6a89-b8d1-46ab463485c1" }
{ "account_age_days": 1036, "account_id": "ACCT-983F8AE90678", "baseline_risk_score": 0.066, "kyc_tier": "tier_2", "session_entropy": 0.459 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 485, "timestamp": "2026-01-03T20:02:00Z", "transaction_amount_usd": 1183028.65 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.615, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3910815.57, "financial_exposure_usd": 6319618.05, "recoverable_pct": 0.814 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107996", "label": "benign", "label_confidence": 0.561, "severity": "medium", "timestamp": "2026-01-06T13:16:00Z", "trace_id": "2c16322e-58d1-284c-7b8d-7e081eae816b" }
{ "account_age_days": 1699, "account_id": "ACCT-8195037A382C", "baseline_risk_score": 0.071, "kyc_tier": "tier_3", "session_entropy": 0.458 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 999, "timestamp": "2026-01-06T13:16:00Z", "transaction_amount_usd": 539.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.759, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1418, "financial_exposure_usd": 1745.11, "recoverable_pct": 0.651 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107112", "label": "benign", "label_confidence": 0.5, "severity": "low", "timestamp": "2026-01-05T22:32:00Z", "trace_id": "54deaf4e-c247-c8a9-7cd0-9c9124f2a5c5" }
{ "account_age_days": 1083, "account_id": "ACCT-90751342DE7E", "baseline_risk_score": 0.073, "kyc_tier": "tier_1", "session_entropy": 0.419 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 215, "timestamp": "2026-01-05T16:08:00Z", "transaction_amount_usd": 10.59 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.762, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 0, "financial_exposure_usd": 0, "recoverable_pct": 0.594 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100637", "label": "fraudulent", "label_confidence": 0.956, "severity": "low", "timestamp": "2026-01-01T10:37:00Z", "trace_id": "4e23b921-a239-5979-a796-1377d786cfdd" }
{ "account_age_days": 1221, "account_id": "ACCT-91186AF41A2F", "baseline_risk_score": 0.281, "kyc_tier": "tier_2", "session_entropy": 0.159 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 1024, "timestamp": "2026-01-01T10:37:00Z", "transaction_amount_usd": 61567.68 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.822, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 425880.65, "financial_exposure_usd": 632025.56, "recoverable_pct": 0.84 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106690", "label": "benign", "label_confidence": 0.637, "severity": "low", "timestamp": "2026-01-05T15:30:00Z", "trace_id": "8f109534-3909-719a-b0e2-f0154cde80c1" }
{ "account_age_days": 539, "account_id": "ACCT-8A082B217249", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.817 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 729, "timestamp": "2026-01-05T15:30:00Z", "transaction_amount_usd": 9409.98 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.779, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2161.74, "financial_exposure_usd": 3283.19, "recoverable_pct": 0.766 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105640", "label": "fraudulent", "label_confidence": 0.631, "severity": "medium", "timestamp": "2026-01-04T22:00:00Z", "trace_id": "4802694d-9e4c-b524-9b7d-df33cb2f6ef0" }
{ "account_age_days": 1758, "account_id": "ACCT-01569C3FA0A5", "baseline_risk_score": 0.25, "kyc_tier": "tier_2", "session_entropy": 0.622 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 89, "timestamp": "2026-01-04T21:04:00Z", "transaction_amount_usd": 18.29 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.781, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1468818.87, "financial_exposure_usd": 3255010.97, "recoverable_pct": 0.421 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103107", "label": "fraudulent", "label_confidence": 0.938, "severity": "low", "timestamp": "2026-01-03T03:47:00Z", "trace_id": "b44f23f0-bb7d-d4ad-f7ed-9c0b97a6ff2f" }
{ "account_age_days": 1179, "account_id": "ACCT-ED154F425ABB", "baseline_risk_score": 0.316, "kyc_tier": "tier_3", "session_entropy": 0.737 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 145, "timestamp": "2026-01-03T03:47:00Z", "transaction_amount_usd": 30074.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.87, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 596694.86, "financial_exposure_usd": 666853.71, "recoverable_pct": 0.096 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109469", "label": "benign", "label_confidence": 0.651, "severity": "high", "timestamp": "2026-01-07T13:49:00Z", "trace_id": "990bb3b6-848c-5fa0-11f4-4e5a9f2289f4" }
{ "account_age_days": 1498, "account_id": "ACCT-5913EB6FAF4F", "baseline_risk_score": 0.086, "kyc_tier": "tier_3", "session_entropy": 0.291 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 930, "timestamp": "2026-01-07T13:49:00Z", "transaction_amount_usd": 14928.69 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.681, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 5238.75, "financial_exposure_usd": 5440.82, "recoverable_pct": 0.618 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103535", "label": "fraudulent", "label_confidence": 0.647, "severity": "low", "timestamp": "2026-01-03T10:55:00Z", "trace_id": "e0673d16-fc80-9e92-87b8-5ce3d1b88b0a" }
{ "account_age_days": 1169, "account_id": "ACCT-0872B4EEA7E6", "baseline_risk_score": 0.098, "kyc_tier": "tier_3", "session_entropy": 0.877 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 1064, "timestamp": "2026-01-03T10:55:00Z", "transaction_amount_usd": 2463530.84 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.757, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5589360.36, "financial_exposure_usd": 7155134.68, "recoverable_pct": 0.615 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108055", "label": "benign", "label_confidence": 0.655, "severity": "high", "timestamp": "2026-01-06T14:15:00Z", "trace_id": "f3d27cfd-6591-1b66-549a-8bafdbf84a15" }
{ "account_age_days": 1976, "account_id": "ACCT-03E1288DB6C9", "baseline_risk_score": 0.135, "kyc_tier": "tier_3", "session_entropy": 0.224 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 312, "timestamp": "2026-01-06T04:09:00Z", "transaction_amount_usd": 18.86 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.777, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1173.06, "financial_exposure_usd": 2457, "recoverable_pct": 0.556 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100842", "label": "fraudulent", "label_confidence": 0.93, "severity": "high", "timestamp": "2026-01-01T14:02:00Z", "trace_id": "28a1b392-4090-3884-235f-1935f53fa0dd" }
{ "account_age_days": 879, "account_id": "ACCT-7351FDB2AB36", "baseline_risk_score": 0.537, "kyc_tier": "tier_2", "session_entropy": 0.123 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 208, "timestamp": "2026-01-01T05:54:00Z", "transaction_amount_usd": 1.96 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.558, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 354940.58, "financial_exposure_usd": 768072.14, "recoverable_pct": 0.364 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102575", "label": "fraudulent", "label_confidence": 0.95, "severity": "critical", "timestamp": "2026-01-02T18:55:00Z", "trace_id": "f7dd0c82-b7e4-a0e9-d96f-eab6401774b5" }
{ "account_age_days": 673, "account_id": "ACCT-E25769FFB742", "baseline_risk_score": 0.607, "kyc_tier": "tier_3", "session_entropy": 0.471 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 241, "timestamp": "2026-01-02T07:29:00Z", "transaction_amount_usd": 5.31 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.651, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 658045.66, "financial_exposure_usd": 998629.99, "recoverable_pct": 0.031 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102724", "label": "fraudulent", "label_confidence": 0.976, "severity": "high", "timestamp": "2026-01-02T21:24:00Z", "trace_id": "d05e2af3-04cf-5d8b-a325-da8dd7de79ff" }
{ "account_age_days": 146, "account_id": "ACCT-4AB9055FFF5E", "baseline_risk_score": 0.33, "kyc_tier": "tier_1", "session_entropy": 0.433 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 1048, "timestamp": "2026-01-02T21:24:00Z", "transaction_amount_usd": 58681.96 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.68, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 708521.23, "financial_exposure_usd": 1196910.93, "recoverable_pct": 0.341 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100965", "label": "fraudulent", "label_confidence": 0.957, "severity": "high", "timestamp": "2026-01-01T16:05:00Z", "trace_id": "1d43a586-504d-b123-8b36-5373f079b5d3" }
{ "account_age_days": 1301, "account_id": "ACCT-01F0BD18C8E8", "baseline_risk_score": 0.403, "kyc_tier": "tier_2", "session_entropy": 0.25 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1093, "timestamp": "2026-01-01T16:05:00Z", "transaction_amount_usd": 75279.21 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.922, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 539158.77, "financial_exposure_usd": 596754.59, "recoverable_pct": 0.178 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108250", "label": "benign", "label_confidence": 0.483, "severity": "medium", "timestamp": "2026-01-06T17:30:00Z", "trace_id": "f9476eb9-571b-3649-c9e3-4a977e178032" }
{ "account_age_days": 889, "account_id": "ACCT-630BCA420DCE", "baseline_risk_score": 0.059, "kyc_tier": "tier_1", "session_entropy": 0.508 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 399, "timestamp": "2026-01-06T16:06:00Z", "transaction_amount_usd": 14 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.479, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2301.24, "financial_exposure_usd": 3102.76, "recoverable_pct": 0.56 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108192", "label": "benign", "label_confidence": 0.728, "severity": "low", "timestamp": "2026-01-06T16:32:00Z", "trace_id": "86557914-0c11-9033-a653-a534a21ddc9a" }
{ "account_age_days": 691, "account_id": "ACCT-8B3499A938BD", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.667 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 589, "timestamp": "2026-01-06T16:32:00Z", "transaction_amount_usd": 3172.47 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.718, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4429.52, "financial_exposure_usd": 5939.74, "recoverable_pct": 0.749 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108498", "label": "benign", "label_confidence": 0.61, "severity": "medium", "timestamp": "2026-01-06T21:38:00Z", "trace_id": "54e7dbc3-ef07-6977-d6a2-c9b6d5a6969d" }
{ "account_age_days": 982, "account_id": "ACCT-2645A728B7EE", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.197 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 152, "timestamp": "2026-01-06T10:54:00Z", "transaction_amount_usd": 16.69 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.54, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 5810.71, "financial_exposure_usd": 6070.94, "recoverable_pct": 0.93 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101431", "label": "fraudulent", "label_confidence": 0.883, "severity": "critical", "timestamp": "2026-01-01T23:51:00Z", "trace_id": "15186e2b-a13c-ed9d-4d1a-80af1c71bd90" }
{ "account_age_days": 1664, "account_id": "ACCT-5BAD287F59BB", "baseline_risk_score": 0.27, "kyc_tier": "tier_3", "session_entropy": 0.707 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 897, "timestamp": "2026-01-01T23:51:00Z", "transaction_amount_usd": 76264.45 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.828, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 276771.12, "financial_exposure_usd": 430372.94, "recoverable_pct": 0.84 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107644", "label": "benign", "label_confidence": 0.691, "severity": "medium", "timestamp": "2026-01-06T07:24:00Z", "trace_id": "6b028b8e-41a8-edbd-eb49-8dafe69d25b9" }
{ "account_age_days": 1737, "account_id": "ACCT-54AE698AEF15", "baseline_risk_score": 0.11, "kyc_tier": "tier_2", "session_entropy": 0.392 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 531, "timestamp": "2026-01-06T07:24:00Z", "transaction_amount_usd": 6515.67 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.706, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3071.54, "financial_exposure_usd": 4112.25, "recoverable_pct": 0.438 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108537", "label": "benign", "label_confidence": 0.694, "severity": "high", "timestamp": "2026-01-06T22:17:00Z", "trace_id": "41870d40-5b91-b3c5-61ec-49903dd318ab" }
{ "account_age_days": 36, "account_id": "ACCT-00DBF5849874", "baseline_risk_score": 0.155, "kyc_tier": "tier_3", "session_entropy": 0.941 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 1182, "timestamp": "2026-01-06T22:17:00Z", "transaction_amount_usd": 1106.75 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.705, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 585.86, "financial_exposure_usd": 658.13, "recoverable_pct": 0.814 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108971", "label": "benign", "label_confidence": 0.734, "severity": "low", "timestamp": "2026-01-07T05:31:00Z", "trace_id": "0519588b-a900-107f-3037-8614b7f35622" }
{ "account_age_days": 1107, "account_id": "ACCT-D0D8E7942924", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.306 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 350, "timestamp": "2026-01-07T05:31:00Z", "transaction_amount_usd": 11185.3 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.49, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 920.51, "financial_exposure_usd": 1691.62, "recoverable_pct": 0.818 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104873", "label": "fraudulent", "label_confidence": 0.797, "severity": "medium", "timestamp": "2026-01-04T09:13:00Z", "trace_id": "13ca97c3-a4f3-6eba-38f3-64676121675e" }
{ "account_age_days": 1514, "account_id": "ACCT-3CC87C4C2E38", "baseline_risk_score": 0.124, "kyc_tier": "tier_2", "session_entropy": 0.806 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 88, "timestamp": "2026-01-04T01:55:00Z", "transaction_amount_usd": 2.06 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED",...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.792, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3206014.39, "financial_exposure_usd": 5362618.81, "recoverable_pct": 0.986 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106226", "label": "fraudulent", "label_confidence": 0.853, "severity": "medium", "timestamp": "2026-01-05T07:46:00Z", "trace_id": "ce589ee8-8493-6d57-1e82-ecbb0705c46d" }
{ "account_age_days": 391, "account_id": "ACCT-CA49FEEDDBEE", "baseline_risk_score": 0.356, "kyc_tier": "tier_1", "session_entropy": 0.929 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 340, "timestamp": "2026-01-05T07:46:00Z", "transaction_amount_usd": 456848.45 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.581, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2644350.39, "financial_exposure_usd": 2966261.61, "recoverable_pct": 0.878 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109099", "label": "benign", "label_confidence": 0.721, "severity": "medium", "timestamp": "2026-01-07T07:39:00Z", "trace_id": "bfcfdedd-28ed-7277-532b-c37159184df5" }
{ "account_age_days": 1287, "account_id": "ACCT-E122D7969176", "baseline_risk_score": 0.107, "kyc_tier": "tier_3", "session_entropy": 0.606 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 153, "timestamp": "2026-01-07T07:39:00Z", "transaction_amount_usd": 1074.4 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.731, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1688.09, "financial_exposure_usd": 2470.63, "recoverable_pct": 0.476 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107676", "label": "benign", "label_confidence": 0.716, "severity": "low", "timestamp": "2026-01-06T07:56:00Z", "trace_id": "e3673c92-d91e-57a9-ca4e-fa7121c18f9a" }
{ "account_age_days": 437, "account_id": "ACCT-DF1361F4197A", "baseline_risk_score": 0.054, "kyc_tier": "tier_1", "session_entropy": 0.255 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 280, "timestamp": "2026-01-06T06:39:00Z", "transaction_amount_usd": 20.88 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.709, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2773.24, "financial_exposure_usd": 4454.2, "recoverable_pct": 0.73 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100190", "label": "fraudulent", "label_confidence": 0.882, "severity": "critical", "timestamp": "2026-01-01T03:10:00Z", "trace_id": "a3beb445-0e5d-8626-19f7-f7750f2f633b" }
{ "account_age_days": 1998, "account_id": "ACCT-135769CBBC03", "baseline_risk_score": 0.447, "kyc_tier": "tier_3", "session_entropy": 0.581 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 117, "timestamp": "2025-12-31T20:38:00Z", "transaction_amount_usd": 2.78 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.669, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 385365.49, "financial_exposure_usd": 517717.24, "recoverable_pct": 0.398 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107899", "label": "benign", "label_confidence": 0.639, "severity": "low", "timestamp": "2026-01-06T11:39:00Z", "trace_id": "137cc0a7-6b94-fde2-f5c8-e18badd06368" }
{ "account_age_days": 690, "account_id": "ACCT-8017BF55CB72", "baseline_risk_score": 0.063, "kyc_tier": "tier_2", "session_entropy": 0.176 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 664, "timestamp": "2026-01-06T11:39:00Z", "transaction_amount_usd": 8962.25 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.495, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 885.16, "financial_exposure_usd": 2030.27, "recoverable_pct": 0.468 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101618", "label": "fraudulent", "label_confidence": 0.861, "severity": "high", "timestamp": "2026-01-02T02:58:00Z", "trace_id": "574cc14f-efb8-7fca-a6ed-c821e1184210" }
{ "account_age_days": 1187, "account_id": "ACCT-709267C7A84F", "baseline_risk_score": 0.443, "kyc_tier": "tier_2", "session_entropy": 0.142 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 136, "timestamp": "2026-01-01T18:58:00Z", "transaction_amount_usd": 0.07 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.833, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 200859.71, "financial_exposure_usd": 440983, "recoverable_pct": 0.492 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108970", "label": "benign", "label_confidence": 0.674, "severity": "medium", "timestamp": "2026-01-07T05:30:00Z", "trace_id": "881028d5-050b-f405-9fd4-8b1e456916b0" }
{ "account_age_days": 856, "account_id": "ACCT-1182B762D75C", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.461 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 271, "timestamp": "2026-01-06T19:26:00Z", "transaction_amount_usd": 3.52 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.796, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1656.25, "financial_exposure_usd": 4049.22, "recoverable_pct": 0.409 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109071", "label": "benign", "label_confidence": 0.636, "severity": "low", "timestamp": "2026-01-07T07:11:00Z", "trace_id": "fc18d39e-6f0e-7c36-b423-633945c6bd10" }
{ "account_age_days": 591, "account_id": "ACCT-074F10FE7C5F", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.397 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 324, "timestamp": "2026-01-07T07:11:00Z", "transaction_amount_usd": 4527.95 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.694, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 527.17, "financial_exposure_usd": 986.9, "recoverable_pct": 0.833 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106204", "label": "fraudulent", "label_confidence": 0.779, "severity": "high", "timestamp": "2026-01-05T07:24:00Z", "trace_id": "7543e34c-deaf-dc79-169c-1f2974acf25d" }
{ "account_age_days": 69, "account_id": "ACCT-42B8B1F6904C", "baseline_risk_score": 0.239, "kyc_tier": "tier_2", "session_entropy": 0.941 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 212, "timestamp": "2026-01-05T05:13:00Z", "transaction_amount_usd": 7.88 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.638, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3206464.28, "financial_exposure_usd": 5674472.19, "recoverable_pct": 0.471 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109523", "label": "benign", "label_confidence": 0.534, "severity": "high", "timestamp": "2026-01-07T14:43:00Z", "trace_id": "807c1247-116d-d6bd-ad4e-903338ac4f75" }
{ "account_age_days": 50, "account_id": "ACCT-D51F126A3A3E", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.498 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 915, "timestamp": "2026-01-07T14:43:00Z", "transaction_amount_usd": 10697.11 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.71, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 3699.28, "financial_exposure_usd": 6291.22, "recoverable_pct": 0.916 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103765", "label": "fraudulent", "label_confidence": 0.824, "severity": "medium", "timestamp": "2026-01-03T14:45:00Z", "trace_id": "c20095a1-0ddf-5b4c-6664-5b866075ef90" }
{ "account_age_days": 375, "account_id": "ACCT-653DFDF1BEC4", "baseline_risk_score": 0.146, "kyc_tier": "tier_1", "session_entropy": 0.133 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 164, "timestamp": "2026-01-03T08:28:00Z", "transaction_amount_usd": 8.01 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.858, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3223835.03, "financial_exposure_usd": 6010296.45, "recoverable_pct": 0.727 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108512", "label": "benign", "label_confidence": 0.538, "severity": "low", "timestamp": "2026-01-06T21:52:00Z", "trace_id": "69b78e89-d0a6-e747-becd-8a1b257356f4" }
{ "account_age_days": 668, "account_id": "ACCT-46040A94106E", "baseline_risk_score": 0.165, "kyc_tier": "tier_3", "session_entropy": 0.208 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1132, "timestamp": "2026-01-06T21:52:00Z", "transaction_amount_usd": 12409.98 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.555, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 946.34, "financial_exposure_usd": 1033.69, "recoverable_pct": 0.807 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101388", "label": "fraudulent", "label_confidence": 0.827, "severity": "medium", "timestamp": "2026-01-01T23:08:00Z", "trace_id": "85b3bcb6-3d11-58d7-aa9b-6bb1d3aa7f3e" }
{ "account_age_days": 1314, "account_id": "ACCT-8EB1EFE4E25C", "baseline_risk_score": 0.465, "kyc_tier": "tier_3", "session_entropy": 0.631 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 1091, "timestamp": "2026-01-01T23:08:00Z", "transaction_amount_usd": 26638.52 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.383, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 493071.12, "financial_exposure_usd": 696763.26, "recoverable_pct": 0.296 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107017", "label": "benign", "label_confidence": 0.541, "severity": "medium", "timestamp": "2026-01-05T20:57:00Z", "trace_id": "5ba7fb60-e1c9-0a1c-9c0f-7a99b12362f7" }
{ "account_age_days": 456, "account_id": "ACCT-4CEA778FFAEE", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.569 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 213, "timestamp": "2026-01-05T17:31:00Z", "transaction_amount_usd": 3.94 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.788, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2353.15, "financial_exposure_usd": 4342.51, "recoverable_pct": 0.886 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108588", "label": "benign", "label_confidence": 0.626, "severity": "medium", "timestamp": "2026-01-06T23:08:00Z", "trace_id": "44937dac-a4f5-b5f4-ec79-e5d0865175e3" }
{ "account_age_days": 1599, "account_id": "ACCT-D889E337FFBB", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.397 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1077, "timestamp": "2026-01-06T23:08:00Z", "transaction_amount_usd": 1456.26 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.673, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2524.57, "financial_exposure_usd": 5843.56, "recoverable_pct": 0.494 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106612", "label": "fraudulent", "label_confidence": 0.739, "severity": "low", "timestamp": "2026-01-05T14:12:00Z", "trace_id": "1625a345-d257-996f-bc6a-ae71366c62f7" }
{ "account_age_days": 1133, "account_id": "ACCT-FBB08D9E2A97", "baseline_risk_score": 0.423, "kyc_tier": "tier_3", "session_entropy": 0.503 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 405, "timestamp": "2026-01-05T14:12:00Z", "transaction_amount_usd": 2012472.31 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.874, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2620250.48, "financial_exposure_usd": 2824148.17, "recoverable_pct": 0.928 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106726", "label": "benign", "label_confidence": 0.517, "severity": "low", "timestamp": "2026-01-05T16:06:00Z", "trace_id": "be6d1c02-10b3-b2c0-09be-8debbb6745e0" }
{ "account_age_days": 1994, "account_id": "ACCT-6C43594DFBCA", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.949 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 800, "timestamp": "2026-01-05T16:06:00Z", "transaction_amount_usd": 6812.28 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.734, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 997.29, "financial_exposure_usd": 1177.18, "recoverable_pct": 0.77 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106224", "label": "fraudulent", "label_confidence": 0.885, "severity": "low", "timestamp": "2026-01-05T07:44:00Z", "trace_id": "3a9aaa5a-2fae-e895-6667-07e5f4668f19" }
{ "account_age_days": 1928, "account_id": "ACCT-862B4EF5C603", "baseline_risk_score": 0.121, "kyc_tier": "tier_1", "session_entropy": 0.42 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 207, "timestamp": "2026-01-05T07:44:00Z", "transaction_amount_usd": 2904978.72 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.865, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3104147.44, "financial_exposure_usd": 4586171.13, "recoverable_pct": 0.824 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105680", "label": "fraudulent", "label_confidence": 0.778, "severity": "medium", "timestamp": "2026-01-04T22:40:00Z", "trace_id": "40d4b78e-af95-e3c7-fc41-74305e6dbef5" }
{ "account_age_days": 657, "account_id": "ACCT-60D512E41B88", "baseline_risk_score": 0.259, "kyc_tier": "tier_3", "session_entropy": 0.585 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 220, "timestamp": "2026-01-04T22:40:00Z", "transaction_amount_usd": 2990740.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.779, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2849318.11, "financial_exposure_usd": 4751962.93, "recoverable_pct": 0.429 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101025", "label": "fraudulent", "label_confidence": 0.796, "severity": "medium", "timestamp": "2026-01-01T17:05:00Z", "trace_id": "c0a62a72-f9a7-7656-9d51-2836691c5f38" }
{ "account_age_days": 39, "account_id": "ACCT-76B0BF1A7C5E", "baseline_risk_score": 0.357, "kyc_tier": "tier_3", "session_entropy": 0.58 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1038, "timestamp": "2026-01-01T17:05:00Z", "transaction_amount_usd": 65600.8 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.732, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 818219.94, "financial_exposure_usd": 864302.76, "recoverable_pct": 0.714 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103984", "label": "fraudulent", "label_confidence": 0.86, "severity": "high", "timestamp": "2026-01-03T18:24:00Z", "trace_id": "dcc6a439-b1fa-c62c-dc44-17e23a122639" }
{ "account_age_days": 1063, "account_id": "ACCT-133D233DD8A2", "baseline_risk_score": 0.27, "kyc_tier": "tier_3", "session_entropy": 0.453 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 348, "timestamp": "2026-01-03T18:24:00Z", "transaction_amount_usd": 405894.18 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.673, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1511624, "financial_exposure_usd": 3466343.97, "recoverable_pct": 0.504 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100051", "label": "fraudulent", "label_confidence": 0.918, "severity": "critical", "timestamp": "2026-01-01T00:51:00Z", "trace_id": "65b90e94-8e6d-e263-635a-775d16476e3f" }
{ "account_age_days": 1873, "account_id": "ACCT-301C8DB316DB", "baseline_risk_score": 0.378, "kyc_tier": "tier_2", "session_entropy": 0.475 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1150, "timestamp": "2026-01-01T00:51:00Z", "transaction_amount_usd": 33506 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.806, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 949459.55, "financial_exposure_usd": 1063688.61, "recoverable_pct": 0.438 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105343", "label": "fraudulent", "label_confidence": 0.754, "severity": "high", "timestamp": "2026-01-04T17:03:00Z", "trace_id": "505d5610-21e4-6c70-fd47-ab4ebeef20ef" }
{ "account_age_days": 579, "account_id": "ACCT-85618247C2DF", "baseline_risk_score": 0.37, "kyc_tier": "tier_3", "session_entropy": 0.691 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 570, "timestamp": "2026-01-04T17:03:00Z", "transaction_amount_usd": 705757.6 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.45, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 1326661.49, "financial_exposure_usd": 1698709.37, "recoverable_pct": 0.707 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103100", "label": "fraudulent", "label_confidence": 0.953, "severity": "high", "timestamp": "2026-01-03T03:40:00Z", "trace_id": "8db72f70-bcee-ac1a-c2bb-68189a68a8f2" }
{ "account_age_days": 1383, "account_id": "ACCT-F5EE71E7FA74", "baseline_risk_score": 0.255, "kyc_tier": "tier_1", "session_entropy": 0.536 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 288, "timestamp": "2026-01-03T02:08:00Z", "transaction_amount_usd": 13.5 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.88, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 55110.2, "financial_exposure_usd": 108820.57, "recoverable_pct": 0.182 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103023", "label": "fraudulent", "label_confidence": 0.959, "severity": "medium", "timestamp": "2026-01-03T02:23:00Z", "trace_id": "85ee2b95-d300-c25b-0316-8c139109c2e0" }
{ "account_age_days": 37, "account_id": "ACCT-E7AF207AC6F4", "baseline_risk_score": 0.352, "kyc_tier": "tier_1", "session_entropy": 0.297 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 959, "timestamp": "2026-01-03T02:23:00Z", "transaction_amount_usd": 77587.24 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.455, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 111407.87, "financial_exposure_usd": 226702.36, "recoverable_pct": 0.203 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100839", "label": "fraudulent", "label_confidence": 0.767, "severity": "critical", "timestamp": "2026-01-01T13:59:00Z", "trace_id": "b0b4821b-0604-844f-3181-b56b67fafcda" }
{ "account_age_days": 1924, "account_id": "ACCT-F290A3070A0E", "baseline_risk_score": 0.544, "kyc_tier": "tier_1", "session_entropy": 0.854 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 761, "timestamp": "2026-01-01T13:59:00Z", "transaction_amount_usd": 28307.04 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.442, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 787710.32, "financial_exposure_usd": 1007058.7, "recoverable_pct": 0.343 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105798", "label": "fraudulent", "label_confidence": 0.873, "severity": "high", "timestamp": "2026-01-05T00:38:00Z", "trace_id": "2b5c2213-92f8-5042-b8db-496e03feb734" }
{ "account_age_days": 1229, "account_id": "ACCT-1E6C969901FE", "baseline_risk_score": 0.437, "kyc_tier": "tier_1", "session_entropy": 0.447 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 213, "timestamp": "2026-01-04T14:47:00Z", "transaction_amount_usd": 8.11 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.491, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2943670.72, "financial_exposure_usd": 6723458.26, "recoverable_pct": 0.563 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103158", "label": "fraudulent", "label_confidence": 0.86, "severity": "critical", "timestamp": "2026-01-03T04:38:00Z", "trace_id": "9f176b2d-085f-524d-6f63-69bfc1255ce0" }
{ "account_age_days": 402, "account_id": "ACCT-CD129FFAA5D0", "baseline_risk_score": 0.579, "kyc_tier": "tier_2", "session_entropy": 0.359 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 328, "timestamp": "2026-01-03T01:23:00Z", "transaction_amount_usd": 13.33 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.633, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 170752.74, "financial_exposure_usd": 400811.2, "recoverable_pct": 0.064 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104862", "label": "fraudulent", "label_confidence": 0.607, "severity": "critical", "timestamp": "2026-01-04T09:02:00Z", "trace_id": "caa7cf3e-a122-7ad8-c0e2-bee3161971ec" }
{ "account_age_days": 1411, "account_id": "ACCT-1D9918313F1A", "baseline_risk_score": 0.127, "kyc_tier": "tier_2", "session_entropy": 0.528 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 436, "timestamp": "2026-01-04T09:02:00Z", "transaction_amount_usd": 853148.85 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.484, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 7091991.52, "financial_exposure_usd": 7668863.69, "recoverable_pct": 0.87 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106706", "label": "benign", "label_confidence": 0.526, "severity": "low", "timestamp": "2026-01-05T15:46:00Z", "trace_id": "b0696771-5b53-5460-1bcc-25135b2d06f2" }
{ "account_age_days": 1013, "account_id": "ACCT-3A15E4E04EE6", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.386 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 206, "timestamp": "2026-01-05T15:46:00Z", "transaction_amount_usd": 10285.8 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.667, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 633, "financial_exposure_usd": 1023.42, "recoverable_pct": 0.537 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100067", "label": "fraudulent", "label_confidence": 0.961, "severity": "low", "timestamp": "2026-01-01T01:07:00Z", "trace_id": "8222cd7f-36e6-ba85-19ab-dc15296b67bf" }
{ "account_age_days": 1196, "account_id": "ACCT-D46B7756B9E4", "baseline_risk_score": 0.531, "kyc_tier": "tier_2", "session_entropy": 0.575 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 90, "timestamp": "2026-01-01T01:07:00Z", "transaction_amount_usd": 96202.02 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.928, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 470070.1, "financial_exposure_usd": 877360.98, "recoverable_pct": 0.819 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101383", "label": "fraudulent", "label_confidence": 0.751, "severity": "high", "timestamp": "2026-01-01T23:03:00Z", "trace_id": "26690681-0784-4018-3a82-b86bc68b73ac" }
{ "account_age_days": 549, "account_id": "ACCT-7EE991386032", "baseline_risk_score": 0.597, "kyc_tier": "tier_3", "session_entropy": 0.325 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 760, "timestamp": "2026-01-01T23:03:00Z", "transaction_amount_usd": 113994.91 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.478, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 314876.81, "financial_exposure_usd": 332080.43, "recoverable_pct": 0.425 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101333", "label": "fraudulent", "label_confidence": 0.81, "severity": "high", "timestamp": "2026-01-01T22:13:00Z", "trace_id": "7fe22b0c-444f-b671-d741-db96e284a8f9" }
{ "account_age_days": 202, "account_id": "ACCT-E4D5C51D4ED6", "baseline_risk_score": 0.586, "kyc_tier": "tier_3", "session_entropy": 0.376 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 981, "timestamp": "2026-01-01T22:13:00Z", "transaction_amount_usd": 53928.7 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.762, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 243249.29, "financial_exposure_usd": 320062.08, "recoverable_pct": 0.647 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105998", "label": "fraudulent", "label_confidence": 0.854, "severity": "medium", "timestamp": "2026-01-05T03:58:00Z", "trace_id": "c4380b2e-1315-ca25-dac7-aae07b3f75d6" }
{ "account_age_days": 1723, "account_id": "ACCT-C0CD5AF362C4", "baseline_risk_score": 0.306, "kyc_tier": "tier_1", "session_entropy": 0.379 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 1036, "timestamp": "2026-01-05T03:58:00Z", "transaction_amount_usd": 2999898.68 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.756, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2778200.06, "financial_exposure_usd": 5651174.39, "recoverable_pct": 0.414 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100013", "label": "fraudulent", "label_confidence": 0.862, "severity": "high", "timestamp": "2026-01-01T00:13:00Z", "trace_id": "4c6e27ff-b9de-7a3a-4868-22b900a81de9" }
{ "account_age_days": 1404, "account_id": "ACCT-118405AD9E11", "baseline_risk_score": 0.605, "kyc_tier": "tier_2", "session_entropy": 0.3 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 786, "timestamp": "2026-01-01T00:13:00Z", "transaction_amount_usd": 79362.92 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.798, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 531086.13, "financial_exposure_usd": 538079.75, "recoverable_pct": 0.646 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104788", "label": "fraudulent", "label_confidence": 0.715, "severity": "medium", "timestamp": "2026-01-04T07:48:00Z", "trace_id": "bdf461fb-cbe5-f0eb-7ca9-bb62f7160a35" }
{ "account_age_days": 791, "account_id": "ACCT-66E7E029928B", "baseline_risk_score": 0.21, "kyc_tier": "tier_3", "session_entropy": 0.235 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 267, "timestamp": "2026-01-03T23:33:00Z", "transaction_amount_usd": 2.24 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.835, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3040065.12, "financial_exposure_usd": 3125731.77, "recoverable_pct": 0.635 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }