schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108630", "label": "benign", "label_confidence": 0.741, "severity": "low", "timestamp": "2026-01-06T23:50:00Z", "trace_id": "faba5491-6651-2f17-5867-24a94b57c2ea" }
{ "account_age_days": 1146, "account_id": "ACCT-D92DDA802B12", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.373 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 369, "timestamp": "2026-01-06T23:50:00Z", "transaction_amount_usd": 11548.23 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.497, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2894.77, "financial_exposure_usd": 3278.85, "recoverable_pct": 0.751 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102245", "label": "fraudulent", "label_confidence": 0.777, "severity": "low", "timestamp": "2026-01-02T13:25:00Z", "trace_id": "a01c96cc-5db5-7e17-1d29-bdb9c7d014c0" }
{ "account_age_days": 171, "account_id": "ACCT-1730088B3C8B", "baseline_risk_score": 0.583, "kyc_tier": "tier_2", "session_entropy": 0.448 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 144, "timestamp": "2026-01-02T08:52:00Z", "transaction_amount_usd": 2.29 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.364, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 518793.38, "financial_exposure_usd": 1245584.88, "recoverable_pct": 0.16 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107699", "label": "benign", "label_confidence": 0.663, "severity": "medium", "timestamp": "2026-01-06T08:19:00Z", "trace_id": "c71a16ef-d825-cfcd-d7b7-82b0d300fe59" }
{ "account_age_days": 1991, "account_id": "ACCT-B18B087FABD7", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.74 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 983, "timestamp": "2026-01-06T08:19:00Z", "transaction_amount_usd": 7125.6 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.644, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2635.05, "financial_exposure_usd": 4308.14, "recoverable_pct": 0.615 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102440", "label": "fraudulent", "label_confidence": 0.785, "severity": "critical", "timestamp": "2026-01-02T16:40:00Z", "trace_id": "635fb094-1254-fe6f-700b-e7276f64f30d" }
{ "account_age_days": 947, "account_id": "ACCT-3EF6CEF8A2F1", "baseline_risk_score": 0.474, "kyc_tier": "tier_2", "session_entropy": 0.255 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 527, "timestamp": "2026-01-02T16:40:00Z", "transaction_amount_usd": 116847.1 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.537, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 383771.6, "financial_exposure_usd": 507900.53, "recoverable_pct": 0.366 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100941", "label": "fraudulent", "label_confidence": 0.776, "severity": "high", "timestamp": "2026-01-01T15:41:00Z", "trace_id": "7a002a99-96ca-79b2-a808-500352558378" }
{ "account_age_days": 360, "account_id": "ACCT-4F862DE080C0", "baseline_risk_score": 0.368, "kyc_tier": "tier_1", "session_entropy": 0.526 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 841, "timestamp": "2026-01-01T15:41:00Z", "transaction_amount_usd": 119685.16 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.934, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1022565.18, "financial_exposure_usd": 1025138.72, "recoverable_pct": 0.413 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101237", "label": "fraudulent", "label_confidence": 0.779, "severity": "high", "timestamp": "2026-01-01T20:37:00Z", "trace_id": "1ac9a408-816c-f2cb-cf10-fd704720fe78" }
{ "account_age_days": 1754, "account_id": "ACCT-5362F686AC81", "baseline_risk_score": 0.419, "kyc_tier": "tier_2", "session_entropy": 0.824 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 1188, "timestamp": "2026-01-01T20:37:00Z", "transaction_amount_usd": 27481.97 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.44, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 380270.9, "financial_exposure_usd": 404186.94, "recoverable_pct": 0.133 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106123", "label": "fraudulent", "label_confidence": 0.877, "severity": "high", "timestamp": "2026-01-05T06:03:00Z", "trace_id": "2c34e297-02b1-4474-d53b-b6843357604f" }
{ "account_age_days": 1616, "account_id": "ACCT-D7ECF33048F3", "baseline_risk_score": 0.364, "kyc_tier": "tier_3", "session_entropy": 0.293 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 873, "timestamp": "2026-01-05T06:03:00Z", "transaction_amount_usd": 633136.05 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.526, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2534629.55, "financial_exposure_usd": 3401084.21, "recoverable_pct": 0.794 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104436", "label": "fraudulent", "label_confidence": 0.645, "severity": "low", "timestamp": "2026-01-04T01:56:00Z", "trace_id": "9af17b58-3fb2-641c-a80c-80e6e9273c13" }
{ "account_age_days": 524, "account_id": "ACCT-CE951BC0F13E", "baseline_risk_score": 0.234, "kyc_tier": "tier_3", "session_entropy": 0.515 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 746, "timestamp": "2026-01-04T01:56:00Z", "transaction_amount_usd": 539831.22 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.707, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1049953.55, "financial_exposure_usd": 2265549.96, "recoverable_pct": 0.794 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102248", "label": "fraudulent", "label_confidence": 0.782, "severity": "critical", "timestamp": "2026-01-02T13:28:00Z", "trace_id": "8d372a48-b932-ab42-ea55-587c6635c22e" }
{ "account_age_days": 402, "account_id": "ACCT-F89D5BBC4730", "baseline_risk_score": 0.532, "kyc_tier": "tier_1", "session_entropy": 0.942 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 212, "timestamp": "2026-01-02T13:28:00Z", "transaction_amount_usd": 81108.98 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.597, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 806820.84, "financial_exposure_usd": 1404217.74, "recoverable_pct": 0.501 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104139", "label": "fraudulent", "label_confidence": 0.907, "severity": "high", "timestamp": "2026-01-03T20:59:00Z", "trace_id": "38e25fa0-eaa4-d289-b89b-953214919671" }
{ "account_age_days": 96, "account_id": "ACCT-1576C846DB1C", "baseline_risk_score": 0.104, "kyc_tier": "tier_3", "session_entropy": 0.845 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 330, "timestamp": "2026-01-03T17:50:00Z", "transaction_amount_usd": 10.75 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.909, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3432249.93, "financial_exposure_usd": 6407911.6, "recoverable_pct": 0.594 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101104", "label": "fraudulent", "label_confidence": 0.95, "severity": "high", "timestamp": "2026-01-01T18:24:00Z", "trace_id": "beb9ec49-4d6b-d4df-9ab0-4c342f3726d7" }
{ "account_age_days": 1579, "account_id": "ACCT-06C17D842EC0", "baseline_risk_score": 0.483, "kyc_tier": "tier_2", "session_entropy": 0.244 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 175, "timestamp": "2026-01-01T17:21:00Z", "transaction_amount_usd": 22.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.442, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 627805.2, "financial_exposure_usd": 695186.4, "recoverable_pct": 0.146 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109439", "label": "benign", "label_confidence": 0.74, "severity": "high", "timestamp": "2026-01-07T13:19:00Z", "trace_id": "66bb9109-8d93-5af9-c78e-aea10b20c7be" }
{ "account_age_days": 1250, "account_id": "ACCT-E0E2B08F84EA", "baseline_risk_score": 0.088, "kyc_tier": "tier_1", "session_entropy": 0.771 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 358, "timestamp": "2026-01-07T13:19:00Z", "transaction_amount_usd": 8637.33 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.587, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 0, "financial_exposure_usd": 0, "recoverable_pct": 0.436 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100145", "label": "fraudulent", "label_confidence": 0.753, "severity": "high", "timestamp": "2026-01-01T02:25:00Z", "trace_id": "bf8f81ea-cfb0-d68d-b189-25a6c6cec51b" }
{ "account_age_days": 1240, "account_id": "ACCT-E19383A90F5C", "baseline_risk_score": 0.508, "kyc_tier": "tier_1", "session_entropy": 0.646 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1050, "timestamp": "2026-01-01T02:25:00Z", "transaction_amount_usd": 28605.57 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.446, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 1015181.3, "financial_exposure_usd": 1128470.66, "recoverable_pct": 0.578 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100970", "label": "fraudulent", "label_confidence": 0.784, "severity": "critical", "timestamp": "2026-01-01T16:10:00Z", "trace_id": "96e1de8d-8170-b553-cc97-d77dee525fc1" }
{ "account_age_days": 225, "account_id": "ACCT-C631BBC68725", "baseline_risk_score": 0.545, "kyc_tier": "tier_1", "session_entropy": 0.466 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1025, "timestamp": "2026-01-01T16:10:00Z", "transaction_amount_usd": 115733.71 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.791, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 241466.85, "financial_exposure_usd": 594052.08, "recoverable_pct": 0.363 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107332", "label": "benign", "label_confidence": 0.747, "severity": "low", "timestamp": "2026-01-06T02:12:00Z", "trace_id": "980e59be-55e4-3bdc-ce33-a2003d0faa52" }
{ "account_age_days": 1696, "account_id": "ACCT-D4CA7C09D17F", "baseline_risk_score": 0.058, "kyc_tier": "tier_2", "session_entropy": 0.314 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 205, "timestamp": "2026-01-06T02:12:00Z", "transaction_amount_usd": 195.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.458, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1680.93, "financial_exposure_usd": 1786.33, "recoverable_pct": 0.424 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103182", "label": "fraudulent", "label_confidence": 0.97, "severity": "critical", "timestamp": "2026-01-03T05:02:00Z", "trace_id": "89ddb3bd-0960-8f44-975b-9187664fb32a" }
{ "account_age_days": 860, "account_id": "ACCT-9FB3F4149026", "baseline_risk_score": 0.577, "kyc_tier": "tier_2", "session_entropy": 0.507 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 234, "timestamp": "2026-01-02T19:38:00Z", "transaction_amount_usd": 4.99 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.396, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 445435.74, "financial_exposure_usd": 626055.34, "recoverable_pct": 0.671 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101137", "label": "fraudulent", "label_confidence": 0.955, "severity": "critical", "timestamp": "2026-01-01T18:57:00Z", "trace_id": "e4e12460-c417-ed91-9da8-f224394e4a92" }
{ "account_age_days": 16, "account_id": "ACCT-01A459B9DFC8", "baseline_risk_score": 0.585, "kyc_tier": "tier_1", "session_entropy": 0.312 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 754, "timestamp": "2026-01-01T18:57:00Z", "transaction_amount_usd": 26810.51 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.515, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 925094.98, "financial_exposure_usd": 1096852.26, "recoverable_pct": 0.022 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105771", "label": "fraudulent", "label_confidence": 0.792, "severity": "high", "timestamp": "2026-01-05T00:11:00Z", "trace_id": "0d5b8973-082f-07a2-f379-cc46fd25886b" }
{ "account_age_days": 266, "account_id": "ACCT-85A5D3F38D63", "baseline_risk_score": 0.3, "kyc_tier": "tier_1", "session_entropy": 0.411 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 109, "timestamp": "2026-01-04T19:16:00Z", "transaction_amount_usd": 9.57 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.545, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 283833.7, "financial_exposure_usd": 440212.79, "recoverable_pct": 0.473 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108658", "label": "benign", "label_confidence": 0.463, "severity": "medium", "timestamp": "2026-01-07T00:18:00Z", "trace_id": "ec7b0f5b-4c7f-fafc-ca33-9a91d64fcf0a" }
{ "account_age_days": 1698, "account_id": "ACCT-D011A49D225D", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.684 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 578, "timestamp": "2026-01-07T00:18:00Z", "transaction_amount_usd": 13750.95 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.698, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3244.69, "financial_exposure_usd": 5034.3, "recoverable_pct": 0.783 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101222", "label": "fraudulent", "label_confidence": 0.793, "severity": "medium", "timestamp": "2026-01-01T20:22:00Z", "trace_id": "5eaee3d0-c754-d0df-b848-80f202b043c9" }
{ "account_age_days": 1240, "account_id": "ACCT-B9A69FA4F65F", "baseline_risk_score": 0.575, "kyc_tier": "tier_1", "session_entropy": 0.868 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 425, "timestamp": "2026-01-01T20:22:00Z", "transaction_amount_usd": 79571.81 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.393, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 316894.45, "financial_exposure_usd": 458949.16, "recoverable_pct": 0.235 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104251", "label": "fraudulent", "label_confidence": 0.843, "severity": "critical", "timestamp": "2026-01-03T22:51:00Z", "trace_id": "3b845f74-9f94-fe29-fd08-78bbe486d776" }
{ "account_age_days": 1533, "account_id": "ACCT-C38A5D8B5091", "baseline_risk_score": 0.32, "kyc_tier": "tier_3", "session_entropy": 0.376 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 1072, "timestamp": "2026-01-03T22:51:00Z", "transaction_amount_usd": 176298.29 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.665, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5633173.71, "financial_exposure_usd": 9159443.84, "recoverable_pct": 0.638 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108327", "label": "benign", "label_confidence": 0.457, "severity": "low", "timestamp": "2026-01-06T18:47:00Z", "trace_id": "5e31c44b-6802-d31c-35d0-98ce76986cde" }
{ "account_age_days": 89, "account_id": "ACCT-B128E00BCFF4", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.296 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 1036, "timestamp": "2026-01-06T18:47:00Z", "transaction_amount_usd": 2921.14 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.742, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1011.45, "financial_exposure_usd": 1338.27, "recoverable_pct": 0.863 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107261", "label": "benign", "label_confidence": 0.509, "severity": "high", "timestamp": "2026-01-06T01:01:00Z", "trace_id": "104c410e-55e4-756b-0723-0f0f498db87a" }
{ "account_age_days": 898, "account_id": "ACCT-DDA082057CA8", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.85 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 1083, "timestamp": "2026-01-06T01:01:00Z", "transaction_amount_usd": 13064.62 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.796, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 760.4, "financial_exposure_usd": 923.09, "recoverable_pct": 0.582 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103556", "label": "fraudulent", "label_confidence": 0.639, "severity": "medium", "timestamp": "2026-01-03T11:16:00Z", "trace_id": "f1917f20-38ba-a6b9-c567-4d452d4aa64a" }
{ "account_age_days": 1921, "account_id": "ACCT-CF759FC85E91", "baseline_risk_score": 0.189, "kyc_tier": "tier_3", "session_entropy": 0.623 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 349, "timestamp": "2026-01-03T09:51:00Z", "transaction_amount_usd": 20.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.447, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3602706.15, "financial_exposure_usd": 4403568.46, "recoverable_pct": 0.479 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102359", "label": "fraudulent", "label_confidence": 0.829, "severity": "medium", "timestamp": "2026-01-02T15:19:00Z", "trace_id": "bc0d9f4c-4f60-378b-c225-178a49f8ed0e" }
{ "account_age_days": 795, "account_id": "ACCT-597E17B43185", "baseline_risk_score": 0.561, "kyc_tier": "tier_1", "session_entropy": 0.879 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 508, "timestamp": "2026-01-02T15:19:00Z", "transaction_amount_usd": 103554.87 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.5, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ...
{ "customer_funds_at_risk_usd": 338537.25, "financial_exposure_usd": 340359.44, "recoverable_pct": 0.049 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102907", "label": "fraudulent", "label_confidence": 0.915, "severity": "high", "timestamp": "2026-01-03T00:27:00Z", "trace_id": "9ec57edb-ac03-1a78-d62f-fc763dce8376" }
{ "account_age_days": 1337, "account_id": "ACCT-A2B1119A9482", "baseline_risk_score": 0.442, "kyc_tier": "tier_3", "session_entropy": 0.351 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 163, "timestamp": "2026-01-02T17:59:00Z", "transaction_amount_usd": 16.1 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.816, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1032317.32, "financial_exposure_usd": 1165623.98, "recoverable_pct": 0.074 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104762", "label": "fraudulent", "label_confidence": 0.942, "severity": "high", "timestamp": "2026-01-04T07:22:00Z", "trace_id": "e189d858-3f1c-efa8-3355-b01685cba8b5" }
{ "account_age_days": 623, "account_id": "ACCT-571870011783", "baseline_risk_score": 0.174, "kyc_tier": "tier_2", "session_entropy": 0.871 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 290, "timestamp": "2026-01-04T07:22:00Z", "transaction_amount_usd": 213539.12 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.537, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3300549.17, "financial_exposure_usd": 4679431.04, "recoverable_pct": 0.554 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102902", "label": "fraudulent", "label_confidence": 0.812, "severity": "medium", "timestamp": "2026-01-03T00:22:00Z", "trace_id": "9d00c569-e6c2-db3d-2d55-5517be2ba283" }
{ "account_age_days": 1332, "account_id": "ACCT-A756CBACD2B3", "baseline_risk_score": 0.412, "kyc_tier": "tier_1", "session_entropy": 0.268 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 138, "timestamp": "2026-01-03T00:22:00Z", "transaction_amount_usd": 76412.22 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.677, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 475133.63, "financial_exposure_usd": 1095226.23, "recoverable_pct": 0.712 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101513", "label": "fraudulent", "label_confidence": 0.915, "severity": "high", "timestamp": "2026-01-02T01:13:00Z", "trace_id": "53e82345-a60d-d74a-1124-bd27dce06904" }
{ "account_age_days": 359, "account_id": "ACCT-3336911D5B5C", "baseline_risk_score": 0.311, "kyc_tier": "tier_1", "session_entropy": 0.315 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 530, "timestamp": "2026-01-02T01:13:00Z", "transaction_amount_usd": 13712.43 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.933, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 220417.29, "financial_exposure_usd": 387150.93, "recoverable_pct": 0.524 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102581", "label": "fraudulent", "label_confidence": 0.877, "severity": "critical", "timestamp": "2026-01-02T19:01:00Z", "trace_id": "b4463eca-70ca-ecea-bf7e-8785b3caf8ef" }
{ "account_age_days": 1120, "account_id": "ACCT-1B98CC6FCAB3", "baseline_risk_score": 0.291, "kyc_tier": "tier_3", "session_entropy": 0.444 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 117, "timestamp": "2026-01-02T19:01:00Z", "transaction_amount_usd": 20439.54 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.478, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 770980.31, "financial_exposure_usd": 952764.73, "recoverable_pct": 0.704 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108468", "label": "benign", "label_confidence": 0.498, "severity": "low", "timestamp": "2026-01-06T21:08:00Z", "trace_id": "2a100e7c-3518-1aea-e5c3-84dfc843eb9e" }
{ "account_age_days": 656, "account_id": "ACCT-62C098D7A621", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.916 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 191, "timestamp": "2026-01-06T19:43:00Z", "transaction_amount_usd": 0.69 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.454, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 7087.53, "financial_exposure_usd": 8117.17, "recoverable_pct": 0.653 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100148", "label": "fraudulent", "label_confidence": 0.927, "severity": "critical", "timestamp": "2026-01-01T02:28:00Z", "trace_id": "7927a136-fc73-e358-4208-9fc875f321cb" }
{ "account_age_days": 1240, "account_id": "ACCT-108134DC5427", "baseline_risk_score": 0.619, "kyc_tier": "tier_2", "session_entropy": 0.37 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 1079, "timestamp": "2026-01-01T02:28:00Z", "transaction_amount_usd": 53324.42 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.771, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 419703.91, "financial_exposure_usd": 895662.87, "recoverable_pct": 0.386 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107660", "label": "benign", "label_confidence": 0.466, "severity": "low", "timestamp": "2026-01-06T07:40:00Z", "trace_id": "75a2e63b-3cd9-1494-ad5a-c88b941f7d9a" }
{ "account_age_days": 698, "account_id": "ACCT-E8F0463A5501", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.917 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 345, "timestamp": "2026-01-06T04:12:00Z", "transaction_amount_usd": 13.71 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.653, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1198.59, "financial_exposure_usd": 1894.34, "recoverable_pct": 0.473 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107598", "label": "benign", "label_confidence": 0.705, "severity": "high", "timestamp": "2026-01-06T06:38:00Z", "trace_id": "da828f39-b21c-8366-f021-86e775bf417d" }
{ "account_age_days": 408, "account_id": "ACCT-2212A4035A54", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.378 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 493, "timestamp": "2026-01-06T06:38:00Z", "transaction_amount_usd": 5065.44 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.682, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2401.84, "financial_exposure_usd": 3257.12, "recoverable_pct": 0.936 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104195", "label": "fraudulent", "label_confidence": 0.682, "severity": "medium", "timestamp": "2026-01-03T21:55:00Z", "trace_id": "b7171e79-9e0e-23d9-d04e-ad7bb054908b" }
{ "account_age_days": 370, "account_id": "ACCT-9D27AB8E4A2B", "baseline_risk_score": 0.299, "kyc_tier": "tier_3", "session_entropy": 0.65 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 549, "timestamp": "2026-01-03T21:55:00Z", "transaction_amount_usd": 1052743.35 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.68, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 4038611.9, "financial_exposure_usd": 5288472.74, "recoverable_pct": 0.886 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101380", "label": "fraudulent", "label_confidence": 0.919, "severity": "critical", "timestamp": "2026-01-01T23:00:00Z", "trace_id": "bec4294f-1079-f38a-e540-e56afa1c7b4a" }
{ "account_age_days": 1606, "account_id": "ACCT-9629B11D51C2", "baseline_risk_score": 0.59, "kyc_tier": "tier_2", "session_entropy": 0.422 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 268, "timestamp": "2026-01-01T18:35:00Z", "transaction_amount_usd": 9.56 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.866, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 593575.2, "financial_exposure_usd": 918155.24, "recoverable_pct": 0.105 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106968", "label": "benign", "label_confidence": 0.735, "severity": "high", "timestamp": "2026-01-05T20:08:00Z", "trace_id": "94d41c61-b540-c3d0-bf21-ddd8c01464e1" }
{ "account_age_days": 1361, "account_id": "ACCT-C11A04F87FA7", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.868 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 981, "timestamp": "2026-01-05T20:08:00Z", "transaction_amount_usd": 14455.52 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.694, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1534.96, "financial_exposure_usd": 2121.02, "recoverable_pct": 0.527 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100343", "label": "fraudulent", "label_confidence": 0.946, "severity": "critical", "timestamp": "2026-01-01T05:43:00Z", "trace_id": "d234fb9d-a845-17ee-99cf-3419f2af0414" }
{ "account_age_days": 448, "account_id": "ACCT-EF8F8421BB28", "baseline_risk_score": 0.515, "kyc_tier": "tier_2", "session_entropy": 0.579 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 736, "timestamp": "2026-01-01T05:43:00Z", "transaction_amount_usd": 88599.82 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.36, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 175796.6, "financial_exposure_usd": 296533.81, "recoverable_pct": 0.766 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109832", "label": "benign", "label_confidence": 0.488, "severity": "medium", "timestamp": "2026-01-07T19:52:00Z", "trace_id": "a2301b9a-237b-6916-f61e-c9c40b2fa7ca" }
{ "account_age_days": 649, "account_id": "ACCT-C12A74FF866A", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.291 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 273, "timestamp": "2026-01-07T07:36:00Z", "transaction_amount_usd": 4.75 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.737, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2147.76, "financial_exposure_usd": 4567.7, "recoverable_pct": 0.773 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100278", "label": "fraudulent", "label_confidence": 0.777, "severity": "medium", "timestamp": "2026-01-01T04:38:00Z", "trace_id": "2b0e817c-2d59-8b9d-b3e3-f68fafce0949" }
{ "account_age_days": 442, "account_id": "ACCT-F00C4CC52045", "baseline_risk_score": 0.609, "kyc_tier": "tier_2", "session_entropy": 0.127 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 122, "timestamp": "2025-12-31T16:53:00Z", "transaction_amount_usd": 23 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.654, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 252315.12, "financial_exposure_usd": 575213.97, "recoverable_pct": 0.461 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107503", "label": "benign", "label_confidence": 0.606, "severity": "medium", "timestamp": "2026-01-06T05:03:00Z", "trace_id": "64d60204-41fc-188a-a701-e120ffb64077" }
{ "account_age_days": 1082, "account_id": "ACCT-179D203B647A", "baseline_risk_score": 0.105, "kyc_tier": "tier_3", "session_entropy": 0.145 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 969, "timestamp": "2026-01-06T05:03:00Z", "transaction_amount_usd": 661.38 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.591, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3349.58, "financial_exposure_usd": 4235.24, "recoverable_pct": 0.866 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108245", "label": "benign", "label_confidence": 0.59, "severity": "low", "timestamp": "2026-01-06T17:25:00Z", "trace_id": "ea48019b-fe3e-57f6-0134-8716707aa847" }
{ "account_age_days": 597, "account_id": "ACCT-8F5EFAF3D257", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.626 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 309, "timestamp": "2026-01-06T17:25:00Z", "transaction_amount_usd": 12994.44 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.486, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4848.77, "financial_exposure_usd": 5377.92, "recoverable_pct": 0.705 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108222", "label": "benign", "label_confidence": 0.609, "severity": "low", "timestamp": "2026-01-06T17:02:00Z", "trace_id": "5404feb5-e16e-6796-91f3-f3e32b945766" }
{ "account_age_days": 1383, "account_id": "ACCT-711863A0586E", "baseline_risk_score": 0.121, "kyc_tier": "tier_2", "session_entropy": 0.461 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 1167, "timestamp": "2026-01-06T17:02:00Z", "transaction_amount_usd": 11303.01 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.644, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2777.45, "financial_exposure_usd": 4068.71, "recoverable_pct": 0.75 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108287", "label": "benign", "label_confidence": 0.723, "severity": "high", "timestamp": "2026-01-06T18:07:00Z", "trace_id": "e8f929b4-4803-8ca3-c5a7-20ae9b1abad6" }
{ "account_age_days": 1950, "account_id": "ACCT-9A7EC4191ED0", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.224 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 266, "timestamp": "2026-01-06T18:07:00Z", "transaction_amount_usd": 712.25 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.798, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 734, "financial_exposure_usd": 794.69, "recoverable_pct": 0.411 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104004", "label": "fraudulent", "label_confidence": 0.677, "severity": "high", "timestamp": "2026-01-03T18:44:00Z", "trace_id": "b00f7f06-ba21-0247-7b68-a201bbb33e11" }
{ "account_age_days": 890, "account_id": "ACCT-648BA1E090E6", "baseline_risk_score": 0.188, "kyc_tier": "tier_1", "session_entropy": 0.386 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 359, "timestamp": "2026-01-03T06:17:00Z", "transaction_amount_usd": 12.66 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.658, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2367724.36, "financial_exposure_usd": 5398137.76, "recoverable_pct": 0.766 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100386", "label": "fraudulent", "label_confidence": 0.89, "severity": "high", "timestamp": "2026-01-01T06:26:00Z", "trace_id": "2abb1647-d838-6f30-b70b-da21dd728d56" }
{ "account_age_days": 591, "account_id": "ACCT-DACD40BA8625", "baseline_risk_score": 0.266, "kyc_tier": "tier_2", "session_entropy": 0.299 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 1106, "timestamp": "2026-01-01T06:26:00Z", "transaction_amount_usd": 56562.55 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.36, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 515772.1, "financial_exposure_usd": 1049589.83, "recoverable_pct": 0.796 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108610", "label": "benign", "label_confidence": 0.699, "severity": "medium", "timestamp": "2026-01-06T23:30:00Z", "trace_id": "a4c0daa4-109d-d4a7-53ca-667ea0649497" }
{ "account_age_days": 1753, "account_id": "ACCT-A0B2772B5CAD", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.585 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1100, "timestamp": "2026-01-06T23:30:00Z", "transaction_amount_usd": 6456.62 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.575, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2333.35, "financial_exposure_usd": 2711.38, "recoverable_pct": 0.46 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100127", "label": "fraudulent", "label_confidence": 0.962, "severity": "critical", "timestamp": "2026-01-01T02:07:00Z", "trace_id": "edc72f12-33a5-1ac6-c461-994d609cfe40" }
{ "account_age_days": 667, "account_id": "ACCT-F5834C69407F", "baseline_risk_score": 0.567, "kyc_tier": "tier_3", "session_entropy": 0.181 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 109, "timestamp": "2026-01-01T02:07:00Z", "transaction_amount_usd": 29005.57 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.757, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 339921.97, "financial_exposure_usd": 567266.57, "recoverable_pct": 0.54 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101127", "label": "fraudulent", "label_confidence": 0.868, "severity": "high", "timestamp": "2026-01-01T18:47:00Z", "trace_id": "7145d996-9f7e-5e4b-075f-70e5e35de789" }
{ "account_age_days": 71, "account_id": "ACCT-F213B4641B29", "baseline_risk_score": 0.267, "kyc_tier": "tier_2", "session_entropy": 0.186 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 711, "timestamp": "2026-01-01T18:47:00Z", "transaction_amount_usd": 103536.79 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.524, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 487686.62, "financial_exposure_usd": 671293.08, "recoverable_pct": 0.559 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101114", "label": "fraudulent", "label_confidence": 0.851, "severity": "critical", "timestamp": "2026-01-01T18:34:00Z", "trace_id": "f649f930-e755-4d26-f7ee-8e8692ef5914" }
{ "account_age_days": 955, "account_id": "ACCT-BA4781DAF14C", "baseline_risk_score": 0.581, "kyc_tier": "tier_3", "session_entropy": 0.755 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 530, "timestamp": "2026-01-01T18:34:00Z", "transaction_amount_usd": 33893.51 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.633, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 543232.03, "financial_exposure_usd": 595539.62, "recoverable_pct": 0.436 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109260", "label": "benign", "label_confidence": 0.699, "severity": "high", "timestamp": "2026-01-07T10:20:00Z", "trace_id": "03033813-63eb-c2ee-923c-76af1be6b321" }
{ "account_age_days": 1802, "account_id": "ACCT-2A7D5286C73E", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.461 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 281, "timestamp": "2026-01-07T10:20:00Z", "transaction_amount_usd": 12334.69 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.613, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1753.94, "financial_exposure_usd": 1784.93, "recoverable_pct": 0.664 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109731", "label": "benign", "label_confidence": 0.57, "severity": "medium", "timestamp": "2026-01-07T18:11:00Z", "trace_id": "e9059682-7b2e-95a7-e020-2e036c32fdfc" }
{ "account_age_days": 514, "account_id": "ACCT-D8F3715D0543", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.157 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 363, "timestamp": "2026-01-07T18:11:00Z", "transaction_amount_usd": 9762.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.709, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 6153.72, "financial_exposure_usd": 6938.41, "recoverable_pct": 0.491 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107930", "label": "benign", "label_confidence": 0.74, "severity": "low", "timestamp": "2026-01-06T12:10:00Z", "trace_id": "d96779b0-961d-bbb2-24c4-897aec5e5764" }
{ "account_age_days": 1820, "account_id": "ACCT-72FC92586749", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.947 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 247, "timestamp": "2026-01-06T12:10:00Z", "transaction_amount_usd": 14274.3 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.476, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 541.06, "financial_exposure_usd": 706.53, "recoverable_pct": 0.687 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105685", "label": "fraudulent", "label_confidence": 0.745, "severity": "medium", "timestamp": "2026-01-04T22:45:00Z", "trace_id": "3475dce5-1258-1370-a211-58199e4a8f63" }
{ "account_age_days": 1852, "account_id": "ACCT-1A3BE12E5E47", "baseline_risk_score": 0.401, "kyc_tier": "tier_2", "session_entropy": 0.44 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 519, "timestamp": "2026-01-04T22:45:00Z", "transaction_amount_usd": 93951.41 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.695, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3477847.64, "financial_exposure_usd": 7166418.04, "recoverable_pct": 0.811 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104694", "label": "fraudulent", "label_confidence": 0.924, "severity": "medium", "timestamp": "2026-01-04T06:14:00Z", "trace_id": "a91240b1-895d-2f96-e0dc-aa0a41cd222a" }
{ "account_age_days": 10, "account_id": "ACCT-1052730EA595", "baseline_risk_score": 0.126, "kyc_tier": "tier_2", "session_entropy": 0.239 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 827, "timestamp": "2026-01-04T06:14:00Z", "transaction_amount_usd": 2254409.85 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.853, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3111475.41, "financial_exposure_usd": 7121497.48, "recoverable_pct": 0.432 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106732", "label": "benign", "label_confidence": 0.718, "severity": "low", "timestamp": "2026-01-05T16:12:00Z", "trace_id": "dc5eceec-8fef-431b-93e9-d4f422980bac" }
{ "account_age_days": 1354, "account_id": "ACCT-F4602C7BD28B", "baseline_risk_score": 0.175, "kyc_tier": "tier_1", "session_entropy": 0.941 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 264, "timestamp": "2026-01-05T07:02:00Z", "transaction_amount_usd": 20.78 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.577, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1332.45, "financial_exposure_usd": 3198.13, "recoverable_pct": 0.884 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101298", "label": "fraudulent", "label_confidence": 0.808, "severity": "low", "timestamp": "2026-01-01T21:38:00Z", "trace_id": "0754a6e8-5dc8-dffa-7cbe-0afcf661414d" }
{ "account_age_days": 392, "account_id": "ACCT-DF31E13CD32F", "baseline_risk_score": 0.355, "kyc_tier": "tier_3", "session_entropy": 0.802 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1088, "timestamp": "2026-01-01T21:38:00Z", "transaction_amount_usd": 9046.11 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.872, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 589580.62, "financial_exposure_usd": 785672.8, "recoverable_pct": 0.683 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109744", "label": "benign", "label_confidence": 0.498, "severity": "low", "timestamp": "2026-01-07T18:24:00Z", "trace_id": "8aee6351-c5cb-ba5d-6e85-b7aa87751ec0" }
{ "account_age_days": 164, "account_id": "ACCT-A510D1D2F75E", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.658 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1041, "timestamp": "2026-01-07T18:24:00Z", "transaction_amount_usd": 1937.17 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.747, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3832.37, "financial_exposure_usd": 7121.68, "recoverable_pct": 0.411 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102026", "label": "fraudulent", "label_confidence": 0.752, "severity": "critical", "timestamp": "2026-01-02T09:46:00Z", "trace_id": "013ab86e-ea93-7cf4-c16d-da84b03aba20" }
{ "account_age_days": 1672, "account_id": "ACCT-9F47D06C4726", "baseline_risk_score": 0.581, "kyc_tier": "tier_1", "session_entropy": 0.193 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 914, "timestamp": "2026-01-02T09:46:00Z", "transaction_amount_usd": 112305.83 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.719, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 1013736.07, "financial_exposure_usd": 1427810.52, "recoverable_pct": 0.235 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103358", "label": "fraudulent", "label_confidence": 0.936, "severity": "high", "timestamp": "2026-01-03T07:58:00Z", "trace_id": "6c2d90d6-ea21-b0a8-b67b-f862e9192e96" }
{ "account_age_days": 1299, "account_id": "ACCT-4B66F4ABAE58", "baseline_risk_score": 0.273, "kyc_tier": "tier_1", "session_entropy": 0.608 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 512, "timestamp": "2026-01-03T07:58:00Z", "transaction_amount_usd": 410146.87 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.603, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 883649.99, "financial_exposure_usd": 1767606.47, "recoverable_pct": 0.435 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108555", "label": "benign", "label_confidence": 0.491, "severity": "low", "timestamp": "2026-01-06T22:35:00Z", "trace_id": "0e727e23-a264-e30a-0139-2383a4bd8644" }
{ "account_age_days": 1857, "account_id": "ACCT-4CBAC1032D5D", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.666 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 258, "timestamp": "2026-01-06T11:57:00Z", "transaction_amount_usd": 19.77 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.736, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2067.96, "financial_exposure_usd": 2170.28, "recoverable_pct": 0.586 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105525", "label": "fraudulent", "label_confidence": 0.93, "severity": "medium", "timestamp": "2026-01-04T20:05:00Z", "trace_id": "bb8d0355-5f78-faf3-de21-89521557946f" }
{ "account_age_days": 1188, "account_id": "ACCT-746914F3F792", "baseline_risk_score": 0.144, "kyc_tier": "tier_3", "session_entropy": 0.181 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 493, "timestamp": "2026-01-04T20:05:00Z", "transaction_amount_usd": 2300740.72 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.727, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2057947.71, "financial_exposure_usd": 2775246.71, "recoverable_pct": 0.765 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102529", "label": "fraudulent", "label_confidence": 0.84, "severity": "low", "timestamp": "2026-01-02T18:09:00Z", "trace_id": "e6cd8f32-6732-3600-7376-01c984ba73d1" }
{ "account_age_days": 941, "account_id": "ACCT-A59AA0BA050E", "baseline_risk_score": 0.358, "kyc_tier": "tier_2", "session_entropy": 0.383 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 299, "timestamp": "2026-01-02T13:23:00Z", "transaction_amount_usd": 0.94 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.651, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 320493.86, "financial_exposure_usd": 647493.42, "recoverable_pct": 0.486 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100700", "label": "fraudulent", "label_confidence": 0.812, "severity": "critical", "timestamp": "2026-01-01T11:40:00Z", "trace_id": "05c2d34d-a979-0968-a342-93218eb4e2b4" }
{ "account_age_days": 1972, "account_id": "ACCT-F05212B99F1A", "baseline_risk_score": 0.373, "kyc_tier": "tier_2", "session_entropy": 0.406 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 510, "timestamp": "2026-01-01T11:40:00Z", "transaction_amount_usd": 2969.24 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.889, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 590267.14, "financial_exposure_usd": 820277.01, "recoverable_pct": 0.412 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108389", "label": "benign", "label_confidence": 0.654, "severity": "high", "timestamp": "2026-01-06T19:49:00Z", "trace_id": "8d6f73a3-3445-a92f-bfbf-06f67aa66c09" }
{ "account_age_days": 957, "account_id": "ACCT-560CBA0E8E7F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.789 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 1119, "timestamp": "2026-01-06T19:49:00Z", "transaction_amount_usd": 4667.78 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.497, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 854.85, "financial_exposure_usd": 1443.06, "recoverable_pct": 0.602 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108804", "label": "benign", "label_confidence": 0.661, "severity": "medium", "timestamp": "2026-01-07T02:44:00Z", "trace_id": "2e289d43-bc25-bfe3-d055-dabcfedbd6e9" }
{ "account_age_days": 1134, "account_id": "ACCT-F9DD9AD6ED23", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.856 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 83, "timestamp": "2026-01-06T17:21:00Z", "transaction_amount_usd": 9.17 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.712, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 653.76, "financial_exposure_usd": 988.69, "recoverable_pct": 0.785 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103322", "label": "fraudulent", "label_confidence": 0.783, "severity": "high", "timestamp": "2026-01-03T07:22:00Z", "trace_id": "0d6dbb5e-b35b-0015-f376-8ac74324c26d" }
{ "account_age_days": 679, "account_id": "ACCT-B4CE90FF5107", "baseline_risk_score": 0.649, "kyc_tier": "tier_1", "session_entropy": 0.775 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 476, "timestamp": "2026-01-03T07:22:00Z", "transaction_amount_usd": 13517.44 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.815, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 132231.82, "financial_exposure_usd": 140493.13, "recoverable_pct": 0.294 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109965", "label": "benign", "label_confidence": 0.54, "severity": "low", "timestamp": "2026-01-07T22:05:00Z", "trace_id": "48322271-0b71-5d34-fbfb-db3a0a017a51" }
{ "account_age_days": 442, "account_id": "ACCT-C1EE577FF009", "baseline_risk_score": 0.06, "kyc_tier": "tier_3", "session_entropy": 0.31 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 516, "timestamp": "2026-01-07T22:05:00Z", "transaction_amount_usd": 9152.88 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.764, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 920.13, "financial_exposure_usd": 1944.37, "recoverable_pct": 0.865 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101738", "label": "fraudulent", "label_confidence": 0.814, "severity": "medium", "timestamp": "2026-01-02T04:58:00Z", "trace_id": "364db478-2f4e-3cda-c25d-b9e6cee1b69f" }
{ "account_age_days": 1230, "account_id": "ACCT-2CB78B733159", "baseline_risk_score": 0.335, "kyc_tier": "tier_1", "session_entropy": 0.702 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "GB", "latency_ms": 1165, "timestamp": "2026-01-02T04:58:00Z", "transaction_amount_usd": 59373.83 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.87, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 254635.3, "financial_exposure_usd": 482691.65, "recoverable_pct": 0.147 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106725", "label": "benign", "label_confidence": 0.499, "severity": "low", "timestamp": "2026-01-05T16:05:00Z", "trace_id": "6e950d6c-d05b-eb1b-30f2-f0f872d9987c" }
{ "account_age_days": 1436, "account_id": "ACCT-02A8AF68263E", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.567 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 1056, "timestamp": "2026-01-05T16:05:00Z", "transaction_amount_usd": 3229.12 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.579, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4278.53, "financial_exposure_usd": 5433.1, "recoverable_pct": 0.441 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101992", "label": "fraudulent", "label_confidence": 0.875, "severity": "low", "timestamp": "2026-01-02T09:12:00Z", "trace_id": "164d53e1-f38b-fa03-75bb-b4e2284a0e01" }
{ "account_age_days": 245, "account_id": "ACCT-C25831DBCD1B", "baseline_risk_score": 0.315, "kyc_tier": "tier_3", "session_entropy": 0.923 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 254, "timestamp": "2026-01-02T09:12:00Z", "transaction_amount_usd": 98602.75 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.843, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 620430.77, "financial_exposure_usd": 919099.02, "recoverable_pct": 0.139 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104350", "label": "fraudulent", "label_confidence": 0.812, "severity": "low", "timestamp": "2026-01-04T00:30:00Z", "trace_id": "2a7d811c-f497-6bb5-1495-7dd863a85d0a" }
{ "account_age_days": 1971, "account_id": "ACCT-DC02097A2E6B", "baseline_risk_score": 0.202, "kyc_tier": "tier_3", "session_entropy": 0.443 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 370, "timestamp": "2026-01-03T12:12:00Z", "transaction_amount_usd": 19.82 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.814, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3190879.18, "financial_exposure_usd": 5982974.25, "recoverable_pct": 0.83 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100025", "label": "fraudulent", "label_confidence": 0.767, "severity": "medium", "timestamp": "2026-01-01T00:25:00Z", "trace_id": "2fa0d842-bc55-300b-06a2-41af1d0af7f7" }
{ "account_age_days": 1700, "account_id": "ACCT-58321EE48471", "baseline_risk_score": 0.377, "kyc_tier": "tier_3", "session_entropy": 0.209 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 993, "timestamp": "2026-01-01T00:25:00Z", "transaction_amount_usd": 109668.33 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.459, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 411617.8, "financial_exposure_usd": 624069, "recoverable_pct": 0.774 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104607", "label": "fraudulent", "label_confidence": 0.726, "severity": "critical", "timestamp": "2026-01-04T04:47:00Z", "trace_id": "b21f2a01-e53e-099f-aeba-025bdf55529a" }
{ "account_age_days": 1118, "account_id": "ACCT-7F6E07982E34", "baseline_risk_score": 0.071, "kyc_tier": "tier_3", "session_entropy": 0.219 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 240, "timestamp": "2026-01-04T04:47:00Z", "transaction_amount_usd": 301000.64 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.465, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5687391.91, "financial_exposure_usd": 6144921.29, "recoverable_pct": 0.642 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109768", "label": "benign", "label_confidence": 0.663, "severity": "medium", "timestamp": "2026-01-07T18:48:00Z", "trace_id": "f8882baa-270b-2688-db38-c12dfe6bd4fb" }
{ "account_age_days": 723, "account_id": "ACCT-BA4F675294FC", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.677 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1012, "timestamp": "2026-01-07T18:48:00Z", "transaction_amount_usd": 11611.09 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.462, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1203.42, "financial_exposure_usd": 1909.86, "recoverable_pct": 0.87 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109650", "label": "benign", "label_confidence": 0.5, "severity": "low", "timestamp": "2026-01-07T16:50:00Z", "trace_id": "3a5f539b-5d8d-309e-3a10-697d1dbbc476" }
{ "account_age_days": 1014, "account_id": "ACCT-16ABBB7EF7BF", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.21 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 983, "timestamp": "2026-01-07T16:50:00Z", "transaction_amount_usd": 11124.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.635, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 203.31, "financial_exposure_usd": 216.01, "recoverable_pct": 0.758 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104335", "label": "fraudulent", "label_confidence": 0.625, "severity": "medium", "timestamp": "2026-01-04T00:15:00Z", "trace_id": "1ed75bfa-f869-b52d-9580-dced2ca4fdbe" }
{ "account_age_days": 1549, "account_id": "ACCT-48E2C2472825", "baseline_risk_score": 0.287, "kyc_tier": "tier_3", "session_entropy": 0.38 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 274, "timestamp": "2026-01-03T12:36:00Z", "transaction_amount_usd": 1.8 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED",...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.797, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1920204.76, "financial_exposure_usd": 2568109.47, "recoverable_pct": 0.582 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100696", "label": "fraudulent", "label_confidence": 0.752, "severity": "high", "timestamp": "2026-01-01T11:36:00Z", "trace_id": "1e731124-3fed-fd47-aa9f-17348bae04ed" }
{ "account_age_days": 1818, "account_id": "ACCT-798E304B756C", "baseline_risk_score": 0.608, "kyc_tier": "tier_2", "session_entropy": 0.162 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 666, "timestamp": "2026-01-01T11:36:00Z", "transaction_amount_usd": 6052.29 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.768, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 527860.84, "financial_exposure_usd": 836406.45, "recoverable_pct": 0.427 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100147", "label": "fraudulent", "label_confidence": 0.956, "severity": "critical", "timestamp": "2026-01-01T02:27:00Z", "trace_id": "54d144d5-18ed-e297-acb8-3fceb3e1511b" }
{ "account_age_days": 608, "account_id": "ACCT-504FDE7C746E", "baseline_risk_score": 0.569, "kyc_tier": "tier_1", "session_entropy": 0.244 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 862, "timestamp": "2026-01-01T02:27:00Z", "transaction_amount_usd": 60677.62 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.518, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 254895.41, "financial_exposure_usd": 416481.42, "recoverable_pct": 0.06 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105046", "label": "fraudulent", "label_confidence": 0.708, "severity": "low", "timestamp": "2026-01-04T12:06:00Z", "trace_id": "9fcbb103-e27b-9bab-21a0-30aa92806a5a" }
{ "account_age_days": 1230, "account_id": "ACCT-05492E3064B8", "baseline_risk_score": 0.341, "kyc_tier": "tier_2", "session_entropy": 0.638 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 657, "timestamp": "2026-01-04T12:06:00Z", "transaction_amount_usd": 692153.64 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.439, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1436576.92, "financial_exposure_usd": 2249086.46, "recoverable_pct": 0.728 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103156", "label": "fraudulent", "label_confidence": 0.884, "severity": "medium", "timestamp": "2026-01-03T04:36:00Z", "trace_id": "0154eaab-348b-d904-1562-d22ba76e2c0b" }
{ "account_age_days": 1975, "account_id": "ACCT-4B37217E45AE", "baseline_risk_score": 0.558, "kyc_tier": "tier_3", "session_entropy": 0.39 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 924, "timestamp": "2026-01-03T04:36:00Z", "transaction_amount_usd": 25323.46 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.636, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 567455.51, "financial_exposure_usd": 963808.84, "recoverable_pct": 0.327 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101888", "label": "fraudulent", "label_confidence": 0.805, "severity": "high", "timestamp": "2026-01-02T07:28:00Z", "trace_id": "7e3e71a3-0876-b510-db24-287879f68e80" }
{ "account_age_days": 1930, "account_id": "ACCT-318035DB7911", "baseline_risk_score": 0.455, "kyc_tier": "tier_1", "session_entropy": 0.89 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 490, "timestamp": "2026-01-02T07:28:00Z", "transaction_amount_usd": 71745.46 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.924, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 497198.05, "financial_exposure_usd": 722843.02, "recoverable_pct": 0.458 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104522", "label": "fraudulent", "label_confidence": 0.685, "severity": "critical", "timestamp": "2026-01-04T03:22:00Z", "trace_id": "b51b8992-8fbf-a987-6027-b854c489ed5b" }
{ "account_age_days": 435, "account_id": "ACCT-AEE39DE13940", "baseline_risk_score": 0.314, "kyc_tier": "tier_1", "session_entropy": 0.167 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 147, "timestamp": "2026-01-04T03:22:00Z", "transaction_amount_usd": 2725641.88 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.889, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4678762.38, "financial_exposure_usd": 6004341.42, "recoverable_pct": 0.753 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107218", "label": "benign", "label_confidence": 0.676, "severity": "low", "timestamp": "2026-01-06T00:18:00Z", "trace_id": "9be38817-0f80-6034-77de-1add6863426e" }
{ "account_age_days": 781, "account_id": "ACCT-EA691F07EB8B", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.162 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 296, "timestamp": "2026-01-05T14:03:00Z", "transaction_amount_usd": 13.65 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.574, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4596.68, "financial_exposure_usd": 6061.96, "recoverable_pct": 0.96 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102976", "label": "fraudulent", "label_confidence": 0.883, "severity": "high", "timestamp": "2026-01-03T01:36:00Z", "trace_id": "0237474f-b531-dce7-ed6f-b796fbca00c8" }
{ "account_age_days": 719, "account_id": "ACCT-8952E610B851", "baseline_risk_score": 0.459, "kyc_tier": "tier_1", "session_entropy": 0.895 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 98, "timestamp": "2026-01-02T15:38:00Z", "transaction_amount_usd": 11.19 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.718, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 364109.17, "financial_exposure_usd": 640372.67, "recoverable_pct": 0.2 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102778", "label": "fraudulent", "label_confidence": 0.869, "severity": "critical", "timestamp": "2026-01-02T22:18:00Z", "trace_id": "1faa3aa3-a4b9-c85e-043c-07770e1ee35a" }
{ "account_age_days": 715, "account_id": "ACCT-5AF68D87487B", "baseline_risk_score": 0.37, "kyc_tier": "tier_3", "session_entropy": 0.255 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 112, "timestamp": "2026-01-02T22:18:00Z", "transaction_amount_usd": 26586.43 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.634, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 297353.18, "financial_exposure_usd": 603415.72, "recoverable_pct": 0.728 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107457", "label": "benign", "label_confidence": 0.529, "severity": "low", "timestamp": "2026-01-06T04:17:00Z", "trace_id": "073063f4-5a7f-10d4-b07f-f14e85a623c3" }
{ "account_age_days": 1388, "account_id": "ACCT-AA8187878B1B", "baseline_risk_score": 0.097, "kyc_tier": "tier_3", "session_entropy": 0.138 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 202, "timestamp": "2026-01-06T01:24:00Z", "transaction_amount_usd": 8.56 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.451, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2182.09, "financial_exposure_usd": 4343.78, "recoverable_pct": 0.49 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101282", "label": "fraudulent", "label_confidence": 0.9, "severity": "medium", "timestamp": "2026-01-01T21:22:00Z", "trace_id": "80eb1072-1a36-a87c-09da-2264f785ccdd" }
{ "account_age_days": 1009, "account_id": "ACCT-91CC2CE182F7", "baseline_risk_score": 0.405, "kyc_tier": "tier_2", "session_entropy": 0.183 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 799, "timestamp": "2026-01-01T21:22:00Z", "transaction_amount_usd": 101788.9 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.383, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 297917.37, "financial_exposure_usd": 682856.17, "recoverable_pct": 0.413 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104506", "label": "fraudulent", "label_confidence": 0.658, "severity": "high", "timestamp": "2026-01-04T03:06:00Z", "trace_id": "4e9e0b43-aeae-75b4-3829-d3e8b8c15089" }
{ "account_age_days": 1859, "account_id": "ACCT-4B236CD64ACE", "baseline_risk_score": 0.129, "kyc_tier": "tier_3", "session_entropy": 0.346 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 339, "timestamp": "2026-01-04T03:06:00Z", "transaction_amount_usd": 1061890.37 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.47, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 7340411.1, "financial_exposure_usd": 8093664.87, "recoverable_pct": 0.644 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108199", "label": "benign", "label_confidence": 0.746, "severity": "medium", "timestamp": "2026-01-06T16:39:00Z", "trace_id": "b777a12f-742d-d882-e2fe-3709744c54a8" }
{ "account_age_days": 914, "account_id": "ACCT-DCE63EF373C2", "baseline_risk_score": 0.106, "kyc_tier": "tier_3", "session_entropy": 0.936 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 222, "timestamp": "2026-01-06T14:18:00Z", "transaction_amount_usd": 9.8 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.692, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3573.37, "financial_exposure_usd": 4835.83, "recoverable_pct": 0.986 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106813", "label": "benign", "label_confidence": 0.715, "severity": "low", "timestamp": "2026-01-05T17:33:00Z", "trace_id": "3a853663-f959-3b91-3639-a9720bfa4a16" }
{ "account_age_days": 244, "account_id": "ACCT-8B9C91749004", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.898 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 261, "timestamp": "2026-01-05T06:15:00Z", "transaction_amount_usd": 24.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.478, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1618.09, "financial_exposure_usd": 3334.49, "recoverable_pct": 0.546 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108139", "label": "benign", "label_confidence": 0.677, "severity": "medium", "timestamp": "2026-01-06T15:39:00Z", "trace_id": "74f32718-33fd-f6c3-741b-5d3698b458e2" }
{ "account_age_days": 27, "account_id": "ACCT-0239D71218CD", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.401 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 266, "timestamp": "2026-01-06T15:39:00Z", "transaction_amount_usd": 7289.31 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.577, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2599.16, "financial_exposure_usd": 5820.87, "recoverable_pct": 0.567 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109202", "label": "benign", "label_confidence": 0.456, "severity": "low", "timestamp": "2026-01-07T09:22:00Z", "trace_id": "cb33386e-37d8-8749-c752-fc1b947d7ff9" }
{ "account_age_days": 1303, "account_id": "ACCT-F7A93859B15A", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.589 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 232, "timestamp": "2026-01-07T09:22:00Z", "transaction_amount_usd": 4750.56 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.762, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1730.26, "financial_exposure_usd": 1842.66, "recoverable_pct": 0.825 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109420", "label": "benign", "label_confidence": 0.683, "severity": "low", "timestamp": "2026-01-07T13:00:00Z", "trace_id": "673aa698-60f3-6fd5-d692-d8aef2932c59" }
{ "account_age_days": 822, "account_id": "ACCT-538EC2859432", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.223 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 110, "timestamp": "2026-01-07T09:59:00Z", "transaction_amount_usd": 14.21 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.576, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1750.2, "financial_exposure_usd": 4370.23, "recoverable_pct": 0.888 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102821", "label": "fraudulent", "label_confidence": 0.849, "severity": "medium", "timestamp": "2026-01-02T23:01:00Z", "trace_id": "836a26ca-f099-fb0e-baca-712d05d9aa8b" }
{ "account_age_days": 1142, "account_id": "ACCT-53EBA1831F87", "baseline_risk_score": 0.575, "kyc_tier": "tier_3", "session_entropy": 0.413 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 209, "timestamp": "2026-01-02T13:43:00Z", "transaction_amount_usd": 13.91 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.937, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 686256.74, "financial_exposure_usd": 790671.47, "recoverable_pct": 0.553 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102085", "label": "fraudulent", "label_confidence": 0.917, "severity": "medium", "timestamp": "2026-01-02T10:45:00Z", "trace_id": "05ad85fb-6fb9-a9a4-a5f5-58b6fbefd518" }
{ "account_age_days": 1599, "account_id": "ACCT-DC8EDB94AD2B", "baseline_risk_score": 0.379, "kyc_tier": "tier_3", "session_entropy": 0.932 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 327, "timestamp": "2026-01-02T10:45:00Z", "transaction_amount_usd": 76256.8 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.529, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 492633.17, "financial_exposure_usd": 1190996.47, "recoverable_pct": 0.585 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107795", "label": "benign", "label_confidence": 0.493, "severity": "high", "timestamp": "2026-01-06T09:55:00Z", "trace_id": "124cc67c-2fdd-10f5-61c5-03b014a843a8" }
{ "account_age_days": 1954, "account_id": "ACCT-ACD10D57F254", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.859 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 311, "timestamp": "2026-01-05T23:30:00Z", "transaction_amount_usd": 21.75 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.682, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 346.92, "financial_exposure_usd": 394.54, "recoverable_pct": 0.868 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102187", "label": "fraudulent", "label_confidence": 0.892, "severity": "medium", "timestamp": "2026-01-02T12:27:00Z", "trace_id": "1fe9033e-fd4c-c60e-671a-82ed5a8e24ba" }
{ "account_age_days": 53, "account_id": "ACCT-6404DE0AD763", "baseline_risk_score": 0.307, "kyc_tier": "tier_1", "session_entropy": 0.276 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 452, "timestamp": "2026-01-02T12:27:00Z", "transaction_amount_usd": 39935.44 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.672, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 213919.15, "financial_exposure_usd": 459949.29, "recoverable_pct": 0.006 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103751", "label": "fraudulent", "label_confidence": 0.92, "severity": "medium", "timestamp": "2026-01-03T14:31:00Z", "trace_id": "b40a2e5e-f2c4-6c8c-1b6c-2b7b98360f20" }
{ "account_age_days": 1742, "account_id": "ACCT-9F04D1CE8644", "baseline_risk_score": 0.44, "kyc_tier": "tier_2", "session_entropy": 0.947 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 1046, "timestamp": "2026-01-03T14:31:00Z", "transaction_amount_usd": 2271743.37 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.428, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4500292.12, "financial_exposure_usd": 5910486.97, "recoverable_pct": 0.884 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102828", "label": "fraudulent", "label_confidence": 0.936, "severity": "high", "timestamp": "2026-01-02T23:08:00Z", "trace_id": "fec82813-ca6c-c928-1597-80d0ae7135f7" }
{ "account_age_days": 1684, "account_id": "ACCT-188F52147859", "baseline_risk_score": 0.587, "kyc_tier": "tier_2", "session_entropy": 0.294 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 343, "timestamp": "2026-01-02T16:33:00Z", "transaction_amount_usd": 23.92 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.815, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 369977.03, "financial_exposure_usd": 737394.98, "recoverable_pct": 0.161 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }