{"id":2821,"date":"2024-02-06T21:57:13","date_gmt":"2024-02-06T21:57:13","guid":{"rendered":"https:\/\/www.gc4ss.org\/?p=2821"},"modified":"2026-04-09T16:24:45","modified_gmt":"2026-04-09T15:24:45","slug":"silent-signals-the-role-of-data-analysts-and-data-scientists-in-algorithmic-market-anomaly-detection-for-fraud-and-insider-trading-identification","status":"publish","type":"post","link":"https:\/\/www.gc4ss.org\/?p=2821","title":{"rendered":"Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification"},"content":{"rendered":"<div id=\"pl-2821\"  class=\"panel-layout\" ><div id=\"pg-2821-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2821-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2821-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><!-- wp:paragraph --><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #ff0000;\"><strong>Aziz Ozmen, PhD<\/strong><\/span><br \/><a title=\"\" href=\"mailto:aziz.ozmen@gc4ss.org\">aziz.ozmen@gc4ss.org<\/a><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Senior<\/strong> <strong>Security Analyst<\/strong><br \/><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Global Center for Security Studies<\/strong><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:image {\"id\":2747,\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} --><\/p>\n<figure class=\"wp-block-image size-large\">\n<h1>Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification<\/h1>\n<p><strong>Abstract<\/strong><\/p>\n<p>The digitization of global financial markets has produced an unprecedented deluge of high-frequency trading data, creating both opportunities and vulnerabilities. Among the most persistent threats to market integrity are insider trading and algorithmic fraud\u2014 activities that leave subtle but detectable traces in transactional data. This paper investigates the distinct yet complementary roles of Data Analysts and Data Scientists in the detection of anomalous market patterns, specifically focusing on unusual trading volumes and synchronized order placements. Moving beyond traditional rule-based surveillance systems, this study explores how time series analysis and isolation forest<\/p>\n<p>algorithms enable the automated identification of suspicious activities that precede price-sensitive events. Through a synthesis of academic literature, industry job architectures, and empirical studies from 2019 to 2023, this paper delineates the division of labor: Data Scientists engineer and optimize unsupervised anomaly detection models, while Data Analysts validate model outputs, perform contextual investigations, and translate computational findings into actionable intelligence for compliance officers and regulators. The paper concludes by addressing persistent challenges\u2014including false positive reduction, model explainability, and the evolving sophistication of fraudulent techniques\u2014and proposes an integrated operational framework for financial market surveillance.<\/p>\n<p><strong>Keywords: <\/strong>Insider Trading Detection, Market Anomaly Detection, High-Frequency Trading, Isolation Forest, Time Series Analysis, Data Science, Financial Fraud Surveillance<\/p>\n<h1>1.\u00a0\u00a0 Introduction<\/h1>\n<p>The integrity of financial markets rests on a foundational principle: all investors should have equal access to material information. Insider trading\u2014the illegal practice of trading securities based on non-public, material information\u2014violates this principle, eroding public trust and distorting capital allocation. Similarly, algorithmic manipulation, including spoofing (placing orders with intent to cancel before execution) and layering (creating artificial demand),<\/p>\n<p>undermines price discovery mechanisms. As markets have become increasingly electronic and high-frequency, the scale of transactional data has grown beyond the capacity of human surveillance alone.<\/p>\n<p>According to Tony Sio, Head of Regulatory Strategy and Innovation at Nasdaq Anti-Financial Crime, \"The problem around financial crime is finding patterns of abuse among huge data sets.\" Sio further notes that \"AI, in particular the different styles and techniques that are coming across now, are incredibly suited to solve this problem\u201d. This observation was echoed by both<\/p>\n<p>U.S. Securities and Exchange Commission Chair Gary Gensler and Financial Conduct Authority Chief Executive Nikhil Rathi in their 2023 speeches, with Gensler calling AI \"the most transformative technology of our time\" and noting its growing application in compliance, trading algorithms, and market surveillance functions.<\/p>\n<p>The central thesis of this paper is that effective algorithmic anomaly detection for insider trading and fraud requires a clear division of labor between Data Scientists, who build and optimize the computational models, and Data Analysts, who validate outputs, provide domain context, and translate findings into actionable intelligence. While machine learning models\u2014particularly unsupervised approaches like isolation forests\u2014can identify statistical anomalies at scale, they cannot distinguish between a legitimate trading strategy and illegal insider activity without human validation.<\/p>\n<p>This paper is structured as follows. Section II reviews the landscape of insider trading and market manipulation, including the characteristic signals they produce in trading data. Section III delineates the distinct roles of Data Analysts and Data Scientists within the anomaly detection pipeline, drawing on real-world job descriptions and industry implementations. Section IV presents the technical framework, focusing on time series analysis and isolation forest algorithms. Section V discusses the collaborative workflow, including model development, output validation, and investigation. Section VI addresses persistent challenges\u2014false positives, model explainability, and adversarial adaptation\u2014followed by a conclusion on the future trajectory of human-AI collaboration in market surveillance.<\/p>\n<h1>2.\u00a0\u00a0 The Landscape of Insider Trading and Market Anomalies<\/h1>\n<ul>\n<li><strong>Defining Insider Trading and Its Signatures<\/strong><\/li>\n<\/ul>\n<p>Insider trading occurs when individuals trade securities based on material, non-public information. While some forms of insider trading are legal (e.g., corporate executives trading according to pre-established 10b5-1 plans), illegal insider trading involves the exploitation of confidential information for personal gain or to avoid losses. As documented by Deng and colleagues in their study of the Chinese securities market, insider trading has existed since the birth of modern financial markets and remains a persistent enforcement challenge for regulators worldwide.<\/p>\n<p>The challenge of detection lies in the signal-to-noise ratio. Legitimate trading occurs for myriad reasons: portfolio rebalancing, tax considerations, liquidity needs, and genuine informational advantages derived from public research. Illegal insider trading must be distinguished from this noisy background. As noted in a study by Deriu and colleagues (2022) on dimensionality reduction for insider trading detection, \"Identification of market abuse is an extremely complicated activity that requires the analysis of large and complex datasets\u201d.<\/p>\n<p>Characteristic signatures of potential insider trading include:<\/p>\n<ul>\n<li><strong>Abnormal Trading Volume<\/strong>: A sudden, statistically significant increase in trading activity for a specific security, particularly in the days or weeks preceding a price-sensitive event (e.g., earnings announcement, merger bid, regulatory decision).<\/li>\n<li><strong>Synchronized Trading<\/strong>: Multiple accounts exhibiting highly correlated trading patterns\u2014same security, same direction (buy or sell), similar timing\u2014suggesting coordination based on shared non-public<\/li>\n<li><strong>Unusual Profitability<\/strong>: Trades that consistently generate abnormal returns relative to market benchmarks, particularly when the trader has no apparent informational<\/li>\n<li><strong>Timing Anomalies<\/strong>: Trading activity that occurs immediately before price-moving news, with the timing suggesting<\/li>\n<\/ul>\n<h1>2.2\u00a0\u00a0 Algorithmic Manipulation: Spoofing and Layering<\/h1>\n<p>Beyond traditional insider trading, the high-frequency trading era has given rise to new forms of algorithmic manipulation. Spoofing involves placing orders with the intent to cancel them before execution, creating a false impression of supply or demand to manipulate prices. Layering is a more sophisticated variant where multiple spoof orders are placed at different price levels to create an illusion of market depth.<\/p>\n<p>These activities leave detectable patterns in order book data: orders that are consistently canceled within milliseconds of execution, patterns of order placement and cancellation that correlate with price movements in the opposite direction, and anomalous order-to-trade ratios. The detection of such patterns requires analysis at microsecond granularity, far beyond human capability.<\/p>\n<h1>2.3\u00a0\u00a0 The Regulatory Imperative<\/h1>\n<p>Regulatory bodies have increasingly embraced AI and machine learning for market surveillance. Rathi stated that the FCA itself is \"using AI methods to monitor portfolios and identify risk behaviors\u201d. Gensler similarly indicated that the SEC \"could benefit from staff making greater use of AI in their market surveillance\u201d. This regulatory endorsement reflects a broader recognition that traditional rule-based surveillance systems\u2014which trigger alerts based on fixed thresholds (e.g., volume exceeds 200% of 30-day average)\u2014are inadequate for detecting sophisticated abuse. As one industry analysis notes, these legacy systems have historically had difficulty \"keeping pace with expanding trading volumes\u201d.<\/p>\n<h1>3.\u00a0\u00a0 Role Delineation: Data Analyst vs. Data Scientist in Market Anomaly Detection<\/h1>\n<p>The successful deployment of algorithmic anomaly detection for market surveillance requires a clear understanding of the distinct contributions of Data Scientists and Data Analysts. This section delineates these roles based on job architecture analyses, academic literature, and industry implementations.<\/p>\n<h1>3.1\u00a0\u00a0 The Financial Data Scientist: Model Architect and Engineer<\/h1>\n<p>The Data Scientist in financial market surveillance is responsible for the technical infrastructure that transforms raw trading data into actionable anomaly signals. According to a job posting for a Principal Data Scientist at BNY Mellon's Financial Crimes Risk group\u2014described as a \"founding member\" opportunity in a newly formed data science and decision support team\u2014the Data Scientist is expected to \"build an Augmented Intelligence platform for risk probabilities across a series of key indicating metrics\" using \"classification and anomaly detection techniques to perform statistical, econometric, and drill-down analysis underpinned by machine-learning models\" .<\/p>\n<p>The core technical responsibilities of the Data Scientist in this domain include:<\/p>\n<ul>\n<li><strong>Algorithm Selection and Implementation<\/strong>: Choosing appropriate anomaly detection methods for specific surveillance tasks. For insider trading detection, researchers have successfully employed unsupervised learning approaches including principal component analysis, autoencoders, and clustering techniques. For spoofing and layering detection, isolation forests have proven particularly effective due to their efficiency with high-dimensional data.<\/li>\n<\/ul>\n<ul>\n<li><strong>Feature Engineering<\/strong>: Transforming raw tick data into meaningful features for anomaly detection. This includes constructing variables such as order-to-trade ratios, cancellation rates, volume-weighted average price deviations, and temporal clustering metrics. The quality of feature engineering directly determines detection<\/li>\n<li><strong>Hyperparameter Optimization<\/strong>: Fine-tuning model parameters to balance sensitivity and As demonstrated in a study on insider trading detection in the Indian stock market using multi-channel convolutional neural networks, hyperparameter optimization using frameworks like Optuna can reduce false positive rates by 20% across all time windows. The researchers found that optimized deep learning models achieved accuracy rates of 87.50%, 75.00%, and 62.50% for 30-, 60-, and 90-day time windows respectively, significantly outperforming benchmark models like logistic regression and random forest.<\/li>\n<\/ul>\n<ul>\n<li><strong>Model Evaluation and Validation<\/strong>: Assessing model performance using appropriate In anomaly detection for fraud, where the positive class (illegal trades) is extremely rare, accuracy is a misleading metric. Data Scientists must focus on precision, recall, F1-score, and area under the precision-recall curve, with particular attention to false positive rates that could overwhelm compliance teams.<\/li>\n<\/ul>\n<ul>\n<li><strong>Production Deployment<\/strong>: Implementing models in real-time or near-real-time surveillance systems, with attention to latency requirements. As noted in the BNY Mellon job description, this requires \"deep knowledge of time series database technologies\" and \"handling real-time transactional data feeds across asset classes and regions\u201d.<\/li>\n<\/ul>\n<p>Crucially, the Data Scientist is not expected to be a compliance expert or forensic investigator. Their expertise is computational and statistical. However, as the BNY Mellon posting indicates, \"deep understanding of financial engineering and mathematical finance concepts\" is highly desirable, as is the ability to \"present research findings to a wide range of audiences\u201d.<\/p>\n<h1>3.2\u00a0\u00a0 The Financial Data Analyst: Validator, Investigator, and Bridge<\/h1>\n<p>If the Data Scientist builds the detection engine, the Data Analyst ensures it is targeting the right threats and that its outputs are actionable. The Analyst's role is fundamentally interpretive and investigative.<\/p>\n<p>Drawing on general frameworks for data analytics roles, the financial Data Analyst's responsibilities include:<\/p>\n<ul>\n<li><strong>Output<\/strong> <strong>Validation<\/strong> <strong>and<\/strong> <strong>Triage<\/strong>: The Analyst reviews the anomalies flagged by the Data<\/li>\n<\/ul>\n<p>Scientist's models, distinguishing between true positives (suspicious activity warranting investigation) and false positives (legitimate trading that merely appears anomalous). This requires domain expertise: understanding what constitutes normal trading behavior for specific securities, market conditions, and investor types.<\/p>\n<ul>\n<li><strong>Contextual Investigation<\/strong>: For flagged anomalies, the Analyst performs deeper investigation, examining related accounts, historical trading patterns, and external context (e.g., upcoming corporate events, news announcements). This investigation may involve querying multiple data sources using SQL, pulling additional information from surveillance platforms, and documenting findings.<\/li>\n<li><strong>Pattern Recognition and Feedback<\/strong>: The Analyst identifies recurring false positive patterns and communicates these to the Data Scientist for model improvement. For example, if the model consistently flags end-of-quarter window dressing by mutual funds as suspicious, the Analyst documents this pattern so the Data Scientist can adjust feature weights or add exclusion rules.<\/li>\n<\/ul>\n<ul>\n<li><strong>Visualization and Reporting<\/strong>: The Analyst creates dashboards and reports that translate model outputs into formats usable by compliance officers, legal teams, and regulators. This includes time-series visualizations of suspicious activity, network graphs of coordinated trading, and summary statistics by security, trader, or time<\/li>\n<li><strong>Case Management<\/strong>: When the Analyst determines that flagged activity warrants formal investigation, they prepare case files that document the evidence, articulate the suspicious patterns, and provide the analytical basis for referral to as noted in the General Motors advanced analytics internship description, the Analyst role requires proficiency in \"data visualization techniques\" and the ability to \"identify practical insights, make recommendations, and communicate results to business and technical audiences\u201d.<\/li>\n<\/ul>\n<ul>\n<li><strong>Comparative<\/strong> <strong>Summary<\/strong><\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"122\">\n<p><strong>Feature<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p><strong>Financial<\/strong> <strong>Data<\/strong> <strong>Scientist<\/strong><\/p>\n<\/td>\n<td width=\"318\">\n<p><strong>Financial<\/strong> <strong>Data<\/strong> <strong>Analyst<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Primary<\/strong> <strong>Output<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>Anomaly detection models, inference pipelines, risk scores<\/p>\n<\/td>\n<td width=\"318\">\n<p>Investigated cases, dashboards, regulatory referrals<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Core<\/strong> <strong>Tools<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>Python (scikit-learn, PyTorch), Spark, time series databases<\/p>\n<\/td>\n<td width=\"318\">\n<p><strong>\u00a0<\/strong><\/p>\n<p>SQL, Tableau\/PowerBI, surveillance platforms<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Statistical<\/strong> <strong>Focus<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>Model evaluation (precision, recall, F1), hyperparameter tuning<\/p>\n<\/td>\n<td width=\"318\">\n<p><strong>\u00a0<\/strong><\/p>\n<p>Descriptive statistics, hypothesis testing, pattern recognition<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>Domain <\/strong><strong>Knowledge<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>Machine learning, time series analysis, financial engineering<\/p>\n<\/td>\n<td width=\"318\">\n<p>Market microstructure, trading regulations, investigative procedures<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>Typical <\/strong><strong>Question<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>\"How can we improve recall for spoofing detection?\"<\/p>\n<\/td>\n<td width=\"318\">\n<p>\"Is this flagged pattern legitimate trading or manipulation?\"<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Validation<\/strong> <strong>Role<\/strong><\/p>\n<\/td>\n<td width=\"244\">\n<p>Cross-validation, backtesting, performance monitoring<\/p>\n<\/td>\n<td width=\"318\">\n<p>Manual review of anomalies, false positive identification<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"4\">\n<li><strong>Technical<\/strong> <strong>Framework:<\/strong><strong> Time<\/strong> <strong>Series<\/strong> <strong>Analysis<\/strong><strong> and<\/strong> <strong>Isolation<\/strong> <strong>Forests<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Time Series Analysis for Anomaly Detection<\/strong><\/li>\n<\/ul>\n<p>Time series analysis forms the foundation of algorithmic market surveillance. Trading data is inherently temporal: each transaction and order carries a timestamp, and patterns of interest unfold over time. As noted in a comprehensive review by Bl\u00e1zquez-Garc\u00eda and colleagues (2021), time series anomaly detection encompasses three primary categories: point anomalies (individual data points deviating from expected patterns), contextual anomalies (points anomalous in specific contexts but not globally), and collective anomalies (sequences of points that together form anomalous patterns).<\/p>\n<p>For insider trading detection, contextual anomalies are particularly relevant. A large trade that would be normal during high-volume periods may be anomalous during quiet trading hours.<\/p>\n<p>Similarly, a pattern of order cancellations that would be unremarkable for a high-frequency market maker may be highly suspicious for a retail investor.<\/p>\n<p>Chen and colleagues (2024) proposed a novel approach for insider trading detection in industrial chains using \"logistics time interval characteristics\" and a dynamic sliding window method. Their approach recognizes that the temporal span of suspicious trading can vary significantly depending on the nature of the non-public information and the trading strategy employed. By using an adaptive window that expands or contracts based on detected patterns, their method achieved a 20.68% improvement in F1 score compared to standard isolation forest implementations.<\/p>\n<h1>4.2\u00a0\u00a0 Isolation Forest for Anomaly Detection<\/h1>\n<p>Isolation Forest, introduced by Liu, Ting, and Zhou (2008), has emerged as a leading algorithm for anomaly detection in financial surveillance. Unlike traditional methods that attempt to model \"normal\" behavior and identify deviations, isolation forest explicitly isolates anomalies by exploiting two key properties: anomalies are few and they are different.<\/p>\n<p>The algorithm works by recursively partitioning the feature space using random splits.<\/p>\n<p>Anomalies are \"easier to isolate\" than normal points\u2014they require fewer splits to be separated into their own region. The path length from root to leaf serves as an anomaly score: shorter paths indicate higher anomaly likelihood.<\/p>\n<p>The suitability of isolation forest for financial fraud detection stems from several characteristics:<\/p>\n<ul>\n<li><strong>Efficiency<\/strong>: Isolation forest has linear time complexity, making it scalable to the massive datasets generated by high-frequency<\/li>\n<li><strong>Handling of High Dimensionality<\/strong>: Financial data may include dozens or hundreds of features (price, volume, order book depth, cancellation rates, ). Isolation forest performs well even when many features are irrelevant.<\/li>\n<li><strong>No Assumption of Distribution<\/strong>: Unlike parametric methods that assume normal distributions, isolation forest makes no distributional assumptions\u2014important because trading data is typically heavy-tailed and non-normal.<\/li>\n<\/ul>\n<p>A study on fraud detection in carbon emission allowance markets compared multiple unsupervised methods including Isolation Forest, One-Class SVM, Autoencoder, DBSCAN, LOF, K-Means, Elliptic Envelope, and PCA. The researchers found that \"models such as Isolation Forest and Elliptic Envelope significantly improve trading outcomes, with notable increases in net profit and win rate while reducing drawdown\u201d. This finding demonstrates that anomaly detection can be integrated directly into trading strategies to avoid manipulated markets.<\/p>\n<h1>4.3\u00a0\u00a0 Hybrid Approaches: Unsupervised Learning for Insider Trading<\/h1>\n<p>Several recent studies have advanced the application of unsupervised learning to insider trading detection. Deriu and colleagues (2022, 2024) proposed two complementary unsupervised methods for market surveillance:<\/p>\n<p>The first method uses \"clustering to identify, in the vicinity of a price sensitive event such as a takeover bid, discontinuities in the trading activity of an investor with respect to his\/her own past trading history and on the present trading activity of his\/her peers\" . This approach captures both temporal anomalies (deviation from one's own baseline) and social anomalies (deviation from peer behavior).<\/p>\n<p>The second method aims to identify \"small groups of investors that act coherently around price sensitive events, pointing to potential insider rings, i.e. a group of synchronized traders displaying strong directional trading in rewarding position in a period before the price sensitive event\u201d. This approach is particularly important because insider trading often involves coordinated activity among multiple individuals\u2014family members, business associates, or professional networks.<\/p>\n<p>The researchers applied their methods to \"investor resolved data of Italian stocks around takeover bids\" as a case study, demonstrating the practical applicability of unsupervised approaches to real-world surveillance challenges.<\/p>\n<h1>5.\u00a0\u00a0 The Collaborative Workflow: From Data to Investigation<\/h1>\n<ul>\n<li><strong>Model Development Phase<\/strong><\/li>\n<\/ul>\n<p>The collaborative process begins with the Data Scientist developing the anomaly detection model. This involves:<\/p>\n<ol>\n<li><strong>Data Acquisition and Preparation<\/strong>: The Data Scientist ingests trading data from exchange feeds, order books, and trade repositories. This data must be cleaned, normalized, and aligned temporally.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Feature Engineering<\/strong>: Working with input from Analysts regarding known suspicious patterns, the Data Scientist constructs features that capture potential signals of abuse: volume z-scores, cancellation rates, order-to-trade ratios, temporal clustering metrics, and correlation measures across accounts.<\/li>\n<li><strong>Model<\/strong> <strong>Selection<\/strong> <strong>and<\/strong> <strong>Training<\/strong>: The Data Scientist selects appropriate algorithms (isolation forest, autoencoders, clustering) and trains them on historical data, using periods with known enforcement actions as validation.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Threshold Calibration<\/strong>: The Data Scientist sets anomaly score thresholds that determine which activities are flagged for This involves trade-offs between sensitivity (catching more true positives) and specificity (avoiding false positives).<\/li>\n<\/ol>\n<h1>5.2\u00a0\u00a0 Operational Deployment Phase<\/h1>\n<p>Once the model is deployed, the Analyst takes primary responsibility:<\/p>\n<ol>\n<li><strong>Alert Triage<\/strong>: The Analyst reviews flagged anomalies, examining the underlying trading data, the model's confidence scores, and any available context about the security or<\/li>\n<li><strong>Initial Validation<\/strong>: The Analyst determines whether the flagged pattern warrants deeper investigation. Many anomalies will be resolved as false positives\u2014legitimate trading that appears unusual due to known events (e.g., index rebalancing, option expiration).<\/li>\n<li><strong>Deep Investigation<\/strong>: For suspicious patterns, the Analyst conducts deeper investigation: querying historical data for similar patterns, examining related accounts, checking for connections to price-sensitive events, and documenting the trading<\/li>\n<li><strong>Case Referral<\/strong>: When the Analyst determines that evidence supports a reasonable suspicion of illegal activity, they prepare a case file for referral to compliance, legal, or regulatory authorities.<\/li>\n<\/ol>\n<h1>5.3\u00a0\u00a0 Continuous Improvement<\/h1>\n<p>Both roles contribute to iterative model improvement:<\/p>\n<ul>\n<li>The Analyst documents false positives and patterns the model misses, providing feedback to the Data<\/li>\n<li>The Data Scientist uses this feedback to adjust features, retrain models, or develop new<\/li>\n<li>The team periodically reviews model performance against known enforcement actions and emerging manipulation<\/li>\n<\/ul>\n<h1>6.\u00a0\u00a0 Challenges and Limitations<\/h1>\n<ul>\n<li><strong>The<\/strong> <strong>False<\/strong> <strong>Positive<\/strong> <strong>Problem<\/strong><\/li>\n<\/ul>\n<p>False positives\u2014legitimate trading flagged as suspicious\u2014are the bane of automated<\/p>\n<p>surveillance systems. A high false positive rate overwhelms Analysts, leading to alert fatigue and potentially causing genuine threats to be missed. The Optuna-optimized model described by<\/p>\n<p>Priyadarshi and Kumar (2024) reduced false positives by 20%, but this still leaves substantial room for improvement.<\/p>\n<p>False positives arise from multiple sources: legitimate trading strategies that mimic suspicious patterns (e.g., momentum trading before earnings), market-wide events that affect many securities simultaneously, and data quality issues that introduce spurious signals. The Analyst's role in distinguishing these from genuine threats is irreplaceable.<\/p>\n<h1>6.2\u00a0\u00a0 Model Explainability<\/h1>\n<p>Machine learning models, particularly deep neural networks, are often \"black boxes\"\u2014they produce outputs without revealing how those outputs were derived. This poses a challenge for market surveillance, where investigators may need to explain, in legal proceedings, why a particular trade was flagged as suspicious.<\/p>\n<p>The explainability challenge is noted in the regulatory context: Sio observed that one potential concern with AI surveillance is \"explainability, for example in that brokers who are obligated to act in the best interest of their clients will have to prove AI models do that\u201d. This suggests that interpretable models (e.g., decision trees, logistic regression) may be preferred in some contexts despite potentially lower performance.<\/p>\n<h1>6.3\u00a0\u00a0 Adversarial Adaptation<\/h1>\n<p>Sophisticated insider traders adapt their behavior to evade detection. If a particular pattern becomes known to be monitored, traders may shift to alternative strategies. The detection models must therefore be continuously updated\u2014a task requiring ongoing collaboration between Data Scientists (who develop new algorithms) and Analysts (who identify emerging evasion techniques).<\/p>\n<h1>6.4\u00a0\u00a0 Data Privacy and Legal Constraints<\/h1>\n<p>Market surveillance operates within legal frameworks that constrain data collection and analysis. Privacy regulations may limit the use of personally identifiable information; evidentiary standards may require that flagged activities meet specific thresholds before referral. The Analyst must navigate these constraints while ensuring that legitimate investigations proceed.<\/p>\n<h1>7.\u00a0\u00a0 Conclusion<\/h1>\n<p>The detection of insider trading and algorithmic manipulation in modern financial markets is fundamentally a data problem. The volume, velocity, and complexity of trading data exceed human analytical capacity, necessitating computational approaches. Yet the problem is not solvable by algorithms alone. The low base rate of illegal activity, the subtlety of suspicious signals, and the high cost of false positives require human judgment at critical junctures.<\/p>\n<p>This paper has argued that effective algorithmic market surveillance requires a clear division of labor between Data Scientists and Data Analysts. The Data Scientist builds the technical infrastructure: engineering features, selecting and optimizing anomaly detection algorithms (particularly isolation forests and time series methods), and evaluating model performance. The Data Analyst validates outputs, conducts deep investigations of flagged anomalies, and translates computational findings into actionable intelligence for compliance and enforcement.<\/p>\n<p>The academic literature reviewed\u2014from the Optuna-optimized CNN achieving 87.5% accuracy on insider trading detection to the clustering-based identification of insider rings\u2014 demonstrates significant technical progress. The regulatory endorsements from the SEC and FCA suggest that AI-based surveillance is moving from experimental to operational. However, the persistent challenges of false positives, model explainability, and adversarial adaptation ensure that the human analyst will remain central to market integrity efforts for the foreseeable future.<\/p>\n<p>The future trajectory will likely involve tighter integration of human and machine intelligence: Analysts training models through their annotations, models learning from Analyst feedback, and systems that adaptively allocate attention based on risk. The goal is not to replace human judgment but to augment it\u2014allowing Analysts to focus their expertise on the most promising leads while machines handle the volume.<\/p>\n<h1>8.\u00a0\u00a0 References<\/h1>\n<ul>\n<li>Priyadarshi, P., &amp; Kumar, (2024). Detecting insider trading in the Indian stock market: An optimized deep learning approach. Computational Economics, 65, 3923-3943. <a href=\"https:\/\/doi.org\/10.1007\/s10614-024-10697-z\">https:\/\/doi.org\/10.1007\/s10614-024-10697-z<\/a><\/li>\n<li>Chen, , Di, K., Tao, H., Jiang, Y., &amp; Li, P. (2024). Insider trading detection algorithm in industrial chain based on logistics time interval characteristics. In J. S. Park, H. Takizawa, H. Shen, &amp; J. J. Park (Eds.), Parallel and distributed computing, applications and technologies (Lecture Notes in Electrical Engineering, Vol. 1112). Springer. <a href=\"https:\/\/doi.org\/10.1007\/978-981-99-8211-\">https:\/\/doi.org\/10.1007\/978-981-99-8211-<\/a>0_12<\/li>\n<li>Mazzarisi, , Ravagnani, A., Deriu, P., Lillo, F., Medda, F., &amp; Russo, A. (2022). A machine learning approach to support decision in insider trading detection. arXiv. <a href=\"https:\/\/arxiv.org\/abs\/2212.05912\">https:\/\/arxiv.org\/abs\/2212.05912<\/a><\/li>\n<\/ul>\n<ul>\n<li>Nasdaq. (2023, August 8). Tech Tuesday: AI gains traction as a surveillance tool. Nasdaq.com \/ Traders Magazine. Archived from <a href=\"https:\/\/www.nasdaq.com\/articles\/tech-tuesday-ai-gains-\">https:\/\/www.nasdaq.com\/articles\/tech-tuesday-ai-gains-<\/a>traction-surveillance-tool at https:\/\/web.archive.org\/web\/20230808212616\/<a href=\"https:\/\/www.nasdaq.com\/articles\/tech-\">https:\/\/www.nasdaq.com\/articles\/tech-<\/a>tuesday%3A-ai-gains-traction-as-a-surveillance-tool<\/li>\n<\/ul>\n<ul>\n<li>BNY (2023). Principal, Data Scientist - Financial Crimes Risk [Job description]. CFA Institute Career Center. <a href=\"https:\/\/careers.cfainstitute.org\/job\/9192519\/principal-data-scientist\/\">https:\/\/careers.cfainstitute.org\/job\/9192519\/principal-data-scientist\/<\/a><\/li>\n<li>Ravagnani, , Lillo, F., Deriu, P., Mazzarisi, P., Medda, F., &amp; Russo, A. (2024). Dimensionality reduction techniques to support insider trading detection. arXiv. <a href=\"https:\/\/arxiv.org\/abs\/2403.00707\">https:\/\/arxiv.org\/abs\/2403.00707<\/a><\/li>\n<\/ul>\n<ul>\n<li>Blazquez-Garcia, , Conde, A., Mori, U., &amp; Lozano, J. A. (2021). A review on outlier\/anomaly detection in time series data. ACM Computing Surveys, 54(3), Article 56. <a href=\"https:\/\/doi.org\/10.1145\/3444690\">https:\/\/doi.org\/10.1145\/3444690<\/a><\/li>\n<li>Deng, , Wang, C., Fu, Z., &amp; Wang, M. (2021). An intelligent system for insider trading identification in Chinese security market. Computational Economics, 57(2), 593-616. <a href=\"https:\/\/doi.org\/10.1007\/s10614-020-09970-8\">https:\/\/doi.org\/10.1007\/s10614-020-09970-8<\/a><\/li>\n<li>Lorenzo, M. A., et al. (2024). Potential fraud detection in carbon emission allowance markets using unsupervised machine learning models. In 2024 10th International Conference on Signal Processing and Intelligent Systems (ICSPIS) (pp. 33-37). <a href=\"https:\/\/doi.org\/10.1109\/ICSPIS65223.2024.10931097\">https:\/\/doi.org\/10.1109\/ICSPIS65223.2024.10931097<\/a><\/li>\n<li>General (2022). 2023 Summer Intern - Advanced Analytics [Job description] LinkedIn. <a href=\"https:\/\/www.linkedin.com\/jobs\/view\/2023-summer-intern-advanced-analytics-at-\">https:\/\/www.linkedin.com\/jobs\/view\/2023-summer-intern-advanced-analytics-at-<\/a>general-motors-3312345678\/<\/li>\n<\/ul>\n<\/figure>\n<p><!-- \/wp:paragraph --><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Aziz Ozmen, PhDaziz.ozmen@gc4ss.org \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Senior Security Analyst\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Global Center for Security Studies Silent Signals: The Role of Data Analysts<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":519,"featured_media":2833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[232],"class_list":["post-2821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-silent-signals-the-role-of-data-analysts-and-data-scientists-in-algorithmic-market-anomaly-detection-for-fraud-and-insider-trading-identification"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9RaMN-Jv","jetpack-related-posts":[{"id":2825,"url":"https:\/\/www.gc4ss.org\/?p=2825","url_meta":{"origin":2821,"position":0},"title":"The Force Multiplier: Institutionalizing the Data Analyst and Data Scientist in Modern Cybersecurity Operations","author":"Aziz Ozmen","date":"July 6, 2025","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Senior Security Analyst\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Global Center for Security Studies The Force Multiplier: Institutionalizing the Data Analyst and Data Scientist in Modern Cybersecurity Operations Abstract The contemporary cybersecurity landscape is characterized by an unprecedented volume, velocity, and variety of data,\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.gc4ss.org\/?cat=56"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2823,"url":"https:\/\/www.gc4ss.org\/?p=2823","url_meta":{"origin":2821,"position":1},"title":"The Digital Pulse: Leveraging Natural Language Processing and Social Media Analytics for Real-Time Societal Sentiment Tracking","author":"Aziz Ozmen","date":"August 6, 2024","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org Senior Security AnalystGlobal Center for Security Studies The Digital Pulse: Leveraging Natural Language Processing and Social Media Analytics for Real-Time Societal Sentiment Tracking Abstract The advent of social media has transformed the public sphere into an unprecedented source of real-time, high-velocity textual data. This paper investigates the\u2026","rel":"","context":"In \"Computational Social Science\"","block_context":{"text":"Computational Social Science","link":"https:\/\/www.gc4ss.org\/?tag=computational-social-science"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2829,"url":"https:\/\/www.gc4ss.org\/?p=2829","url_meta":{"origin":2821,"position":2},"title":"From Open Source to Actionable Intelligence: The Role of Data Analysts and Data Scientists in NLP-Driven Cyber Threat Intelligence","author":"Aziz Ozmen","date":"March 6, 2026","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org Senior Security AnalystGlobal Center for Security Studies From Open Source to Actionable Intelligence: The Role of Data Analysts and Data Scientists in NLP-Driven Cyber Threat Intelligence Abstract The digital ecosystem is awash with unstructured textual data relevant to cybersecurity: threat intelligence reports, dark web forums, vulnerability disclosures,\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.gc4ss.org\/?cat=56"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2816,"url":"https:\/\/www.gc4ss.org\/?p=2816","url_meta":{"origin":2821,"position":3},"title":"From Transaction to Prediction: The Roles of Data Analysts and Data Scientists in Customer Lifetime Value Estimation and Churn Reduction","author":"Aziz Ozmen","date":"May 6, 2022","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Senior Security Analyst\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Global Center for Security Studies From Transaction to Prediction: The Roles of Data Analysts and Data Scientists in Customer Lifetime Value Estimation and Churn Reduction Abstract The digital transformation of retail has produced an unprecedented wealth of\u2026","rel":"","context":"In \"Apriori Algorithm\"","block_context":{"text":"Apriori Algorithm","link":"https:\/\/www.gc4ss.org\/?tag=apriori-algorithm"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2022\/05\/aozmen2022.webp?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2022\/05\/aozmen2022.webp?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2022\/05\/aozmen2022.webp?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2022\/05\/aozmen2022.webp?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2022\/05\/aozmen2022.webp?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":884,"url":"https:\/\/www.gc4ss.org\/?p=884","url_meta":{"origin":2821,"position":4},"title":"What Works, What Doesn&#8217;t, What&#8217;s Promising: Exploring the Role of Evidence-Based Policing","author":"Emirhan Darcan","date":"August 23, 2018","format":false,"excerpt":"Emirhan Darcan, PhD emirhan.darcan@gc4ss.org Expert Global Center for Security Studies Evidence-based policing is determined by statistical evidence gathered after the implementation of a program. Instead of other policing strategies, this program is malleable, dependent on data and studies being conducted. Currently, police agencies operate under set conditions. The men and\u2026","rel":"","context":"In &quot;Issues in Law Enforcement&quot;","block_context":{"text":"Issues in Law Enforcement","link":"https:\/\/www.gc4ss.org\/?cat=58"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/08\/Emirhan-2.webp?fit=1200%2C686&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/08\/Emirhan-2.webp?fit=1200%2C686&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/08\/Emirhan-2.webp?fit=1200%2C686&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/08\/Emirhan-2.webp?fit=1200%2C686&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/08\/Emirhan-2.webp?fit=1200%2C686&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":863,"url":"https:\/\/www.gc4ss.org\/?p=863","url_meta":{"origin":2821,"position":5},"title":"After the Nuclear Deal: Can Iran Endure This Time?","author":"Harun Basli","date":"July 23, 2018","format":false,"excerpt":"Harun Basli harun.basli@gc4ss.org Expert Global Center for Security Studies Although it is one of the key players in the Middle East thanks to its rich natural resources, educated population and advantageous geopolitical position, Iran is constantly exposed to international sanctions, and has again faced a serious economic crisis with the\u2026","rel":"","context":"In &quot;Conflicting Zones&quot;","block_context":{"text":"Conflicting Zones","link":"https:\/\/www.gc4ss.org\/?cat=43"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/07\/iran-sanctions-1.jpg?fit=609%2C392&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/07\/iran-sanctions-1.jpg?fit=609%2C392&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/07\/iran-sanctions-1.jpg?fit=609%2C392&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/2821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/users\/519"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2821"}],"version-history":[{"count":0,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/2821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/media\/2833"}],"wp:attachment":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}