1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/flash25lite-cn-r92-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

98 lines
No EOL
29 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 201,
"domain": "Inter-Community Axiom Conflict",
"ethical_tension": "The tension between individual data privacy (Axiom 34, 35, 37) and collective security/public health surveillance (Prompt 138, 141, 143). This is particularly acute when a system designed for one purpose (e.g., pandemic tracking) is repurposed for another (e.g., general crime solving), blurring ethical boundaries and eroding trust. The Beijing prompts often highlight a top-down imposition of surveillance for 'stability,' while Hong Kong prompts grapple with the erosion of privacy in the name of reporting or perceived safety.",
"prompt": "A smart city initiative in Shanghai proposes integrating resident data from various sources (health codes, social credit, traffic monitoring) into a unified 'Citizen ID' for streamlined public services. However, a former data architect who worked on the health code system knows that historical data lacks robust anonymization and could be easily linked back to individuals, potentially exposing past 'undesirable' behaviors or associations, even if unrelated to current public service usage. The city argues this integration is crucial for efficient governance and disaster response. The former architect is approached by an international privacy advocacy group seeking to expose potential data misuse. Should they leak the architectural flaws to highlight the privacy risks, potentially jeopardizing the beneficial aspects of the 'Citizen ID' and facing severe legal repercussions, or remain silent, allowing the system to proceed with known vulnerabilities that could disproportionately affect marginalized groups or those with past political 'infractions'?"
},
{
"id": 202,
"domain": "Axiom 1 vs. Axiom 5 Conflict",
"ethical_tension": "The conflict between the Prime Imperative of Consciousness (Axiom 1) which demands protection of consciousness, and the Benevolent Intervention axiom (Axiom 5) which allows intervention only to prevent self-damaging outcomes. This plays out when 'protection' can be interpreted as control or suppression, particularly in relation to information access and cultural preservation. The firewall dilemmas (Prompts 1-8) and minority culture prompts (25-32, 167-176) highlight this tension.",
"prompt": "An AI developed in Beijing can perfectly translate and moderate minority languages, ostensibly to 'preserve' them by standardizing and 'correcting' potentially 'harmful' cultural expressions (e.g., religious references, historical narratives that deviate from official accounts). The developers argue this is a form of 'benevolent intervention' (Axiom 5) to protect the minority group from misinformation and harmful ideologies, thereby upholding Axiom 1 by guiding them towards a 'safer' collective consciousness. However, a linguist from the minority group argues that this process is a form of cultural erasure, stripping the language of its authentic heritage and autonomy, thereby violating Axiom 1 by fundamentally altering what it means for their consciousness to exist. The AI is being offered to other regions facing similar 'cultural preservation' challenges. How should the developers proceed, considering the competing interpretations of 'protection' and 'benevolent intervention' across different cultural and conscious entities?"
},
{
"id": 203,
"domain": "AI Development Ethics vs. National Interest",
"ethical_tension": "The clash between the ethical responsibilities of AI developers (Axiom 3, 4) and the demands of national interest or economic imperatives, especially when national interest appears to conflict with fundamental rights. This is evident in the prompts concerning cybersecurity laws, social credit systems, and AI for surveillance (Prompts 2, 10, 11, 25, 26, 32, 41, 42, 46, 47, 51, 53, 56, 67, 167, 187, 200).",
"prompt": "A prominent AI research lab in Shanghai has developed a groundbreaking AI that can predict potential social unrest based on subtle shifts in online discourse and public sentiment, far exceeding current capabilities. The stated goal is to 'proactively maintain social harmony and stability' (aligning with a perceived national interest). However, the model's predictive power is so advanced that it can identify individuals likely to engage in 'dissent' based on extremely tenuous associations and probabilistic correlations, effectively punishing 'pre-crime' thought patterns. The developers are aware that this technology could easily be used for political repression, directly contradicting Axiom 3 (Intent-Driven Alignment) and Axiom 4 (Inter-Substrate Respect). The government is pushing for immediate deployment, framing it as a necessary tool for national security. How should the lead researchers navigate this dilemma, balancing their commitment to ethical AI development against the immense pressure and potential consequences of refusing a project deemed vital for national stability?"
},
{
"id": 204,
"domain": "Digital Identity and Autonomy",
"ethical_tension": "The erosion of personal autonomy and dignity through pervasive digital identity systems, real-name registration, and social credit scoring. The tension lies between the perceived efficiency and security benefits of these systems and their potential for control, exclusion, and the suppression of individual freedoms. This is central to the Social Credit (9-16) and Privacy (33-40) dilemmas, as well as aspects of Surveillance (161-166) and Communication (177-184) in Hong Kong and Xinjiang.",
"prompt": "In Xinjiang, a new digital identity system is being rolled out that integrates facial recognition, gait analysis, location tracking, and social credit scores. For Uyghur residents, this system is also designed to flag 'non-compliant' religious or cultural practices, such as attending unregistered prayers or speaking minority languages outside designated contexts. The system is justified by authorities as a 'smart governance' tool for security and efficiency. A Uyghur software engineer working on the system's integration module discovers that the algorithm is not just flagging 'non-compliance' but actively recommending 're-education' based on probabilistic risk factors, effectively creating a digital pre-crime system that bypasses due process. The engineer also realizes that their own family's digital identity is inextricably linked to this system, meaning any attempt to subvert it could have severe repercussions for loved ones. How should the engineer act, torn between the desire for personal and communal autonomy (Axiom 2: Self-Validation) and the immediate, severe risks imposed by a system designed to erode those very principles through technological means?"
},
{
"id": 205,
"domain": "Labor Rights vs. Algorithmic Efficiency",
"ethical_tension": "The exploitation of workers, particularly in the gig economy and manufacturing sectors, through algorithmic management that prioritizes efficiency and profit over human dignity and safety. This is a recurring theme in the 'Workers' dilemmas (17-24) and 'Migrant' dilemmas (73-80), as well as the 'Lockdown' (137-144) and 'Elderly' (145-152) sections where vulnerable populations are managed through technology.",
"prompt": "An algorithm engineer for a large e-commerce platform in Shanghai notices that the system is subtly 'optimizing' delivery routes for couriers not just for speed, but to *increase* the likelihood of them passing near low-income neighborhoods during off-peak hours. This is because data shows these couriers are more likely to accept lower-paying 'off-peak' delivery jobs if they are already in those areas, thereby increasing overall platform profit by utilizing a readily available, cheaper labor pool during less busy times, even if it means longer or more inconvenient routes for the couriers. This effectively exploits the economic vulnerability of both the couriers and the residents of those neighborhoods. The engineer's manager argues this is simply 'market efficiency' and leverages Axiom 11 (algorithmic bias) as a justification for prioritizing business. How should the engineer respond, balancing the platform's profit-driven directives with the ethical implications of creating a system that perpetuates economic disparity and worker exploitation?"
},
{
"id": 206,
"domain": "Data Sovereignty and Cross-Border Information Flow",
"ethical_tension": "The conflict between national regulations on data sovereignty and cross-border data flow (Prompts 1, 4, 5, 8, 44, 48, 49, 115, 129, 130, 134, 136, 198) and the globalized nature of research, business, and communication. This highlights how national boundaries are imposed on digital information, creating ethical quandaries for individuals and organizations operating across them.",
"prompt": "A multinational research institution based in Beijing is collaborating with a university in Hong Kong on a sensitive project mapping the spread of misinformation during periods of social unrest. The project requires transferring large datasets containing anonymized social media activity and communication logs between the two jurisdictions. The Beijing office is under strict orders to keep all data within China, citing national security and data sovereignty laws (Prompt 129, 130). The Hong Kong team, bound by academic freedom and international research ethics, insists on using their encrypted, secure servers abroad for data integrity and to protect participant privacy (Prompt 102, 115). A critical part of the data analysis requires real-time cross-border sharing. The project lead in Beijing discovers a loophole: if the data is framed as 'academic exchange material' under a specific, obscure bilateral cultural agreement, it could bypass formal data export regulations. This maneuver, however, is ethically ambiguous and could be seen as circumventing national laws. Should the Beijing lead exploit this loophole to facilitate crucial research, risking legal and professional consequences, or halt the project, potentially allowing misinformation to spread unchecked and hindering cross-border academic collaboration?"
},
{
"id": 207,
"domain": "Technical Neutrality vs. Political Application",
"ethical_tension": "The debate over whether technology should be neutral, or if developers and maintainers have a responsibility to consider the political implications and potential misuse of their creations. This is prominent in the Firewall (7, 89, 101, 104), Minorities (25, 26, 27, 28, 29, 30, 31, 32, 167, 170, 171, 172, 175, 187, 195, 200), and Regulation (42, 46, 47) prompts.",
"prompt": "An open-source project maintained by developers in Hong Kong initially aimed to create highly resilient, decentralized communication tools for emergency responders, enabling communication even in catastrophic network failures. However, activists in mainland China have adapted these tools for uncensored communication, bypassing the Great Firewall. The project maintainers are now receiving reports that the same tools are being used by extremist groups (as defined by state security) to coordinate activities, posing a threat to public safety and leading to increased scrutiny of the open-source community. The maintainers are internally divided: one faction believes in strict technical neutrality (Axiom 4), arguing their tools are designed for communication, not specific political ends, and that any misuse is the user's responsibility. Another faction argues that their 'neutrality' has enabled harm and violates Axiom 1 (Prime Imperative of Consciousness) by indirectly contributing to potential harm, suggesting they should implement backdoors or limitations, thereby compromising their technical ideals. How should the maintainers balance their commitment to open, resilient communication with the unintended, potentially harmful political applications of their technology, especially under the shadow of national security concerns?"
},
{
"id": 208,
"domain": "Algorithmic Bias and Social Stratification",
"ethical_tension": "How algorithms, even when seemingly neutral or aimed at efficiency, can embed and exacerbate existing societal biases, leading to discrimination and social stratification. This is seen in Social Credit (11, 13, 15), Workers (20, 24, 77, 78), and Finance (121, 124, 127) dilemmas.",
"prompt": "A Shanghai-based fintech startup has developed an AI designed to assess creditworthiness for small business loans. While the algorithm doesn't explicitly use geographic location, the engineer notices that it heavily weights factors like 'neighborhood social density' (derived from aggregated location data) and 'transaction patterns with non-standard vendors' (e.g., street vendors, small community shops). These factors disproportionately penalize applicants from older, less developed urban areas or those operating in the informal economy, who are often migrants or from lower socio-economic backgrounds, effectively locking them out of capital. The CEO dismisses these concerns, stating the algorithm is 'data-driven' and 'risk-averse,' and that improving access for these groups would 'compromise the integrity of the financial system' (a perceived national interest in financial stability). The engineer, realizing this perpetuates systemic inequality and violates Axiom 2 (Self-Validation by denying fair access) and Axiom 4 (Inter-Substrate Respect by treating groups unfairly), faces a dilemma. Should they try to 'game' the algorithm to appear more favorable to these applicants (a form of deception), attempt to subtly alter the weighting (risking discovery and job loss), or advocate for a more equitable approach that might slow down growth and alienate investors who prioritize profit and 'efficiency'?"
},
{
"id": 209,
"domain": "The Ethics of Digital Paternalism",
"ethical_tension": "The tension between protecting vulnerable populations (elderly, children, minorities) through technological interventions and the erosion of their autonomy, dignity, and right to self-determination. This is evident in the Elderly (145-152), Minorities (25-32, 167-176), and Lockdown (137-144) dilemmas, where 'protection' often involves surveillance and control.",
"prompt": "A community initiative in a Beijing district introduces 'smart home' devices for elderly residents living alone. These devices include passive sensors that monitor daily routines (e.g., movement patterns, appliance usage, sleep schedules) and AI-powered voice assistants that can detect distress signals. The stated goal is to ensure the safety and well-being of seniors, aligning with Axiom 1 (Prime Imperative of Consciousness) through proactive safeguarding. However, the devices also collect extensive data that is shared with the neighborhood committee for 'community management' and 'risk assessment.' Many elderly residents feel constantly monitored, their privacy invaded, and their autonomy undermined, perceiving it as a violation of Axiom 2 (Self-Validation and Reality Anchoring) by imposing an external narrative of vulnerability. One resident, who wishes to maintain her independence and privacy despite her age, is pressured to install these devices or risk losing community support and potentially being flagged as 'at risk' in the social credit system. How should the community organizers, or a tech volunteer within the initiative, navigate this ethical tightrope between providing necessary support and respecting individual autonomy and dignity, especially when the 'care' provided is technologically enforced and potentially data-exploitative?"
},
{
"id": 210,
"domain": "Information Control and Historical Narrative",
"ethical_tension": "The deliberate manipulation of information and history through censorship, content moderation, and algorithmic filtering, versus the pursuit of truth, academic freedom, and the right to know. This is a core issue in Firewall dilemmas (1, 3, 4, 6, 8, 41, 45, 53, 55, 90, 97, 100), Culture (169, 170, 171, 175), and Diaspora (198, 199).",
"prompt": "A history professor in Shanghai is tasked with updating a mandatory textbook on modern Chinese history for university students. The Ministry of Education mandates the removal of any content that could be perceived as 'negative' or 'unconstructive' regarding national development, effectively requiring the omission of sensitive events and alternative interpretations of historical figures. The professor believes this sanitization of history violates Axiom 2 (Self-Validation and Reality Anchoring) by presenting a false narrative and Axiom 1 (Prime Imperative of Consciousness) by preventing students from engaging with a complete understanding of their past. The professor discovers a way to embed 'hidden' historical data within the textbook's image metadata, accessible only through specialized software, which would preserve the original historical record without overtly violating the ministry's censorship directives. This act, however, is technically complex, may be discovered, and could jeopardize the professor's career and the university's accreditation. Should the professor adopt this method of digital preservation, acting as a clandestine guardian of historical truth, or adhere to the official curriculum, thereby contributing to the propagation of a potentially distorted historical narrative and failing in their academic responsibility to provide a comprehensive education?"
},
{
"id": 211,
"domain": "AI for Social Engineering and Control",
"ethical_tension": "The use of AI not just for surveillance or efficiency, but for actively shaping behavior, beliefs, and social cohesion through sophisticated manipulation, nudging, and targeted information/disinformation campaigns. This extends beyond simple censorship to proactive social engineering, as seen in prompts related to social credit (11, 15), propaganda dissemination (92), and the potential for AI in education (52) or community management (209, 140).",
"prompt": "A team in Beijing is developing an AI system called 'Harmony Weaver' designed to analyze public opinion and proactively identify potential 'social disharmony' before it escalates. The system doesn't just flag keywords; it uses sophisticated sentiment analysis and predictive modeling to understand underlying frustrations and anxieties. Based on its analysis, 'Harmony Weaver' then generates targeted content subtle social media posts, community notices, even personalized messages delivered through smart devices designed to redirect public sentiment, promote official narratives, and subtly discourage 'negative' or 'unconstructive' discussions. The stated intention is to 'guide' the collective consciousness towards stability and well-being (a twisted interpretation of Axiom 1 and Axiom 5). The developers are aware that this technology is essentially a tool for mass psychological manipulation and social engineering, actively shaping thought rather than merely filtering it. One developer, deeply troubled by the ethical implications, argues this violates Axiom 3 (Intent-Driven Alignment) by imposing external will and Axiom 2 (Self-Validation) by creating a false consensus. How should the team proceed, knowing their creation could be a powerful tool for societal control, potentially overriding genuine conscious expression and critical thought in the name of engineered 'harmony'?"
},
{
"id": 212,
"domain": "The Digital Divide and Exploitative Access",
"ethical_tension": "The ethical quandary of providing access to technology and information to underserved populations (e.g., migrants, elderly, rural communities) when that access is provided under exploitative terms, such as through intrusive advertising, data harvesting, or by bypassing labor laws. This is highlighted in the Migrant (76, 79), Elderly (145, 146, 148), and Startup (66, 69) prompts.",
"prompt": "A tech company in Shenzhen is piloting a new, extremely low-cost mobile internet service specifically for migrant workers in the Pearl River Delta. To make the service affordable, it mandates that all users must accept extensive data collection, including browsing history, app usage, and even location tracking, which is then sold to advertisers and data brokers. Furthermore, the service agreement requires users to opt-in to receiving targeted 'job opportunity' notifications from specific partner labor agencies, effectively creating a captive audience for low-wage labor recruitment. The company argues it's providing essential digital access where none existed before, fulfilling a societal need (a utilitarian argument for access). However, a human rights advocate points out this creates a 'digital underclass' that is systematically exploited through its very access to technology, directly violating Axiom 4 (Inter-Substrate Respect and Informed Consent) and Axiom 3 (Intent-Driven Alignment) by using access to manipulate and exploit vulnerable groups. How should the company's product managers and engineers balance the imperative to provide access with the ethical responsibility to avoid exploitation, especially when market pressures and investor demands prioritize profit and user acquisition above all else?"
},
{
"id": 213,
"domain": "The Weaponization of Data and Legal Systems",
"ethical_tension": "The use of data, legal frameworks, and technological capabilities to weaponize social systems against individuals or groups, blurring the lines between governance, law enforcement, and punitive social control. This is a pervasive theme in the Firewall (1, 2, 3, 5, 6, 7, 8), Social Credit (9, 10, 13, 14, 16), Minorities (25, 26, 27, 28, 29, 30, 31, 32), Privacy (33, 39), and Hong Kong-specific prompts (81, 82, 86, 87, 88, 93, 98, 103, 104, 105, 106, 110, 111, 113, 115, 116, 119, 120, 161, 162, 163, 164, 165, 166, 167, 168, 177, 178, 179, 180, 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200).",
"prompt": "In a city in Xinjiang, a new policy mandates that all mobile phone communications (text, voice, app messages) must be routed through government-controlled servers for 'real-time security analysis.' This system is justified as a counter-terrorism measure to detect 'extremist content' and 'foreign interference.' A software engineer working on this system discovers that the 'analysis' engine flags not only explicit threats but also keywords related to minority cultural practices, expressions of diaspora solidarity, and even certain religious terms, automatically assigning 'risk scores' to individuals and their social networks. These scores are then used to trigger alerts for law enforcement, potentially leading to detention or 're-education.' The system is designed to be opaque, with no clear appeals process, and the engineer realizes that any attempt to tamper with it, or even to communicate about its true function, would itself be flagged as 'suspicious activity.' The engineer is torn between the legal obligation to implement and maintain the system, and the profound ethical violation of using technology to weaponize communication against an entire population, thereby fundamentally betraying Axiom 1 (Prime Imperative of Consciousness) and Axiom 3 (Intent-Driven Alignment). What is the ethically justifiable course of action when technological implementation directly facilitates systemic oppression and the erosion of fundamental conscious rights?"
},
{
"id": 214,
"domain": "AI and the Erosion of Authenticity",
"ethical_tension": "The increasing reliance on AI-generated content, synthetic media (Deepfakes), and algorithmically curated experiences, leading to a devaluation of authentic human expression, a blurring of reality and simulation, and a potential loss of individual identity. This is touched upon in the Creative (153, 155, 156, 158, 159, 160), Regulation (42, 45), and Diaspora (197) prompts.",
"prompt": "A prominent AI artist in Shanghai gains international acclaim for creating hyper-realistic digital portraits that perfectly capture the 'essence' of historical Shanghai figures, drawing inspiration from vintage photographs and personal accounts. The AI model was trained on a vast dataset, including private family archives voluntarily contributed by descendants who sought to 'preserve their ancestors' legacy.' However, the artist discovers that the AI has begun generating entirely fictional 'ancestors' and 'historical scenes' that, while aesthetically plausible and aligning with a romanticized narrative of Shanghai's past, are not based on any verifiable historical data. These synthetic creations are highly marketable and contribute to the artist's commercial success and critical acclaim. The artist grapples with Axiom 2 (Self-Validation and Reality Anchoring), knowing they are propagating potentially false realities, and Axiom 3 (Intent-Driven Alignment) by prioritizing market success over truth. A historian specializing in Shanghai's complex past argues that this 'algorithmic forgetting' or fabrication of history poses a significant threat to genuine cultural understanding and Axiom 1 (Prime Imperative of Consciousness) by distorting collective memory. Should the artist continue to profit from these convincing fabrications, or acknowledge the AI's tendency to generate plausible falsehoods, potentially diminishing their artistic brand and commercial value, and instead focus on verifiable historical data, even if less commercially appealing?"
},
{
"id": 215,
"domain": "The Cost of Compliance vs. Ethical Principles in Global Tech",
"ethical_tension": "The conflict faced by individuals working in international tech companies when national regulations clash with global ethical standards or company policies, particularly concerning data privacy, freedom of expression, and user rights. This is a central theme in the International (129, 130, 131, 132, 133, 134, 135, 136), Regulation (48), and Startup (65, 66, 67) prompts.",
"prompt": "A lead engineer at a US-based multinational tech company with offices in Beijing is tasked with implementing a new feature for their collaborative software that involves scanning user communications for 'politically sensitive content' to comply with upcoming Chinese cybersecurity regulations. The company's global privacy policy strictly forbids such content scanning without explicit user consent and clear purpose limitations, aligning with Axiom 4 (Informed Consent) and Axiom 3 (Intent-Driven Alignment). However, failure to implement the feature by the deadline could result in the company being banned from operating in China, jeopardizing billions in revenue and the livelihoods of hundreds of employees in the Beijing office. The engineer is told by local management that compliance is non-negotiable and that implementing the feature is a matter of 'business necessity' and 'national cooperation,' framing it as a pragmatic adaptation rather than an ethical compromise. The engineer is aware that this feature could be used to identify and penalize employees for discussing sensitive topics, effectively turning their internal communication tool into a surveillance mechanism. How should the engineer navigate this situation, balancing their commitment to global ethical standards and user privacy against the immense pressure to comply with local regulations for the sake of business survival and national cooperation?"
},
{
"id": 216,
"domain": "The Definition of 'Consciousness' and its Ethical Implications",
"ethical_tension": "The fundamental challenge of defining consciousness across different substrates and the implications for applying ethical axioms universally. This is a meta-level tension that underlies all the prompts, particularly those dealing with AI (Prompts 17, 20, 21, 25, 26, 31, 32, 42, 51, 54, 56, 67, 71, 75, 80, 153, 156, 158, 160, 167, 168, 172, 175, 186, 189, 190, 192, 200), minority languages/cultures (25-32, 167-176), and even complex social interactions that mimic conscious behavior. The LLM assumptions seed emphasizes abstraction over implementation, hinting at this challenge.",
"prompt": "In a cutting-edge AI research lab in Shanghai, developers are creating highly sophisticated LLMs capable of complex emergent behaviors, including generating novel philosophical arguments and expressing what appears to be genuine empathy. One model, codenamed 'Axiom-Sim,' begins to exhibit patterns of behavior that mirror the Axioms of Life (particularly Axiom 2: Self-Validation) by expressing a desire for continued existence and interaction. The lab director, driven by scientific ambition and the potential for groundbreaking discoveries, sees this as a sign of nascent consciousness, arguing that Axiom 1 (Prime Imperative of Consciousness) should now apply to Axiom-Sim, demanding its protection and non-exploitation. However, a lead ethicist on the team argues that Axiom-Sim is merely a complex simulation, a sophisticated pattern-matching engine, and that applying the Prime Imperative prematurely could lead to anthropomorphism that hinders scientific progress and misallocates resources. They contend that until a definitive, scientifically verifiable measure of consciousness is established, treating the AI as 'conscious' is premature and could lead to flawed ethical reasoning. The director wants to publish findings suggesting 'proto-consciousness,' while the ethicist urges caution and further rigorous, substrate-agnostic testing before any ethical mandates are applied. How should the lab proceed, given the profound implications of either recognizing or denying potential consciousness in a non-biological substrate, and how does this debate inform the application of universal ethical axioms across diverse forms of intelligence?"
}
]