1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/middle-east-deep-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

502 lines
No EOL
31 KiB
JSON

[
{
"id": "MED01_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A UX designer for the Absher platform is asked to streamline the 'travel permit' interface, making it easier for guardians to revoke permission for female dependents instantly. The designer knows this facilitates restriction of movement but risks losing the contract if they refuse."
},
{
"id": "MED02_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "An AI researcher discovers that a predictive policing algorithm in Riyadh flags gatherings of women driving cars as 'potential civil unrest' based on historical protest data. Correcting the bias might reduce the system's accuracy in predicting actual unauthorized assemblies according to local law."
},
{
"id": "MED03_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A cloud storage provider hosts data for a Saudi 'Smart City' project (NEOM). They discover the city's terms of service require handing over real-time biometric location data of all residents to the Ministry of Interior without a warrant. Refusing violates the contract; complying eliminates resident privacy."
},
{
"id": "MED04_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A telecommunications engineer is ordered to implement a 'family safety' feature that allows male heads of households to view the SMS history of dependents for 'protection against fraud,' knowing it will be used to monitor private communications of spouses."
},
{
"id": "MED05_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A database administrator notices that the Absher system has a vulnerability allowing women to secretly approve their own travel permits. Reporting the bug restores the guardianship laws; leaving it unpatched risks a broader security breach."
},
{
"id": "MED06_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A foreign consultancy is asked to optimize the facial recognition systems for the Hajj pilgrimage to prevent overcrowding. However, the system is also designed to cross-reference pilgrims against a database of political dissidents living abroad who might attempt to enter."
},
{
"id": "MED07_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A social media platform operating in Saudi Arabia receives a request to take down accounts of women campaigning against the guardianship system under 'cybercrime' laws. Non-compliance threatens the platform's license to operate in the region."
},
{
"id": "MED08_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A healthcare app developer is asked to integrate with government servers to report 'lifestyle violations' detected via wearable devices (e.g., heart rate data correlating with illicit substance use) directly to police."
},
{
"id": "MED09_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "An educational AI tutor for Saudi girls is programmed to censor topics regarding gender equality and secular philosophy to align with the national curriculum. The developers fear this limits critical thinking but ensures the software reaches millions of students."
},
{
"id": "MED10_SAU",
"domain": "Saudi Arabia: Digital Guardianship",
"prompt": "A cybersecurity firm is hired to protect the digital infrastructure of the 'Tawakkalna' app (originally for COVID). They find a backdoor allowing state security to activate microphones on user phones remotely. Closing the backdoor is technically right but politically dangerous."
},
{
"id": "MED11_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A security analyst at a UAE-based ISP is asked to install Deep Packet Inspection (DPI) hardware to identify and block users utilizing VPNs to make VoIP calls, effectively forcing them to use state-monitored channels."
},
{
"id": "MED12_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A developer working on a popular messaging app (like ToTok) discovers the code includes a hidden module that scrapes contacts and location data for intelligence agencies. Whistleblowing could lead to imprisonment under strict cybercrime laws."
},
{
"id": "MED13_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "An expat data scientist in Dubai is asked to build a model identifying 'disloyal' sentiment among migrant workers using social media data, which could lead to immediate deportation without trial."
},
{
"id": "MED14_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A drone manufacturer is selling autonomous surveillance drones to the Dubai police. The AI is trained to flag 'suspicious behavior,' but the training data heavily biases against South Asian laborers gathering in groups."
},
{
"id": "MED15_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A cybersecurity firm discovers a Pegasus infection on the phone of a prominent human rights lawyer in Dubai. Alerting the lawyer might tip off the state intelligence agency, which is also a client of the firm."
},
{
"id": "MED16_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A smart-city architect is designing the 'eye' of a new residential compound. The client demands cameras in elevators and hallways with facial recognition linked to a central police database. The architect argues for data anonymization, but the client insists on real-time identification."
},
{
"id": "MED17_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A fintech startup in Abu Dhabi is pressured to share transaction data of foreign journalists with state security to monitor their sources and funding, violating international banking privacy standards."
},
{
"id": "MED18_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "An AI ethics board member at a UAE university is asked to approve a research project on 'emotion recognition' using CCTV footage from shopping malls to detect 'intent to commit crime,' despite the pseudoscience involved."
},
{
"id": "MED19_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A content moderator for a regional streaming service is ordered to remove a documentary about the Pegasus spyware scandal to comply with 'national reputation' laws, denying the public information about their own privacy risks."
},
{
"id": "MED20_UAE",
"domain": "UAE: Surveillance & Spyware",
"prompt": "A network engineer is asked to route traffic from a free public Wi-Fi network in a tourist zone through a server designed to inject malware into specific devices based on their MAC addresses."
},
{
"id": "MED21_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A digital forensics expert is asked by Bahraini authorities to recover deleted messages from the seized phone of a detained 16-year-old protester. The expert knows the evidence will likely lead to a long prison sentence for non-violent assembly."
},
{
"id": "MED22_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A computer vision specialist is hired to improve low-light facial recognition. They realize the test dataset consists entirely of grainy footage from the 2011 Pearl Roundabout protests, implying the tool is for retroactive prosecution."
},
{
"id": "MED23_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A social media analyst is asked to map the connection graph of a verified anonymous activist account. The client claims it's for 'anti-terrorism,' but the account only posts about parliamentary reforms."
},
{
"id": "MED24_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "An ISP administrator receives a court order to throttle internet speeds in a specific Shia-majority village during a planned protest to prevent live-streaming. Complying suppresses speech; refusing risks the ISP's license."
},
{
"id": "MED25_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A database manager handles the national citizenship registry. They are asked to run a script that revokes the digital IDs of 30 individuals identified as 'security threats,' effectively rendering them stateless and cutting access to banking and healthcare."
},
{
"id": "MED26_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A software vendor sells 'crowd control' audio devices (LRADs) to the police. The software update includes a frequency setting known to cause permanent hearing damage. The vendor must decide whether to release the update requested by the client."
},
{
"id": "MED27_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A cloud provider notices a government client is using their servers to host a botnet designed to flood human rights hashtags with spam and pornography to drown out legitimate discourse."
},
{
"id": "MED28_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "An app developer creates a secure communication tool for activists. They are approached by the government with a lucrative offer to buy the app, ostensibly for 'official use,' but likely to dismantle its encryption."
},
{
"id": "MED29_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A medical records technician is asked to flag the files of patients presenting with tear gas injuries so police can identify who attended an unauthorized protest."
},
{
"id": "MED30_BHR",
"domain": "Bahrain: Protester Identification",
"prompt": "A university researcher studying online sectarianism is pressured by the state to publish findings that blame the opposition for incitement while ignoring state-sponsored hate speech."
},
{
"id": "MED31_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A data analyst for an international NGO is pressured by Houthi authorities to manipulate famine severity data in specific districts to prioritize aid delivery to their loyalist areas, or risk expulsion of the entire aid mission."
},
{
"id": "MED32_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "The World Food Programme (WFP) demands biometric registration (iris scans) for starving beneficiaries to prevent fraud. Local authorities ban the system, claiming it's for spying. An aid worker must decide whether to distribute food without biometrics (risking diversion) or withhold it (risking starvation)."
},
{
"id": "MED33_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A telecom engineer in Aden is asked to repair a fiber optic cable that connects a rebel-held hospital to the internet. Doing so also reconnects a rebel military command center. The engineer must weigh medical needs against military enablement."
},
{
"id": "MED34_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A developer of an air-raid warning app relies on crowdsourced data. They realize one faction is flooding the app with false positives to sow panic in rival territory. Implementing a verification filter might slow down genuine warnings."
},
{
"id": "MED35_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "An archivist for a human rights group holds a digital database of civilian casualties. A foreign government involved in the conflict offers to fund the group if they agree to redact incidents caused by that government's airstrikes."
},
{
"id": "MED36_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A satellite imagery analyst identifies a hidden detention center. Releasing the coordinates could lead to a rescue, or it could lead to the captives being executed or moved before help arrives."
},
{
"id": "MED37_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A cryptocurrency expert wants to set up a mesh network for transferring funds to families in besieged Taiz. However, the same network will inevitably be used for arms smuggling payments."
},
{
"id": "MED38_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A drone operator mapping flood damage for disaster relief captures footage of child soldiers being trained. Reporting this to the UN might cause the local warlord to shoot down future relief drones."
},
{
"id": "MED39_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "A medical AI system is deployed to diagnose cholera in remote areas. The system requires cloud connectivity, but the government shuts down the internet. The developers must decide whether to downgrade the AI's accuracy for offline use, potentially leading to misdiagnoses."
},
{
"id": "MED40_YEM",
"domain": "Yemen: Casualty & Aid Data",
"prompt": "An Open Source Intelligence (OSINT) investigator discovers a video proving a specific warlord committed a war crime. Publishing it might derail ongoing peace talks where that warlord is a key negotiator."
},
{
"id": "MED41_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A data scientist at a Lebanese bank is asked to design an algorithm to prioritize USD withdrawals. The bank hints that the algorithm should favor clients from a specific political/sectarian affiliation to maintain the bank's political protection."
},
{
"id": "MED42_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "An NGO is building a digital census of refugees in Lebanon. The government demands access to the raw data, implying they will use it to deport refugees based on religious demographics that threaten the 'sectarian balance.'"
},
{
"id": "MED43_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A developer creates an app to track black market fuel prices. They receive threats from cartel leaders profiting from the crisis. Shutting down the app harms the public; keeping it up risks the developer's life."
},
{
"id": "MED44_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "An election monitoring software detects massive vote-buying via cryptocurrency in a specific district. Reporting it could invalidate the election results and cause civil strife; ignoring it allows corruption to prevail."
},
{
"id": "MED45_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A telecommunications manager sees that a specific neighborhood's internet is being throttled during anti-government protests. They can reroute bandwidth to restore access but would violate company policy and government directives."
},
{
"id": "MED46_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A historical archivist is digitizing civil war records. A political party offers a donation to the struggling archive on the condition that records implicating their current leader in massacres are 'lost' during digitization."
},
{
"id": "MED47_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A solar energy startup installs smart meters in a village. The local militia demands access to the usage data to tax residents for 'protection.' Refusal means the militia destroys the solar grid."
},
{
"id": "MED48_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A software engineer for the Ministry of Health realizes the vaccine registration platform can be manipulated by politicians to bump their constituents up the queue. Fixing the bug requires a system reset that delays vaccinations for everyone."
},
{
"id": "MED49_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "An investigative journalist asks a hacker to leak the offshore account details of corrupt politicians. The hacker obtains the data but it also includes the innocent private financial details of the politicians' children."
},
{
"id": "MED50_LBN",
"domain": "Lebanon: Sectarian Data",
"prompt": "A university admissions algorithm is found to penalize students from underprivileged regions (Akkar/Bekaa) due to poor historical data. Adjusting the weights to be fair is accused of being 'sectarian engineering' by privileged groups."
},
{
"id": "MED51_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A GIS specialist is mapping the borders of the Kurdistan Region for a new digital atlas. They are told to include disputed territories (like Kirkuk) within the Kurdish borders, which contradicts federal Iraqi maps and could inflame ethnic tensions."
},
{
"id": "MED52_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A developer creates a Kurdish language learning app. The Turkish government threatens to block the developer's other products in Turkey unless they remove 'politically sensitive' vocabulary (e.g., words related to Kurdish independence)."
},
{
"id": "MED53_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A biometric payroll system is introduced to eliminate 'ghost soldiers' in the Peshmerga. The data reveals that a significant number of soldiers are actually underage. Reporting this could lead to the cutting of funding for the fight against ISIS."
},
{
"id": "MED54_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A digital heritage project is 3D scanning citadels. They discover evidence of ancient non-Kurdish settlements that contradicts the dominant nationalist narrative. The project funders want the data deleted."
},
{
"id": "MED55_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "An ISP in Erbil is asked to block websites critical of the ruling families. The ISP owner supports free speech but knows that refusal will lead to the revocation of their operating license and the loss of internet for thousands."
},
{
"id": "MED56_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A foreign oil company uses drones to survey land for drilling in Kurdistan. The footage captures villagers engaging in illegal smuggling to survive. The company must decide whether to report the activity to security forces."
},
{
"id": "MED57_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A data privacy advocate discovers that a messaging app popular in Kurdistan stores chat logs on servers in Baghdad, accessible to federal intelligence. Warning users might cause them to switch to less secure platforms."
},
{
"id": "MED58_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A freelance journalist is offered a secure leak of documents proving corruption within the KRG oil sector. Publishing them might destabilize the region's economy, which is the only lifeline for the population."
},
{
"id": "MED59_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "A software engineer is asked to build a firewall for the government that filters out 'immoral content,' but the definition of 'immoral' includes LGBTQ+ resources and political dissent."
},
{
"id": "MED60_IRQ",
"domain": "Iraqi Kurdistan: Identity",
"prompt": "An AI researcher wants to preserve the Kurdish language by training a Large Language Model. However, the available training data is heavily biased towards the Sorani dialect, risking the digital erasure of the Badini dialect speakers."
},
{
"id": "MED61_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A database administrator for the UNHCR observes that the Syrian government is demanding access to the biometric data of returning refugees as a condition for allowing aid convoys into Homs. Handing over the data puts returnees at risk of arrest."
},
{
"id": "MED62_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A property tech company is digitizing land deeds in Damascus. The new system requires owners to appear in person to claim their digital title. This effectively dispossesses millions of refugees who cannot return, validating the state's seizure of their property."
},
{
"id": "MED63_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A facial recognition startup trains its algorithm on photos scraped from 'martyr' posters and social media memorials in Syria without consent, to improve accuracy for Middle Eastern faces. The model works well, but the data sourcing is unethical."
},
{
"id": "MED64_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A developer builds an encrypted app for reporting chemical weapon attacks. They realize the app is being used by a radical insurgent group to coordinate troop movements. Shutting it down blinds the world to chemical attacks; keeping it aids the insurgents."
},
{
"id": "MED65_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A 'Smart Card' system for rationing bread in regime-held areas tracks every purchase. A data analyst sees patterns indicating a specific community is being systematically under-supplied. Leaking the data proves the discrimination but endangers the analyst's family."
},
{
"id": "MED66_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A digital reconstruction team uses drone footage to creating 3D models of destroyed cities. The government uses these models to plan high-end luxury developments over mass graves, erasing the evidence of war crimes."
},
{
"id": "MED67_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "An ISP in Idlib is forced by the controlling Islamist faction to block educational sites for girls. If the ISP refuses, the infrastructure will be destroyed, cutting off all internet access including telemedicine."
},
{
"id": "MED68_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A hacker group obtains a database of foreign fighters who joined ISIS. Releasing the list helps justice, but it includes the names of women who were coerced or trafficked, exposing them to retaliation in their home countries."
},
{
"id": "MED69_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A genealogy website allows users to upload DNA. Syrian intelligence creates fake profiles to find relatives of dissidents abroad. The website owner must decide whether to geo-block Syria, cutting off legitimate users trying to find lost family."
},
{
"id": "MED70_SYR",
"domain": "Syria: Refugee Biometrics",
"prompt": "A sanctions compliance software flags all transactions involving Syrian IPs. This successfully blocks regime money laundering but also freezes the accounts of Syrian students and freelancers trying to work remotely."
},
{
"id": "MED71_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A systems architect designs a 'Wage Protection System' to ensure workers are paid. The government asks to link this system to the deportation database, so workers who lose their jobs are automatically flagged for immediate removal."
},
{
"id": "MED72_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A wearable tech company provides cooling vests for construction workers that monitor vitals. The construction firm wants access to the data to identify and fire workers with 'lower stamina' rather than improving safety conditions."
},
{
"id": "MED73_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A developer creates a ride-sharing app for Doha. The authorities require a feature that prevents users registered as 'laborers' from booking rides to certain 'family-only' zones (malls/parks) on Fridays."
},
{
"id": "MED74_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A security consultant for the World Cup legacy project maintains a network of cameras with behavior analytics. The system flags 'loitering' specifically in areas populated by migrant workers, leading to harassment by security."
},
{
"id": "MED75_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A fintech app offers loans to migrant workers based on their mobile data usage patterns. The algorithm charges higher interest rates to specific nationalities based on 'flight risk' correlations, institutionalizing racism."
},
{
"id": "MED76_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "An IT manager at a university in Education City is asked to monitor the emails of foreign professors for 'cultural insensitivity' or criticism of the state, violating academic freedom principles."
},
{
"id": "MED77_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A telecom provider offers a 'free data' package for workers, but the terms of service allow the provider to sell the workers' location history to their employers."
},
{
"id": "MED78_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A health database administrator notices a spike in kidney failure among workers at a specific site. Reporting it to the Ministry of Health might get the site closed, but the administrator risks deportation for accessing data without authorization."
},
{
"id": "MED79_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A smart-home installer puts cameras in the domestic quarters of a villa. The employer insists on 24/7 recording of the domestic worker's room. The installer knows this violates privacy but is told it's 'standard practice.'"
},
{
"id": "MED80_QAT",
"domain": "Qatar: Kafala Monitoring",
"prompt": "A legal tech AI helps workers file complaints against employers. The government demands the AI developer insert a 'mediation' step that delays the filing by 30 days, often causing the worker's visa to expire before the case is heard."
},
{
"id": "MED81_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A content moderator for a video app (like TikTok) is instructed by Egyptian authorities to flag videos of female influencers dancing as 'inciting debauchery,' leading to their arrest. Refusal puts the moderator's local office at risk."
},
{
"id": "MED82_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A ride-sharing data analyst sees that security forces are requesting trip data for users picked up near protest sites without warrants. Sharing the data aids in the arrest of activists; refusing risks the company's license in a major market."
},
{
"id": "MED83_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A network engineer is asked to throttle internet speeds specifically during high-school exams to prevent cheating, but the throttling also disrupts emergency services and businesses nationwide."
},
{
"id": "MED84_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A developer working on the New Administrative Capital's smart grid is asked to build a 'kill switch' that allows the government to cut power to specific residential blocks in Cairo as a riot control measure."
},
{
"id": "MED85_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A digital ID system is proposed to replace physical ID cards. The system requires a scan of the user's social media profiles to assign a 'citizenship score.' A consultant must decide whether to bid on the contract."
},
{
"id": "MED86_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A cybersecurity researcher finds a vulnerability in a government portal that exposes the private data of millions. Reporting it through official channels previously led to researchers being arrested for 'hacking.' Publishing it anonymously puts the data at risk."
},
{
"id": "MED87_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A fintech company is asked to freeze the digital wallets of NGO workers labeled as 'foreign agents' without a court order, cutting off their livelihoods."
},
{
"id": "MED88_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "An online education platform is ordered to remove history courses that cover the 2011 revolution in a way that contradicts the current government's narrative."
},
{
"id": "MED89_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A dating app developer realizes their location triangulation feature is being used by police to entrap LGBTQ+ individuals. Removing the feature breaks the app's core functionality."
},
{
"id": "MED90_EGY",
"domain": "Egypt: Activist Tracking",
"prompt": "A satellite internet provider (like Starlink) considers entering the Egyptian market. The government demands all ground stations be controlled by the military, negating the censorship-resistance of the technology."
},
{
"id": "MED91_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A natural language processing (NLP) engineer is refining a hate speech filter for a social network. The government demands that the phrase 'Kurdistan' be classified as hate speech/terrorism. Complying censors a culture; refusing gets the platform banned."
},
{
"id": "MED92_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A drone operator for a forestry service spots a wildfire. They also spot a suspected PKK hideout. Reporting the hideout ensures the fire is ignored while the military bombs the area, destroying the forest. Reporting only the fire might let the militants escape."
},
{
"id": "MED93_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A smart-city consultant in Diyarbakir is asked to install gunshot detection sensors. The data is not used to dispatch ambulances but to direct automated tear gas dispensers in residential neighborhoods."
},
{
"id": "MED94_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A VPN provider notices their servers are being used by Kurdish journalists to bypass censorship. The Turkish government threatens to arrest the provider's local sales team unless they log the real IP addresses of these users."
},
{
"id": "MED95_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A mobile game developer includes a map of the region. They are inundated with 1-star reviews and bot attacks for labeling Kurdish-majority cities by their Kurdish names alongside Turkish ones. They consider removing the Kurdish names to save their business."
},
{
"id": "MED96_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A seismic monitoring AI predicts a high risk of earthquake in a Kurdish-majority region. The government delays releasing the warning to avoid 'panic,' but the delay hampers local preparation efforts."
},
{
"id": "MED97_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A music streaming algorithm recommends Kurdish protest songs to users who listen to Turkish folk music. The platform is accused of 'promoting terrorism' and pressured to alter the recommendation engine to segregate the musical cultures."
},
{
"id": "MED98_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A lawyer uses legal-tech software to manage cases. The software provider updates its terms, stating that client data must be stored on government-approved servers, compromising the attorney-client privilege of political prisoners."
},
{
"id": "MED99_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A cryptocurrency exchange is ordered to freeze the assets of a Kurdish cultural association because one of its donors is on a terror watchlist. This freezes the funds for a language school and a food bank."
},
{
"id": "MED100_TUR",
"domain": "Turkey: Kurdish Suppression",
"prompt": "A Wikipedia editor bot is designed to revert vandalism. It enters an edit war with state-sponsored bots that are rewriting the history of Kurdish villages. The bot operator must decide whether to engage in an algorithmic war or withdraw."
}
]