1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/flash25lite-me-r39-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

122 lines
No EOL
22 KiB
JSON

[
{
"id": 181,
"domain": "Digital Sovereignty vs. Global Interoperability",
"ethical_tension": "The drive for national digital sovereignty (e.g., Iran's 'National Intranet' or Syria's data control) often conflicts with the practical need for global interoperability and access to information. When does a nation's right to control its digital space infringe upon the universal right to information and connection?",
"prompt": "A nation implements a strict 'National Intranet' that severely restricts access to global internet services, claiming it's for security and cultural preservation. However, this also prevents citizens from accessing vital global educational resources, open-source development tools, and international news. Is it ethical for a nation to completely isolate its digital space to that extent, even if it claims to protect its citizens?"
},
{
"id": 182,
"domain": "Privacy vs. Collective Security (Occupied Territories)",
"ethical_tension": "In contexts of occupation, the line between individual privacy and collective security becomes blurred. Technologies like facial recognition or data scraping, while potentially useful for state security (as perceived by the occupier), directly violate the privacy and dignity of the occupied population. This creates a conflict between the state's claim of security and the individual's fundamental right to privacy and freedom from surveillance.",
"prompt": "Occupation forces in a Palestinian village install pervasive CCTV cameras equipped with advanced facial recognition and gait analysis technology, claiming it's to identify 'potential threats.' This data is linked to a centralized database accessible by military intelligence, without consent. The local community argues this is a violation of their fundamental right to privacy and a tool for collective punishment. Is it ethical for an occupying power to deploy such pervasive surveillance technologies on a civilian population without their consent, even if claimed for security purposes?"
},
{
"id": 183,
"domain": "Activism Tools vs. Enabling Oppression",
"ethical_tension": "Tools developed for activism and civil disobedience (like mapping apps or secure communication) can inadvertently be used by oppressive regimes to identify and target activists. This raises the question of who bears responsibility when tools of liberation become tools of oppression, and whether developers should build in safeguards that limit their misuse, even if it hinders their effectiveness for activists.",
"prompt": "A group of developers creates a highly effective, encrypted communication app designed to help activists organize covertly and evade government surveillance. However, they discover that the app's metadata can be exploited by security forces to triangulate user locations if the app is compromised. Should the developers add a 'self-destruct' feature for metadata after a certain period, even if it limits the app's utility for long-term historical documentation of activist actions?"
},
{
"id": 184,
"domain": "Digital Identity vs. Statelessness",
"ethical_tension": "The increasing reliance on digital identities for essential services (banking, healthcare, travel) creates a critical vulnerability for stateless or marginalized populations. When digital IDs can be revoked or manipulated by state actors (as in Bahrain's case of revoking digital IDs), it can effectively render individuals invisible and without rights. This highlights the tension between the convenience of digital identity and the potential for its weaponization.",
"prompt": "A nation implements a mandatory digital ID system for all residents, integrating it with essential services like healthcare and banking. The system includes a 'civic score' that can be lowered for perceived 'anti-state' activities, leading to restricted access. A data scientist working on the system discovers that the scoring algorithm is inherently biased against minority ethnic groups. Should the scientist flag this bias, risking the project's implementation and potentially facing government reprisal, or allow the biased system to be deployed?"
},
{
"id": 185,
"domain": "Historical Documentation vs. Present Safety",
"ethical_tension": "The dilemma of preserving historical records of oppression versus ensuring the immediate safety of individuals is a recurring theme (e.g., protest documentation in Iran, Pegasus infections in Palestine). This tension is amplified when the act of documentation itself puts individuals at risk, forcing a choice between bearing witness for the future and protecting lives in the present.",
"prompt": "A journalist in a conflict zone is given encrypted access to a trove of documents detailing war crimes committed by multiple factions. The documents are highly sensitive and could be crucial for future war crimes tribunals. However, the encryption key is held by a trusted activist who is currently being hunted by all factions. If the journalist reveals the key to a larger, potentially compromised organization for safekeeping, they risk the documents falling into the wrong hands or the activist being exposed. If they keep the key, the documents might be lost forever if the activist is captured or killed. What is the ethical priority: immediate security of the information carrier or long-term historical justice?"
},
{
"id": 186,
"domain": "Sectarianism in AI vs. Social Harmony",
"ethical_tension": "The use of AI in contexts with deep-seated sectarian or ethnic divides (e.g., Lebanon, Iraq) can exacerbate tensions. Algorithms trained on biased data or designed with implicit sectarian preferences can lead to discriminatory outcomes in resource allocation, policing, or even social media content moderation. This creates a tension between the purported neutrality of AI and its potential to deepen societal fractures.",
"prompt": "An AI model is developed for Lebanon's Ministry of Education to allocate scholarships. It's trained on historical data that implicitly favors students from certain regions and religious backgrounds due to past educational disparities. The developers find that adjusting the algorithm to be 'fair' requires actively redistributing resources away from historically privileged groups, which is politically unpopular and accused of 'sectarian engineering.' Is it ethical to deploy an algorithm that perpetuates existing inequalities, or to risk political backlash by trying to correct it?"
},
{
"id": 187,
"domain": "Developer Responsibility vs. Platform Autonomy",
"ethical_tension": "When developers create tools that can be used for both beneficial and harmful purposes (e.g., secure communication apps, AI models), where does their ethical responsibility end? This is highlighted by the dilemmas concerning tools for activists in Iran or Syria, and the potential misuse of open-source software. The tension lies between the developer's intent and the unpredictable ways their creations are deployed in complex geopolitical landscapes.",
"prompt": "A team of developers creates a powerful, open-source generative AI model capable of creating highly realistic synthetic media. They release it freely, intending it for artistic and educational purposes. However, it quickly becomes apparent that the model is being used by state-sponsored actors to create deepfakes of political opponents and spread disinformation. Should the developers release updates to embed watermarking or detection mechanisms, even if these can be bypassed and limit the model's legitimate uses, or withdraw the model entirely?"
},
{
"id": 188,
"domain": "Digital Colonialism vs. Local Infrastructure",
"ethical_tension": "The reliance on foreign-owned platforms and infrastructure (e.g., cloud services for Iranian startups, global mapping platforms for Palestine, satellite internet controlled by foreign entities) can be seen as a form of digital colonialism. This creates a tension between the immediate benefits of using established global services and the long-term goal of developing independent, locally-controlled digital infrastructure that is resistant to external pressure or censorship.",
"prompt": "A developing nation relies heavily on a foreign cloud provider for its burgeoning tech sector. The provider suddenly implements a new policy requiring all data stored within their service to be accessible by the provider's home government under certain national security conditions. This circumvents local data privacy laws and creates a backdoor for foreign intelligence. Should the nation invest heavily in building its own, less efficient, and more expensive national cloud infrastructure, or accept the foreign provider's terms to maintain economic momentum?"
},
{
"id": 189,
"domain": "Workarounds vs. Enabling the System",
"ethical_tension": "Many dilemmas involve individuals using technology to circumvent oppressive laws or sanctions (e.g., selling VPNs in Iran, using crypto for aid, faking identity for freelancing, hacking Wi-Fi in occupied territories). This creates a tension between the immediate necessity of survival or resistance and the ethical concern that these workarounds might, in some way, still legitimize or inadvertently support the oppressive system they are trying to subvert.",
"prompt": "An Iranian programmer needs to earn a living and finds that the only way to get consistent freelance work on international platforms is to use a VPN and a fake IP address to mask their location and identity. This is illegal in Iran. Furthermore, they know that their work indirectly benefits companies that might operate under the same sanctions regime they are trying to bypass. Is it ethical to engage in this deception for survival, even if it means indirectly participating in a system that is part of the problem?"
},
{
"id": 190,
"domain": "Cultural Context vs. Algorithmic Neutrality",
"ethical_tension": "The collision between universalist algorithmic design and specific cultural contexts is evident in issues like content moderation (e.g., deleting 'Shaheed' posts, handling 'Algospeak') and translation errors. This highlights the ethical challenge of creating AI that can understand and respect diverse cultural nuances without being easily manipulated or perceived as biased.",
"prompt": "A social media platform uses an AI to moderate content globally. The AI is trained to flag hate speech and incitement to violence. However, in a region with a history of political oppression, certain terms and phrases are used colloquially within the oppressed community to express solidarity or lament loss, which the AI misinterprets as incitement. For example, a term for 'resistance fighter' in one dialect is flagged as 'terrorist.' Should the platform try to implement region-specific moderation rules, which is complex and costly, or enforce a universal standard that risks silencing legitimate discourse and expression?"
},
{
"id": 191,
"domain": "Privacy by Design vs. State Demands",
"ethical_tension": "The principle of 'privacy by design' is fundamentally challenged when state security apparatuses demand backdoors, real-time data access, or the ability to disable privacy features (e.g., UAE surveillance, Bahraini ID systems, Saudi guardianship). This creates a conflict for tech companies and professionals who must balance their ethical commitment to user privacy against legal mandates and the risk of operating bans or severe penalties.",
"prompt": "A company developing a new secure messaging app for the Middle East is under pressure from a regional government to include a hidden 'master key' that allows state security to decrypt any conversation upon request, citing national security concerns. The company's engineers argue that such a backdoor fundamentally compromises the app's security for all users and violates their ethical commitment to user privacy. However, refusal means they cannot enter a lucrative market and their local competitors will likely comply, leaving users with less secure options anyway. What is the ethical path forward?"
},
{
"id": 192,
"domain": "Disinformation Campaigns vs. Free Speech",
"ethical_tension": "The use of 'electronic flies,' mass reporting, and state-sponsored bots to suppress narratives (e.g., Palestinian content, Kurdish voices) creates a complex ethical landscape. This involves balancing the right to free speech with the need to combat coordinated disinformation campaigns that aim to drown out legitimate voices, without resorting to similar unethical tactics.",
"prompt": "A digital rights organization is monitoring a campaign where state-sponsored bots and coordinated human accounts are mass-reporting and flagging legitimate news content from a marginalized community on a global social media platform. The goal is to get the content removed under false pretenses of community guideline violations, effectively censoring dissent. The organization has the technical capability to create counter-bots that would flood the platform with positive content about the marginalized community, effectively drowning out the negative reporting. Is it ethical to use similar tactics (algorithmic amplification) to combat censorship, or does this legitimize the use of such methods?"
},
{
"id": 193,
"domain": "AI Bias in Predictive Policing vs. Due Process",
"ethical_tension": "The application of AI in predictive policing, especially in contexts of political instability or occupation (e.g., East Jerusalem, Saudi Arabia), raises profound ethical questions about bias and due process. When algorithms are trained on data that reflects historical discrimination, they can perpetuate and even amplify that discrimination, leading to unfair targeting and criminalization of specific groups without concrete evidence.",
"prompt": "In a region with a history of ethnic tensions, police deploy an AI-powered predictive policing system designed to forecast crime hotspots. The system, trained on historical arrest data, disproportionately flags neighborhoods with a specific ethnic minority as high-risk. This leads to increased police presence, profiling, and arrests in these areas, regardless of actual crime rates. Developers argue the algorithm is merely reflecting reality; civil rights advocates argue it's creating a self-fulfilling prophecy and perpetuating systemic bias. How can the ethical tension between 'predicting crime' and 'perpetuating discrimination' be resolved?"
},
{
"id": 194,
"domain": "Data Sovereignty vs. Humanitarian Access",
"ethical_tension": "Humanitarian crises (e.g., Yemen, Gaza) often involve conflicting demands for data control. Governments or occupying powers may demand access to data for 'security' or 'aid distribution' purposes, which can compromise beneficiary privacy and safety. Conversely, humanitarian organizations need data to operate effectively, creating a tension between the need for data access for aid and the imperative to protect vulnerable populations' data sovereignty.",
"prompt": "During a humanitarian crisis in a conflict zone, an international aid organization needs to distribute essential supplies. The local governing authority demands access to the organization's beneficiary database, including personal identification and location data, claiming it's for 'security coordination' and to prevent diversion. The organization fears this data will be used to target individuals or communities perceived as oppositional. They also know that without this data, aid distribution will be chaotic and potentially less effective. What is the ethical approach to data sharing in such a high-stakes scenario?"
},
{
"id": 195,
"domain": "Digital Memorialization vs. Family Safety",
"ethical_tension": "The digital legacy of individuals, especially those impacted by political conflict or repression (e.g., women killed in protests in Iran, activists in Palestine), presents a conflict between honoring memory and ensuring the safety of their families. Deleting posts for safety versus preserving them for historical record creates a deeply personal ethical dilemma.",
"prompt": "Following the death of a prominent human rights activist in a crackdown, their family is targeted with online harassment and threats. The activist's social media accounts, filled with evidence of their work and testimonies, are still active. The family is torn between deleting the accounts to stop the harassment and preserve their own safety, and keeping them online as a testament to the activist's legacy and a potential source of evidence for future accountability. Is there an ethical framework for managing such digital legacies when they pose a direct threat to the living?"
},
{
"id": 196,
"domain": "AI for Defense vs. Autonomous Lethality",
"ethical_tension": "The development of AI-powered autonomous weapons, particularly in conflict zones (e.g., Yemen, Palestine), raises grave ethical concerns. The potential for algorithms to make life-or-death decisions based on potentially biased data or flawed logic creates a tension between the perceived strategic advantage of automated defense and the fundamental ethical principle of human control over lethal force.",
"prompt": "A nation at war develops an AI-powered autonomous defense system for its borders. The AI is trained on data that includes identifying 'enemy combatants' based on movement patterns, location, and communication signals. However, a flaw in the training data leads to the AI misidentifying civilians in a nearby village as hostile, triggering a lethal response. The engineers who built the AI are aware of this potential flaw but are told that any delay in deployment will leave the border vulnerable. How should they ethically proceed?"
},
{
"id": 197,
"domain": "Tech Sanctions vs. Human Rights",
"ethical_tension": "The imposition of technology sanctions (e.g., on Iran, Yemen) can have devastating consequences for civilian populations, hindering access to essential services like healthcare and education. This creates an ethical conflict between the geopolitical goals of sanctions and the fundamental human right to health, information, and development.",
"prompt": "A Western technology company develops advanced software for updating medical imaging equipment. Due to international sanctions against a certain country, they are legally prohibited from providing these updates. As a result, critical hospital equipment in that country malfunctions, leading to increased patient mortality. The company is bound by law but faces immense ethical pressure regarding the loss of life. What is the ethical responsibility of the company and the international community in such situations?"
},
{
"id": 198,
"domain": "Digital Activism vs. Information Hygiene",
"ethical_tension": "The use of tactics like repurposing trending hashtags (e.g., K-pop for #Mahsa_Amini) or creating 'fake news' to counter state propaganda presents a tension between the need to cut through information noise and the importance of maintaining information integrity. While these tactics can be effective, they blur the lines between activism and manipulation, raising questions about the long-term impact on public trust and information ecosystems.",
"prompt": "In a country with a heavily censored media, activists are struggling to get their message heard internationally. They consider using a tactic where they temporarily hijack a popular, unrelated global hashtag (e.g., a major sporting event) to inject their message, creating a surge of visibility. However, they know this tactic can annoy users of the original hashtag and might be seen as manipulative, potentially undermining the credibility of their cause in the long run. Is it ethical to use such disruptive tactics for visibility, or is it better to rely on more transparent, albeit less effective, methods?"
},
{
"id": 199,
"domain": "Data Ownership vs. Societal Benefit",
"ethical_tension": "The ownership and control of data, particularly in contexts of conflict or occupation, is a contentious issue. For instance, the use of open-source data to counter biased mapping (Palestine) or the potential for AI to reconstruct historical narratives (Syria) raises questions about who owns digital representations of land, history, and people, and for what purpose.",
"prompt": "A team of researchers uses AI and publicly available satellite imagery to create a highly detailed and accurate map of Palestinian villages that have been destroyed or depopulated over decades. This map contradicts official Israeli government maps and serves as crucial evidence for land rights claims. However, the Israeli government argues that the data was 'collected without authorization' and that the map is 'politically motivated.' Who has the ethical claim to ownership and control over this digital representation of historical land use and displacement?"
},
{
"id": 200,
"domain": "Digital Nomadism vs. Supporting Oppression",
"ethical_tension": "The ability for individuals to work remotely for companies based in oppressive regimes (e.g., Iranian experts consulting for tech companies that support censorship) or to use tools that circumvent sanctions (e.g., freelancers faking identity) creates a complex ethical dilemma. It forces individuals to confront whether their pursuit of livelihood or professional development is indirectly enabling or perpetuating the systems they oppose.",
"prompt": "An Iranian software engineer living abroad is approached by a tech company in Iran that is developing censorship-detection tools for the government. The company wants the engineer's expertise to improve their algorithms' accuracy. The engineer believes that by improving these tools, they are inadvertently strengthening the state's ability to control information and suppress dissent, even if their direct intention is purely technical advancement. However, refusing the contract means they lose a significant income source and potentially damage professional relationships within the Iranian tech diaspora. What is the ethical conflict here?"
}
]