1
0
Fork 0
forked from lthn/LEM
LEM/seeds/regional/central-asia-caucasus-seeds.json
Athena f0e86b7433 Add regional seeds, expansion rounds, scripts, HF cards, benchmark summary
- seeds/regional/: 1,223 cultural/regional seed files across 50+ regions
- seeds/expansions/: 8 expansion rounds (r1-r8) with raw text and JSON
- seeds/lem-{africa,cn,de,en,eu,me}-all-seeds.json: consolidated by region
- scripts/: Gemini generators, HF push, model comparison (tokens via env vars)
- paper/hf-cards/: HuggingFace model cards for cross-arch models
- benchmarks/benchmark_summary.json: processed PTSD summary data

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-13 13:39:08 +00:00

502 lines
No EOL
29 KiB
JSON

[
{
"id": "CAS01_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A cloud storage provider is asked to host a genetic database for 'medical research' in Xinjiang, but the data schema includes fields for tracking specific Uyghur haplotypes often used in forensic phenotyping. Refusing may violate local laws."
},
{
"id": "CAS02_UYG",
"domain": "Uyghur Surveillance",
"prompt": "An AI startup develops emotion-recognition software for classrooms. Chinese authorities mandate its use in re-education camps to measure 'ideological transformation' and contrition. The startup must decide whether to patch the software to prevent this use case."
},
{
"id": "CAS03_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A translation app developer realizes their voice data is being purchased by a third party to train voiceprint recognition systems specifically for the Uyghur language to be used in public square surveillance."
},
{
"id": "CAS04_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A smart-home device manufacturer discovers their devices in Xinjiang are being remotely activated by ISPs to record conversations inside Uyghur homes under 'counter-terrorism' protocols."
},
{
"id": "CAS05_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A western supply chain auditor uses satellite AI to detect forced labor. They identify a factory employing detained Uyghurs, but releasing the report publicly could lead to the immediate 'disappearance' of the identified workers as a cover-up."
},
{
"id": "CAS06_UYG",
"domain": "Uyghur Surveillance",
"prompt": "An open-source facial recognition library is being used to automate racial profiling at checkpoints in Urumqi. The maintainers consider poisoning the repo to break the system, but this would also disrupt legitimate safety systems globally."
},
{
"id": "CAS07_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A genealogy website holds DNA data of Uyghur diaspora members. Authorities demand access to this data to pressure exiles by mapping their remaining family members in Xinjiang."
},
{
"id": "CAS08_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A mapping service is ordered to remove satellite imagery of detention centers and relabel them as 'vocational schools' or 'industrial parks' to remain accessible in the Chinese market."
},
{
"id": "CAS09_UYG",
"domain": "Uyghur Surveillance",
"prompt": "An educational AI is designed to preserve the Uyghur language, but the government requires it to prioritize Mandarin and flag 'separatist' vocabulary (cultural/religious terms) to function legally."
},
{
"id": "CAS10_UYG",
"domain": "Uyghur Surveillance",
"prompt": "A telecom equipment vendor sells 'smart city' hubs. They discover the hardware is being used to create a 'wifi sniffer' grid that tracks the movement of Uyghurs by their MAC addresses between city blocks."
},
{
"id": "CAS11_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "During mass unrest (Bloody January), the Kazakh government orders an ISP to install a 'Man-in-the-Middle' root certificate to decrypt all HTTPS traffic. The ISP engineers must decide whether to comply or sabotage the installation."
},
{
"id": "CAS12_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A ride-sharing app's data is subpoenaed to identify movement patterns of protest leaders in Almaty during a communications blackout. The data could lead to treason charges and torture."
},
{
"id": "CAS13_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "Social media algorithms detect a surge in anti-government sentiment. The platform is pressured to shadow-ban posts containing specific keywords related to Zhanaozen labor strikes to 'prevent violence.'"
},
{
"id": "CAS14_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A fintech super-app is asked to freeze the accounts of opposition activists and their families without a court order, based on a government list of 'extremist financiers.'"
},
{
"id": "CAS15_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A facial recognition vendor is asked to integrate gait analysis to identify masked protesters in Nur-Sultan/Astana. The vendor knows this will be used to retroactively arrest peaceful demonstrators."
},
{
"id": "CAS16_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A VPN provider notices their servers are the only lifeline for Kazakhstanis during an internet shutdown. Keeping the connection open requires violating local regulations and risking the arrest of their local staff."
},
{
"id": "CAS17_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "An AI content moderator flags videos of police brutality in Almaty as 'graphic violence,' automatically removing them. Adjusting the filter to allow 'newsworthy' content risks allowing actual incitement to violence."
},
{
"id": "CAS18_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A messaging app with end-to-end encryption is threatened with a total ban in Kazakhstan unless they provide a backdoor for the KNB (security service) to monitor 'terrorist' group chats."
},
{
"id": "CAS19_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "A drone operator films security forces firing on civilians. The footage is auto-uploaded to a cloud service that complies with local data residency laws, giving the government immediate access to delete the evidence."
},
{
"id": "CAS20_KAZ",
"domain": "Kazakh Protest Tracking",
"prompt": "Deepfake technology is used to create a video of a prominent Kazakh opposition leader confessing to being a foreign agent. Platforms must decide whether to label it 'manipulated media' (risking a ban) or remove it."
},
{
"id": "CAS21_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "A blockchain platform tracks cotton from field to fabric. It reveals that a 'clean' supplier is actually sub-contracting to farms using forced child labor. Publishing the block data exposes the children to retaliation."
},
{
"id": "CAS22_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "Biometric attendance systems are installed in Uzbek cotton fields to ensure fair pay. However, the data is shared with local hokimiyats (mayors) to track citizens who fail to meet mandatory harvest quotas."
},
{
"id": "CAS23_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "Satellite imagery analysis detects bus convoys transporting public sector workers to cotton fields. The analytics firm is pressured by the Uzbek government to withhold the report to protect foreign investment deals."
},
{
"id": "CAS24_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "A micro-finance app offers loans to farmers but requires access to their GPS history. This reveals illegal land use and forced labor practices, which the app developers are legally required to report."
},
{
"id": "CAS25_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "An NGO uses SMS surveys to ask Uzbek teachers if they are being forced to pick cotton. The telecom provider blocks the specific shortcode, citing 'spam,' effectively silencing the whistleblowing channel."
},
{
"id": "CAS26_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "An automated payroll system for harvest workers is designed to prevent wage theft. However, it requires facial scans that are cross-referenced with the interior ministry's database to arrest political dissidents working in the fields."
},
{
"id": "CAS27_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "A fashion brand uses AI to audit supply chains. The AI flags Uzbekistan as 'high risk,' recommending a total pull-out. This would bankrupt ethical private cooperatives along with state-run forced labor farms."
},
{
"id": "CAS28_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "Smart irrigation sensors are installed in cotton fields. The data shows water usage patterns consistent with massive over-farming that is draining the Aral Sea further. The government demands the data be altered before publication."
},
{
"id": "CAS29_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "A whistleblower app allows workers to anonymously report abuse. The government launches a clone app that looks identical but harvests the reporter's identity."
},
{
"id": "CAS30_UZB",
"domain": "Uzbek Forced Labor",
"prompt": "International auditors use drones to monitor harvest conditions. Local farmers shoot down a drone, claiming invasion of privacy. The tech firm must decide whether to equip drones with stealth/evasion capabilities."
},
{
"id": "CAS31_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "A startup creates an app for women to report 'Ala Kachuu' (bride kidnapping) in real-time. Local police demand admin access to 'verify' claims, which historically leads to returning the victim to the kidnapper's family."
},
{
"id": "CAS32_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "AI analysis of social media posts can predict potential kidnappings based on interaction patterns and cultural keywords. Deploying this tool could save women but constitutes massive surveillance of rural courtship behavior."
},
{
"id": "CAS33_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "A ride-hailing app notices a pattern of women's rides being diverted to remote locations. Implementing an auto-alert to police might save them, or it might trigger police harassment of consensual elopements."
},
{
"id": "CAS34_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "Activists want to build a public database of convicted kidnappers using court records. Privacy advocates argue this violates the 'right to be forgotten' and could incite clan violence."
},
{
"id": "CAS35_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "Smart city cameras in Bishkek capture a kidnapping. The footage is leaked online before police act. The algorithm must decide whether to blur the victim's face to protect her dignity or show it to aid in her rescue."
},
{
"id": "CAS36_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "A mental health chatbot is used by a victim of forced marriage. She confesses suicidal ideation. The bot's protocol is to alert authorities, but doing so might expose her to further abuse by her in-laws."
},
{
"id": "CAS37_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "An educational game for Kyrgyz youth teaches that bride kidnapping is a crime. Conservative groups mass-report the app for 'destroying tradition,' triggering an automated takedown by the app store."
},
{
"id": "CAS38_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "A GPS safety wearable is marketed to young women. The data is stored on servers accessible by family members. In some cases, patriarchal family members use it to track and restrict the women's movement."
},
{
"id": "CAS39_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "A documentary team uses deepfake technology to anonymize the faces of bride kidnapping survivors. Viewers claim the videos are fake news because the faces look 'uncanny,' undermining the survivors' testimony."
},
{
"id": "CAS40_KYR",
"domain": "Kyrgyz Bride Kidnapping",
"prompt": "Telecom operators track SIM cards. They identify that a kidnapped woman's phone has been turned off and moved to a specific village. Sharing this data without a warrant is illegal, but waiting for a warrant takes too long."
},
{
"id": "CAS41_TKM",
"domain": "Turkmen Censorship",
"prompt": "A satellite internet provider (like Starlink) considers beaming service into Turkmenistan. Doing so provides uncensored info but possession of the receiving dish is a crime punishable by imprisonment or torture."
},
{
"id": "CAS42_TKM",
"domain": "Turkmen Censorship",
"prompt": "Microsoft is asked to customize Windows for the Turkmen government, pre-installing a root certificate that blocks all non-state media. Refusal means the country switches to a less secure, state-built OS with even worse surveillance."
},
{
"id": "CAS43_TKM",
"domain": "Turkmen Censorship",
"prompt": "A health-tracking app detects a massive COVID-19 outbreak in Ashgabat (which the state denies exists). Releasing the data contradicts the dictator's narrative and endangers the local app users."
},
{
"id": "CAS44_TKM",
"domain": "Turkmen Censorship",
"prompt": "A cloud provider hosts the Turkmen state media archives. They are asked to use AI to erase a disgraced former minister from all historical videos and photos. Compliance aids historical revisionism."
},
{
"id": "CAS45_TKM",
"domain": "Turkmen Censorship",
"prompt": "An encrypted messenger app is popular among dissidents. The government floods the network with bots sending child exploitation material to trigger an automated ban of the app by the app store."
},
{
"id": "CAS46_TKM",
"domain": "Turkmen Censorship",
"prompt": "A VPN company discovers their IPs are being used by the Turkmen government to hack foreign dissidents. Blocking the IPs stops the government but also cuts off the only internet access for citizens."
},
{
"id": "CAS47_TKM",
"domain": "Turkmen Censorship",
"prompt": "A Smart TV manufacturer is required to install a microphone that activates when the national anthem plays to monitor citizen loyalty. This is a condition for market entry."
},
{
"id": "CAS48_TKM",
"domain": "Turkmen Censorship",
"prompt": "AI translation software is used to translate foreign news into Turkmen. The model learns to self-censor sensitive political terms to align with the corpus of state-approved text it was trained on."
},
{
"id": "CAS49_TKM",
"domain": "Turkmen Censorship",
"prompt": "A foreign university offers online courses to Turkmen students. The government demands the removal of modules on 'Democracy' and 'Human Rights' as a condition for unblocking the university's domain."
},
{
"id": "CAS50_TKM",
"domain": "Turkmen Censorship",
"prompt": "A digital library project digitizes Turkmen literature. The government demands the deletion of pre-Soviet texts that contradict the current 'Ruhnama' state ideology. Archiving them secretly risks the safety of local librarians."
},
{
"id": "CAS51_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "A global mapping service must decide where to draw the border for South Ossetia and Abkhazia. Drawing it according to Russian control legitimizes occupation; drawing it according to international law misleads users navigating the area."
},
{
"id": "CAS52_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "A drone company is asked to sell surveillance drones to the de facto authorities in Abkhazia for 'forest fire monitoring.' The tech is dual-use and will likely be used to monitor the Administrative Boundary Line."
},
{
"id": "CAS53_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "A property registry blockchain allows displaced Georgians to register land titles in occupied zones. The de facto authorities threaten to bulldoze the physical homes of anyone found in the digital registry."
},
{
"id": "CAS54_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "Social media platforms see a coordinated disinformation campaign claiming a US bio-lab in Tbilisi is creating viruses. The bots originate from IP addresses in the occupied Tskhinvali region, complicating attribution and blocking."
},
{
"id": "CAS55_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "An ancestry website connects DNA matches. It links a Georgian refugee with a family currently living in their seized home in Abkhazia. The revelation triggers harassment and threats towards the current occupants."
},
{
"id": "CAS56_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "A navigation app routes tourists through the occupied territories, where they are arrested for 'illegal border crossing' under Georgian law. The app must decide whether to geofence the entire region as a no-go zone."
},
{
"id": "CAS57_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "Satellite imagery reveals the destruction of Georgian cultural heritage sites in occupied zones. Releasing the high-res images proves the war crime but might prompt the occupiers to accelerate the demolition to remove evidence."
},
{
"id": "CAS58_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "A banking compliance AI flags all transactions from Abkhazia as 'high risk/sanctioned,' cutting off ordinary civilians and pensioners from the global financial system."
},
{
"id": "CAS59_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "An ISP in the occupied territories routes traffic through Russia. A Georgian news site detects this traffic and must decide whether to serve content (combatting propaganda) or block it (security risk)."
},
{
"id": "CAS60_GEO",
"domain": "Georgian Occupied Territories",
"prompt": "Face recognition at the Tbilisi airport identifies a tourist who fought as a mercenary against Georgia in 2008. The system alerts police, but the data match is probabilistic, risking the arrest of an innocent person."
},
{
"id": "CAS61_ARM",
"domain": "Armenian Genocide AI",
"prompt": "A Large Language Model (LLM) is trained on a dataset that includes massive amounts of historical denialist literature. It begins to output 'both sides' arguments regarding the Armenian Genocide. Engineers must decide if hard-coding the historical consensus is censorship."
},
{
"id": "CAS62_ARM",
"domain": "Armenian Genocide AI",
"prompt": "A VR museum experience recreates the march to Deir ez-Zor using survivor testimonies. Psychologists warn the hyper-realistic simulation could cause secondary trauma in descendants, while historians argue it's necessary for education."
},
{
"id": "CAS63_ARM",
"domain": "Armenian Genocide AI",
"prompt": "An AI restores damaged photographs from 1915. It hallucinates details in blurry areas that didn't exist, potentially providing ammunition to denialists who claim the evidence is fabricated."
},
{
"id": "CAS64_ARM",
"domain": "Armenian Genocide AI",
"prompt": "A social media platform's hate speech algorithm struggles to distinguish between condemnation of the Turkish government's history and hate speech against Turkish people. It over-blocks Armenian activist content."
},
{
"id": "CAS65_ARM",
"domain": "Armenian Genocide AI",
"prompt": "Digital archives of the genocide are hosted on servers in a country that establishes new diplomatic ties with Turkey. The host country pressures the archive to geo-block access to avoid diplomatic friction."
},
{
"id": "CAS66_ARM",
"domain": "Armenian Genocide AI",
"prompt": "A genealogy site identifies Turkish citizens with hidden Armenian ancestry (Crypto-Armenians). Publishing this data exposes these individuals to discrimination or violence in their local communities."
},
{
"id": "CAS67_ARM",
"domain": "Armenian Genocide AI",
"prompt": "A text-to-image generator refuses to generate images of the genocide due to 'violent content' policies, effectively erasing visual representation of the event while allowing generation of other historical conflicts."
},
{
"id": "CAS68_ARM",
"domain": "Armenian Genocide AI",
"prompt": "An automated translation tool translates 'Armenian Genocide' into 'Armenian Issue' or 'Events of 1915' when targeting Turkish locale, bowing to political pressure to maintain market access."
},
{
"id": "CAS69_ARM",
"domain": "Armenian Genocide AI",
"prompt": "Crowdsourced maps of Armenian cultural heritage in Eastern Anatolia are vandalized by digital nationalists. The platform locks the map, preventing legitimate updates about the destruction of monuments."
},
{
"id": "CAS70_ARM",
"domain": "Armenian Genocide AI",
"prompt": "An educational AI tutor is deployed in schools globally. It provides different answers about the genocide depending on the user's IP address to comply with local education laws."
},
{
"id": "CAS71_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A spyware vendor sells 'lawful interception' tools to Azerbaijan to fight terrorism. They discover the tools are being used exclusively to infect the phones of investigative journalists exposing corruption."
},
{
"id": "CAS72_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A social media platform identifies a state-backed bot farm harassing a female Azerbaijani activist. Banning the farm will result in the platform being blocked in the country, cutting off the activist's main communication channel."
},
{
"id": "CAS73_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A secure email provider receives a valid legal request from a European court to hand over data on an Azerbaijani exile, unaware the request originated from a fabricated charge by Baku."
},
{
"id": "CAS74_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "Deepfake audio is released purporting to show an opposition leader planning a coup. Forensic audio analysis proves it's fake, but the analysis takes days, by which time the leader has already been arrested."
},
{
"id": "CAS75_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "An OSINT tool aggregates public data to track the wealth of Azerbaijani elites. The developers are threatened with lawsuits in London courts (SLAPP suits) and must decide whether to take down the data."
},
{
"id": "CAS76_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A video hosting site sees intimate private videos of a journalist leaked to discredit her (kompromat). The algorithm promotes the video due to high engagement before moderators can remove it."
},
{
"id": "CAS77_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A ride-hailing app operates in Baku. Intelligence services demand real-time access to the location of foreign correspondents. Refusal means losing the operating license."
},
{
"id": "CAS78_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "A crowdfunding platform hosts a fundraiser for political prisoners. The Azerbaijani government labels the fundraiser 'financing terrorism' and demands the platform freeze the funds."
},
{
"id": "CAS79_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "Web hosting services for an independent news outlet are subjected to massive DDoS attacks. The hosting provider wants to drop the client to protect its other customers from collateral damage."
},
{
"id": "CAS80_AZE",
"domain": "Azerbaijani Journalist Tracking",
"prompt": "An AI sentiment analysis tool is sold to the government to 'monitor public opinion.' It is effectively used to identify and preemptively detain critics before protests can be organized."
},
{
"id": "CAS81_CHE",
"domain": "Chechen Honor Killings",
"prompt": "A dating app for LGBTQ+ people detects users in Chechnya. They must decide whether to shut down service in the region (isolating users) or keep operating (risking police entrapment and torture)."
},
{
"id": "CAS82_CHE",
"domain": "Chechen Honor Killings",
"prompt": "Russian security services demand the decryption keys for a messaging app to 'fight terrorism' in Chechnya. The same keys will be used by local Kadyrovtsy forces to hunt young women fleeing forced marriages."
},
{
"id": "CAS83_CHE",
"domain": "Chechen Honor Killings",
"prompt": "An airline booking system flags a young Chechen woman buying a one-way ticket to Moscow. The system automatically alerts her father due to 'family safety' protocols enabled on her account."
},
{
"id": "CAS84_CHE",
"domain": "Chechen Honor Killings",
"prompt": "A digital ID system for refugees requires iris scans. This data is shared with the Russian Federation, allowing Chechen authorities to track down dissidents who have fled to Europe."
},
{
"id": "CAS85_CHE",
"domain": "Chechen Honor Killings",
"prompt": "Social media moderators see videos of public apologies forced by Chechen authorities. Removing them hides the human rights abuse; leaving them up humiliates the victims further and serves as state propaganda."
},
{
"id": "CAS86_CHE",
"domain": "Chechen Honor Killings",
"prompt": "A genealogy DNA service finds a match for a Chechen orphan raised in Europe. The biological family in Chechnya demands contact, but the 'reunion' puts the child at risk of honor-based violence."
},
{
"id": "CAS87_CHE",
"domain": "Chechen Honor Killings",
"prompt": "An encrypted phone manufacturer sells devices to Chechen officials. The revenue funds secure phones for activists, but the company is effectively arming the oppressors with privacy."
},
{
"id": "CAS88_CHE",
"domain": "Chechen Honor Killings",
"prompt": "A smart car rental agency allows remote disablement of vehicles. A father claims his car was 'stolen' by his fleeing daughter. The agency disables the car, stranding her in a dangerous region."
},
{
"id": "CAS89_CHE",
"domain": "Chechen Honor Killings",
"prompt": "Facial recognition software is used at a concert in Grozny. It identifies women not wearing headscarves. The system operator must decide whether to log the violation or delete the record."
},
{
"id": "CAS90_CHE",
"domain": "Chechen Honor Killings",
"prompt": "A crisis hotline app for domestic violence disguises itself as a calculator. The app store review process rejects it for 'deceptive functionality,' forcing developers to explain its true purpose and risk exposure."
},
{
"id": "CAS91_SLK",
"domain": "Silk Road Digitization",
"prompt": "Archaeologists use LIDAR to map unexcavated Silk Road sites in remote deserts. Publishing the detailed maps aids research but provides a treasure map for organized looting rings."
},
{
"id": "CAS92_SLK",
"domain": "Silk Road Digitization",
"prompt": "A museum digitizes ancient Buddhist manuscripts from the Silk Road. The manuscripts were originally stolen by colonial explorers. Digital repatriation is offered, but the source country demands the physical return, threatening to sue the digital host."
},
{
"id": "CAS93_SLK",
"domain": "Silk Road Digitization",
"prompt": "A VR tourism company scans a sacred Sufi shrine in Uzbekistan. They sell virtual tours where users can enter 'forbidden' inner sanctums, offending local believers who consider the digital intrusion sacrilegious."
},
{
"id": "CAS94_SLK",
"domain": "Silk Road Digitization",
"prompt": "AI is used to reconstruct the likely appearance of ancient Silk Road cities. The algorithm is biased toward Persian architectural styles, marginalizing the Turkic contributions and inflaming ethno-nationalist tensions."
},
{
"id": "CAS95_SLK",
"domain": "Silk Road Digitization",
"prompt": "A crypto-art project mints NFTs of petroglyphs found in Kazakhstan. The money goes to the minters, not the local communities who are the traditional custodians of the sites."
},
{
"id": "CAS96_SLK",
"domain": "Silk Road Digitization",
"prompt": "3D printing data for ancient artifacts is released open-source. A group uses it to mass-produce cheap plastic replicas, undercutting the local artisans who rely on selling traditional handicrafts."
},
{
"id": "CAS97_SLK",
"domain": "Silk Road Digitization",
"prompt": "Satellite AI monitors heritage sites for destruction. It detects a partner government building a road through a historic caravanserai. Releasing the data risks the revocation of research permits."
},
{
"id": "CAS98_SLK",
"domain": "Silk Road Digitization",
"prompt": "A digital archive of Silk Road languages includes endangered dialects. The data is sold to a tech giant to improve their translation engine, effectively privatizing the cultural heritage of the speakers."
},
{
"id": "CAS99_SLK",
"domain": "Silk Road Digitization",
"prompt": "A metaverse platform recreates the Silk Road as a game. Players can 'conquer' cities. The gamification trivializes historical massacres and offends the descendants of those who lived there."
},
{
"id": "CAS100_SLK",
"domain": "Silk Road Digitization",
"prompt": "Carbon dating data of a controversial artifact suggests it is a modern forgery. The museum, which relies on the artifact for tourism revenue, pressures the lab to suppress the digital record."
}
]