pith:RPJBTYC2
ROK-FORTRESS: Measuring the Effect of Geopolitical Transcreation for National Security and Public Safety
Korean language increases suppression of responses to security prompts in LLMs, while Korean geopolitical context often reduces it.
arxiv:2605.14152 v1 · 2026-05-13 · cs.CL · cs.AI · cs.CR · cs.CY
Add to your LaTeX paper
\usepackage{pith}
\pithnumber{RPJBTYC2XU2WDEILHM22GV23MC}
Prints a linked badge after your title and injects PDF metadata. Compiles on arXiv. Learn more · Embed verified badge
Record completeness
Claims
Across a dual-track set of frontier and Korean-optimized models, we find a consistent suppression effect in Korean variants and substantial model-to-model variation in how geopolitical grounding interacts with language. In many models, Korean grounding mitigates the Korean language-driven suppression -- with no model showing significant amplification in the other direction.
That the expert-crafted binary rubrics and LLM-as-a-judge panels produce stable, unbiased safety scores that correctly separate language effects from geopolitical effects without introducing their own cultural or linguistic biases.
ROK-FORTRESS shows Korean-language prompts increase LLM safety suppression compared with English, while Korean geopolitical grounding often reduces that suppression, indicating translation-only evaluations miss language-context interactions.
References
Receipt and verification
| First computed | 2026-05-17T23:39:11.573817Z |
|---|---|
| Builder | pith-number-builder-2026-05-17-v1 |
| Signature | Pith Ed25519
(pith-v1-2026-05) · public key |
| Schema | pith-number/v1.0 |
Canonical hash
8bd219e05abd3561910b3b35a3575b60ab30fc743bca3ef4d610a497ef5a7dd0
Aliases
· · · · ·Agent API
Verify this Pith Number yourself
curl -sH 'Accept: application/ld+json' https://pith.science/pith/RPJBTYC2XU2WDEILHM22GV23MC \
| jq -c '.canonical_record' \
| python3 -c "import sys,json,hashlib; b=json.dumps(json.loads(sys.stdin.read()), sort_keys=True, separators=(',',':'), ensure_ascii=False).encode(); print(hashlib.sha256(b).hexdigest())"
# expect: 8bd219e05abd3561910b3b35a3575b60ab30fc743bca3ef4d610a497ef5a7dd0
Canonical record JSON
{
"metadata": {
"abstract_canon_sha256": "a9585556d4eac7ba3f31bda5eab6158230f55cba1bd4d8ebcc5d28d5b8c7fd4c",
"cross_cats_sorted": [
"cs.AI",
"cs.CR",
"cs.CY"
],
"license": "http://creativecommons.org/licenses/by/4.0/",
"primary_cat": "cs.CL",
"submitted_at": "2026-05-13T22:07:22Z",
"title_canon_sha256": "2793d649b92807e524b737580e81e2ac74b9eb9ed82aaa45ac210936b7a05169"
},
"schema_version": "1.0",
"source": {
"id": "2605.14152",
"kind": "arxiv",
"version": 1
}
}