By examining how North Korea, Inc. — the web of state trading companies affiliated to the Korean Workers’ Party, the Korean People’s Army, and the Cabinet — operates, this report highlights a new framework for gauging regime stability in North Korea.

Assessing regime stability in North Korea continues to be a major challenge for analysts. By examining how North Korea, Inc. — the web of state trading companies affiliated to the Korean Workers’ Party, the Korean People’s Army, and the Cabinet — operates, we can develop a new framework for gauging regime stability. As interviews with defectors who previously worked in these state trading companies indicate, the regime is able to derive funds from North Korea, Inc. to maintain the loyalty of the North Korean elites and to provide a mechanism through which different branches of the North Korean state can generate funds for operating budgets. During periods when North Korea's international isolation deepens as a result of its brinkmanship activities, North Korea, Inc. constitutes an effective coping mechanism for the Kim Jong Il regime.


Related Research & Analysis

What’s at Stake for China in the Iran War?

What’s at Stake for China in the Iran War?

Monday, June 23, 2025

China has major energy and economic interests that are threatened by an escalating conflict. But Beijing may also see some strategic opportunities with the U.S. focused on the war. Ultimately, China is likely unwilling, and unable, to make a serious effort to broker peace.

Type: Analysis

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

Wednesday, June 18, 2025

The 2024 revelations over China’s effort to implant malware in critical U.S. infrastructure by the Volt Typhoon hacking group — as well as the Salt Typhoon group’s successful breaching of at least nine major U.S. telecoms — have renewed concern over Beijing’s constant, ongoing efforts to hack Western companies, governments and non-governmental organizations. Unlike past incidents, like those involving Chinese military unit 61398, which were largely about cyber espionage, the Volt Typhoon group was actively implanting malware designed to disrupt critical infrastructure such as water and power systems.

Type: Analysis

How Vulnerable Is India to Chinese Economic Coercion?

How Vulnerable Is India to Chinese Economic Coercion?

Monday, June 16, 2025

By: Sushant Singh

While India has taken a strong security stance against China, its economic posture has been cooperative. But India's reliance on Chinese imports may undermine its role as a counterbalance to China. The U.S. can help India serve as a counterweight to China by supporting Delhi’s de-risking efforts.

Type: Analysis

The Perils of a Cold War Analogy for Today’s U.S.-China Rivalry

The Perils of a Cold War Analogy for Today’s U.S.-China Rivalry

Tuesday, June 10, 2025

In the new era of great power rivalry between the United States and the People’s Republic of China (hereafter “China”), the paradigm of strategic competition has become popular. In looking to make sense of the present global geopolitical moment and paradigm, pundits search for a relevant historical analogy.

Type: Analysis

View All Research & Analysis