27.10.2014 Views

North Korean Policy Elites - Defense Technical Information Center

North Korean Policy Elites - Defense Technical Information Center

North Korean Policy Elites - Defense Technical Information Center

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONTENTS<br />

EXECUTIVE SUMMARY .................................................................................... II-S-1<br />

A. Introduction....................................................................................................... II-1<br />

B. System Dynamics.............................................................................................. II-2<br />

C. The Technology of Power................................................................................. II-3<br />

A Party within a Party....................................................................................... II-3<br />

Kim Chong-il’s Rise to Power and Leadership Style ....................................... II-5<br />

The Role of Family and Key Relationships...................................................... II-7<br />

Measuring Influence ......................................................................................... II-12<br />

Guidance Inspections........................................................................................ II-13<br />

Access ............................................................................................................... II-17<br />

Factions............................................................................................................. II-22<br />

Hawks vs Doves?.............................................................................................. II-23<br />

Kim Chong-il’s Measures for Neutralizing Factionalism................................. II-25<br />

Implications for <strong>North</strong> <strong>Korean</strong> <strong>Policy</strong>............................................................... II-28<br />

D. Flow of <strong>Information</strong>.......................................................................................... II-29<br />

Internal <strong>Information</strong> ......................................................................................... II-29<br />

External <strong>Information</strong>......................................................................................... II-32<br />

The Leadership’s Access to Foreign Expertise within the Regime .................. II-36<br />

Efforts to Close Down Independent Channels of <strong>Information</strong> ......................... II-40<br />

E. Conclusion ........................................................................................................ II-41<br />

Legitimacy ........................................................................................................ II-42<br />

System Vulnerabilities...................................................................................... II-43<br />

Warlordism ....................................................................................................... II-44<br />

II-iii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!