Expert Commentary

What to Do About Kim Jong-Un

March 15, 2016 | Michael Mazza
 

In the wake of North Korea’s January nuclear test, White House spokesman Josh Earnest described U.S. goals for the Korean peninsula. “We want the North Koreans to end their provocative acts,” he said, “both in the form of missile tests and nuclear tests, to commit to denuclearization, and to demonstrate a commitment to pursuing peace and stability on the Korean Peninsula.” Worthy goals, to be sure, but impossible to achieve as long as the Kim regime is in power.

To be clear, Kim Jong-un will never commit to denuclearization nor to peace and stability on the peninsula. To do so would be antithetical to the regime’s very nature. Writing recently for National Review, my colleague Nicholas Eberstadt described the North’s “essentially messianic—and unapologetically racialist—vision of history.” In that vision, the Democratic People’s Republic of Korea (DPRK) will unite the Korean people, throw out foreign invaders, and establish DPRK rule over the peninsula.

Nuclear weapons, then, are not simply a deterrent but a tool by which to achieve unification. And for Pyongyang to genuinely commit to peace and stability on the peninsula would be to abandon the regime’s animating vision. Kim can sacrifice neither and expect to maintain the support of elites or the legitimacy of his rule. The North Koreans have enshrined their status as a nuclear power in the constitution and have repeatedly said they will never bargain away their nuclear weapons. There is little reason to believe that is simply a negotiating ploy.

Recognizing that the regime is the problem leads to what may be an uncomfortable conclusion: the United States and its partners must contain North Korea in the near-term while pursuing a longer term policy of regime change.

Since the latest nuclear and missile tests, the United States, South Korea, and Japan have all imposed strong, unilateral sanctions on North Korea. The United Nations Security Council has also weighed in with its strongest resolution yet; these international sanctions, if enforced—and that’s a big if—will have real bite. The United States must now move to completely cut the DPRK off from the international financial system as it did in 2005.

Altogether, this tightening web of financial and trade sanctions will make it increasingly difficult for Pyongyang to access hard cash, which is necessary both to support nuclear and missile programs and to ensure elite cohesion in the North. The idea is not to bring North Korea to the bargaining table—though the allies should consider any offers from the North to negotiate over its nuclear program—but rather to starve its weapons programs of resources and to sow internal dissension within the regime.

In addition to stronger sanctions, the United States and its partners should step up pressure on North Korea on the human rights front. The allies should pursue two simultaneous lines of effort. Internationally, they should apply unrelenting pressure on China to encourage it to live up to is international obligations: Beijing must treat North Koreans that flee across its border as political refugees and speed their way to South Korea rather than send them back to the North. The United States should, in addition, repeatedly call a UN Security Council vote on referring Kim Jong-un and his top lieutenants to The Hague for prosecution for crimes against humanity. Beijing will use its veto, but it may grow tired of repeatedly, publicly allying itself with the world’s most odious regime.

At the same time, the allies should enhance their efforts to provide the North Korean people with access to reporting on the world at large, on life in South Korea, and on Kim Jong-un himself. Citizens and soldiers alike should know that while they tighten their belts, the Pyongyang elite feast on Russian caviar and French cheeses. It’s far past time for the Kim regime’s domestic legitimacy to be seriously challenged.

Finally, the United States and South Korea should invest more deeply in their own self-defense capabilities. Talks over the deployment to the Republic of Korea of the Terminal High-Altitude Area Defense (THAAD) system, which would enhance the South’s defense against ballistic missile threats, are a good start. At home, the United States should expand the number of ground-based interceptors while also investing in a next-generation GBI. North Korea is unlikely to ever host large numbers of intercontinental ballistic missiles—against a limited threat, continental missile defense can and should be made nearly airtight. American and South Korean investments in defenses can turn North Korean missiles into wasting assets.

The U.S.-ROK alliance should also take steps to further mitigate the Northern artillery threat, especially to the Seoul metropolitan area. The first order of business is to identify and keep tabs on the thousands of artillery pieces beyond the Demilitarized Zone. The Korean People’s Army should have little doubt of the alliance’s ability to identify, track, and target the field guns that effectively allow North Korea to hold millions of South Koreans hostage. Washington and Seoul should also make defense against incoming rounds a priority; in this regard, the U.S. Army’s High Energy Laser Mobile Demonstrator is a promising technology.

The steps described above may not bring stability to the Korean Peninsula in the near term. Indeed, the first two lines of effort are designed to sow instability in the North. But the quest for stability is a mirage, and one that cedes the initiative to Pyongyang, which has opted to destabilize the peninsula at times of its choosing while putting the onus for escalation control on the allies. Going forward, the allies must be far more proactive in shaping the peninsula’s security environment.

Just how the Kim regime will fall remains difficult to discern, but there is a clear moral and strategic imperative to hasten its collapse. Unification under the Republic of Korea is the only way to ensure a nuclear-free, democratic, and flourishing Korean peninsula.

The Author is Michael Mazza

Michael Mazza is a research fellow in foreign and defense policy studies at the American Enterprise Institute (AEI), where he analyzes US defense policy in the Asia-Pacific region, Chinese military modernization, cross–Taiwan Strait relations, and Korean Peninsula security. A regular writer for the AEIdeas blog, he is also the program manager of AEI’s annual Executive Program on National Security Policy and Strategy.

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe