India vs China, who would the US support in a conflict?

Following a savage clash in the Sino-Indian border, thousands of Chinese and Indian troops have been in a standoff within the Ladakh region, high within the Himalayas. On June 6, the two countries reached an agreement to de-escalate by the mutual withdrawal of troops from the Galwan Valley. That agreement went dramatically wrong on June […]

North Korea: COVID-19 or not?

Despite their best efforts to cover themselves, North Korea couldn’t hide from the coronavirus. It sealed its borders in late January and shut off business with China, which accounts for nine-tenths of its external trade. North Korean authorities have told citizens that there have been confirmed cases of the coronavirus. This is in contrast to […]

Dead or Alive? Why is it so hard to know what happens in North Korea?

This article was written by Alex Hollings and originally published on Sandboxx.com.  A few days ago, headlines around the world suggested that North Korea’s Supreme Leader, Kim Jong Un, was in critical condition following surgery. Almost immediately, questions arose about succession. After years of fiery bluster and threats of nuclear war out of the North Korean government, many wondered […]

Is North Korean dictator Kim Jong-un dying?

Preliminary reports from various outlets suggest that North Korea dictator Kim Jong-un’s (KJU) health is possibly at risk following an alleged cardiovascular procedure earlier this month for which he is receiving treatment. The approximately 36-year-old dictator’s health has long been a point of speculation for observers outside North Korea’s notoriously closed society. His country is […]

FBI & Intelligence agencies warn about North Korean hackers

A recent release from the Federal Bureau of Investigation, Department of Homeland Security, the Treasury Department, and the Department of State details the scope of the North Korean hacking threat for public consumption. The advisory, released as a comprehensive resource on all things DPRK cyber, highlights the threats posed by malicious cyber activities and offers […]