• Title/Summary/Keyword: the army

Search Result 1,340, Processing Time 0.03 seconds

A historical study of the Large Banner, a symbol of the military dignity of the Late Joseon Dynasty (조선 후기 무위(武威)의 상징 대기치(大旗幟) 고증)

  • JAE, Songhee;KIM, Youngsun
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.4
    • /
    • pp.152-173
    • /
    • 2021
  • The Large Banner was introduced during the Japanese Invasions of Korea with a new military system. It was a flag that controlled the movement of soldiers in military training. In addition, it was used in other ways, such as a symbol when receiving a king in a military camp, a flag raised on the front of a royal procession, at the reception and dispatch of envoys, and at a local official's procession. The Large Banner was recognized as a symbol of military dignity and training rites. The Large Banner was analyzed in the present study in the context of two different types of decorations. Type I includes chungdogi, gakgi and moongi. Type II includes grand, medium, and small obangi, geumgogi and pyomigi. Each type is decorated differently for each purpose. The size of the flag is estimated to be a square of over 4 ja long in length. Flame edges were attached to one side and run up and down The Large Banner used the Five Direction Colors based on the traditional principles of Yin-Yang and Five Elements. The pattern of the Large Banner is largely distinguished by four. The pattern of large obangi consists of divine beasts symbolizing the Five Directions and a Taoism amulet letter. The pattern of medium obangi features spiritual generals that escort the Five Directions. The pattern of small obangi has the Eight Trigrams. The pattern of moongi consists of a tiger with wings that keeps a tight watch on the army's doors. As for historical sources of coloring for Large Banner production, the color-written copy named Gije, from the collection of the Osaka Prefect Library, was confirmed as the style of the Yongho Camp in the mid to late 18th century, and it was also used for this essay and visualization work. We used Cloud-patterned Satin Damask as the background material for Large Banner production, to reveal the dignity of the military. The size of the 4 ja flag was determined to be 170 cm long and 145 cm wide, and the 5 ja flag was 200 cm long and 175 cm wide. The conversion formula used for this work was Youngjochuck (1 ja =30cm). In addition, the order of hierarchy in the Flag of the King was discovered within all flags of the late Joseon Dynasty. In the above historical study, the two types of Large Banner were visualized. The visualization considered the size of the flag, the decoration of the flagpole, and the patterns described in this essay to restore them to their original shape laid out the 18th century relics on the background. By presenting color, size, material patterns, and auxiliary items together, it was possible not only to produce 3D content, but also to produce real products.

"Critical Application of Witness Commentaries: The Case of Guerrilla Warfare in the Korean War" ("증언자료의 비판적 활용 - 6.25전쟁 시기 유격대의 경우")

  • Cho, Sung Hun
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.137-178
    • /
    • 2005
  • The anticommunist guerrillas' activities that aretheconcern of this article took place largely in North Korea or behind the enemy-held lines. Verifying their history is accordingly difficult and requires careful attention, but despite their active operations the military as well as the scholarly community have been lax in studying them. The Korean War came to be perceived as a traditional, limited war with regular battles, so that the studies addressed mostly the regular operations, and guerrilla warfare is remembered as an almost 'exclusive property' of the communist invaders; a small wonder that the anticommunist guerrillas have not been studied much and the collection of materials neglected. Therefore, in contrast with the witness accounts concerning regular battles, witness resources were of a small volume about these "patriots without the service numbers." For the above reasons the guerrilla participants and their later-organized fellowships took to the task of leaving records and compiling the histories of their units. They became active preservers of history in order to inform later generations of their works and also to secure deserved benefits from the government, in a world where none recognized their achievements. For instance, 4th Donkey Unit published witness accounts in addition to a unit history, and left video-recordings of guerrilla witnesses before any institute systematized the oral history of the guerrillas. In the case of Kyulsa ("Resolved to Die") Guerrilla Unit, the unit history was 10 times revised and expanded upon for publication, contributing substantially to the recovery of anticommunist guerrilla history which had almost totally lacked documented resources. Now because the guerrilla-related witness accounts were produced through fellowship societies and not individually, it often took the form of 'collective memory.' As a result, though thousands of former guerrillas remain surviving, the scarcity of numerous versions of, or perspectives upon, an event renders difficult an objective approach to the historical truth. Even requests to verify the service of a guerrilla member or to apply for decoration or government benefits for those killed in action, the process is taken care of not at the hands of the first party but the veteran society, so that a variety of opinions are not available for consideration. Moreover, some accounts were taken by American military personnel, and since some historians, unaware of official documents or evaluation of achievements, tended to center the records around their own units and especially to exaggerate the units' performances, they often featured factual errors. Thefollowing is the means to utilize positively the aforementioned type of witness accounts in military history research. It involves the active use of military historical detachments (MHD). As in the examples of those dispatched by the American forces during the Korean War, experts should be dispatched during, and not just after, wartimes. By considering and investigating the differences among various perspectives on the same historical event, even without extra documented resources it is possibleto arrive at theerrors or questionable points of the oral accounts, supplementing the additional accounts. Therefore any time lapses between witness accounts must be kept in consideration. Moreover when the oral accounts come from a group such as participants in the same guerrilla unit or operation, a standardized list of items ought to be put to use. Education in oral history is necessary not just for the training of experts. In America wherethefield sees much activity, it is used not only in college or graduate programs but also in elementary and lifetime educational processes. In comparison in our nation, and especially in historical disciplines, methodological insistence upon documented evidences prevails in the main, and in the fields of nationalist movement or modern history, oral accounts do not receive adequate attention. Like ancient documents and monuments, oral history also needs to be made a regular part of diverse resource materials at our academic institutes for history. Courses in memory and history, such as those in American colleges, are available possibilities.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Rethinking Korean Women's Art from a Post-territorial Perspective: Focusing on Korean-Japanese third generation women artists' experience of diaspora and an interpretation of their work (탈영토적 시각에서 볼 수 있는 한국여성미술의 비평적 가능성 : 재일동포3세 여성화가의 '디아스포라'의 경험과 작품해석을 중심으로)

  • Suh, Heejung
    • The Journal of Art Theory & Practice
    • /
    • no.14
    • /
    • pp.125-158
    • /
    • 2012
  • After liberation from Japanese colonial rule in 1945, there was the three-year period of United States Army Military Government in Korea. In 1948, Democratic People's Republic of Korea, and Republic of Korea were established in the north and south of the Korean Peninsula. The Republic of Korea is now a modern state set in the southern part of the Korean. We usually refer to Koreans as people who belong to the Republic of Korea. Can we say that is true exactly? Why make of this an obsolete question? The period from 1945 when Korea was emancipated from Japanese colonial rule to 1948 when the Republic of Korea was established has not been a focus of modern Korean history. This three years remains empty in Korean history and makes the concept of 'Korean' we usually consider ambiguous, and prompts careful attention to the silence of 'some Koreans' forced to live against their will in the blurred boundaries between nation and people. This dissertation regards 'Koreans' who came to live in the border of nations, especially 'Korean-Japanese third generation women artists'who are marginalized both Japan and Korea. It questions the category of 'Korean women's art' that has so far been considered, based on the concept of territory, and presents a new perspective for viewing 'Korean women's art'. Almost no study on Korean-Japanese women's art has been conducted, based on research on Korean diaspora, and no systematic historical records exist. Even data-collection is limited due to the political situation of South and North in confrontation. Representation of the Mother Country on the Artworks by First and Second-Generation Korean-Japanese(Zainich) Women Artists after Liberation since 1945 was published in 2011 is the only dissertation in which Korean-Japanese women artists, and early artistic activities. That research is based on press releases and interviews obtained through Japan. This thesis concentrates on the world of Korean-Japanese third generation women artists such as Kim Jung-sook, Kim Ae-soon, and Han Sung-nam, permanent residents in Japan who still have Korean nationality. The three Korean-Japanese third generation women artists whose art world is reviewed in this thesis would like to reveal their voices as minorities in Japan and Korea, resisting power and the universal concepts of nation, people and identity. Questioning the general notions of 'Korean women' and 'Korean women's art'considered within the Korean Peninsula, they explore their identity as Korean women outside the Korean territory from a post-territorial perspective and have a new understanding of the minority's diversity and difference through their eyes as marginal women living outside the mainstream of Korean and Japanese society. This is associated with recent post-colonial critical viewpoints reconsidering myths of universalism and transcendental aesthetic measures. In the 1980s and 1990s art museums and galleries in New York tried a critical shift in aesthetic discourse on contemporary art history, analyzed how power relationships among such elements as gender, sexuality, race, nationalism. Ghost of Ethnicity: Rethinking Art Discourses of the 1940s and 1980s by Lisa Bloom is an obvious presentation about the post-colonial discourse. Lisa Bloom rethinks the diversity of race, ethnicity, sexuality, and gender each artist and critic has, she began a new discussion on artists who were anti-establishment artists alienated by mainstream society. As migration rapidly increased through globalism lead by the United States the aspects of diaspora experience emerges as critical issues in interpreting contemporary culture. As a new concept of art with hybrid cultural backgrounds exists, each artist's cultural identity and specificity should be viewed and interpreted in a sociopolitical context. A criticism started considering the distinct characteristics of each individual's historical experience and cultural identity, and paying attention to experience of the third world artist, especially women artists, confronting the power of modernist discourses from a perspective of the white male subject. Considering recent international contemporary art, the Korean-Japanese third generation women artists who clarify their cultural identity as minority living in the border between Korea and Japan may present a new direction for contemporary Korean art. Their art world derives from their diaspora experience on colonial trauma historically. Their works made us to see that it is also associated with postcolonial critical perspective in the recent contemporary art stream. And it reminds us of rethinking the diversity of the minority living outside mainstream society. Thus, this should be considered as one of the features in the context of Korean women's art.

  • PDF

A reevaluation of the castles and palaces of Goryeo Gangdo (江都) using GIS (고려 강도(江都)의 성곽과 궁궐 재고찰)

  • KANG, Dongseok
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.4
    • /
    • pp.174-191
    • /
    • 2021
  • Gangdo (江都), a reproduction of Gaegyeong, was the capital of Goryeo for 39 years. However, due to the urgent wartime situation of the Mongol invasion and the geographical features of Ganghwa Island, the castle system and palace layout were somewhat different from those of Gaegyeong. Gangdo's castle can be understood as a triple castle system consisting of outer castle, middle castle, and inner castle. First, the outer castle was the first to be completed, and it was built at the forefront to prevent the Mongol army from invading in the first place. It is presumed that the section was between Huamdon and Hwadodon in the outer castle during the Joseon Dynasty. The middle castle can be seen as the present 'Middle Castle', a castle built of earth on the outskirts of the Ganghwa-mountain Castle. Considering the sophistication and robustness of the construction method confirmed in the archaeological research, this castle is thought to have been built under a meticulous plan. In other words, as the capital city, it was completed 'at last' as recorded in the Koryo History, after a long 18-year construction process to protect palaces, government offices, and private houses. The inner castle was a castle with the character of a palace. This corresponds to the Old Castle of Ganghwabu (江華府) during the Joseon Dynasty, and it almost coincided with the scale of the composition of Gaegyeong's palace castle. It was a complex functional space, featuring the integration of the palace and the imperial castle, where the main government offices and ancillary facilities, including the palace, were located. Based on the documentary record that these palaces were similar to Gaegyeong's palace, the palace map was overlapped with that of Gaegyeong. The central axis of the building from Seungpyeongmun (昇平門) to Seongyeongjeon (宣慶殿) coincided with Kim Sangyongsunjeol Monument in Ganghwa- Goryeo Palace. Therefore, it seems that the palace of Gangdo had the same basic structure as that of Gaegyeong. However, the inner palace and annexed buildings must have been arranged in consideration of the topographical conditions of Ganghwa, and this is estimated to be the Gunggol area in Gwancheong-ri.

The Effects of Sight Alignment Method on Pistol Shooting Records of Security Guard (경호요원 권총사격시 조준선정렬방식과 기록변화와의 관계)

  • Lee, Sang-Chul;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.367-388
    • /
    • 2007
  • Some of individuals working at various fields of security guard are given the legal right to use a gun to cope with expected risks and crimes. Not only in Korea but also throughout the world, a pistol is being used as a device for the workers of security guard such as the army, the police and intelligence agencies to keep the law and social order. A pistol, which is regarded as the last safety measure of security guard, is easy to carry but, because of its short barrel for high portability, its hit ratio and long-range shooting performance are much lower than ordinary guns. Despite such weak points, a pistol can be a great tool because of its high portability and if the users make steady efforts to improve their skills and, for this reason, it has been being used widely until now. National agency workers' pistol shooting skills depend on several important factors, but for the fast and accurate shooting, the mot important factor is how to aim at the target. Because it takes a relatively longer time to align the sight on the target, the change of the sight alignment method is expected to improve pistol shooting skills a lot. In Korea, however, most of national agency training centers teach the basic aiming method that crosses the foresight and the backsight and aligns the crossing to the target. That is, they teach the sight alignment method for fixed targets. Some agencies in Korea and foreign countries that have used guns more frequently and longer than us are teaching different sight alignment methods as well. Representative ones of them are aiming only with the foresight and pointing shooting. These aiming methods are expected to produce good results against moving targets. While the basic sight alignment method has to cross the foresight and the backsight and then to align the crossing to the target, so takes a longer time than other aiming methods, the other two aiming methods are expected to be effective in fields where both swiftness and accuracy are require. Because domestic agencies are teaching mainly the basic sight alignment method, the present study purposed to examine the effects of different aiming methods on shooting records and ultimately to contribute to national agency workers' operation. For this purpose, we selected 20 policemen from local police commandos under the National Police Agency who were accustomed to pistol shooting and measured their pistol shooting. According to the results, the pointed shooting method showed the best record in 5m short.range shooting. As to hit ratio in 15m shooting, which is relatively long.range for pistol shooting, the basic aiming method showed the best record, but the results of statistical analysis showed that pointed shooting is most superior. Of course, the results were obtained from a group who were used to and skillful in pistol shooting, but they are considered meaningful in that all the police and national agency workers should have such high shooting skills.

  • PDF

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

A Study for Seepage Control of Levee with a Pervious Toe Drain (제내 비탈끝 배수공을 이용한 제방의 침투조절에 관한 연구)

  • Kong, Young-San;Kang, Tae-Uk;Lee, Sang-Ho
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.6
    • /
    • pp.569-581
    • /
    • 2012
  • The levee is the facility which is constructed along with river for the protection of landside and for passage of water when there is a flood. When the seepage is exposed to the atmosphere on the landside surface of levee, it may eventually lead to levee failure. The seepage water may be removed from the landside surface by a properly designed drainage system. The purpose of the study is to show seepage control effect of a pervious toe drain, and to compare two drainage methods of a pervious toe drain. One is the pervious toe drain suggested by U.S. Army Corps of Engineers (USACE) and the other is that suggested by Japan Institute of Construction Engineering (JICE). The levee model constructed has the following dimension: the base width is 2.6 m; the crest width is 0.4 m; the side slope 1 : 2. The water depth in the riverside is 0.5 m. The shape of the toe drain by USACE is triangular. The shape of the toe drain by JICE is rectangular. They were installed with the base length of 0.4 m. The levee model without the toe drain showed saturation surface on the land side in the experiment but not with the toe drain. The experiment results was applied to a numerical analysis model using SEEP/W to calibrate and verify. The numerical analysis results for 35 cm and 30 cm drain width showed that the drain by JICE is a little bit safer than the drain by USACE. It is also easier to construct the toe drain by JICE. The results in the study would be applied to plan the seepage control for a levee with pervious toe drain.

Efficient Utilization of Private Resources for the National Defense - Focused on maintenance, supply, transportation, training & education - (국방분야 민간자원의 효율적 활용방안 - 정비, 보급, 수송, 교육훈련분야를 중심으로 -)

  • Park, Kyun-Yong
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.313-340
    • /
    • 2011
  • The National Defense Reformation bill of "National Defense Reformation 2020" which have been constantly disputed and reformed by the government went through various levels of complementary measures after the North Korean sinking on the Republic of Korea (ROK) Naval Vessel "Cheonan". The final outcome of this reform is also known as the 307 Plan and this was announced on the 8th March. The reformed National Defense Reformation is to reduce the number of units and military personnel under the military structure reformation. However, in order for us to undertake successful National Defense Reformation, the use of privatized civilian resources are essential. Therefore according to this theory, the ROK Ministry of National Defense (MND) have selected the usage of privatized resources as one of the main core agenda for the National Defense Reformation management procedures, and under this agenda the MND plans to further expand the usage of private Especially the MND plans to minimize the personnel resources applied in non-combat areas and in turn use these supplemented personnel with optimization. In order to do this, the MND have initiated necessary appropriate analysis over the whole national defense section by understanding various projects and acquisition requests required by each militaries and civilian research institutions. However for efficient management of privatized civilian resources, first of all, those possible efficient private resources which can achieve optimization will need to be identified, and secondly continuous systematic reinforcements will need to be made in private resource usage legislations. Furthermore, we would need to consider the possibility of labor disputes because of privatization expansion. Therefore, full legal and systematic complementary measures are required in all possible issue arising areas which can affect the combat readiness posture. There is another problem of huge increase in operational expenses as reduction of standby forces are only reducing the number of soldiers and filling these numbers with more cost expensive commissioned officers. However, to overcome this problem, we would need to reduce the number of positions available for active officers and fill these positions with military reserve personnel who previously had working experiences with the related positions (thereby guaranteeing active officers re-employment after completing active service). This would in tum maintain the standards of combat readiness posture and reduce necessary financial budgets which may newly arise. The area of maintenance, supply, transportation, training & education duties which are highly efficient when using privatized resources, will need to be transformed from military management based to civilian management based system. For maintenance, this can be processed by integrating National Maintenance Support System. In order for us to undertake this procedure, we would need to develop maintenance units which are possible to be privatized and this will in turn reduce the military personnel executing job duties, improve service quality and prevent duplicate investments etc. For supply area, we will need to establish Integrated Military Logistics Center in-connection with national and civilian logistics system. This will in turn reduce the logistics time frame as well as required personnel and equipments. In terms of transportation, we will need to further expand the renting and leasing system. This will need to be executed by integrating the National Defense Transportation Information System which will in turn reduce the required personnel and financial budgets. Finally for training and education, retired military personnel can be employed as training instructors and at the military academy, further expansion in the number of civilian professors can be employed in-connection with National Defense Reformation. In other words, more active privatized civilian resources will need to be managed and used for National Defense Reformation.

  • PDF

Military science's understanding on Daodejing of Wangzhen (왕진의 『도덕경』에 대한 병학적 이해)

  • Kim, Tae-yong
    • The Journal of Korean Philosophical History
    • /
    • no.23
    • /
    • pp.295-316
    • /
    • 2008
  • This is to study the military philosophy of Wangzhen's Commentary on Daodejing written by a famous military officer in the end of Tang Dynasty, Wangzhen. Historically, many scholars consider Laozi's Daodejing as a book on military science. Wangzhen, however, is the only person to interpret Daodejing genealogically from a military perspective. Wangzhen thinks that the fact that human beings like competing naturally causes the constant competition in the world. Human beings are born with the most outstanding spirit among all beings. But, when God created human beings, they had greed and avarice in the middle of their heart. Accordingly, human beings look for a success and a profit, and follow the wicked way, leaving the right way. The contractions among each greed and avarice bring about small or big competitions. Human beings have greed and avarice. It means human beings have emotions. As a result, the competitions in the world are not able to disappear because human beings have emotions. To win the completion human beings use weapons. According to Wangzhen, the war is the most devilish deed due to the weapon's atrocious, dangerous quality. Yet, the world's interests are decided by how efficiently the weapons are used. Consequently, the weapon techniques are worthy and play an important role in the real world. Morality, however, should be in the first priority in ruling over a country and commanding the army. The national security and the war victory could be secured when civil and military affairs have a balance. Wangzhen thinks that Laozi emphasizes "Not-Competing" as a basic solution of competition. The competition is the root cause of war and disorder. Therefore, Not-Competing is the main idea of Daodejing. Not-Competiting is a basis of Wangzhen's military philosophy as well. For Wangzhen, Not-Competing is Wuwei. Wuwei has political and military meanings at the same time. Wangzhen build up the "Not-Competing" military philosophy by applying Loazi's Daodejing to his military philosophy.