• Title/Summary/Keyword: the military of north korea

Search Result 290, Processing Time 0.023 seconds

A Survey on the Cheolwon Castle of Taebong-guk During the Japanese Colonial Period (일제강점기 태봉국 철원성 조사와 봉선사지)

  • Sim, Jaeyoaun
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.1
    • /
    • pp.258-271
    • /
    • 2019
  • Recent changes in inter-Korean relations have encouraged South Korean archaeologists' interest in northern cultural heritage and their desire to conduct research. However, it is doubtful how much the South Korea really knows about the cultural ruins in North Korea and the cultural ruins to be found in the DMZ. In Korea, research data on the Japanese colonial period is scattered amongst national institutions and it is not possible to to collect, identify and document the data available in each institution. Typically, the data of Keiichi Ogawa(小川敬吉) is difficult to understand in its printed from. In addition, Ogawa has collected data from several national government agencies, and work is underway to collect architectural data and construct digital archives. This situation will not occur if we publish the data collected so far in digital form. Therefore, there is an urgent need to fully disclose the data related to Cheolwon which is owned by national institutions. If this data is analyzed, sufficient archaeological information can be obtained without excavation. On the other hand, one must wonder if the whole landscape of Cheolwon castle of Taebongguk cand be understood by investigating the interior of Cheolwon castle. This effort should be preceded by a survey on the ruins and the remains of the southern part of the southern boundary line. Rapid development and large-scale arrangement of cultivated land are likely to make it difficult to restore the external landscape related to the tillage demand that is required by the current situation. In the process of restoration of the actual Gyeongwon Line, it has been confirmed that serious irregularity has caused damage and the landscape has been transformed. In order to minimize these risks, it is urgent that we investigate the relics scattered in the southern part of the country, and not devote ourselves to the investigation of Cheolwon. In this regard, how much military, roads, excavation and archaeologists are prepared, centered on Cheolwon and scenery is an important question. I am curious as to how much preparation is provided to the Chulwon-gun and Gangwon-do in terms of administrative assistance, and how much archaeologists and excavation agencies are aware of the archaeological information of the inside and the southern part of the DMZ. Furthermore, how long have people been aware of the archaeological remains on the North Korean side? In order for da iscussion on Cheolwon and scenery to progress, it is necessary to carry out a precise investigation and accumulation of data on the remains in South Korea.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Dual Faces of Nationalism reflected in Contemporary Korean Art and Society (현대 한국미술과 민족주의란 두 개의 얼굴)

  • Choi, Tae-Man
    • The Journal of Art Theory & Practice
    • /
    • no.4
    • /
    • pp.145-180
    • /
    • 2006
  • In Korea, nation and nationalism are undeniable justice, absolute virtue and moreover system of desire. From the late Chosun Dynasty when the Korean Peninsula had to survive from the critical situation of being the arena of competition, and through the colonial period under Japanese imperialism, nationalism became stronger as a logic of survival. The policy of seclusion under closed and exclusive nationalism that didn't recognize the world situation well enough, eventually gave more pain to the nation. Nationalism in colonial Korea which was as reformed nationalism and on the other hand, as intransigent, resisting nationalism. Since the purpose of this writing is not for clarifying the argument raised on Korean nationalism, there is no use mentioning how it went with the change of time. But we have to focus on the fact that the word 'nation' which appeared under the influence of popular revolution and capitalism meaning 'a group of people', was translated and understood as a racial concept for strengthening the unity of 'single-race nation with five thousand years' history. First of all, there is nationalism used to fortify the system. 'The Charter of National Education' and 'The Pledge of Allegiance' were ornaments to intensify the ruling ideology and dictatorship to militarize entire South Korea for 'settling Korean democracy' professed nationalism. Also, another ruling ideology armed with 'self-reliance' put North Korea into the state of hypnosis called nationalism. Nationalism, claiming 'nation' outwardly, but in reality, being an illuminating, instructing ideology isolating each other was indeed a body with two faces. This made 'nation' in Korea mysterious and objective through work such as. The statue commemorating patriotic forefathers' and picture of national records' in South Korea art. Nationalism used to strengthening the system encountered the magical 'single-race' and made 'ghost' being an extreme exclusion to other nations. We can find pedigreed pureness not allowing any mixed breeds from the attitude accepting western art -via Japan or directly- and making it vague by using the word Korean and Asia. There's nationalism as a resistant ideology to solidify the system on the other side. It came out as a way of survival among the Great Power and grew with the task of national liberation to became as a powerful force facing against the dictatorship dominating South Korea after the liberation. This discussion of nationalism as a resistance ideology was active in 1980s. In 1980, democracy movement against the dictatorship of 5th Republic originated from military power which came out suppressing the democratic movement in Gwangju, spread out from the intellects and the students to the labors, farmers and the civilians. It is well known that the 'Nation-People(Minjoong)'s Art Movement could come out under this social condition. Our attitude toward nationalism is still dual in this opening part of 21st century. On one hand, they are opposing to the ultra-nationalism but are not able to separate it from nationalism, and on the other, they have much confusion using it. In fact, in a single-race nation like Korea, the situation of being nationalism and jus sanguinis together can cause dual nationalism. Though nationalism is included in the globalization order, it is evidence that it's effective in Korea where there are still modern fetters like division and separation. In particular, in the world where Japan makes East Asia Coalition but exposed in front of nationalism, and China not being free from Sinocentrism, and American nationalism taking the world order, and Russia fortifying nationalism suppressing the minority race after the dissolution of socialism, Korean nationalism is at the point to find an alternative plan superior to the ruling and resisting ideology.

  • PDF

A Study on the Development of the Traditional Design Content in health and longevity based on the Lucky Signs (길상(吉祥)을 상징하는 수복(壽福) 중심의 전통적인 디자인 콘텐츠 개발에 대한 방향성 연구 - 문화상품디자인 중심으로 -)

  • Jung, Su-yeon;Hong, Dong-sik
    • Journal of Communication Design
    • /
    • v.66
    • /
    • pp.90-101
    • /
    • 2019
  • South Korea had a hard time creating its own image of a nation that formed its identity due to 6.25, Japanese-style rule, division of South and North Korea, and military dictatorship. Recently, Korea has been searching and spreading its identity by creating a Korean wave such as various events and K-POPs. However, since there are still no images and cultural products representing Korea's identity, it is necessary to develop design contents related to native culture and professional cultural product design. Design powers such as France and Japan focus on design projects that can add value to their national design policy projects. Traditional Korean contents also need to be specialized and continuous in image design and research. In this study, five lucky-SubokGangnYeon(long life, happiness and peace), a representative of Korean culture, studied with the most interest in the old and the modern, namely, "Living healthy long." Through the development of cultural product design and the use of design content, I would look forward to presenting the diversity and direction in producing Korea's own design products and images that fit the trend of modern 'age of 100.' Based on images based on special exhibitions related to longevity of the National Folk Museum of Korea, the museum discovers key used features and meanings, studies patterns and patterns, and analyzes design cases applied to modern cultural product design. We also want to look at the direction available through design content, which is a symbol of llong life happiness and peace. First, cultural products have limitations that lack the development of design products, lack of public relations and sales outlets, and lack of awareness of traditional culture, which should precede policy support and awareness reform at the national level. Second, we need to streamline prices that meet the needs of the market. Third, cultural product design and contents related to tradition can be settled and disseminated more easily when traditional design is utilized and distributed mainly on practical stationery and household goods. Fourth, it is necessary to develop contents of various Korean images based on research on Korean cultural history and aesthetic consciousness. Research on the Korean culture of designers should be conducted, not just in the form of figurative images. Fifth, traditional manufacturing methods and materials should be respected by modern times, but modern production products should be developed with economy and durability.

Ecological Buffer Analysis of Western DMZ and Vicinity using Logistic Function Derived from TVI-Distance Curve (TVI-거리함수를 이용한 서부 DMZ 및 민통지역의 생태적 보전폭원 조사)

  • Kim, Sang-Wook
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.95-104
    • /
    • 2006
  • The DMZ is a 248km long thin green line which has various landscapes of fields, hills and mountains. This study focused on western part of DMZ and vicinity which consist of abandoned rice paddy, wetlands and fields. The main purpose of this study is to detect the vegetation vitality from the western part of MDL to DMZ vicinity and identify and quantify ecological buffer(ecotone) width adopting logistic function derived from 'Vegetation Index-distance curve' using an Landsat ETM+ image acquired on June of 2002. Green leaf vegetation was quantified to identify the ecotone buffer in western DMZ and vicinity(civilian control area: CCA) using Transformed Vegetation Index(TVI) which is one of common measurement among various indices. Vegetation measurement from Military Demarcation Line(MDL) to vicinity area was investigated at 500m intervals to 10kms of southern and northern part of western DMZ and vicinity. The Logistic function models the sigmoid curve of growth with three stages of growth of initial competition and maturity. In the TVI-distance logistic curve, the maturity is high vegetation vitality, the competition is vitality changing, and the initial is low vitality. In the TVI-distance curve, maturity area of high TVI value is core area for ecological conservation, and the competition area between inflection points can be an ecotone(ecological buffer). In case of southern part, maximum TVI value is 221.92 and minimum is 207.16, and maximum TVI of northen part is 215.32 and minimum is 188.35. That means forest devastation of north Korean part of DMZ and vicinity is severer than that of south Korea. The width of core area for ecological conservation is 2,311m, and ecotone in the southern part is 5,339m, so minimum width from MDL for ecological conservation can be computed as 7,651m. In case of Northern part, the width of core area is 1,841m, and ecotone buffer is 5,014m, so ecological conservation width can be estimated as 6,855m. In case of northen part, width of estimated core area is less than that of DMZ width, which means ecological disturbance is very severe in northern part of western DMZ.

  • PDF

The Relics of Wae Lineage and the Keyhole-Shaped Mounds in the Honam Area (호남지역(湖南地域)의 왜계자료(倭系資料)와 전방후원형고분(前方後圓形古墳))

  • Tsuchida, Junko
    • Korean Journal of Heritage: History & Science
    • /
    • v.51 no.2
    • /
    • pp.170-203
    • /
    • 2018
  • From the period of Japanese colonialism up to the present, the researchers of archaeology and ancient history in Korea and Japan have paid much attention to the Honam area. Recently the ruins and relics of Wae lineage are often discovered at archaeological excavation sites in this region. In particular, at least 17 keyhole-shaped mounds were confirmed. The fact that three mounds were built on one site was newly revealed. Haniwa, a representative earthenware object of the Kofun period in Japan, was discovered as well. Therefore, the study of a historical meaning of archaeological materials about Wae lineage in the Honam area thus far must be reexamined. The ruins and relics of Wae lineage in the Honam area have been studied by selecting only specific cases. I identified all the ruins and relics of Wae lineage in the Honam area and analyzed the process of their change in this paper. I reviewed the relationship between Wae and Mahan, and the purpose of their negotiation based on archaeological characteristics, changing processes, and historical records on a quarterly basis. The ruins and relics of Wae lineage have increased and widely spread since the early period of the 5th century in the Honam area. This tendency continued until the late period of the 6th century. Weapons of Wae lineage were introduced and tombs in the style of Wae were built from the late 4th century to the early period of the 5th century (TG232~TK216 period). Sueki was introduced from the middle to late period of the 5th century (TK208~TK23 period). Keyhole-shaped mounds and tombs in the style of Wae were built from the late period of the 5th century to the early period of the 6th century (TK47~MT15 period). Japanese weapons were introduced from the middle to late period of the 6th century (TK10~TK209 period). In other words, the archaeological appearance is different in each quarterly period. There was an intensive diplomatic relationship between Baekje and Wae in the TG232~TK216 period. The military might be included in a mission of Wae. The materials of Wae lineage of this period are likely to be related to this. Sueki spread to the inland part of the Honam area in the TK208~TK23 period. This Sueki tends to be excavated on advantageous sites for the accumulation and distribution of supplies. The main characters of the keyhole-shaped mounds are presumed to be a group of traders which were under the control of a certain influence in the north of Kyushu. The keyhole-shaped mounds were abruptly built at some distance from mounds of the leaders in the Honam area. Additionally, there was no special influence base to which the characters of the keyhole-shaped mounds belonged in the surroundings. However, it might have been impossible for the group of traders to build the keyhole-shaped mounds without the support from the residents at all because there was a big difference in the building technology of the keyhole-shaped mounds between Japan and the Honam area. The time of building some keyhole-shaped mounds is the same or almost the same with that of the mounds built for the regional leaders. This proves a close relationship with the residents as well. What do the archaeological materials of Wae lineage which have been used and buried mean over 200 years in the Honam area? Geumgwan Gaya, which had exported iron resources to Japan, perished in the early period of the 5th century. Instead of Gaya, the Honam area might have played an important role to supply the necessary resources to Japan. We assume that the Japanese (Wae) actively worked to acquire various resources focusing on the underground resources in the Honam area.

9 Provinces and 5 Secondary Capitals, Myeong-ju(Haseo-ju) - Revolve Around Urban Structure - (구주오소경과 명주(하서주) - 그 도시구조를 중심으로 -)

  • Takahumi, Yamada
    • Korean Journal of Heritage: History & Science
    • /
    • v.45 no.2
    • /
    • pp.20-37
    • /
    • 2012
  • After withdrawal of military troops of Chinese Tang dynasty in the 18th year of King Moon-moo's reign(678), the Silla Kingdom had actually unified the Korean peninsula and had divided the territory into 9 states benchmarking the China's local administrations adjustment system. He had established local administrative units by deploying secondary capitals, counties and prefectures in the nine states. The so-called "9 Provinces and 5 Secondary capitals" are what constitutes the local administrations system. The provinces can be compared to current provinces of the Republic of Korea(hereinafter Korea), and secondary capitals to megalopolises. According to a chapter of the Samkuksaki(三?史記) which had recorded the achievements of king Kyoungdeok in December in his 16th year on the throne(757), the local administrative units had amounted to 5 secondary capitals, 117 counties and 293 prefectures. There are still lots of ambiguous points since there have never been any consultation on locations of provinces and secondary capitals' castles, and on structures of cities because the researches for local cities inside the 9 Provinces and 5 Secondary capitals in the Unified Silla Kingdom has been conducted centering on the historic literatures only. The research for restoring structures of cities seen from an archeological perspective are limited to the studies of Taewoo Park("A study on the local cities in the Unified Kingdom Age" 1987) and that of the author("A study on the restoration of planned cities for the Unified Silla Kingdom in terms of the structures and realities of the castles in the 9 Provinces and 5 Secondary capitals" 2009). The Gangneung city of Gangwon province was originally called Haseoryang(河西良) of the Gogureo Kingdom as an ancient nation of Ye(濊). According to "Samkuksaki", it had evolved from Haseoju(河西州) to a secondary capitals in the 8th year of King Seonduk(639). Afterwards, it had been renamed as Myeongju(溟洲) in the 16th year of King Kyoungduk(757), and then several other names were given to it after Goryo dynasty. Taewoo Park claims that it is being defined as a sanctuary remaining in Myoungjudong because of the vestige of bare castle, and this cannot be ascertained due to the on-going urbanization processes. Also, the Kwandong university authority is suggesting an opinion of regarding Myeongju mountain castle located 3 Kms southwest of the center of Gangwon city as commanding post for the pertinent state. The author has restored the pertinent area into a city composed of villages within a lattice framework like Silla Keumkyoung and many other cities. The structure is depicted next. The downtown of Gangneung is situated on a flat terrain at the west bank of Namdaecheon stream flowing southwest to northeast along the inner area of the city. Though there isn't any hill comparatively higher than others in the vicinity, hills are continuously linked east to west along the northern area of the downtown, and the maximum width of flat terrain is about 1 Km and is not so large. Currently, urbanization is being proceeded into the inner portion of Gangneung city, the lands in all directions from the hub of Gangneung station have been readjusted, and thus previous land-zoning program is almost nullified. However, referring to the topographic chart drawn at the time of Japanese colonial rule, it can be validated that land-zoning program to accord the lattice framework with the length of its one side equaling to 190m leaves its vestige about 0.8Km northwest to southeast and about 1.7Km northeast to southwest of the vicinity of Okcheondong, Imdangdong, Geumhakdong, Myeongjudong, and etcetera which comprize the hub of the downtown. The land-zoning vestige within the lattice framework, compared to other cases related with the '9 states and 5 secondary capitals', is very much likely to be that of the Unified Silla Kingdom. That the length of a side of a lattice framework is 190m as opposed to that of Silla Geumkyoung and other cities with their 140m or 160m long sides is a single survey item in the future. The baseline direction for zoning the lands is tilting approximately 37.5 degrees west of northwest to southeast axis in accordance with the topographic features. It seems that this phenomenon takes place because of the direction of Namdaecheon and the geographic constraints of the hills in the north. Reviewing minimally, a rectangular size of zoned land by 4 Pangs(坊) on the northwest to southeast side multiplied by 7 Pangs(坊) on the northeast to southwest side had been restored within a lattice framework. Otherwise, considering the extent of expansion of the existing zoned lands in the lattice framework and one more Pang(坊) being added to each side, it is likely that the size could have been with 5 Pangs(坊) on the northwest to southeast side multiplied by 8 Pangs(坊) on the northeast to southwest side(950 M on the northwest to southeast side multiplied by 1,520m on the northeast to southwest side). The overall shape is rectangle, but land-zoning programs reminiscent of rebuilt roads(red phoenix road) like Jang-an castle(長安城) of Chinese Tang dynasty or Pyoungseong castle(平城城) in Japan is not to be validated. There are some historic items among the roof tiles and earthen wares excavated at local administrative office sites or Gangneung's town castle in Joseon dynasty inside the area assumed to be containing municipal vestiges even though archeological survey for the vestige of Myeongju has not been made yet, and these items deserve dating back to the Unified Silla Kingdom age. Also, all of the construction sites at local administrative authorities of the Joseon dynasty are showing large degrees of slant in the azimuth. This is a circumstantial evidence indicating the fact that the inherited land-zoning programs to be seen in Gangneung in terms of the lattice framework had ever existed in the past. Also, the author does not decline that Myeongju mountain castle had once been the commanding post when reviewing the roof tiles at the edge of eaves in this stronghold. The ancient municipal castles in the Korean peninsula are composed of castles on the flat terrain as well as hilly areas and the cluster of strongholds like Myounghwal, Namhan, Seohyoung mountain castles built around municipal castle of Geumkyoung based on a lattice framework program. Considering that mountain castles are spread in the vicinity of municipal vestiges in other cities other than the 9 states and 5 secondary capitals, it is estimated that Myeongju was assuming the function of commanding post incorporating cities on the flat terrain and castles on the hills.