<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://protectingsoftnetworks.org/2022/08/22/salaam-alaikum-issue-3/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/img_6143.jpg</image:loc><image:title>IMG_6143</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/july-2022-newsletter-4.png</image:loc><image:title>july-2022-newsletter-4</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/july-2022-newsletter-3.png</image:loc><image:title>july-2022-newsletter-3</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/july-2022-newsletter-2.png</image:loc><image:title>july-2022-newsletter-2</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/july-2022-newsletter-1.png</image:loc><image:title>july-2022-newsletter-1</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2022/08/july-2022-newsletter.png</image:loc><image:title>july-2022-newsletter</image:title></image:image><lastmod>2022-08-22T15:34:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2022/04/22/salaam-alaikum/</loc><lastmod>2022-04-22T03:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2022/02/10/2616/</loc><lastmod>2022-02-10T03:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/research-and-publications/</loc><lastmod>2021-01-03T20:49:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/media-center/news-2020/</loc><lastmod>2020-07-08T02:08:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/media-center/</loc><lastmod>2020-01-13T03:41:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/media-center/news-2019/</loc><lastmod>2019-12-23T06:16:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/2019/10/04/irap-scores-a-win-isoa-update-and-more/</loc><lastmod>2019-10-04T02:16:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/media-center/news-2018/</loc><lastmod>2019-07-31T16:42:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/research-and-publications/soft-networks-protecting-an-achilles-heel-of-american-influence/</loc><lastmod>2019-07-25T17:52:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/media-center/news-2016/</loc><lastmod>2019-07-25T16:37:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/media-center/news-2017/</loc><lastmod>2019-07-17T17:14:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/2019/06/27/spsn-releases-soft-networks-white-paper/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2019/06/nbc-news-story.jpg</image:loc><image:title>NBC News Story</image:title><image:caption>An Afghan interpreter, right, on patrol with 2nd Platoon, Alpha Company, 2nd Battalion, 1st Infantry Regiment of the 5th Stryker Brigade, calls over some local teenagers who were seen moving suspiciously in a tree line on May 8, 2010, in Afghanistan's Kandahar Province. (JULIE JACOBSON/ AP file) From Luce's NBC News article, see link below. </image:caption></image:image><lastmod>2019-06-27T19:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/the-team/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/11/46065311_2145734022357613_2876066747448819712_n1.jpg</image:loc><image:title>46065311_2145734022357613_2876066747448819712_n</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/11/46065311_2145734022357613_2876066747448819712_n.jpg</image:loc><image:title>46065311_2145734022357613_2876066747448819712_n</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/alek.jpg</image:loc><image:title>Alek</image:title><image:caption>Alek Ball</image:caption></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/img_9828.jpg</image:loc><image:title>IMG_9828</image:title><image:caption>Sam Romano</image:caption></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/becca.jpg</image:loc><image:title>becca</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/jamie.jpg</image:loc><image:title>jamie</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/steve.jpg</image:loc><image:title>steve</image:title></image:image><lastmod>2019-06-27T18:15:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/research-and-publications/soft-networks/</loc><lastmod>2019-06-26T18:47:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/research-and-publications/protecting-soft-networks-time-to-counter-the-enemys-logical-strategy/</loc><lastmod>2019-06-26T18:47:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/research-and-publications/too-littletoo-late-protecting-american-soft-networks-in-coin-ct/</loc><lastmod>2019-06-26T18:47:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/2019/03/01/holidays-2018-update/</loc><lastmod>2019-03-01T18:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2018/10/25/soft-networks-panel-at-policywest/</loc><lastmod>2018-10-25T00:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2018/10/25/september-2018-update/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/10/fadi-matti-iraq-2008-3.jpg</image:loc><image:title>Fadi Matti Iraq 2008 (3)</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/10/170906_sarah_feinberg_009-1170x731.jpg</image:loc><image:title>170906_sarah_feinberg_009-1170x731</image:title><image:caption>Eli Meir Kaplan for Wharton&#13;&#13;Sarah Feinberg poses for a portrait on Wednesday, September 6, 2017 at The Washington Post in Washington, DC.</image:caption></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/10/members-weekend-2016.jpg</image:loc><image:title>members weekend 2016</image:title></image:image><lastmod>2018-10-25T00:46:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2018/08/22/august-2018-update/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/08/img_1286.jpg</image:loc><image:title>IMG_1286</image:title></image:image><lastmod>2018-10-01T15:03:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2018/08/22/pacific-council-newsroom-publishes-article-on-spsn-member-launches-project-to-protect-conflict-zone-allies/</loc><lastmod>2018-08-22T09:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/2018/06/01/the-journey-begins/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/pexels-photo-57690.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2018-08-22T09:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://protectingsoftnetworks.org/news/</loc><lastmod>2018-08-22T09:06:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/about-our-partners/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/07/vfai-logo-for-ecomms_450x.png</image:loc><image:title>VfAI-logo-for-ecomms_450x</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/40.jpg</image:loc><image:title>40</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/download.png</image:loc><image:title>download</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/download-1.jpg</image:loc><image:title>download (1)</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/hrf_jury-3.png</image:loc><image:title>HRF_JURY-3</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/download.jpg</image:loc><image:title>download</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/cisalogo.jpg</image:loc><image:title>CISAlogo</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/logo.png</image:loc><image:title>logo</image:title></image:image><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/clients_pcip-300x300.png</image:loc><image:title>clients_pcip-300x300</image:title></image:image><lastmod>2018-07-17T09:52:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org/contact/</loc><image:image><image:loc>https://protectingsoftnetworks.org/wp-content/uploads/2018/06/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2018-06-01T17:17:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://protectingsoftnetworks.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-08-22T15:34:16+00:00</lastmod></url></urlset>
