<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.internetsociety.org/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.internetsociety.org/blog/2009/11/internet-governance-and-recovery-and-economic-growth/</loc>
		<lastmod>2009-11-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2009/11/acceso-y-diversidad-permanece-como-un-tema-central-para-el-foro-de-gobernanza-de-internet/</loc>
		<lastmod>2009-11-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/01/new-internet-draft-ipv6-guidance-for-internet-content-and-application-service-providers-2/</loc>
		<lastmod>2012-01-11T20:21:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/4-ietf-mailing-lists-to-follow-for-monitoring-ipv6-2/</loc>
		<lastmod>2012-02-14T13:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/citrix-launches-new-blog-series-about-ipv6-transition/</loc>
		<lastmod>2012-02-23T17:16:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/RegionalNewsletter_24-February.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/02/citrixblog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/citrix-launches-new-blog-post-series-about-ipv6-transition/</loc>
		<lastmod>2012-02-23T17:16:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/02/citrixblog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/04/slides-carrier-grade-nat-cgn-observations-and-recommendations/</loc>
		<lastmod>2012-04-30T12:24:17+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/04/cgn-grundemann-naipv6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/cisco-blog-five-steps-for-building-your-ipv6-address-plan/</loc>
		<lastmod>2012-05-02T20:05:35+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/05/ciscoblog-20120512.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/cisco-blog-5-steps-for-building-your-ipv6-address-plan/</loc>
		<lastmod>2012-05-02T20:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/05/ciscoblog-20120512.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/08/observations-from-the-standing-committee-on-copyright-and-related-rights-sccr24-world-intellectual-property-organization-wipo/</loc>
		<lastmod>2012-08-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/08/sip-forum-formally-launches-sip-over-ipv6-task-group/</loc>
		<lastmod>2012-08-23T12:27:29+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/08/SIPForum.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/09/arin-enters-phase-2-of-ipv4-countdown-only-3-8-blocks-left/</loc>
		<lastmod>2012-09-19T20:36:43+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/09/arin-ipv4-countdown.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/09/u-s-white-house-website-now-on-ipv6/</loc>
		<lastmod>2012-09-28T12:54:10+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/09/www.whitehouse.gov_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/internet-technology-matters/</loc>
		<lastmod>2012-11-02T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2012/11/prohibir-internet-no-es-la-solucion-2/</loc>
		<lastmod>2012-11-23T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/12/google-available-over-ipv6/</loc>
		<lastmod>2012-12-24T13:06:12+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/12/Googleplusipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/12/Googleplus-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/are-you-a-redditor-subscribe-to-the-ipv6-subreddit-2/</loc>
		<lastmod>2013-01-16T13:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/reddit-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/playing-googles-zamboni-gamedoodle-over-ipv6/</loc>
		<lastmod>2013-01-16T20:32:45+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2013/01/google-zamboni-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/playing-googles-zamboni-gamedoodle-over-ipv6-2/</loc>
		<lastmod>2013-01-16T20:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/google-zamboni-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/new-internet-draft-balanced-ipv6-security-for-residential-cpe/</loc>
		<lastmod>2013-01-25T14:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/IPv6-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/02/apricot-2013-reflections-on-the-future-of-the-internet/</loc>
		<lastmod>2013-02-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/open-public-test-of-nat64dns64-at-go6lab/</loc>
		<lastmod>2013-03-26T12:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/Screen-Shot-2013-03-11-at-9.09.31-AM-300x223.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/rfc-6180-offers-guidelines-for-using-ipv6-transition-mechanisms-2/</loc>
		<lastmod>2013-05-06T15:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/packet-pushers-healthy-paranoia-podcast-ipv6-security-smackdown/</loc>
		<lastmod>2013-05-09T12:06:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/packet-pushers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/telstra-rolls-out-ipv6-to-business-adsl-customers-2/</loc>
		<lastmod>2013-06-27T15:48:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/telstra-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/07/comcast-now-enabling-users-to-easily-find-out-ipv6-status-in-their-area-2/</loc>
		<lastmod>2013-07-08T17:43:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/07/comcast-ipv6ready.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/07/voluntary-initiatives-as-a-source-of-policy-making-on-the-internet/</loc>
		<lastmod>2013-07-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/research-and-education-networks-at-the-forefront-in-content-generation/</loc>
		<lastmod>2013-08-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/national-research-and-education-network-kenet/</loc>
		<lastmod>2013-08-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/nap-africa-hits-2-5-gbps-traffic/</loc>
		<lastmod>2013-08-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/liquid-telecom-continues-with-quest-to-be-africas-largest-network/</loc>
		<lastmod>2013-08-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/ipv6-deployment-hits-2-keeps-growing/</loc>
		<lastmod>2013-09-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/monetizing-ipv6-a-guest-blog-post-before-broadband-world-forum/</loc>
		<lastmod>2013-10-15T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/the-open-internet-is-good-for-business/</loc>
		<lastmod>2013-10-22T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/the-internet-as-a-catalyst-for-development/</loc>
		<lastmod>2013-11-26T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/going-native-ipv6-in-my-home-office-2/</loc>
		<lastmod>2013-12-03T22:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/twc-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/deloittes-tech-trends-2013-ipv6-and-this-time-we-mean-it-2/</loc>
		<lastmod>2013-12-30T13:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/deloitte-ipv6-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/prediction-ipv6-adoption-hits-double-digits-in-2014/</loc>
		<lastmod>2014-01-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/WIPv6L-Banner-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/vint-cerf-i-want-all-of-you-to-ask-your-isps-what-their-plan-is-for-ipv6-2/</loc>
		<lastmod>2014-04-03T15:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/netmundial-variations-on-a-theme-multistakeholder-consensus-building-in-action/</loc>
		<lastmod>2014-05-01T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/hands-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/how-to-make-your-website-available-over-ipv6/</loc>
		<lastmod>2014-06-06T18:26:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/pervasive-internet-surveillance-policy-ripples/</loc>
		<lastmod>2014-06-26T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/vint-cerf-pitches-ipv6-on-the-colbert-report-2/</loc>
		<lastmod>2014-07-16T15:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/techquickie-video-ipv4-vs-ipv6-as-fast-as-possible/</loc>
		<lastmod>2014-07-25T17:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/techquickie-video-ipv4-vs-ipv6-as-fast-as-possible-2/</loc>
		<lastmod>2014-07-25T17:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/new-internet-numbers-show-continued-growth/</loc>
		<lastmod>2014-08-11T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/new-cea-webinar-archive-on-ipv6-and-broadband/</loc>
		<lastmod>2014-08-14T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Homepage_IPv6_1_0-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/linkedin-permanently-enables-ipv6-on-its-website/</loc>
		<lastmod>2014-09-08T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/LinkedinLogoTransparent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/akamai-adds-ipv6-trend-visualizations-to-state-of-the-internet-reporting/</loc>
		<lastmod>2014-11-03T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Akamai_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/are-you-buying-home-electronics-that-are-ready-for-ipv6/</loc>
		<lastmod>2014-11-28T11:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/emily-taylors-must-read-post-ofcom-in-denial-over-uk-ipv6-failure-2/</loc>
		<lastmod>2014-12-12T19:45:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/emily-taylor-ofcom.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/the-hidden-economics-of-local-content-hosting/</loc>
		<lastmod>2015-01-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/the-digital-divide-is-not-binary/</loc>
		<lastmod>2015-01-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2015/02/rejoignez-notre-chapitre-du-cameroun-pour-une-conference-sur-la-gouvernance-dinternet-au-cameroun/</loc>
		<lastmod>2015-02-11T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cameroon_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/an-open-internet-is-critical-for-un-sustainable-development-goals/</loc>
		<lastmod>2015-04-27T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/sustainable-development-goals.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/continuing-the-momentum-of-the-iana-transition/</loc>
		<lastmod>2015-05-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IANA_logo_large.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/video-interview-olaf-kolkman-at-wsis-forum-discussing-collaborative-security-and-more/</loc>
		<lastmod>2015-05-29T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wsis-forum-olaf-interview.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/icann-53-tangoing-the-iana-process-in-buenos-aires/</loc>
		<lastmod>2015-06-17T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/1024px-193_-_Buenos_Aires_-_Puerto_Madero_-_Janvier_2010.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/iana-stewardship-transition-a-major-milestone-passed-on-the-path-towards-globalizing-the-internet/</loc>
		<lastmod>2015-06-26T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IMG_3982_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/the-mobile-app-trap/</loc>
		<lastmod>2015-07-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/perspectives-on-the-iana-stewardship-transition-principles/</loc>
		<lastmod>2015-07-29T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/perspectives-on-iana-transition.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/summer-school-on-internet-governance-ssig-plays-a-critical-role-in-internet-growth/</loc>
		<lastmod>2015-08-03T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ssig-2014.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/lacigf-in-mexico-city-collaborative-governance-and-unleashing-opportunities/</loc>
		<lastmod>2015-08-04T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/LACIGF8-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/an-ipv6-dance-party/</loc>
		<lastmod>2015-08-04T17:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/an-ipv6-dance-party-2/</loc>
		<lastmod>2015-08-04T17:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/connecting-the-next-billion/</loc>
		<lastmod>2015-08-26T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/kid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/were-almost-there-iana-stewardship-transition/</loc>
		<lastmod>2015-10-20T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana-ccwg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/where-is-wsis-heading-post-2015/</loc>
		<lastmod>2015-12-01T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr-un_photo-3311542781.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/the-internet-society-believes-privacy-is-key-for-a-trusted-internet/</loc>
		<lastmod>2016-01-28T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Data-Privacy-Day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/watch-live-march-1-2-turks-and-caicos-islands-internet-governance-workshop/</loc>
		<lastmod>2016-03-01T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/igintci.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/testimony-before-the-us-house-about-the-iana-stewardship-transition/</loc>
		<lastmod>2016-03-17T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/sally-wentworth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2016/03/fiches-sur-les-politiques-publiques-de-internet-society-disponibles-en-francais/</loc>
		<lastmod>2016-03-29T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/policy-briefs-intro-12.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/04/the-start-of-a-new-beginning-the-internet-governance-forum-on-its-road-to-2025/</loc>
		<lastmod>2016-04-01T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/igf2015-openingsession.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/important-next-step-in-iana-stewardship-transition-ntia-says-proposal-meets-criteria/</loc>
		<lastmod>2016-06-09T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IANA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/icts-at-the-heart-of-the-development-agenda-from-high-level-declarations-to-action/</loc>
		<lastmod>2016-06-13T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/stiforum.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/reflecting-on-two-terms-of-internet-society-board-service/</loc>
		<lastmod>2016-06-16T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/1JasonLivingood.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/embracing-privacy-in-the-digital-age-a-dialogue-with-the-un-special-rapporteur-on-privacy/</loc>
		<lastmod>2016-07-01T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/unsr-conversation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/security-go-young-people-paving-the-way-to-better-online-security/</loc>
		<lastmod>2016-08-08T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/8425506706_6f38d6409f_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/a-key-moment-for-the-iana-transition/</loc>
		<lastmod>2016-09-12T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/read-the-internet-societys-framework-for-access-policy-and-share-your-views/</loc>
		<lastmod>2016-09-15T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Aboyandagirl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/open-consultations-at-the-itu-how-to-build-an-enabling-environment-for-internet-access/</loc>
		<lastmod>2016-10-19T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr-itu-cwg-oct2016-29625944603_69b1fa16a7_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/new-study-reveals-more-than-200-mobile-sitesapps-are-exposing-sensitive-consumer-information/</loc>
		<lastmod>2016-12-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_C7UFJEXEV4_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/dan-geer-revisits-2014-blackhat-recommendations-more-industry-recognition-of-the-problem-much-left-to-do/</loc>
		<lastmod>2016-12-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/computer-1591018_1920_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/should-our-personal-health-data-be-sold-for-a-profit/</loc>
		<lastmod>2016-12-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_9M1HWW2JFV_3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/what-indias-banking-industry-breach-can-teach-us-about-the-importance-of-collaboration/</loc>
		<lastmod>2016-12-21T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/office-1209640_1920_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/in-our-new-changed-world-we-need-new-tools-remarks-at-next-generation-internet-summit/</loc>
		<lastmod>2017-06-06T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/FullSizeRender-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/bringing-internet-research-to-the-ietf-applied-networking-research-workshop-program-now-available-2/</loc>
		<lastmod>2017-06-27T13:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/g20-nations-must-set-clear-priorities-for-digital-agenda/</loc>
		<lastmod>2017-07-05T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Flags_5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/looking-at-the-past-to-understand-the-future-a-history-of-iana-through-the-years/</loc>
		<lastmod>2017-08-16T22:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana-timeline-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/isoc-internet-governance-event-toolkit-bringing-the-discussions-to-the-people/</loc>
		<lastmod>2017-08-16T23:09:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/igevents-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/07/why-understanding-internet-security-and-resilience-is-important-when-talking-about-cybersecurity/</loc>
		<lastmod>2017-08-16T23:45:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/over-25-of-verizon-wireless-traffic-is-now-over-ipv6/</loc>
		<lastmod>2017-08-29T22:22:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/VW_IPv61-300x180.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/network-operator-ipv6traffic-201304151.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/weekend-project-add-ipvfoo-or-ipvfox-to-your-web-browser-to-see-what-is-ipv6/</loc>
		<lastmod>2017-08-30T14:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/ipvfox-focus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/wordpress-com-over-ipv6-300x131.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/weekend-project-set-up-an-ipv6-tunnel/</loc>
		<lastmod>2017-08-30T14:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256-150x150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/bknix-peering-forum-2017-next-week/</loc>
		<lastmod>2017-08-30T15:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-12-12.22.39-300x126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-12-11.49.17-300x97.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-12-11.49.38-300x145.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/lets-encrypt-certificates-for-mail-servers-and-dane-part-2-of-2/</loc>
		<lastmod>2017-08-30T17:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/letsencrypt-300x106.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/screen-capture-182-300x173.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/screen-capture-186-300x147.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ipv6-troubleshooting-for-helpdesks-now-published-as-ripe-631/</loc>
		<lastmod>2017-08-30T22:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/09/Ripe_RGB-300x121.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/introducing-rfc-7454-bgp-operations-and-security/</loc>
		<lastmod>2017-08-30T22:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/olle-johanssons-morecrypto-v2-0-slide-deck-with-tls/</loc>
		<lastmod>2017-08-30T23:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/operators-and-the-ietf-update-from-ietf-91/</loc>
		<lastmod>2017-08-31T13:36:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/newshirt-285x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/video-selective-blackholing-at-ripe-68/</loc>
		<lastmod>2017-08-31T13:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/JobSnijders_RIPE_Selective_Blackholing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/video-balancing-end-user-ipv6-security-and-end-to-end-connectivity-ripe-68/</loc>
		<lastmod>2017-08-31T13:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/RagnarAnfinsenIPv6Security-300x224.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/videoslides-case-study-deploying-ipv6-in-10-days-at-24media-ripe67/</loc>
		<lastmod>2017-08-31T14:19:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/ripe67-tore-anderson.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/videoslides-case-study-of-terastreams-ipv6-implementation-ripe67/</loc>
		<lastmod>2017-08-31T14:20:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/ripe67-terastream-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/indias-dept-of-telecommunications-for-tamil-nadu-making-plans-for-transition-to-ipv6-2/</loc>
		<lastmod>2017-08-31T14:21:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/the-hindu-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/videoslides-case-study-ipv6-and-home-automation-ripe67/</loc>
		<lastmod>2017-08-31T14:49:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/ripe67-ipv6-at-home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/ipso-challenge-2013-offers-10k-to-winner-with-best-new-internet-of-things-ideaproduct-2/</loc>
		<lastmod>2017-08-31T15:09:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/ipso-alliance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/ripe-labs-internet-tools-ideas-and-statistics-2/</loc>
		<lastmod>2017-08-31T15:17:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/Stats-Dashboard-235x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/igf-usa-promoting-inclusive-internet/</loc>
		<lastmod>2017-08-31T15:44:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IGF-USA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/igf-usa-promoting-inclusive-internet/</loc>
		<lastmod>2017-09-01T11:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IGF-USA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/03/unh-iol-hosting-ipv6-test-event-for-home-routers-on-april-16-20-2012/</loc>
		<lastmod>2017-09-01T20:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/FIRST-banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/01/WorldIPv6Launch-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/01/world-ipv6-launch-on-june-6-2012-to-bring-permanent-ipv6-deployment/</loc>
		<lastmod>2017-09-01T20:29:41+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/01/WorldIPv6Launch-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/what-if-your-business-is-ipv4-only-arin-infographic-2/</loc>
		<lastmod>2017-09-05T21:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/0001/12/what-shall-we-call-our-new-topic-area-on-anti-spoofing-of-ip-addresses/</loc>
		<lastmod>2017-09-06T16:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/question-mark.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/onwards-and-upwards/</loc>
		<lastmod>2017-09-06T16:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/640-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/skype-on-android-works-over-ipv6-on-mobile-networks-using-464xlat/</loc>
		<lastmod>2017-09-06T16:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/jan-call-187x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/clat-interface-300x242.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/ip-addresses-are-not-telephone-numbers-the-fundamental-flaw-with-the-fccs-proposed-privacy-rules/</loc>
		<lastmod>2017-09-06T17:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ip-addresses.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/network-neutrality-let-those-packets-flow/</loc>
		<lastmod>2017-09-06T18:12:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/converging-on-barcelona-for-mwc-2016/</loc>
		<lastmod>2017-09-06T18:23:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/MWC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/does-a-digital-society-have-to-become-a-surveillance-society/</loc>
		<lastmod>2017-09-06T18:39:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/france-natl-assembly-jpellgen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/the-igf-2014-fragmentation-track/</loc>
		<lastmod>2017-09-06T19:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/ietf-issues-rfc-7258-declaring-that-pervasive-monitoring-is-an-attack-against-the-internet/</loc>
		<lastmod>2017-09-06T19:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Pervasive-Monitoring1-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/fakeid-android-certificates-and-implementation-details/</loc>
		<lastmod>2017-09-06T19:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/Android-FAKEID-logo-200x200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/gigaom-cloud-providers-need-to-get-ipv6-2/</loc>
		<lastmod>2017-09-06T19:37:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/gigaom-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/new-apache-spamassassin-release-3-4-0-includes-native-ipv6-support/</loc>
		<lastmod>2017-09-07T12:14:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/apache-spam-assassin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/video-bind-and-dnssec-what-is-new/</loc>
		<lastmod>2017-09-07T12:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/the-second-caribbean-peering-interconnection-forum-carpif2-to-be-held-in-curacao-june-8-9/</loc>
		<lastmod>2017-09-07T13:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/carpif-background.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/04/measuring-internet-health-introducing-noma/</loc>
		<lastmod>2017-09-07T13:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/research.final_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/submissions-for-the-raim-workshop-on-internet-measurements-closes-friday/</loc>
		<lastmod>2017-09-07T13:04:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/machine-to-machine-976-510-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/why-megafast-internet-often-isnt-video/</loc>
		<lastmod>2017-09-07T13:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/megafast1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/keeping-the-internet-open-happy-anniversary-openstand/</loc>
		<lastmod>2017-09-07T13:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/openstandimage2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/the-internet-society-announces-its-25th-cohort-of-technology-fellows-to-the-internet-engineering-task-force-meetings/</loc>
		<lastmod>2017-09-07T13:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/a-fond-farewell-from-leslie-daigle-where-weve-been-where-were-going/</loc>
		<lastmod>2017-09-07T13:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/leslietest1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/ipv6-traffic-and-mobile-networks-thoughts-after-world-ipv6-congress/</loc>
		<lastmod>2017-09-07T13:06:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/2014-02-11_17-53-57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/reflections-on-three-years-on-the-isoc-board-of-trustees/</loc>
		<lastmod>2017-09-07T13:26:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/080715-INTERCOMM-032-min-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/join-us-at-world-press-freedom-day-this-week/</loc>
		<lastmod>2017-09-07T13:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/matt-popovich-60438-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/digital-identity-evolving-or-just-cloning-itself/</loc>
		<lastmod>2017-09-07T13:26:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/identity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/security-fatigue-complicates-the-battle-against-data-breaches/</loc>
		<lastmod>2017-09-07T13:26:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_VG49081NDD_4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/data-breaches-and-you-our-global-internet-report-2016-explains-the-critical-steps-you-need-to-take-now/</loc>
		<lastmod>2017-09-07T13:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/gir2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/clt-starts-today-telecommunications-regulatory-challenges-for-the-digital-ecosystem-is-a-key-theme/</loc>
		<lastmod>2017-09-07T13:26:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/clt2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/hey-someone-fragmented-my-internet-and-didnt-even-tell-me/</loc>
		<lastmod>2017-09-07T13:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/blogpost1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/5th-itac-oecd-newsletter-internet-governance-wsis10-iot-cybersecurity-trust-standards/</loc>
		<lastmod>2017-09-07T13:27:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/itacLogo2_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/coordinating-attack-response-at-internet-scale/</loc>
		<lastmod>2017-09-07T13:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/netradar-data-enriches-global-internet-report/</loc>
		<lastmod>2017-09-07T13:27:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/online-communications-and-confidentiality-what-do-you-need/</loc>
		<lastmod>2017-09-07T13:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iStock-global-connections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/winner-announced-in-isoc-sponsored-student-poster-competition-at-tnc2014/</loc>
		<lastmod>2017-09-07T13:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/TNC2014PosterWinner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/whats-in-your-privacy-tool-bag/</loc>
		<lastmod>2017-09-07T13:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/selfie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/help-us-help-you-take-the-deploy360-survey/</loc>
		<lastmod>2017-09-07T13:48:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/WeNeedYou-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/new-addition-to-deploy360-and-apac-team/</loc>
		<lastmod>2017-09-07T13:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/AftabSiddiqui-Bio-Picture-239x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/can-we-really-blame-dnssec-for-larger-volume-ddos-attacks/</loc>
		<lastmod>2017-09-07T13:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/new-research-shows-ipv6-adoption-is-now-real/</loc>
		<lastmod>2017-09-07T13:48:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/ratioIPv4_IPv6_paths.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/lacnic-enters-phase-2-of-final-ipv4-address-countdown-only-a-single-10-remaining/</loc>
		<lastmod>2017-09-07T13:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/lacnic-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/chris-grundemann-and-jan-zorz-at-apricot-2014/</loc>
		<lastmod>2017-09-07T13:49:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/apricot-new-300x105.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/moving-forward-meet-our-new-director-chris-grundemann/</loc>
		<lastmod>2017-09-07T13:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/10295923_10152188879251376_5518449953580863205_o-199x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/deploy360-participating-in-ietf84-in-vancouver/</loc>
		<lastmod>2017-09-07T13:53:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/09/another-page-in-internet-history-turned-ripe-ncc-allocating-its-last-ipv4-8/</loc>
		<lastmod>2017-09-07T13:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/09/Ripe_RGB-300x121.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/12/feedbackvolunteer-forms-added-to-the-site-2/</loc>
		<lastmod>2017-09-07T13:53:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/12/video-ipv6-dnssec-rpki-etc-whats-the-holdup-and-how-can-we-help-usenix-lisa-2011-2/</loc>
		<lastmod>2017-09-07T13:53:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/11/slides-how-ipv6-will-impact-sip-and-telecommunications/</loc>
		<lastmod>2017-09-07T13:53:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/11/slides-how-ipv6-will-impact-sip-and-telecommunications-2/</loc>
		<lastmod>2017-09-07T13:53:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/10/welcome-to-the-preview-release-of-the-do-hub-2/</loc>
		<lastmod>2017-09-07T13:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/jim-galvin-writing-about-dnssec-on-circleid/</loc>
		<lastmod>2017-09-07T14:05:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/jim-galvin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/25-25-using-internet-make-difference-communities/</loc>
		<lastmod>2017-09-07T15:55:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25u25Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/prohibir-internet-no-es-la-solucion-2/</loc>
		<lastmod>2017-09-07T17:03:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/which-direction-will-the-internet-go-help-us-explore-the-forces-at-work/</loc>
		<lastmod>2017-09-07T17:19:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/jetty1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/youth-arent-the-future-were-the-present/</loc>
		<lastmod>2017-09-07T17:19:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/youth-Special-Interest-Group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/beyond-the-net-new-grants-programme-for-chapters-is-launched/</loc>
		<lastmod>2017-09-07T17:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/beyondthenet1-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/civil-society-app-and-500k-euro-for-collaboration/</loc>
		<lastmod>2017-09-07T17:21:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/banner_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/inet-trinidad-tobago-covers-ipv6-dnssec-privacy-ixps-cybersecurity-and-more-this-week/</loc>
		<lastmod>2017-09-07T17:21:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/INET-TT-Logo-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/community-grants-programme-blog-welcome/</loc>
		<lastmod>2017-09-07T17:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/bknix-peering-forum-2017-highlights/</loc>
		<lastmod>2017-09-07T17:39:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-22-11.09.14-300x105.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/IMG_0867-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/IMG_1027-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-22-13.12.53-300x80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-22-13.13.05-300x81.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/blackberrys-new-blend-application-requires-ipv6-networking-updated/</loc>
		<lastmod>2017-09-07T17:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/blackberry-blend.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/caa-mandated-by-cabrowser-forum/</loc>
		<lastmod>2017-09-07T17:47:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/major-browser-compatibility-300x96.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/uber-goes-ipv6-to-support-its-growing-infrastructure/</loc>
		<lastmod>2017-09-07T17:49:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/uber-serp-logo-f6e7549c89-300x300.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/nominations-open-for-the-next-class-of-internet-hall-of-fame-inductees/</loc>
		<lastmod>2017-09-07T18:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ihof-nominations-2017-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/innovations-at-the-edge-of-the-oecds-ministerial-meeting-in-cancun/</loc>
		<lastmod>2017-09-07T18:13:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/oecd-hackathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/whats-your-answer-the-dark-web/</loc>
		<lastmod>2017-09-07T18:13:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Dark-Web-e1552402557809.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/internet-society-activities-at-the-global-conference-on-cyberspace-2015-gccs2015/</loc>
		<lastmod>2017-09-07T18:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/gccs2015-977.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/overcoming-the-obstacles-to-internet-evolution-announcing-the-semi-workshop/</loc>
		<lastmod>2017-09-07T18:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/meetingpanel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/internet-milestones/</loc>
		<lastmod>2017-09-07T18:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/modem.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/celebrating-25-years-of-the-world-wide-web-whats-next-for-the-internet/</loc>
		<lastmod>2017-09-07T18:13:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Celebrate-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/cira-makes-dnssec-available-for-ca-through-registrars/</loc>
		<lastmod>2017-09-07T18:25:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/cira-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/great-ipv6-work-happening-in-grenada-in-the-caribbean-2/</loc>
		<lastmod>2017-09-07T18:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/ipv6-in-grenada-may2014_pdf__page_1_of_15_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/friday-comic-xkcd-on-ipv6-and-nanobot-swarms/</loc>
		<lastmod>2017-09-07T18:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/comments-internet-draft-on-dnssec-crypto-algorithm-agility/</loc>
		<lastmod>2017-09-07T18:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/dnssec-and-dane-activities-at-icann-57-in-hyderabad-india-november-4-7-2016/</loc>
		<lastmod>2017-09-07T18:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/icann57-hyderabad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/what-would-you-like-to-see-in-a-state-of-dnssec-deployment-2016-report/</loc>
		<lastmod>2017-09-07T18:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/nist-publishes-new-guide-dns-based-email-security-about-dane-and-dnssec/</loc>
		<lastmod>2017-09-07T18:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/nist-dane.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/lets-encrypt-certificates-for-mail-servers-and-dane-part-1-of-2/</loc>
		<lastmod>2017-09-07T18:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/letsencrypt-300x106.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/screen-capture-176-300x95.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/screen-capture-177-300x116.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/screen-capture-178-300x106.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/screen-capture-179-300x104.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/got-a-dnssec-or-dane-story-or-tool-to-share-submit-a-proposal-for-icann-55-dnssec-workshop/</loc>
		<lastmod>2017-09-07T18:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/icann55_marrakech_logo_300x255-230x196.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/techtarget-sheds-light-on-dnssec-cas-and-government-spying-control/</loc>
		<lastmod>2017-09-07T18:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/techtarget-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/even-more-danednssectls-email-testing-from-go6lab/</loc>
		<lastmod>2017-09-07T18:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/dane-300x113.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/more-dane-dnssec-tls-testing-from-go6lab/</loc>
		<lastmod>2017-09-07T18:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/dane.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/testing-dane-for-sending-secure-email-at-the-go6lab/</loc>
		<lastmod>2017-09-07T18:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/dane.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/at-rsa-conference-apr-23-can-dnssec-and-dane-add-a-layer-of-trust-to-tls-and-dns/</loc>
		<lastmod>2017-09-07T18:36:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/rsa-conference.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/iana-dnssec-root-key-ceremony-21-streaming-live-today/</loc>
		<lastmod>2017-09-07T18:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/ksk-ceremony-21.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/ksk-ceremony-command-line.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/ksk-ceremony.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/KSK_Ceremony.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/many-dnssec-and-dane-activities-at-icann52-next-week-in-singapore/</loc>
		<lastmod>2017-09-07T18:36:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/icann52-singapore.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/watch-live-today-dnssec-root-ksk-ceremony-20-at-1215-pst-2015-utc/</loc>
		<lastmod>2017-09-07T18:36:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/iana-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/dns-security-advisories-out-today-for-bind-powerdns-and-unbound-time-to-upgrade-2/</loc>
		<lastmod>2017-09-07T18:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/new-rfc-7344-aiming-to-solve-the-ds-upload-issue-in-dnssec/</loc>
		<lastmod>2017-09-07T18:37:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/ds-upload-300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/ipfire-adds-dnssec-validation-in-new-release-via-crowdfunding/</loc>
		<lastmod>2017-09-07T18:37:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/ipfire-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/distributed-trust-modelstls-certificate-transparency-and-dane/</loc>
		<lastmod>2017-09-07T18:37:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/tls-150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/a-hosting-provider-marketing-secure-hosting-with-ssl-dnssec-and-dane-tlsa/</loc>
		<lastmod>2017-09-07T18:39:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/secure-hosting-mit-dnssec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/no-dnssec-would-not-help-prevent-microsofts-seizure-of-domains/</loc>
		<lastmod>2017-09-07T18:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/speaking-at-sipnoc-2014-on-june-10-about-tls-for-sipvoipuc/</loc>
		<lastmod>2017-09-07T18:39:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/sipnoc2014-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/video-dnssec-measurement-using-atlas-probes-ripe-68/</loc>
		<lastmod>2017-09-07T18:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/dnssec-atlas-ripe68.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/weekend-project-try-out-bloodhound-a-web-browser-with-full-dnssec-support/</loc>
		<lastmod>2017-09-07T18:39:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/bloodhound.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/dnssec-training-in-rwanda-for-the-rw-cctld/</loc>
		<lastmod>2017-09-07T18:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/rwanda-dnssec-training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/weekend-project-add-dkim-dnssec-verifier-to-thunderbird/</loc>
		<lastmod>2017-09-07T18:39:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/dnssec-dkim.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/nist-offers-new-tool-to-verify-tlsa-records-for-dane-dnssec/</loc>
		<lastmod>2017-09-07T18:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/dane-tls-testing-nist-tool-300x240.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/weekend-project-test-out-new-dnssec-support-in-dnsmasq/</loc>
		<lastmod>2017-09-07T18:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/dnsmasq-icon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/weekend-project-install-the-dnssectlsa-validator-for-chrome-firefox-more/</loc>
		<lastmod>2017-09-07T18:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/DNSSEC-TLSA-Validator.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/tlsa-browser.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/video-enog6-dnssec-and-dane-deployment-trends-tools-and-challenges/</loc>
		<lastmod>2017-09-07T18:39:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/afnic-publishes-issue-paper-securing-internet-communications-end-to-end-using-dane-protocol/</loc>
		<lastmod>2017-09-07T18:39:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/afnic-issue-paper-dane.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/slides-dnsec-and-dane-deployment-trends-tools-and-challenges/</loc>
		<lastmod>2017-09-07T18:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/how-to-securely-transfer-a-dnssec-signed-domain-between-dns-operators-sidns-epp-keyrelay/</loc>
		<lastmod>2017-09-07T18:39:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/sidn-epp-keyrelay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/great-news-tv-and-cc-now-signed-with-dnssec/</loc>
		<lastmod>2017-09-07T18:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/verisign-tv-cc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/verisign-labs-dane-demonstration-page-and-test-sites/</loc>
		<lastmod>2017-09-07T18:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/verisign-labs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/hash-slinger-helps-you-easily-create-tlsa-records-for-dnssec-dane/</loc>
		<lastmod>2017-09-07T18:40:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/10/21-sites-you-can-use-to-test-dane-support-dnssec-ssltls/</loc>
		<lastmod>2017-09-07T18:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/3-ietf-mailing-lists-to-follow-for-monitoring-dnssec/</loc>
		<lastmod>2017-09-07T18:41:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/make-encryption-the-norm-for-all-internet-traffic-says-the-internet-architecture-board-iab/</loc>
		<lastmod>2017-09-07T18:51:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/iab-300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/celebrating-30-years-of-the-domain-name-system-dns-this-month/</loc>
		<lastmod>2017-09-07T19:18:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/dns-250.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/freebsd-10-to-include-openssh-with-dnssec-support-for-sshfp-records/</loc>
		<lastmod>2017-09-07T19:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/freebsd-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/celebrating-the-3rd-launchiversary-of-world-ipv6-launch-2/</loc>
		<lastmod>2017-09-07T19:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/wipv6l-velvet-250.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/wipv6l-vzwireless-20150513.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/google-ipv6-june2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/t-mobile-usa-crosses-50-ipv6-deployment-verizon-wireless-65-att-38-2/</loc>
		<lastmod>2017-09-07T19:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/tmobile-ipv6-feb2015.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/vzwireless-feb2015.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/wipv6l-measurements-feb2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/vint-cerf-we-need-to-move-to-the-production-version-of-the-internet-ipv6-2/</loc>
		<lastmod>2017-09-07T19:27:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/check-out-the-new-2-year-world-ipv6-launchiversary-infographic-2/</loc>
		<lastmod>2017-09-07T19:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/wipv6l2-infographic-partial.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/great-ipv6-case-studies-coming-in-what-is-yours-2/</loc>
		<lastmod>2017-09-07T19:27:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/call-for-ipv6-case-studies-for-world-ipv6-launchiversary-2/</loc>
		<lastmod>2017-09-07T19:27:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/world-ipv6-launch-media-report-1-mythic-beasts-telefonica-in-peru-municipal-wifi-cloudflare-and-more-2/</loc>
		<lastmod>2017-09-07T19:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/register-now-webinar-tomorrow-june-6-ipv6-in-the-real-world-presented-by-afrinic-isoc-orange-2/</loc>
		<lastmod>2017-09-07T19:27:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/Af6TF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/thursday-marks-1-year-since-world-ipv6-launch-have-you-made-the-move-if-not-why-not-2/</loc>
		<lastmod>2017-09-07T19:27:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/06/join-vint-cerf-on-june-5th-in-a-google-hangout-about-world-ipv6-launch/</loc>
		<lastmod>2017-09-07T19:27:23+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/06/HangoutsOnAir.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/video-how-to-ipv6-enable-any-website-using-a-cdn/</loc>
		<lastmod>2017-09-07T19:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/fcc-the-countdown-to-ipv6-is-on/</loc>
		<lastmod>2017-09-07T19:27:28+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/05/fcc-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/zyxel-joins-world-ipv6-launch-as-home-router-vendor/</loc>
		<lastmod>2017-09-07T19:27:30+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/05/ZyXEL-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/videoslidecast-what-is-world-ipv6-launch-all-about-how-can-you-participate/</loc>
		<lastmod>2017-09-07T19:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/bringing-internet-research-to-the-ietf-applied-networking-research-workshop-program-now-available/</loc>
		<lastmod>2017-09-08T02:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IETFWorkshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/reflecting-on-10-years-of-the-fellowship-to-the-ietf/</loc>
		<lastmod>2017-09-08T02:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/46-years-of-rfcs-celebrating-the-anniversary-of-rfc-1/</loc>
		<lastmod>2017-09-08T02:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/rfc1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/video-ietf-newcomers-session-provides-a-tutorial-about-the-standards-process/</loc>
		<lastmod>2017-09-08T02:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/29th-dnssec-root-signing-ceremony/</loc>
		<lastmod>2017-09-08T12:22:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/29th-Key-Rollover-Picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/bringing-internet-research-to-the-ietf-inaugural-applied-networking-research-workshop-program-now-available/</loc>
		<lastmod>2017-09-08T12:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/research-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/25th-dns-root-key-ceremony/</loc>
		<lastmod>2017-09-08T12:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/DNS-Key.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/ndss-2016-papers-now-online/</loc>
		<lastmod>2017-09-08T12:22:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/NDSS-copy-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/caida-to-host-inaugural-bgp-hackathon/</loc>
		<lastmod>2017-09-08T12:22:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/the-black-box-paradox-how-to-trust-a-secret-on-todays-internet/</loc>
		<lastmod>2017-09-08T12:23:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/LockBackground_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/pervasive-internet-surveillance-the-technical-communitys-response-so-far/</loc>
		<lastmod>2017-09-08T12:23:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Pervasive-Monitoring1-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/fixing-heartbleed-its-the-culture-not-just-the-technology/</loc>
		<lastmod>2017-09-08T12:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/heartbleed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/cloudflare-re-affirms-goal-of-dnssec-support-by-end-of-2014/</loc>
		<lastmod>2017-09-08T12:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/cloudflare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/cloudflare-enabling-ipv6-for-all-customers/</loc>
		<lastmod>2017-09-08T12:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/cloudflare.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/vyncke-ipv6-cloudflare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/in-september-singapore-and-senegal-signed-their-sn-and-sg-with-dnssec/</loc>
		<lastmod>2017-09-08T12:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/singapore-and-senegal-sign-with-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/andorra-ad-becomes-the-latest-cctld-signed-with-dnssec/</loc>
		<lastmod>2017-09-08T12:56:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/andorra-flag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/a-personal-example-of-why-we-need-anti-spoofing-measures-deployed/</loc>
		<lastmod>2017-09-08T13:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/Deploy360-Badge_Anti-Spoofing-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/fcc-requests-comments-on-dnssec-bgpsec-and-anti-spoofing/</loc>
		<lastmod>2017-09-08T13:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/fcc-logo_black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/video-geoff-huston-what-if-everyone-did-dnssec-apnic-38/</loc>
		<lastmod>2017-09-08T13:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/starting-june-1-apple-requires-all-ios-apps-to-work-in-ipv6-only-networks-2/</loc>
		<lastmod>2017-09-08T13:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/05/apple-ios-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/chris-grundemann-nanog-63-talking-bcop-ietf-and-more/</loc>
		<lastmod>2017-09-08T13:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/NANOG63Home-300x284.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/bcop-button-300x65.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/jan-zorz-at-ipv6-council-belgium-today/</loc>
		<lastmod>2017-09-08T13:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/jan-zorz-belgian-ipv6-council.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/chris-grundemann-at-nanog-60-talking-bcop-and-ietf/</loc>
		<lastmod>2017-09-08T13:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/NANOG-60-300x284.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/a-2013-recap-of-our-bcop-efforts/</loc>
		<lastmod>2017-09-08T13:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/registration-operations-workshop-this-sunday-before-ietf92-to-talk-about-epp-encryption-dns/</loc>
		<lastmod>2017-09-08T13:40:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/registration-operations-workshop-2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/bgp-hijacker-steals-bitcoins/</loc>
		<lastmod>2017-09-08T13:45:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/BGP_Hijack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/video-cryptech-and-rpki-randy-bush-at-ripe-68/</loc>
		<lastmod>2017-09-08T13:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/RandyBush_HSM_RPKI-300x224.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/bgp-hijacking-in-iceland-and-belarus-shows-increased-need-for-bgp-security/</loc>
		<lastmod>2017-09-08T13:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/renesys-mitm-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/ces-2014-cea-announces-ipv6-specification-for-consumer-electronics-2/</loc>
		<lastmod>2017-09-08T13:52:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/cea-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/circleid-thinking-strategically-about-the-benefits-of-ipv6-2/</loc>
		<lastmod>2017-09-08T14:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/cid-mukom-tamon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/circleid-dns-security-should-be-one-of-your-priorities-including-dnssec/</loc>
		<lastmod>2017-09-08T14:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/circleid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/a-trio-of-ipv6-posts-from-mark-townsley-worth-reading-2/</loc>
		<lastmod>2017-09-08T14:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/townsley-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/comcast-publishing-domains-failing-dnssec-via-twitter/</loc>
		<lastmod>2017-09-08T14:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/comcastdns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/cloudflare-writes-about-dnssec-complexities-and-considerations/</loc>
		<lastmod>2017-09-08T14:17:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/cloudflare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/dnssec-name-and-shame-spotlights-top-web-sites-without-dnssec/</loc>
		<lastmod>2017-09-08T14:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/dnssec-name-and-shame.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/video-making-sense-out-of-an-ipv6-address/</loc>
		<lastmod>2017-09-08T14:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/video-t-mobiles-cameron-byrne-explains-challenges-and-success-around-enabling-ipv6-for-mobile-networks/</loc>
		<lastmod>2017-09-08T14:33:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/08/video-ipv6-addressing-and-why-isps-give-out-such-huge-blocks-of-ipv6-addresses/</loc>
		<lastmod>2017-09-08T14:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/dhcpy6d-a-new-tool-to-help-with-dhcpv6-dhcp-for-ipv6/</loc>
		<lastmod>2017-09-08T14:40:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/dhcpy6d.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/nlnet-labs-makes-their-dnssec-training-materials-freely-available-for-all-to-use/</loc>
		<lastmod>2017-09-08T14:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/tls-o-matic-now-available-to-test-tls-in-applications/</loc>
		<lastmod>2017-09-08T14:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/tls-o-matic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/cloudflare-releases-open-source-cfssl-a-tlsssl-toolkit/</loc>
		<lastmod>2017-09-08T14:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/cloudflare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/heartbleed-libressl-and-the-importance-of-implementation-diversity/</loc>
		<lastmod>2017-09-08T14:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/LibreSSL_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/introducing-a-new-deploy360-topic-tls-for-applications/</loc>
		<lastmod>2017-09-08T14:47:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/tls-150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/value-openness-building-tomorrows-digital-economies-reflections-oecd-ministerial-2016/</loc>
		<lastmod>2017-09-08T14:53:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/oecd-ministerial-main-graphic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/virtuous-circle-open-internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/verizon-wireless-nears-70-ipv6-att-crosses-50-more/</loc>
		<lastmod>2017-09-08T14:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/wipv6l-vzwireless-20150513.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/05/wipv6l-att-20150513.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/verizon-wireless-hits-56-ipv6-t-mobile-usa-40-att-24/</loc>
		<lastmod>2017-09-08T14:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/verizon-ipv6-september2014.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/akamai-launches-new-ipv6-trend-visualization-charts/</loc>
		<lastmod>2017-09-08T14:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/akamai-ipv6-trends-1024x842.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/verizon-wireless-approaching-50-ipv6-in-latest-world-ipv6-launch-measurements/</loc>
		<lastmod>2017-09-08T14:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/verizon-ipv6-20160416-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/new-ipv6-measurements-comcast-nearing-25-verizon-wireless-46-dt-at-18/</loc>
		<lastmod>2017-09-08T14:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/wipv6l-measurements-201402.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/comcast-and-time-warner-show-dramatic-increases-in-ipv6-deployment/</loc>
		<lastmod>2017-09-08T14:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/Comcast-300x180.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/google-fiber-shows-77-55-ipv6-deployment-in-latest-world-ipv6-launch-statistics/</loc>
		<lastmod>2017-09-08T14:55:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/worldipv6launch-stats-june18.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/07/over-8-of-internet-users-now-use-dnssec-validation-per-geoff-huston/</loc>
		<lastmod>2017-09-08T14:55:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/new-maps-show-current-state-of-global-dnssec-deployment/</loc>
		<lastmod>2017-09-08T14:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/2013-04-03-2013-04-03-300x170.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/08/video-4-days-of-world-ipv6-launch-statistics-in-165-seconds/</loc>
		<lastmod>2017-09-08T14:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/switzerland-edges-out-romania-as-top-in-ipv6-adoption-via-google/</loc>
		<lastmod>2017-09-08T14:57:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/switzerland-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/swisscom-doubles-ipv6-deployment-verizon-wireless-hits-70-ipv6/</loc>
		<lastmod>2017-09-08T14:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/08/swisscom-ipv6-201508.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/08/verizon-wireless-ipv6-201508.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/finally-a-dnssec-validation-trend-chart-up-and-to-the-right/</loc>
		<lastmod>2017-09-08T14:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/dnssec-trendline-20140703.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/dnssec-trendline-7days.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/dnssec-validation-worldmap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/dnssec-validation-country-ranking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/comments-our-routing-content-roadmap-is-now-available-2/</loc>
		<lastmod>2017-09-08T15:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/two-great-articles-in-arstechnica-and-light-reading-about-ion-conferences-ipv6-dnssec/</loc>
		<lastmod>2017-09-08T15:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/ars-technica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/video-advancing-the-network-where-weve-been-where-were-headed-ion-san-diego/</loc>
		<lastmod>2017-09-08T15:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/all-about-ion-singapore/</loc>
		<lastmod>2017-09-08T15:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2011/09/ion_singapore2013_blue_jpg1-300x147.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/01/videoslides-dead-men-walking-ipv6-and-dnssec/</loc>
		<lastmod>2017-09-08T15:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/01/videoslides-good-men-rising-ipv6-and-dnssec-toronto-ion/</loc>
		<lastmod>2017-09-08T15:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/in-5-days-ion-sri-lanka-will-cover-ipv6-dnssec-dane-bgp-tls-bcop-and-more/</loc>
		<lastmod>2017-09-08T15:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/ION-Sri-Lanka.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/Afilias_No_Tag-300x114.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/watch-live-right-now-from-japan-ion-tokyo-ipv6-dnssec-and-bcop/</loc>
		<lastmod>2017-09-08T15:28:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/iontokyo-chris.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/dnssec-and-dane-activities-at-icann53-in-buenos-aires-on-22-24-june/</loc>
		<lastmod>2017-09-08T15:37:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/icann53-buenos-aires.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/congratulations-to-argentina-on-dnssec-signing-of-ar/</loc>
		<lastmod>2017-09-08T15:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/argentina-and-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/last-week-at-lacnic24-and-lacnog-in-bogota-columbia/</loc>
		<lastmod>2017-09-08T15:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/screen-capture-338-300x149.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/12096241_10207979141619242_5666248937441522871_n-300x183.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/ipv6-security-myth-10-deploying-ipv6-is-too-risky/</loc>
		<lastmod>2017-09-08T15:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/ipv6-security-myth-8-it-supports-ipv6/</loc>
		<lastmod>2017-09-08T15:40:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ipv6-security-myth-7-96-more-bits-no-magic/</loc>
		<lastmod>2017-09-08T15:40:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ipv6-security-myth-6-ipv6-is-too-new-to-be-attacked/</loc>
		<lastmod>2017-09-08T15:40:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ipv6-security-myth-5-privacy-addresses-fix-everything/</loc>
		<lastmod>2017-09-08T15:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ipv6-security-myth-4-ipv6-networks-are-too-big-to-scan/</loc>
		<lastmod>2017-09-08T15:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/ipv6-security-myth-3-no-ipv6-nat-means-less-security/</loc>
		<lastmod>2017-09-08T15:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/ipv6-security-myth-2-ipv6-has-security-designed-in/</loc>
		<lastmod>2017-09-08T15:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/ipv6-security-myth-1-im-not-running-ipv6-so-i-dont-have-to-worry/</loc>
		<lastmod>2017-09-08T15:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/IPv6SecurityMyths-300x117.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/ernw-compares-penetration-testing-tools-ipv6-support/</loc>
		<lastmod>2017-09-08T15:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/ernw-ipv6-pen-testing-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/ipv6hackers-group-to-meet-in-berlin-on-july-28-2013/</loc>
		<lastmod>2017-09-08T15:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/ipv6hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/case-study-printing-and-scanning-over-ipv6-only/</loc>
		<lastmod>2017-09-08T15:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/brother-ipv6-settings-292x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/brother-mac-setup-300x287.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/brother-wireshark-300x153.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/screen-capture-232-300x136.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/facebook-launches-ipv6-only-data-cluster/</loc>
		<lastmod>2017-09-08T15:52:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/fb-internal-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/facebooks-extremely-impressive-internal-use-of-ipv6/</loc>
		<lastmod>2017-09-08T15:52:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/fb-internal-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/facebook-moving-to-an-ipv6-only-internal-network/</loc>
		<lastmod>2017-09-08T15:52:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/fb-internal-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/dnssec-and-dns-security-talks-at-dns-oarc-spring-forum-streaming-live-out-of-dublin-today-and-tomorrow/</loc>
		<lastmod>2017-09-08T15:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/dns-oarc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/dns-oarc-24-streaming-live-march-31-april-1-from-buenos-aires/</loc>
		<lastmod>2017-09-08T15:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/Oarc24.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/watch-dns-oarc-live-this-weekend-for-dnssec-dane-dns-privacy-and-more/</loc>
		<lastmod>2017-09-08T15:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/dns-oarc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/google-stats-now-showing-over-8-ipv6/</loc>
		<lastmod>2017-09-08T16:07:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/ipv6-google-sept5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/google-ipv6-stats-pass-4-globally-20-in-belgium-8-in-usa-11-in-switzerland/</loc>
		<lastmod>2017-09-08T16:07:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/google-4percent.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ipv6-google-global-4percent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/googles-ipv6-traffic-hits-5-globally-28-in-belgium-12-in-usa-and-germany/</loc>
		<lastmod>2017-09-08T16:07:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/google-ipv6-5percent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/awesome-news-about-https-as-a-ranking-signal-google-now-can-we-please-get-ipv6-and-dnssec-too/</loc>
		<lastmod>2017-09-08T16:07:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/google-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/google-is-now-always-using-tlsssl-for-gmail-connections/</loc>
		<lastmod>2017-09-08T16:07:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/gmail.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/googles-ipv6-stats-pass-3-less-than-5-months-after-passing-2/</loc>
		<lastmod>2017-09-08T16:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/google-ipv6-3percent-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/google-now-seeing-2-ipv6-traffic-the-internet-is-changing/</loc>
		<lastmod>2017-09-08T16:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/google-ipv6-2percent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/huge-news-for-internet-security-google-public-dns-is-now-performing-dnssec-validation/</loc>
		<lastmod>2017-09-08T16:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/google-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/google-confirms-having-ipv6-and-ipv4-will-not-cause-duplicate-content-issues-for-search-ranking-2/</loc>
		<lastmod>2017-09-08T16:08:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/playing-googles-interactive-rubiks-cube-over-ipv6/</loc>
		<lastmod>2017-09-08T16:10:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Google-rubikscube.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Google-rubikscube-details.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/friday-humor-hipku-encodes-an-ipv6-address-as-haiku/</loc>
		<lastmod>2017-09-08T16:10:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/hipku.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/humor-ipv6-exhaustion-counter/</loc>
		<lastmod>2017-09-08T16:10:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/IPv6_Exhaustion_Counter-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/friday-humor-keep-calm-and-enable-dnssec-and-ipv6-too/</loc>
		<lastmod>2017-09-08T16:10:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/08/keepcalmandenablednssec-255x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/friday-fun-an-ipv6-pumpkin-at-tomorrows-keene-nh-pumpkin-festival/</loc>
		<lastmod>2017-09-08T16:10:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/ipv6-pumpkin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/chris-grundemann-speaking-at-the-2014-government-ipv6-conference/</loc>
		<lastmod>2017-09-08T16:19:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/dgi_logo_bak.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/09/impact-ipv6-aims-to-expand-ipv6-usage-throughout-cameroon-2/</loc>
		<lastmod>2017-09-08T16:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/cameroon-ipv6-300x199.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/iab-warns-that-all-networking-standards-need-to-fully-support-ipv6-2/</loc>
		<lastmod>2017-09-08T16:35:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/IPv6-image-300x175.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/dnssec-deployment-workshop-on-wednesday-at-icann-48-live-stream-available/</loc>
		<lastmod>2017-09-08T16:39:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/08/icann48.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/call-for-speakers-for-dnssec-workshop-at-icann-48-in-buenos-aires/</loc>
		<lastmod>2017-09-08T16:39:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/08/icann48.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/chris-grundemann-speaking-on-ipv6-and-talking-bcop-at-hknog-1-0/</loc>
		<lastmod>2017-09-08T16:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/HKNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/report-on-icann50-dnssec-workshop-cloudflare-hsms-otr-demos-and-more/</loc>
		<lastmod>2017-09-08T16:45:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/DNSSEC_Workshop___ICANN50___London.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/icann50-dnssec-workshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/reminder-dnssec-for-everybody-streamed-live-from-icann-50-today/</loc>
		<lastmod>2017-09-08T16:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/DNSSEC_Workshop___ICANN50___London.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/call-for-participation-icann-50-dnssec-workshop-on-25-june-in-london/</loc>
		<lastmod>2017-09-08T16:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/icann-50-london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/background-information-for-the-dnssec-root-ksk-rollover-workshop-at-icann51/</loc>
		<lastmod>2017-09-08T16:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/10/icann51-la.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/a-great-amount-of-dnssecdane-activity-at-icann-51-in-l-a-next-week/</loc>
		<lastmod>2017-09-08T16:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/10/icann51-la.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/want-to-speak-about-your-dnssec-or-dane-work-tool-or-service-icann52-cfp/</loc>
		<lastmod>2017-09-08T16:47:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/icann52-singapore.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/over-50-of-cz-domains-now-signed-with-dnssec/</loc>
		<lastmod>2017-09-08T17:23:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/cz-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/dell-how-i-learned-to-stop-worrying-and-love-ipv6-2/</loc>
		<lastmod>2017-09-08T17:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/dell-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/watch-live-today-dnssec-root-ksk-ceremony-25-1300-edt-1700-utc/</loc>
		<lastmod>2017-09-08T17:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/email-hijacking-new-research-shows-why-we-need-dnssec-now/</loc>
		<lastmod>2017-09-08T17:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/mx-cache-poisoning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/how-did-estonia-grow-from-near-0-ipv6-to-8-in-7-months/</loc>
		<lastmod>2017-09-08T17:58:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/estonia-ipv6-akamai-soti.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/ipv6-estonia-apnic-labs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/arabic-translations-of-ipv6-and-dnssec-fact-sheets-now-available-for-download/</loc>
		<lastmod>2017-09-08T17:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/arabic-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/simple-dnssec-fact-sheet-now-available-in-english-french-and-spanish/</loc>
		<lastmod>2017-09-08T17:59:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/10/dnssec-fact-sheet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/fedora-21-to-have-dnssec-validation-enabled-by-default/</loc>
		<lastmod>2017-09-08T18:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/fedora-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/finland-planning-national-ipv6-launch-day-on-9-june-2015-2/</loc>
		<lastmod>2017-09-08T18:01:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/finland-national-ipv6-launch-day.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/IPv6_%E2%80%93_Google.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/recovering-from-the-wonderful-insanity-of-ietf-90/</loc>
		<lastmod>2017-09-08T18:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-plenary-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-wes-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-micline-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-microphone-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-jan-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-ornate-fairmont-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-dnsop-packed-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-terminal-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-simple-example-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-long-beards-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/ietf90-run-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/operators-and-the-ietf-update-from-ietf-92/</loc>
		<lastmod>2017-09-08T18:28:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/2015-03-24-19.19.38-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/20150325_133459_1-197x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/video-what-are-negative-trust-anchors-for-dnssec/</loc>
		<lastmod>2017-09-08T18:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/video-of-apple-wwdc-session-about-ipv6-and-ios-9-now-available-and-some-screenshots/</loc>
		<lastmod>2017-09-08T18:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/WWDC_2015_-_Videos_-_Apple_Developer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-dns64-nat64.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-nat64-network-sharing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-testing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-what-breaks-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-whatworks-1-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-whatworks-2-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/today-interop-radio-the-real-scoop-on-ipv6-2/</loc>
		<lastmod>2017-09-08T18:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/interop-radio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/05/new-infographic-on-ipv6-enabled-sites-in-top-1-million-alexa-sites/</loc>
		<lastmod>2017-09-08T18:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/the-next-steps-toward-increasing-the-security-of-dnssec-with-elliptic-curve-cryptography/</loc>
		<lastmod>2017-09-08T18:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/do-you-have-an-idea-call-for-participation-dnssec-workshop-at-icann57-in-hyderabad-india/</loc>
		<lastmod>2017-09-08T18:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/icann57-hyderabad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/watch-live-icann-59-dnssec-workshop-june-26-at-700am-utc/</loc>
		<lastmod>2017-09-08T18:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/ICANN59-color.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/call-for-participation-dnssec-workshop-at-icann-59-in-johannesburg-south-africa/</loc>
		<lastmod>2017-09-08T18:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/icann59-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/congrats-to-irelands-iedr-for-signing-ie-with-dnssec/</loc>
		<lastmod>2017-09-08T18:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/11/ie-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/facebooks-ios-apps-now-work-on-ipv6-only-networks-2/</loc>
		<lastmod>2017-09-08T19:06:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/facebook-messenger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/jan-zorz-and-chris-grundemann-at-janog33/</loc>
		<lastmod>2017-09-08T19:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/deploy360-is-hiring/</loc>
		<lastmod>2017-09-08T19:09:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/interesting-ipv6-address-planning-discussion-on-nanog-mailing-list-2/</loc>
		<lastmod>2017-09-08T19:11:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/madagascar-signs-mg-with-dnssec-as-part-of-internet-day/</loc>
		<lastmod>2017-09-08T19:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/madagascar-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/azerbaijan-az-becomes-latest-cctld-to-sign-with-dnssec/</loc>
		<lastmod>2017-09-08T19:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/azerbaijan-dnssec-cctld-450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/indonesia-and-vanuatu-sign-id-and-vu-with-dnssec/</loc>
		<lastmod>2017-09-08T19:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/2014-12-15-2014-12-15AP-300x170.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/over-600-top-level-domains-now-signed-with-dnssec/</loc>
		<lastmod>2017-09-08T19:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/rick-lamb-dnssec-tld-stats-2014-01-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/cctld-dnssec-status-2015-01-12.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/congrats-to-spain-es-and-croatia-hr-on-on-their-dnssec-signed-tlds-in-the-dns-root/</loc>
		<lastmod>2017-09-08T19:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/croatia-spain-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/watch-live-today-dnssec-root-ksk-ceremony-at-1700-utc/</loc>
		<lastmod>2017-09-08T19:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/dnssec-key-ceremony-25.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/video-interview-why-use-knot-dns-for-dns-and-dnssec/</loc>
		<lastmod>2017-09-08T19:32:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/knot-dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/new-kamailio-dnssec-module-enables-higher-security-for-sip-voip/</loc>
		<lastmod>2017-09-08T19:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/kamailio-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/linkedin-passes-another-ipv6-milestone/</loc>
		<lastmod>2017-09-08T19:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/LinkedIn-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/deutsche-telekom-ipv6-traffic-passes-15-verizon-wireless-ipv6-traffic-passes-40/</loc>
		<lastmod>2017-09-08T19:43:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/DT_IPv6_deployment-300x180.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/middle-east-dns-forum-covers-dnssec-lets-fill-in-the-map/</loc>
		<lastmod>2017-09-08T19:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/me-dns-forum.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/dnssec-middle-east-march2015-1024x797.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/mexicos-axtel-provides-excellent-ipv6-lessons-learned-and-recommendations/</loc>
		<lastmod>2017-09-08T19:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/axtel-ipv6-case-study-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/facebook-akamai-pass-major-milestone-over-50-ipv6-from-us-mobile-networks-2/</loc>
		<lastmod>2017-09-08T19:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/facebook-ipv6-50percent-mobilenetworks-300x67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/wipv6l-55percent-mobile.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/watch-live-today-nanog-sessions-on-ipv6-performance-addressing-2/</loc>
		<lastmod>2017-09-08T19:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/NANOG-60.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/nlnet-labs-releases-helpful-dnssec-infrastructure-audit-framework/</loc>
		<lastmod>2017-09-08T20:02:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/nlnetlabs-dnssec-audit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/fun-intro-to-dnssec-video-from-the-norid-team/</loc>
		<lastmod>2017-09-08T20:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/congrats-to-norways-no-on-over-5000-dnssec-signed-domains/</loc>
		<lastmod>2017-09-08T20:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/norid-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/norways-no-cctld-now-signed-with-dnssec/</loc>
		<lastmod>2017-09-08T20:07:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/norways-no-passes-22000-dnssec-signed-domains/</loc>
		<lastmod>2017-09-08T20:08:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/deploy360-pacnog-19/</loc>
		<lastmod>2017-09-08T20:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/IMG_0007-e1480915200966-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/IMG_0015-e1480915327667-225x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/openwrt-and-open-wireless-bringing-ipv6-and-dnssec-to-end-users/</loc>
		<lastmod>2017-09-08T20:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/openWRT_logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/EFF_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/ietf-90-operators-and-ietf-initial-survey-results-discussion/</loc>
		<lastmod>2017-09-08T20:23:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/10487564_10152175213606135_7193651054069304527_n-300x168.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/congratulations-to-portugals-pt-on-their-dnssec-growth/</loc>
		<lastmod>2017-09-08T20:28:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/dnssec-pt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/php-domain-parser-adds-support-for-ipv6/</loc>
		<lastmod>2017-09-08T20:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/php_logo_200_100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/a-very-useful-new-rfc-7059-a-comparison-of-ipv6-over-ipv4-tunnel-mechanisms/</loc>
		<lastmod>2017-09-08T20:37:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/11/rfc7059-250.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/video-danes-dont-lie-danesmtp-ripe-68/</loc>
		<lastmod>2017-09-08T20:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/CarstenStrotmannDANEsDontLie-300x224.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/new-rfc-7958-dnssec-trust-anchor-publication-for-the-root-zone/</loc>
		<lastmod>2017-09-08T20:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/rfc7958.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/04/dnssexy-net-news-from-the-dns-blogosphere/</loc>
		<lastmod>2017-09-08T20:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/04/DNSsexy-net.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/rpki-how-i-signed-go6lab-ip-resources-and-survived/</loc>
		<lastmod>2017-09-08T20:53:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/screen-capture-259-300x99.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/screen-capture-260-300x54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/go6-v4-300x119.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/go6-v6-300x118.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/safnog2-meeting-in-mbabane-swaziland-speaking-about-ipv6-and-bcop/</loc>
		<lastmod>2017-09-08T20:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/screen-capture-313.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/17064034015_d8cb588677_z-300x233.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/16876582790_92b72170d8_z-300x126.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/slides-security-in-an-ipv6-world-myth-reality-2/</loc>
		<lastmod>2017-09-08T20:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/slides-sip-and-ipv6-can-they-get-along-2/</loc>
		<lastmod>2017-09-08T21:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/slides-ipv6-and-telecom-ipv4-is-finally-running-out-now-what-2/</loc>
		<lastmod>2017-09-08T21:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/congratulations-to-nl-for-passing-2-million-dnssec-signed-domains/</loc>
		<lastmod>2017-09-08T21:06:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/nl-2-million.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/nl-approaching-2-million.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/speaking-at-sipnoc-next-week-about-ipv6-and-dnssec-with-voip/</loc>
		<lastmod>2017-09-08T21:07:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/sipnoc2013.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/ssac-issues-new-report-on-ddos-attacks-against-dns/</loc>
		<lastmod>2017-09-08T21:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/ssac-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/ipv6-privacy-addresses-provide-protection-against-surveillance-and-tracking-2/</loc>
		<lastmod>2017-09-08T21:10:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/netnod-autumn-2014-meeting-in-stockholm-ipv6-presentations/</loc>
		<lastmod>2017-09-08T21:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/10/10272753_518369331627343_1207570513101728378_o-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/on-broccoli-technologies-and-ipv6-in-the-new-ip-blog/</loc>
		<lastmod>2017-09-09T01:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/thenewip-300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/tunisia-signs-tn-and-arabic-idn-tld-with-dnssec/</loc>
		<lastmod>2017-09-09T01:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/tunisia-flag.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/tunisia-dnssec-ds.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/congratulations-to-uruguay-on-signing-uy-with-dnssec/</loc>
		<lastmod>2017-09-09T01:11:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/08/uruguay-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/webinar-on-may-22-ipv6-and-telecom-whats-next-2/</loc>
		<lastmod>2017-09-09T01:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/us-telecom-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/free-light-reading-webinar-feb-8th-making-the-ipv6-transition-for-cable/</loc>
		<lastmod>2017-09-09T01:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/learn-ipv6-basics-in-vmware-vbrownbag-webinar-on-sept-3-2/</loc>
		<lastmod>2017-09-09T01:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/vBrownBag-300x84.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/are-you-protected-by-dnssec-a-quick-way-to-check/</loc>
		<lastmod>2017-09-09T01:21:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/dnssec-tools-test-thumbs-up.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/dnssec-tools-test-thumbs-down.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/google-clarifies-dnssec-support-opt-in-now-full-validation-coming-soon/</loc>
		<lastmod>2017-09-09T01:21:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/google-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/reminder-live-call-in-two-hours-about-tls-ssl-and-the-need-for-more-crypto-everywhere/</loc>
		<lastmod>2017-09-09T01:23:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/05/vuc-gplus-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/year-end-thoughts/</loc>
		<lastmod>2017-09-11T14:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/yearend.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/stand-for-leadership-the-choice-is-yours/</loc>
		<lastmod>2017-09-11T14:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/17740291349_9c1650b5b4_k-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/you-dont-change-the-world-by-thinking-like-everyone-else/</loc>
		<lastmod>2017-09-11T14:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_DLR0KPL3PQ-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/the-digital-divide-is-not-binary-2/</loc>
		<lastmod>2017-09-11T14:21:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/bookcomputer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/iana-keeping-the-ultimate-objective-in-mind/</loc>
		<lastmod>2017-09-11T14:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/12road_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/wsis10-building-a-shared-vision-for-the-next-decade/</loc>
		<lastmod>2017-09-11T14:26:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/en_Connecting-dots_Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/connecting-the-dots-options-for-future-action/</loc>
		<lastmod>2017-09-11T14:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/connectthedots.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/internet-society-webinar-on-the-iana-stewardship-transition-tomorrow/</loc>
		<lastmod>2017-09-11T14:26:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/return-to-singapore-from-chili-crabs-to-names-numbers-and-protocol-parameters/</loc>
		<lastmod>2017-09-11T14:26:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/singapore_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/the-role-of-internet-intermediaries-in-fostering-online-freedoms/</loc>
		<lastmod>2017-09-11T14:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/update-on-the-netmundial-initiative/</loc>
		<lastmod>2017-09-11T14:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/igf-2014-takes-action/</loc>
		<lastmod>2017-09-11T14:26:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/igf8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/understanding-the-iana-functions/</loc>
		<lastmod>2017-09-11T14:26:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana1-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/reflections-from-the-world-of-internet-governance-part-2/</loc>
		<lastmod>2017-09-11T14:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/the-igf-in-istanbul-internet-governance-in-the-hands-of-many/</loc>
		<lastmod>2017-09-11T14:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iStock_000025331653Small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/reflections-from-the-world-of-internet-governance/</loc>
		<lastmod>2017-09-11T14:26:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/markus-kummer-named-to-new-isoc-position-to-strengthen-the-igf/</loc>
		<lastmod>2017-09-11T14:26:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/markus_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/partnerships-for-smart-internet-development-and-for-progressing-wsis10-objectives/</loc>
		<lastmod>2017-09-11T14:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Screen-Shot-2014-06-09-at-2.07.52-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/netmundial-variations-on-a-theme-multistakeholder-consensus-building-in-action/</loc>
		<lastmod>2017-09-11T14:26:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/hands-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/internet-society-observations-on-the-upcoming-netmundial-meeting/</loc>
		<lastmod>2017-09-11T14:26:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/openroad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/the-trans-pacific-partnership-agreement-tpp-and-the-ipr-internet-related-provisions/</loc>
		<lastmod>2017-09-11T14:26:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/no-small-island-developing-state-is-an-island/</loc>
		<lastmod>2017-09-11T14:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/power-of-internet-for-disaster-and-environmental-control/</loc>
		<lastmod>2017-09-11T14:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/wtpf-day-three-summary/</loc>
		<lastmod>2017-09-11T14:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/many-voices-makes-strong-policy/</loc>
		<lastmod>2017-09-11T14:26:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/multistakeholder-cooperation-reflections-on-the-emergence-of-a-new-phraseology-in-international-cooperation/</loc>
		<lastmod>2017-09-11T14:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/12/wcit-monday-december-3rd/</loc>
		<lastmod>2017-09-11T14:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/12/wcit-wednesday-december-5th/</loc>
		<lastmod>2017-09-11T14:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/towards-a-multilingual-internet/</loc>
		<lastmod>2017-09-11T14:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/are-isps-the-new-digital-content-police/</loc>
		<lastmod>2017-09-11T14:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/09/libraries-and-public-access/</loc>
		<lastmod>2017-09-11T14:27:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/national-contributions-to-wcit-what-is-your-government-going-to-say/</loc>
		<lastmod>2017-09-11T14:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2010/09/some-thoughts-on-cybercrime-within-the-igf-in-vilnius/</loc>
		<lastmod>2017-09-11T14:27:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/iab-warns-that-all-networking-standards-need-to-fully-support-ipv6/</loc>
		<lastmod>2017-09-11T14:30:33+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2016/02/IPv6-image-300x175.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/facebook-akamai-pass-major-milestone-over-50-ipv6-from-us-mobile-networks/</loc>
		<lastmod>2017-09-11T14:30:33+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2016/08/facebook-ipv6-50percent-mobilenetworks-300x67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2016/08/wipv6l-55percent-mobile.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/celebrating-the-3rd-launchiversary-of-world-ipv6-launch/</loc>
		<lastmod>2017-09-11T14:30:34+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/06/wipv6l-velvet-250.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/05/wipv6l-vzwireless-20150513.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/06/google-ipv6-june2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/t-mobile-usa-crosses-50-ipv6-deployment-verizon-wireless-65-att-38/</loc>
		<lastmod>2017-09-11T14:30:35+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/02/tmobile-ipv6-feb2015.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/02/vzwireless-feb2015.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2015/02/wipv6l-measurements-feb2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/finland-planning-national-ipv6-launch-day-on-9-june-2015/</loc>
		<lastmod>2017-09-11T14:30:36+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/12/finland-national-ipv6-launch-day.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/12/IPv6_%E2%80%93_Google.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/emily-taylors-must-read-post-ofcom-in-denial-over-uk-ipv6-failure/</loc>
		<lastmod>2017-09-11T14:30:36+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/12/emily-taylor-ofcom.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/facebooks-ios-apps-now-work-on-ipv6-only-networks/</loc>
		<lastmod>2017-09-11T14:30:36+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/12/facebook-messenger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/are-you-buying-home-electronics-ready-for-ipv6/</loc>
		<lastmod>2017-09-11T14:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/interesting-ipv6-address-planning-discussion-on-nanog-mailing-list/</loc>
		<lastmod>2017-09-11T14:30:39+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/blackberrys-new-blend-application-requires-ipv6-networking/</loc>
		<lastmod>2017-09-11T14:30:40+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/09/blackberry-blend.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/learn-ipv6-basics-in-vmware-vbrownbag-webinar-on-sept-3/</loc>
		<lastmod>2017-09-11T14:30:41+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/09/vBrownBag-300x84.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/vint-cerf-pitches-ipv6-on-the-colbert-report/</loc>
		<lastmod>2017-09-11T14:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/vint-cerf-we-need-to-move-to-the-production-version-of-the-internet-ipv6/</loc>
		<lastmod>2017-09-11T14:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/slides-ipv6-and-telecom-ipv4-is-finally-running-out-now-what/</loc>
		<lastmod>2017-09-11T14:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/goodbye-ipv4-iana-starts-allocating-final-address-blocks/</loc>
		<lastmod>2017-09-11T14:30:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/report.1st.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/02/ICANN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/nbcuniversal-and-comcast-sign-strategic-sponsorship-agreement-for-internet-society-and-internet-engineering-task-force/</loc>
		<lastmod>2017-09-11T14:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/call-for-ipv6-case-studies-for-world-ipv6-launchiversary/</loc>
		<lastmod>2017-09-11T14:30:49+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/vint-cerf-i-want-all-of-you-to-ask-your-isps-what-their-plan-is-for-ipv6/</loc>
		<lastmod>2017-09-11T14:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/time-to-get-ipv6-arin-starts-allocation-from-its-last-block-of-ipv4-addresses/</loc>
		<lastmod>2017-09-11T14:30:50+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/01/arin-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/circleid-thinking-strategically-about-the-benefits-of-ipv6/</loc>
		<lastmod>2017-09-11T14:30:50+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/02/cid-mukom-tamon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/ces-2014-cea-announces-ipv6-specification-for-consumer-electronics/</loc>
		<lastmod>2017-09-11T14:30:51+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/01/cea-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/going-native-ipv6-in-my-home-office/</loc>
		<lastmod>2017-09-11T14:30:53+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2013/12/twc-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/montevideo-future-internet-cooperation-and-the-universal-deployment-of-ipv6/</loc>
		<lastmod>2017-09-11T14:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/slides-sip-and-ipv6-can-they-get-along/</loc>
		<lastmod>2017-09-11T14:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/06/got-ipv6-can-you-please-help-with-this-ipv6-deployment-survey/</loc>
		<lastmod>2017-09-11T14:31:02+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/06/nro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/06/to-build-the-interplanetary-internet-we-need-ipv6/</loc>
		<lastmod>2017-09-11T14:31:03+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/06/interplanetaryinternet-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/06/ipv6-is-no-longer-optional-in-all-ietf-standards-rfc-6540/</loc>
		<lastmod>2017-09-11T14:31:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/bp-OECD2016-20160607-en.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/03/ietf-logo-200x115.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/googles-public-dns-works-with-ipv6-can-help-in-your-migration/</loc>
		<lastmod>2017-09-11T14:31:05+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/02/GooglePublicDNS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/slides-the-case-for-ipv6-only-data-centers/</loc>
		<lastmod>2017-09-11T14:31:05+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/02/ipv6-only-data-centers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/4-ietf-mailing-lists-to-follow-for-monitoring-ipv6/</loc>
		<lastmod>2017-09-11T14:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/01/its-friday-why-not-make-it-ipv6-friday/</loc>
		<lastmod>2017-09-11T14:31:07+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2012/01/IPv6Friday.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/internet-society-ceo-speech-at-the-un-general-assembly-wsis10-review/</loc>
		<lastmod>2017-09-11T14:37:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Wsis10-kathy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/comments-for-the-wsis10-second-interactive-consultation-with-stakeholders/</loc>
		<lastmod>2017-09-11T14:37:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wsis2015-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/internet-society-statement-at-un-wsis10-consultation-on-19-october-2015/</loc>
		<lastmod>2017-09-11T14:37:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/constance-wsis-forum-2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/ict-as-an-enabling-platform-for-innovation-and-the-creation-of-value/</loc>
		<lastmod>2017-09-11T14:37:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/osvaldo-larancuent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/announcing-the-2015-internet-society-wsis-fellows/</loc>
		<lastmod>2017-09-11T14:37:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wsis-plus-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/kicking-off-the-2015-internet-governance-marathon-with-the-cstd/</loc>
		<lastmod>2017-09-11T14:37:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cstd18-unctad-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/shared-with-the-un-cstd-today-a-perspective-on-wsis10-and-the-opportunities-and-challenges-for-the-information-society/</loc>
		<lastmod>2017-09-11T14:37:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cstd-usmissiongeneva.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/human-rights-and-trust-two-foundations-of-a-people-centered-information-society/</loc>
		<lastmod>2017-09-11T14:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/raul-wsis20-oct2015.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/isoc-speaking-on-2-july-at-wsis10-informal-interactive-stakeholder-consultation/</loc>
		<lastmod>2017-09-11T14:45:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wsis-plus-10-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/encryption-is-critical-for-business-communication/</loc>
		<lastmod>2017-09-11T14:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/business.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/yahoo-spying-responsibilities-and-possibilities/</loc>
		<lastmod>2017-09-11T14:53:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/postcard2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/when-your-internet-history-is-no-longer-history-the-danger-of-the-uks-new-investigatory-powers-act/</loc>
		<lastmod>2017-09-11T14:53:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/surveillancecams-robin-wilton-cc-by-nc-nd.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/enough-about-apple-and-encryption-lets-talk-system-security/</loc>
		<lastmod>2017-09-11T14:53:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr_risager_23025811830_976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/internet-society-signs-secure-the-internet-online-petition/</loc>
		<lastmod>2017-09-11T14:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/no-keys-under-the-doormat-please/</loc>
		<lastmod>2017-09-11T14:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/unnamed-file.key.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/internet-society-supports-the-lets-encrypt-initiative-to-increase-end-to-end-encryption/</loc>
		<lastmod>2017-09-11T14:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/letsencrypt-logo-horizontal-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/strong-support-from-the-un-special-rapporteur-david-kaye-for-anonymity-and-encryption/</loc>
		<lastmod>2017-09-11T14:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/systemlock-YuriSamoilov-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/05/freedom-of-speech-rethinking-the-role-of-encryption/</loc>
		<lastmod>2017-09-11T14:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/encryption-backdoors-decrease-trust-in-the-internet/</loc>
		<lastmod>2017-09-11T14:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/obama-encryption-letter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/slides-security-in-an-ipv6-world-myth-reality/</loc>
		<lastmod>2017-09-11T14:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/quis-custodiet-custodiam-whos-protecting-data-protection/</loc>
		<lastmod>2017-09-11T14:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/lets-think-differently-to-shape-%e2%80%aatomorrow/</loc>
		<lastmod>2017-09-11T14:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/WirelessforCommunities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/several-voices-and-one-goal-how-to-foster-internet-development-in-latin-america-and-caribbean/</loc>
		<lastmod>2017-09-11T15:07:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/lacridd1_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/ridd1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/the-integral-link-between-internet-governance-and-development/</loc>
		<lastmod>2017-09-11T15:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/happy_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/from-inspiration-to-innovation-on-the-open-internet/</loc>
		<lastmod>2017-09-11T15:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/kenyacity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/happy-30th-birthday-dns/</loc>
		<lastmod>2017-09-11T15:18:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/the-intersection-of-human-rights-and-ietf-protocols/</loc>
		<lastmod>2017-09-11T15:38:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Dallas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/07/building-bridges-between-the-internet-and-the-rights-communities/</loc>
		<lastmod>2017-09-11T15:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/HR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/when-law-isnt-enough/</loc>
		<lastmod>2017-09-11T15:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/a-perspective-on-principles-for-internet-surveillance/</loc>
		<lastmod>2017-09-11T15:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/first-anrp-award-of-2015-goes-to-aaron-gember-jacobson-for-innovative-network-function-control-plane/</loc>
		<lastmod>2017-09-11T15:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/irtf-logo-1600.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/there-is-no-perimeter-in-iot-security/</loc>
		<lastmod>2017-09-11T15:51:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/walled-castle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/ipv6-deployments-need-to-be-planned-but-it-just-works-lessons-from-broadband-world-forum/</loc>
		<lastmod>2017-09-11T15:51:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Growth_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/manrs-turns-1-and-first-japanese-operator-iij-joins/</loc>
		<lastmod>2017-09-11T17:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Celebrate.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/root-server-ddos-attack-how-manrs-can-help/</loc>
		<lastmod>2017-09-11T17:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/paving-the-way-forward-for-manrs/</loc>
		<lastmod>2017-09-11T17:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/manrs-976x385-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/why-routing-security-matters-and-ixps-play-a-role/</loc>
		<lastmod>2017-09-11T17:14:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/machine-to-machine-976-510-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/are-network-security-issues-stifling-innovation-well-discuss-at-bte-2015-next-week/</loc>
		<lastmod>2017-09-11T17:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/BTE-2015-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/why-network-operators-need-to-be-concerned-and-how-manrs-can-help/</loc>
		<lastmod>2017-09-11T17:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/open-internet-standards-collaboration/</loc>
		<lastmod>2017-09-11T17:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/can-a-machine-care-about-privacy/</loc>
		<lastmod>2017-09-11T17:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/machine-to-machine-976-510-14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/the-fundamental-tension-between-safety-and-privacy-and-the-uks-proposed-encryption-ban/</loc>
		<lastmod>2017-09-11T17:21:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/scales-security-privacy-977-411.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/surveillance-is-this-the-beginning-of-the-end-of-data-trawlers/</loc>
		<lastmod>2017-09-11T17:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/freedom-of-expression-online-finding-the-appropriate-balance/</loc>
		<lastmod>2017-09-11T17:21:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/mobilephone1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/four-basic-steps-to-protecting-your-digital-privacy-in-2015/</loc>
		<lastmod>2017-09-11T17:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/12425120753_c06eaa425d_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/bgpmon-using-bgp-data-to-fight-spam/</loc>
		<lastmod>2017-09-11T17:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/bgpmon-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/the-mobile-divide/</loc>
		<lastmod>2017-09-11T17:30:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/mobile2_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/read-the-internet-societys-trust-framework-and-share-your-views/</loc>
		<lastmod>2017-09-11T19:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/trust-policy-framework-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/09/cyber-espace-de-b%e2%80%8boulkassoumbougou-end-of-training-of-trainers-workshop/</loc>
		<lastmod>2017-09-12T12:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/time-synchronization-security-trust/</loc>
		<lastmod>2017-09-12T19:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/time-laptop-keyboard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/what-will-the-internet-look-like-in-the-next-5-7-years/</loc>
		<lastmod>2017-09-12T20:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cystalball1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/africa-dns-forum-taking-stock-and-planning-ahead/</loc>
		<lastmod>2017-09-12T20:58:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfricaDNSForum.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/collaborative-security-is-how-we-build-that-trust-in-the-internets-infrastructure-remarks-at-the-africa-dns-forum-2016/</loc>
		<lastmod>2017-09-12T20:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Adf-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/humans-of-intercommunity/</loc>
		<lastmod>2017-09-13T01:23:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Manuela-from-the-DR.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Manuela-from-the-DR.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Julius-from-Ghana.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Victor-from-Venezuela.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Mason-from-Canada.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Mel-from-the-Philippines.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Olusoji-from-Lagos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/27th-dns-root-key-ceremony/</loc>
		<lastmod>2017-09-13T13:05:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Key-Signing-Key.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/Key-Signing-Key.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/Key-Signing-Aina.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/conectando-lo-desconectando-la-historia-de-la-visita-a-una-escuela-agua-azul-mexico/</loc>
		<lastmod>2017-09-13T13:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/agua-azul-title.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-02-road.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-03-school.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-04-pedro.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-05-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-06-rachel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-07-camilo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-08-girl.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-09-classroom.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-10-tower.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/happy-launchiversary-ipv6-celebrating-4-years-since-world-ipv6-launch/</loc>
		<lastmod>2017-09-13T13:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Homepage_IPv6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/v6-since-2012.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/unhrc-creates-new-un-special-rapporteur-on-the-right-to-privacy-in-the-digital-age/</loc>
		<lastmod>2017-09-13T14:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/UNHCR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/internet-society-to-partner-with-economic-community-of-west-african-states-to-promote-an-open-trusted-internet/</loc>
		<lastmod>2017-09-13T14:30:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Dawit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/celebrating-the-power-of-our-global-community/</loc>
		<lastmod>2017-09-13T14:40:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/volunteers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/apple-will-require-ipv6-support-for-all-ios-9-apps/</loc>
		<lastmod>2017-09-13T15:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/wwdc2015-ipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/ipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/ipv6-3-steps.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/apple-ipv6-only-lan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/02/factors-forcing-down-ethiopias-rankings-in-the-digital-economy-and-policy-implications-reach-final-milestone/</loc>
		<lastmod>2017-09-13T15:25:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/history-of-the-internet-holds-the-keys-to-its-future/</loc>
		<lastmod>2017-09-13T15:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/founderstofuture-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/why-an-open-internet-matters/</loc>
		<lastmod>2017-09-13T15:33:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/watching.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/04/use-reddit-and-interested-in-dnssec-subscribe-to-the-dnssecurity-subreddit/</loc>
		<lastmod>2017-09-13T15:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/reddit-dnssecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/talking-nat64check-at-dknog-in-copenhagen/</loc>
		<lastmod>2017-09-13T15:48:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/dknog-logo-300x76-e1489565652395.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/watch-live-today-2nd-annual-interplanetary-networking-conference/</loc>
		<lastmod>2017-09-13T15:50:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ipnsig-conference.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/missed-the-vuc-hangout-about-dnssec-and-voip-watch-the-recording/</loc>
		<lastmod>2017-09-13T16:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/norwegian-network-operators-group-nonog-is-born/</loc>
		<lastmod>2017-09-13T16:24:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/nix_logo-web.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/nix-300x121.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/we-need-your-vote/</loc>
		<lastmod>2017-09-13T16:44:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/3002018955_d9ab2c0a4a_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/new-nat64dns64-implementations-available-for-public-testing-in-go6lab/</loc>
		<lastmod>2017-09-13T16:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/go6lab-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/happy-birthday-backbone/</loc>
		<lastmod>2017-09-13T16:50:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/happybirthday.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/unsolicited-advice-how-to-be-a-fearless-girl-in-ict/</loc>
		<lastmod>2017-09-13T16:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/girlsinict_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/nominate-a-woman-or-girl-for-an-equalsintech-award/</loc>
		<lastmod>2017-09-13T16:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/womanintech1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/on-earth-day-we-need-an-open-internet-to-find-solutions/</loc>
		<lastmod>2017-09-13T17:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/gsfc-16611703184.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/internet-is-all-about-collaboration/</loc>
		<lastmod>2017-09-13T17:11:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/collaboration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/verisign-joins-manrs-to-further-security-stability-and-resiliency-of-the-internet-routing-system/</loc>
		<lastmod>2017-09-13T17:47:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/manrs-logoRGB200x200_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/e-entrepreneurship-on-the-open-internet/</loc>
		<lastmod>2017-09-13T17:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/homeoffice.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/lacnic-ipv6-troubleshooting-for-helpdesks-webinar-today/</loc>
		<lastmod>2017-09-13T17:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/lacnic-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/jan-sander.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/watch-live-25-25-award-ceremony-monday-18-september-900am-pdt/</loc>
		<lastmod>2017-09-18T12:06:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25-under-25-grid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/take-brief-survey-support-community-networks/</loc>
		<lastmod>2017-09-22T15:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/NetCommonsSurvey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/recognizing-internet-visionaries-innovators-leaders-around-world/</loc>
		<lastmod>2017-09-25T19:16:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IHOF-2017-inductees-1280x852.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/25-25-using-internet-make-difference-communities/</loc>
		<lastmod>2017-09-25T19:50:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25u25Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/new-blueborne-vulnerability-bluetooth-devices-happened/</loc>
		<lastmod>2017-09-25T20:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/google-leaked-prefixes-knocked-japan-off-internet/</loc>
		<lastmod>2017-09-26T13:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Security-OrangeCone-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/recognizing-internet-visionaries-innovators-leaders-around-world/</loc>
		<lastmod>2017-09-26T14:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IHOF-2017-inductees-1280x852.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/sensitizing-africans-internet-things/</loc>
		<lastmod>2017-09-26T21:31:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IoTWorkshop-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/sensitizing-africans-internet-things/</loc>
		<lastmod>2017-09-27T16:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IoTWorkshop-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/can-iot-platforms-apple-google-samsung-make-home-automation-systems-secure/</loc>
		<lastmod>2017-09-27T20:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/SmartPhone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/HomeKit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/MUD.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/section-230-weeds-internet-publisher-providers/</loc>
		<lastmod>2017-09-28T11:49:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/USCapitol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/using-wifi-grow-grapes/</loc>
		<lastmod>2017-09-28T19:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/rural-broadband_Craig-Thomson.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Agtechflows-576x1024-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/connecting-indigenous-communities/</loc>
		<lastmod>2017-10-02T13:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/ICS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/small-actions-big-impact-helping-make-internet-secure/</loc>
		<lastmod>2017-10-02T16:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/CyberSecurityMonth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/internet-situation-egypt/</loc>
		<lastmod>2017-10-02T20:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/ixp-workshop-held-karachi-pakistan/</loc>
		<lastmod>2017-10-04T02:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/IXP-workshop-pakistan-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/IXP-workshop-pakistan-1-250px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/IXP-workshop-pakistan-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/afpif-2017-kicks-off-abidjan/</loc>
		<lastmod>2017-10-04T18:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfPIF_Day1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/abidjan-holds-successful-afpif-2017/</loc>
		<lastmod>2017-10-04T18:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfPIF_Day3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/chain-command-multistakeholderism-aprigf-apsig-experience/</loc>
		<lastmod>2017-10-04T20:58:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Bangkok-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/first-practical-workshop-iot-increase-awareness-interest-ethiopian-universities/</loc>
		<lastmod>2017-10-09T14:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/IoTWorkshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/new-ways-working-connect-world/</loc>
		<lastmod>2017-10-09T14:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/luis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/applied-networking-research-prize-winners-announced-nominations-2018-now-open/</loc>
		<lastmod>2017-10-10T18:36:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/partnerships-connect-world/</loc>
		<lastmod>2017-10-11T20:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/ENACOM_MoU.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/new-policy-brief-published-community-networks-access-spectrum/</loc>
		<lastmod>2017-10-13T14:10:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/policy-brief-spectrum.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/strong-encryption-essential-security-not-barrier/</loc>
		<lastmod>2017-10-13T14:26:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/ResponsibleEncryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/fellows-speak-internet-future-feminist/</loc>
		<lastmod>2017-10-13T19:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/FutureInternet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/approaches-internet-security-cybersecurity-path-forward/</loc>
		<lastmod>2017-10-16T20:32:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/krack-reinforces-need-encryption-multiple-layers-stack/</loc>
		<lastmod>2017-10-17T07:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/matt-artz-398329.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/post-equifax-need-reconsider-identify-people/</loc>
		<lastmod>2017-10-18T15:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/EquifaxID.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/approaches-internet-security-cybersecurity-path-forward/</loc>
		<lastmod>2017-10-20T13:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/internet-built-force-good-lets-keep-way/</loc>
		<lastmod>2017-10-20T16:42:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Focus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/hello-ipv6-goodbye-cgns-recent-discussions-eueuropol-meeting/</loc>
		<lastmod>2017-10-24T07:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ip-addresses.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/bringing-the-world-online-meet-the-people-who-are-making-it-happen/</loc>
		<lastmod>2017-10-23T10:58:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/connectingcommunities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/the-fight-for-telephony/</loc>
		<lastmod>2017-10-23T11:08:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/PeterBloom1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/png-ix-network-security-workshop/</loc>
		<lastmod>2017-10-24T15:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/encryption-law-enforcement-can-work-together/</loc>
		<lastmod>2017-10-26T15:12:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/puzzle-hans-peter-gauster-252751.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/ipv6-routing-security-coming-ion-belgrade/</loc>
		<lastmod>2017-10-30T06:15:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Belgrade.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2011/09/ION_Belgrade2017-300x154.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/encryption-law-enforcement-can-work-together/</loc>
		<lastmod>2017-10-27T11:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/puzzle-hans-peter-gauster-252751.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/roca-encryption-vulnerability/</loc>
		<lastmod>2017-11-01T07:05:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Encryption-words-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/ronog4-meeting-bucharest-romania/</loc>
		<lastmod>2017-10-31T12:33:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/ronog-300x131.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/looking-forward-after-six-years-on-the-internet-society-board-of-trustees/</loc>
		<lastmod>2017-11-01T18:18:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/bobhinden3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/rough-guide-ietf-100-internet-infrastructure-resilience/</loc>
		<lastmod>2017-11-07T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Routing-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/first-practical-workshop-iot-increase-awareness-interest-ethiopian-universities/</loc>
		<lastmod>2017-11-01T19:58:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/IoTWorkshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/manrs-ixps-a-more-secure-internet-routing-system/</loc>
		<lastmod>2017-11-02T14:50:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/andrei-moreip-2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/global-routing-a-kludge-or-a-collaboration-phenomenon/</loc>
		<lastmod>2017-11-02T14:51:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wapo-routing-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/01/observations-from-the-routing-resiliency-measurements-workshop/</loc>
		<lastmod>2017-11-02T15:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/yubikeys-affected-infineon-security-weakness/</loc>
		<lastmod>2017-11-03T08:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/will-take-building-future-internet-brings-opportunity-europe/</loc>
		<lastmod>2017-11-03T12:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/RIDD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/november-2017-ietf-journal-now-available-online/</loc>
		<lastmod>2017-11-06T08:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/IETF-Journal-Filler-Photo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/rough-guide-ietf-100-slinging-standards-singapore/</loc>
		<lastmod>2017-11-06T15:06:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/100IETF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/community-networks-indigenous-communities-indigenous-communities/</loc>
		<lastmod>2017-11-07T16:46:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/CommunityNetworksIndigenousCommunities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/community-networks-indigenous-communities-indigenous-communities/</loc>
		<lastmod>2017-11-07T17:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/CommunityNetworksIndigenousCommunities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/deploy360-is-at-ais-14-right-now/</loc>
		<lastmod>2017-11-08T18:41:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/ais_en.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/reflections-on-the-2016-asia-pacific-regional-internet-governance-forum/</loc>
		<lastmod>2017-11-08T18:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/APrIGF-Collage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/how-you-can-help-connect-the-planet/</loc>
		<lastmod>2017-11-08T18:46:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/connecttheunconnected.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/rough-guide-ietf-100-identity-privacy-encryption/</loc>
		<lastmod>2017-11-10T05:19:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Identity2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/if-a-picture-is-worth-a-thousand-words-what-about-a-map/</loc>
		<lastmod>2017-11-10T18:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/map1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/inet-trinidad-and-tobago-to-cover-ipv6-dnssec-ixps-and-more/</loc>
		<lastmod>2017-11-10T18:25:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/10/inet-t-and-t.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/reflections-copenhagen-ripe-ncc-ipv6-hackathon-danish-ipv6-day/</loc>
		<lastmod>2017-11-13T14:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ripe76-ipv6-hackathon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/PSX_20171104_111808-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/PSX_20171104_111743-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/PSX_20171104_121252-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/PSX_20171104_190536-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/PSX_20171104_112717-300x169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/online-freedoms-threat-2017-freedom-net-report/</loc>
		<lastmod>2017-11-14T10:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/sara-silva-418793-1280x853-barbed-wire.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/one-week-ion-belgrade/</loc>
		<lastmod>2017-11-16T08:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Belgrade.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/unlocking-internet-education-policymakers-hold-key/</loc>
		<lastmod>2017-11-20T18:20:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/StockSnap_XVQYWY15O0-e1510574191430.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/thoughts-on-todays-fcc-net-neutrality-ruling/</loc>
		<lastmod>2017-11-21T20:08:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/need-sustainable-approach-network-neutrality/</loc>
		<lastmod>2017-11-22T15:53:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/balleyne_flickr_2668834386_e515577409_open_internet_1280x555.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/need-sustainable-approach-network-neutrality/</loc>
		<lastmod>2017-11-22T16:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/balleyne_flickr_2668834386_e515577409_open_internet_1280x555.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/comes-smart-toys-pays-shop-smart/</loc>
		<lastmod>2017-11-24T14:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/SmartToys-e1526639480481.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/letter-from-ethiopia-can-we-use-technology-to-help-privacy-evolve/</loc>
		<lastmod>2017-11-23T17:01:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/Ethiopia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/promoting-african-internet-economy-opportunity-cannot-missed/</loc>
		<lastmod>2017-11-24T11:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/AfricaInternetEconomy_people.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/the-future-is-limitless/</loc>
		<lastmod>2017-11-29T11:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/170918_IS-645.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/dns-security-advisories-out-today-for-bind-powerdns-and-unbound-time-to-upgrade/</loc>
		<lastmod>2017-11-29T14:54:45+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2014/12/dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/is-the-uk-investigatory-powers-bill-fatally-flawed/</loc>
		<lastmod>2017-11-29T15:04:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Camera-With-Flags.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/thoughts-on-the-london-internet-coordination-meeting/</loc>
		<lastmod>2017-11-29T15:13:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/london-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/capturing-global-trends-and-emerging-threats-to-internet-freedom/</loc>
		<lastmod>2017-11-29T15:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/provoking-national-boundaries-on-the-internet-a-chilling-thought/</loc>
		<lastmod>2017-11-29T15:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/geoff-huston-unravels-an-ipv6-bug-involving-apple-mail-and-microsoft-exchange-2/</loc>
		<lastmod>2017-11-29T15:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/literally-ipv6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/mit-goes-on-ipv4-selling-spree/</loc>
		<lastmod>2017-11-29T15:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-31-10.37.43-300x162.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-31-10.53.27-135x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/Screenshot-2017-05-31-10.29.43-300x226.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/rfc-8200-ipv6-has-been-standardized/</loc>
		<lastmod>2017-11-29T16:12:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Screenshot-2017-07-15-13.48.17-300x134.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/announcing-four-ndss-2018-workshops-binary-analysis-iot-dns-privacy-security/</loc>
		<lastmod>2017-11-29T18:15:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/NDSS-Cover-Photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/passing-ceo-baton/</loc>
		<lastmod>2017-11-29T21:25:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/beyond-the-net-announces-the-results-for-the-november-2016-cycle/</loc>
		<lastmod>2017-11-30T16:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_SG78Z5JOFS_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/congratulations-to-the-latest-community-grant-recipients/</loc>
		<lastmod>2017-11-30T17:01:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/internetschoolforfarmers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/8-new-projects-under-internet-societys-beyond-the-net-program/</loc>
		<lastmod>2017-11-30T17:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/fishermen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/solutions-needed-time-close-digital-gender-divide/</loc>
		<lastmod>2017-12-01T20:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/womeninafrica_small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/ceo-succession-internet-society/</loc>
		<lastmod>2017-12-03T20:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/technology-purpose-vashkar-bhattacharjees-story/</loc>
		<lastmod>2017-12-04T23:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/VashkarBhattacharjee.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/nominations-now-open-2018-isoc-board-trustees-election/</loc>
		<lastmod>2017-12-05T13:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/ISOC-logo-white-on-dark-teal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/communities-connectivity-destiny/</loc>
		<lastmod>2017-12-06T14:56:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alexander-radelich-318771.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/first-albanian-network-operators-forum/</loc>
		<lastmod>2017-12-06T16:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof1-300x200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof2-300x111.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof3-300x200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof4-300x143.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/communities-connectivity-destiny/</loc>
		<lastmod>2017-12-06T23:45:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alexander-radelich-318771.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/passing-ceo-baton/</loc>
		<lastmod>2017-12-07T12:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/passing-ceo-baton/</loc>
		<lastmod>2017-12-07T12:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/manrs-routing-security-brazilian-isp-community/</loc>
		<lastmod>2017-12-11T08:32:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Routing-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/MANRS-Brazil-Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/MANRS-Brazil-Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/MANRS-Brazil-Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/MANRS-Brazil-Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/MANRS-Brazil-Fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/first-albanian-network-operators-forum/</loc>
		<lastmod>2017-12-07T23:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/alnof3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/reflections-global-cyber-heavy-week-gccs-gfce/</loc>
		<lastmod>2017-12-12T09:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/monitoring-your-dane-deployment/</loc>
		<lastmod>2017-12-18T02:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Deploy360-Billboard_DNSSEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/net-neutrality-fccs-december-14-vote/</loc>
		<lastmod>2017-12-11T17:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/NetNeutrality.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/68714/</loc>
		<lastmod>2017-12-12T18:03:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/david-vyorst-1280x750.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/net-neutrality-fccs-december-14-vote/</loc>
		<lastmod>2017-12-12T22:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/NetNeutrality.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/building-world-free-barriers-vashkar-bhattacharjees-story/</loc>
		<lastmod>2017-12-13T11:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/VashkarPart3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/reflections-global-commission-stability-cyberspace/</loc>
		<lastmod>2017-12-13T16:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/reflections-global-cyber-heavy-week-gccs-gfce/</loc>
		<lastmod>2017-12-13T16:47:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/68714/</loc>
		<lastmod>2017-12-13T21:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/david-vyorst-1280x750.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/another-bgp-routing-incident-highlights-internet-without-checkpoints/</loc>
		<lastmod>2017-12-14T13:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/BGPRoutingIncident.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Eleven-Months-Routing-Incidents-1-300x258.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/lets-mobilize-better-data-stewardship/</loc>
		<lastmod>2017-12-14T13:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/BetterDataStewardship.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/together-can-reduce-barriers/</loc>
		<lastmod>2017-12-14T17:47:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/We-Can-Reduce-Barriers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/the-internet-is-at-a-crossroads/</loc>
		<lastmod>2017-12-14T17:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/IGF-2012-veni-8166949792_1e3e49a3e6_1280x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/another-bgp-routing-incident-highlights-internet-without-checkpoints/</loc>
		<lastmod>2017-12-15T11:21:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/BGPRoutingIncident.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/the-internet-is-at-a-crossroads/</loc>
		<lastmod>2017-12-15T11:52:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/IGF-2012-veni-8166949792_1e3e49a3e6_1280x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/the-internet-is-at-a-crossroads/</loc>
		<lastmod>2017-12-15T12:28:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/IGF-2012-veni-8166949792_1e3e49a3e6_1280x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/help-make-internet-open-join-sig-women/</loc>
		<lastmod>2017-12-15T18:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Womens-SIG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/help-make-internet-open-join-sig-women/</loc>
		<lastmod>2017-12-18T21:16:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Womens-SIG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/help-make-internet-open-join-sig-women/</loc>
		<lastmod>2017-12-19T14:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Womens-SIG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/new-isoc-chapter-launches-land-brave-namibia/</loc>
		<lastmod>2017-12-19T21:31:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-Namibia-Chapter_Launch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/holiday-season-know-smart-toy-toy-soldier/</loc>
		<lastmod>2017-12-20T17:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ToySoldier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/new-isoc-chapter-launches-land-brave-namibia/</loc>
		<lastmod>2017-12-21T12:52:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-Namibia-Chapter_Launch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-Namibia-Chapter_Launch_1_Minister-1024x683.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-Namibia-Chapter_Launch_7-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/holiday-season-know-smart-toy-toy-soldier/</loc>
		<lastmod>2017-12-21T22:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ToySoldier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/holiday-season-know-smart-toy-toy-soldier/</loc>
		<lastmod>2017-12-21T22:51:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ToySoldier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/lets-make-internet-safe/</loc>
		<lastmod>2017-12-27T21:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/InternetSafeAll.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/reflections-early-internet/</loc>
		<lastmod>2017-12-27T23:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Reflections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/future-journalism-internet-age-watchdogs-lapdogs/</loc>
		<lastmod>2017-12-28T08:24:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/rawpixel-com-3232171.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/future-journalism-internet-age-watchdogs-lapdogs/</loc>
		<lastmod>2017-12-28T08:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/rawpixel-com-3232171.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2017/12/chapterthon-2017-winner/</loc>
		<lastmod>2017-12-28T19:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/turkeyr-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/reflections-early-internet/</loc>
		<lastmod>2017-12-29T18:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Reflections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/making-lasting-impact-look-back-2017/</loc>
		<lastmod>2018-01-02T18:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/2017-review.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/lets-make-internet-safe/</loc>
		<lastmod>2018-01-02T19:44:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/InternetSafeAll.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/making-lasting-impact-look-back-2017/</loc>
		<lastmod>2018-01-03T22:45:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/2017-review.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/un-nintendo-consequences-protect-gaming-devices-becoming-bots/</loc>
		<lastmod>2018-01-05T10:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/DDos-Gaming.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/meltdown-spectre-need-vigilance-upgradeability-collaborative-security/</loc>
		<lastmod>2018-01-04T20:41:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/meltdown-spectre.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/un-nintendo-consequences-protect-gaming-devices-becoming-bots/</loc>
		<lastmod>2018-01-06T16:33:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/DDos-Gaming.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/deadline-feb-1-nominations-public-interest-registry-org-operator-board-directors/</loc>
		<lastmod>2018-01-09T22:24:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PIR-logo-1280x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2017/05/escuela-nacional-de-lambare/</loc>
		<lastmod>2018-01-10T14:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cover_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/community-network-remote-georgian-region-tusheti/</loc>
		<lastmod>2018-01-10T21:15:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Tusheti.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-advocacy-action/</loc>
		<lastmod>2018-01-11T21:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/2018-fireworks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-advocacy-action/</loc>
		<lastmod>2018-01-11T21:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/2018-fireworks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-advocacy-action/</loc>
		<lastmod>2018-01-12T15:47:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/2018-fireworks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/14000-incidents-2017-routing-security-year-review/</loc>
		<lastmod>2018-01-13T20:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Picture8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/new-developments-net-neutrality-debate/</loc>
		<lastmod>2018-01-15T19:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/jomar-thomas-unsplash-us-congress-271602.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/can-ipv4-networks-compromised-via-ipv6/</loc>
		<lastmod>2018-01-15T19:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/connecting-nepals-earthquake-affected-communities-self-sustainable-model/</loc>
		<lastmod>2018-01-22T10:30:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Photocover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Pradip-Waiba-300x288.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/chapterthon-2017-winner/</loc>
		<lastmod>2018-01-22T15:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/turkeyr-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/every-connection-matters-shape-tomorrow-help-close-digital-divides/</loc>
		<lastmod>2018-01-22T15:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/WTDC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/building-new-website-improved-search-speed-open-issue-tracker/</loc>
		<lastmod>2018-01-22T19:43:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/isoc-home-page-search-window.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/welcome-new-internet-society-website/</loc>
		<lastmod>2018-01-22T19:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Get-Involved.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/deadline-feb-1-nominations-public-interest-registry-org-operator-board-directors/</loc>
		<lastmod>2018-01-22T20:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PIR-logo-1280x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/deadline-feb-1-nominations-public-interest-registry-org-operator-board-directors/</loc>
		<lastmod>2018-01-22T20:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PIR-logo-1280x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/14000-incidents-2017-routing-security-year-review/</loc>
		<lastmod>2018-01-23T12:41:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/14000-incidents-2017-routing-security-year-review/</loc>
		<lastmod>2018-01-23T13:07:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/building-new-website-improved-search-speed-open-issue-tracker/</loc>
		<lastmod>2018-01-23T22:30:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/isoc-home-page-search-window.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/call-nominations-now-open-rob-blokzijl-award/</loc>
		<lastmod>2018-01-24T16:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/RobBlokzijl-1280x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/new-developments-net-neutrality-debate/</loc>
		<lastmod>2018-01-25T12:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/jomar-thomas-unsplash-us-congress-271602.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/isocs-policy-statement-at-the-wsis-forum-support-your-local-heroes/</loc>
		<lastmod>2018-01-25T17:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/WSISForum-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/process-developing-submitting-ietf-internet-draft-story/</loc>
		<lastmod>2018-01-25T19:25:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/limited-time-read-springer-nature-paper-healthcare-security-privacy/</loc>
		<lastmod>2018-01-25T19:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacypic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/future-thinking-paula-corte-real-freedom-expression-online/</loc>
		<lastmod>2018-01-26T14:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PaulaCorteRealPanel.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/can-ipv4-networks-compromised-via-ipv6/</loc>
		<lastmod>2018-01-26T14:49:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/cyber-incident-tsunami-time-get-ready/</loc>
		<lastmod>2018-01-29T10:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/OTA-cyber-incident-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/limited-time-read-springer-nature-paper-healthcare-security-privacy/</loc>
		<lastmod>2018-01-29T20:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacypic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/lazy-persons-guide-better-online-privacy/</loc>
		<lastmod>2018-01-30T15:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/LazyPersonsGuide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/state-net-today-must-act-now-future/</loc>
		<lastmod>2018-01-31T16:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/joshua-earle-14603-1280x656.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-time-listen-voices-women/</loc>
		<lastmod>2018-01-31T20:21:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/time-listen-women.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/preserving-future-one-bit-time/</loc>
		<lastmod>2018-02-01T18:51:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Library.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/image001-300x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/5-months-hurricanes-world-must-reconnect-caribbean/</loc>
		<lastmod>2018-02-02T15:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/slates-announced-for-board/</loc>
		<lastmod>2018-02-02T15:39:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/02/slates-announced-for-board/</loc>
		<lastmod>2018-02-04T15:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/time-g20s-first-digital-agenda/</loc>
		<lastmod>2018-02-05T17:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Congress-Plaza-Buenos-Aires.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/5-months-hurricanes-world-must-reconnect-caribbean/</loc>
		<lastmod>2018-02-06T12:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/help-make-internet-safer-place-everyone/</loc>
		<lastmod>2018-02-07T17:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/SaferInternetDay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/can-expand-multistakeholder-model-internet-governance-feasibility-report/</loc>
		<lastmod>2018-02-07T22:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fuse-brussels-169216.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/how-can-we-expand-the-use-of-the-multistakeholder-model/</loc>
		<lastmod>2018-02-07T22:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/MultistakeholderPieces.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/collaborative-governance-initiative/</loc>
		<lastmod>2018-02-08T14:49:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/IGF-2012-veni-8166949792_1e3e49a3e6_1280x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/lazy-persons-guide-better-online-privacy/</loc>
		<lastmod>2018-02-08T16:33:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/LazyPersonsGuide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/02/collaborative-governance-initiative/</loc>
		<lastmod>2018-02-11T13:37:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/IGF-2012-veni-8166949792_1e3e49a3e6_1280x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/help-five-projects-connect-world/</loc>
		<lastmod>2018-02-11T15:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/WSIS_Internet_Society-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/help-make-internet-safer-place-everyone/</loc>
		<lastmod>2018-02-11T16:05:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/SaferInternetDay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/time-g20s-first-digital-agenda/</loc>
		<lastmod>2018-02-11T16:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Congress-Plaza-Buenos-Aires.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/5-months-hurricanes-world-must-reconnect-caribbean/</loc>
		<lastmod>2018-02-11T16:47:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/watch-state-net-2018-live-monday-january-29/</loc>
		<lastmod>2018-02-13T10:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/sotn-main-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/limited-time-read-springer-nature-paper-healthcare-security-privacy/</loc>
		<lastmod>2018-02-13T12:28:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacypic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/building-new-website-improved-search-speed-open-issue-tracker/</loc>
		<lastmod>2018-02-14T16:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/isoc-home-page-search-window.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/connecting-nepals-earthquake-affected-communities-self-sustainable-model/</loc>
		<lastmod>2018-02-14T17:02:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Photocover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/lazy-persons-guide-better-online-privacy/</loc>
		<lastmod>2018-02-15T21:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/LazyPersonsGuide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/busy-week-manrs-routing-security-apricot-2018/</loc>
		<lastmod>2018-02-20T02:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/kathmandu-at-night-nepal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/building-sustainable-community-network-sarantaporo-greece/</loc>
		<lastmod>2018-02-16T21:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Sarantaporo_Network-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/building-sustainable-community-network-sarantaporo-greece/</loc>
		<lastmod>2018-02-16T22:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Sarantaporo_Network-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/is-your-reputation-safe-on-the-blockchain/</loc>
		<lastmod>2018-02-20T19:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/reputation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/busy-week-manrs-routing-security-apricot-2018/</loc>
		<lastmod>2018-02-21T14:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/kathmandu-at-night-nepal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-thinking-niel-harper-cyber-threats/</loc>
		<lastmod>2018-02-22T17:29:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/niel-harper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/starting-today-ndss-highlights-best-internet-security-research/</loc>
		<lastmod>2018-02-23T10:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2011/09/SanDiego.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/NDSS18_logo-25-Years.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/starting-today-ndss-highlights-best-internet-security-research/</loc>
		<lastmod>2018-02-23T15:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2011/09/SanDiego.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/NDSS18_logo-25-Years.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/the-cost-of-cybercrime/</loc>
		<lastmod>2018-02-23T15:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Euro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/evidence-cost-trust-trouble-department-justice-dreamhost-case/</loc>
		<lastmod>2018-02-23T15:24:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Privacy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/the-cost-of-cybercrime/</loc>
		<lastmod>2018-02-23T16:23:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Euro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/weakening-encryption-might-be-an-easy-fix-but-counterproductive-in-the-long-run/</loc>
		<lastmod>2018-02-23T16:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/European-Parliament.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/new-study-understanding-manrs-potential-enterprises-service-providers/</loc>
		<lastmod>2018-02-23T16:52:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/manrs-976x385-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/improving-routing-security-introducing-six-new-manrs-tutorials/</loc>
		<lastmod>2018-02-26T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/routing-976-338.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-thinking-niel-harper-cyber-threats-2/</loc>
		<lastmod>2018-02-26T10:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/niel-harper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/bringing-internet-venezuelas-remote-regions-setting-world-record/</loc>
		<lastmod>2018-02-26T12:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cesar-marchan-75353-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/icann-postpones-dnssec-root-ksk-rollover-october-11-will-not-big-day/</loc>
		<lastmod>2018-02-26T12:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/skeleton-key-4055202668_7997e879a6_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/the-cost-of-cybercrime/</loc>
		<lastmod>2018-02-26T13:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Euro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/libraries-stand-internets-future-join-call-end-shutdowns/</loc>
		<lastmod>2018-02-26T15:25:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Library.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/summoning-all-youth-let-the-world-know-what-you-think-about-the-internet/</loc>
		<lastmod>2018-02-26T16:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/paul-proshin-468-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/with-the-right-tools-and-support-anyone-can-build-an-internet-connection/</loc>
		<lastmod>2018-02-26T16:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/pierangelo-ranieri-42688-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/ndss-2018-automating-process-vulnerability-discovery/</loc>
		<lastmod>2018-02-26T17:52:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/a-new-hippocratic-oath-first-do-no-harm-to-me-or-my-healthcare-data/</loc>
		<lastmod>2018-02-26T18:38:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacypic-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/ndss-2018-automating-process-vulnerability-discovery/</loc>
		<lastmod>2018-02-26T18:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/internet-society-deeply-concerned-about-internet-blocking-in-venezuela/</loc>
		<lastmod>2018-02-26T18:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr_deadhorse_367716072_bb5ee4f378_976px-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/25-25-using-internet-make-difference-communities/</loc>
		<lastmod>2018-02-26T19:01:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25u25Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-thinking-cyrating-cyber-threats/</loc>
		<lastmod>2018-02-26T19:17:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/CYRATING.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/survey-paints-a-bleak-picture-of-the-current-state-of-trust-online/</loc>
		<lastmod>2018-02-26T22:12:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/worry1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/community-forum-what-are-your-hopes-and-fears-about-the-internet/</loc>
		<lastmod>2018-02-26T22:19:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/yingchou-han-241463-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/watch-internet-hall-fame-ihof-awards-tonight-l/</loc>
		<lastmod>2018-02-26T22:30:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/ihof-logo-horizontal-1280-548.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/improving-routing-security-introducing-six-new-manrs-tutorials/</loc>
		<lastmod>2018-02-27T15:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/routing-976-338.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/ceo-succession-internet-society-status-update/</loc>
		<lastmod>2018-02-27T16:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/international-cooperation-needed-create-increasingly-beneficial-internet/</loc>
		<lastmod>2018-02-27T18:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Internet-Jurisdiction.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/raul-echeberria-mobile-world-congress-ministerial-programme-policies-expand-access-mobile/</loc>
		<lastmod>2018-02-27T18:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/MWCBarcelona.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/google-leaked-prefixes-knocked-japan-off-internet/</loc>
		<lastmod>2018-02-27T19:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Security-OrangeCone-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/five-steps-can-take-right-now-increase-privacy/</loc>
		<lastmod>2018-02-27T19:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IncreaseYourPrivacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/good-ipv6-news-from-akamai-state-of-the-internet-report/</loc>
		<lastmod>2018-02-27T20:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/Akamai-Q1-2017-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/want-to-quickly-create-a-tlsa-record-for-dane-dnssec/</loc>
		<lastmod>2018-02-27T20:12:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/Generate-TLSA-Record-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/afpif-day-two-identifying-challenges-opportunities/</loc>
		<lastmod>2018-02-27T20:20:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfPIF_Day2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/encryption-and-law-enforcement-aiming-for-trust/</loc>
		<lastmod>2018-02-27T20:50:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr-christiaan-colen-20971563620-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/transforming-the-internet-societys-web-presence/</loc>
		<lastmod>2018-02-27T21:09:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/new-website-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/my-view-of-the-dnssec-root-key-signing-ceremony/</loc>
		<lastmod>2018-02-27T21:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/Root-Signing-Ceremony-Participants.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/Root-Signing-Ceremony-Checking-the-Safes.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/Root-Signing-Ceremony-Smart-Cards.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/Root-Signing-Ceremony-Olaf-Kolkman-checking-bags.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/introducing-a-new-deploy360-topic-securing-bgp/</loc>
		<lastmod>2018-02-27T21:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/bgp-150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/what-we-learned-dnssec-ksk-rollovers-in-go6lab/</loc>
		<lastmod>2018-02-27T21:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/raul-echeberria-mobile-world-congress-ministerial-programme-policies-expand-access-mobile/</loc>
		<lastmod>2018-02-27T21:55:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/MWCBarcelona.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/ceo-succession-internet-society-status-update-feb-2018/</loc>
		<lastmod>2018-02-27T23:14:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/week-internet-news-blockchain-fights-slavery-seafood-industry/</loc>
		<lastmod>2018-02-28T21:05:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/final-slates-nominees-2018-internet-society-board-trustees-elections/</loc>
		<lastmod>2018-02-28T21:58:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/final-slates-nominees-2018-internet-society-board-trustees-elections/</loc>
		<lastmod>2018-03-01T00:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/final-slates-nominees-2018-internet-society-board-trustees-elections/</loc>
		<lastmod>2018-03-01T11:53:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/international-cooperation-needed-create-increasingly-beneficial-internet/</loc>
		<lastmod>2018-03-01T14:51:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Internet-Jurisdiction.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/ceo-succession-internet-society-status-update-feb-2018/</loc>
		<lastmod>2018-03-01T16:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/empowering-education-next-generation/</loc>
		<lastmod>2018-03-04T19:45:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/CTN_Asuntion_Paraguay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/routing-security-bof-apricot-2018/</loc>
		<lastmod>2018-03-06T09:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/APRICOT2018-blog-banner-555x202-04-01-555x202.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/39780648954_3668b7418a_o-300x144.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Screenshot-2018-03-04-13.08.27-300x68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Screenshot-2018-03-04-13.08.40-300x86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Screenshot-2018-03-04-13.09.01-300x84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Screenshot-2018-03-04-13.09.24-300x90.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/routing-security-serious-problem-manrs-can-help-report-apricot-2018/</loc>
		<lastmod>2018-03-06T04:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/routing-976-338.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/empowering-education-next-generation/</loc>
		<lastmod>2018-03-06T13:46:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/CTN_Asuntion_Paraguay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/section-230-weeds-internet-publisher-providers/</loc>
		<lastmod>2018-03-06T15:16:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/USCapitol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-time-listen-voices-women/</loc>
		<lastmod>2018-03-08T15:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/time-listen-women.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/power-of-women-to-change-the-world/</loc>
		<lastmod>2018-03-08T16:46:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/IWD-Kathy-Brown-e1520505895415.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/stories-six-women-international-womens-day-2018/</loc>
		<lastmod>2018-03-08T17:35:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/makkiya-shine-the-light.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PoornimaMeegammana400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MaryHeldaAkongo400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateGreen400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/JazminFallas400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MakkiyaJawed400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PaulaCorteReal400x400-300x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/stories-six-women-international-womens-day-2018/</loc>
		<lastmod>2018-03-08T17:49:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/makkiya-shine-the-light.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PoornimaMeegammana400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MaryHeldaAkongo400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateGreen400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/JazminFallas400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MakkiyaJawed400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PaulaCorteReal400x400-300x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/open-call-ceo-candidates-ceo-succession-internet-society/</loc>
		<lastmod>2018-03-09T13:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/ceo-succession-internet-society/</loc>
		<lastmod>2018-03-09T13:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/stories-six-women-international-womens-day-2018/</loc>
		<lastmod>2018-03-09T17:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/makkiya-shine-the-light.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PoornimaMeegammana400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MaryHeldaAkongo400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateGreen400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/JazminFallas400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MakkiyaJawed400x400-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/PaulaCorteReal400x400-300x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/03/power-of-women-to-change-the-world/</loc>
		<lastmod>2018-03-09T18:20:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/IWD-Kathy-Brown.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-back-london/</loc>
		<lastmod>2018-03-11T11:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/cgn-ipv6-fighting-online-crime/</loc>
		<lastmod>2018-03-10T05:59:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Europol-HQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/2018-time-listen-voices-women/</loc>
		<lastmod>2018-03-12T12:32:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/time-listen-women.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/u-s-sec-targets-unregulated-cryptocurrency-exchanges/</loc>
		<lastmod>2018-03-12T15:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/cryptocurrency-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/routing-security-serious-problem-manrs-can-help-report-apricot-2018/</loc>
		<lastmod>2018-03-12T17:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/routing-976-338.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/voting-open-2018-internet-society-board-trustees-elections/</loc>
		<lastmod>2018-03-12T22:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/kate-ekanem-promoting-education-literacy-empowerment-girls-nigeria/</loc>
		<lastmod>2018-03-13T22:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateEkanem-IWD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/03/power-of-women-to-change-the-world/</loc>
		<lastmod>2018-03-13T22:23:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/IWD-Kathy-Brown.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/call-for-nominations-for-our-board-of-trustees/</loc>
		<lastmod>2018-03-14T10:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/dnssec-activities-icann-61-san-juan-march-11-14-2018/</loc>
		<lastmod>2018-03-14T13:18:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/icann61-header-900x375.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/open-call-ceo-candidates-ceo-succession-internet-society/</loc>
		<lastmod>2018-03-14T14:10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/indigenous-connectivity-summit-participants-share-stories/</loc>
		<lastmod>2018-03-14T17:53:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Madeleine-Redfern.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/indigenous-connectivity-summit-participants-share-stories/</loc>
		<lastmod>2018-03-14T17:53:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Madeleine-Redfern.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/connecting-indigenous-communities-2/</loc>
		<lastmod>2018-03-14T17:54:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/santa-fe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/connecting-indigenous-communities-2/</loc>
		<lastmod>2018-03-14T17:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/santa-fe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/zero-one-hundred-arctic-slope/</loc>
		<lastmod>2018-03-14T17:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/Patuk-Glenn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/chocolate-fitness-trackers-recognizing-consumer-rights-responsibilities/</loc>
		<lastmod>2018-03-15T08:37:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/speaker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/u-s-sec-targets-unregulated-cryptocurrency-exchanges/</loc>
		<lastmod>2018-03-15T16:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/cryptocurrency-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/dns-tls-experience-go6lab/</loc>
		<lastmod>2018-03-15T20:11:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_SSL_TLS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/deploy360/wp-content/uploads/2017/08/screen-capture-267-1024x635.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-back-london/</loc>
		<lastmod>2018-03-15T22:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/isoc-ch-p%e2%89%a1p-foundation-engaged-collaborative-effort-pretty-easy-privacy-p%e2%89%a1p/</loc>
		<lastmod>2018-03-15T22:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/rishabh-varshney-138805-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ceos-encryption-questions-need-asking-experts-2/</loc>
		<lastmod>2018-03-16T14:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/ceo-encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/response-community-cat-issues/</loc>
		<lastmod>2018-03-16T18:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/short-term-internet-shutdown-bali-tied-holiday/</loc>
		<lastmod>2018-03-16T18:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/bali-shutdown.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/75852/</loc>
		<lastmod>2018-03-16T19:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-internet-infrastructure-resilience/</loc>
		<lastmod>2018-03-16T22:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/routing-976-338.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-dnssec-dane-dns-security-privacy/</loc>
		<lastmod>2018-03-16T23:04:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/DNSSEC-for-Tech-Matters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/lets-reform-igf-ensure-healthy-future/</loc>
		<lastmod>2018-03-17T00:17:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/voice-igf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/03/lets-reform-igf-ensure-healthy-future/</loc>
		<lastmod>2018-03-19T14:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/voice-igf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/75852/</loc>
		<lastmod>2018-03-19T21:06:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/future-thinking-wired-editor-chief-nicholas-thompson-role-media/</loc>
		<lastmod>2018-03-20T11:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/nicholas-thompson.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-dnssec-dane-dns-security-privacy/</loc>
		<lastmod>2018-03-20T14:56:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/DNSSEC-for-Tech-Matters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/chapterthon-wins-2018-wsis-prize-international-regional-cooperation/</loc>
		<lastmod>2018-03-20T16:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/WSIS_Prize_2018_Winner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2017/12/chapterthon-2017-winner/</loc>
		<lastmod>2018-03-20T18:40:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/turkeyr-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/fake-news-spread-fast-dont-blame-bots/</loc>
		<lastmod>2018-03-21T19:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MIT-campus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/nominations-open-jonathan-b-postel-service-award-2018/</loc>
		<lastmod>2018-03-21T20:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Jon-Postel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/connect-everyone-internet-ietf-101-technical-plenary/</loc>
		<lastmod>2018-03-22T12:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/ietf101-plenary-panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ferghana-valley-ixp-reducing-digital-gap-central-asia/</loc>
		<lastmod>2018-03-22T14:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Tian_Chi_8869581842_PhotoCover-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/nominations-open-jonathan-b-postel-service-award-2018/</loc>
		<lastmod>2018-03-22T16:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Jon-Postel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/nominations-open-jonathan-b-postel-service-award-2018/</loc>
		<lastmod>2018-03-22T16:45:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Jon-Postel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/the-state-of-cybersecurity-in-europe-should-we-reboot/</loc>
		<lastmod>2018-03-23T09:26:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr-eurodig2016-kolkman.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/community-networks-mexico-resources/</loc>
		<lastmod>2018-03-23T10:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/redes-mexico.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/future-thinking-wired-editor-chief-nicholas-thompson-role-media-2/</loc>
		<lastmod>2018-03-23T12:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/nicholas-thompson.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/report-distributed-iot-security-standards-workshop-ndss-2018/</loc>
		<lastmod>2018-03-25T09:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-e1521969111196.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/fake-news-spread-fast-dont-blame-bots/</loc>
		<lastmod>2018-03-26T11:40:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MIT-campus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/community-networks-mexico-resources/</loc>
		<lastmod>2018-03-26T11:56:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/redes-mexico.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ferghana-valley-ixp-reducing-digital-gap-central-asia/</loc>
		<lastmod>2018-03-26T13:27:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Tian_Chi_8869581842_PhotoCover-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/dawn-new-digital-rights-finnish-citizens/</loc>
		<lastmod>2018-03-26T13:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MOOC-team.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/sri-lankan-shutdown-web-based-services-creates-huge-social-costs/</loc>
		<lastmod>2018-03-26T16:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/sri-lanka.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/connect-everyone-internet-ietf-101-technical-plenary/</loc>
		<lastmod>2018-03-26T18:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/ietf101-plenary-panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/sri-lankan-shutdown-web-based-services-creates-huge-social-costs/</loc>
		<lastmod>2018-03-27T17:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/sri-lanka.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/applications-now-open-hackathonais/</loc>
		<lastmod>2018-03-28T14:35:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hackathon-ais.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/lets-encrypt-offers-free-multi-domain-https-certificates/</loc>
		<lastmod>2018-03-28T16:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/wordpress-hosts-with-lets-encrypt-e1522244790312.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/building-new-website-posse-sharing-facebook-twitter-linkedin-google/</loc>
		<lastmod>2018-03-28T19:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/posse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/better-internet-kenyan-kids/</loc>
		<lastmod>2018-03-30T13:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Save_Online_Team-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/spacex-gets-us-approval-launch-space-based-broadband-service/</loc>
		<lastmod>2018-03-30T16:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/spacex.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/deadline-today-2359-utc-submit-comments-icann-dnssec-root-ksk-rollover-plan/</loc>
		<lastmod>2018-04-02T14:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/bryce-barker-73651-unsplash-clock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/applications-now-open-hackathonais/</loc>
		<lastmod>2018-04-03T13:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hackathon-ais.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/applied-networking-research-workshop-anrw-call-papers-due-20-april/</loc>
		<lastmod>2018-04-03T15:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/research.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/team-isoc-apricot-2018/</loc>
		<lastmod>2018-04-03T15:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/APRICOT2018-blog-banner-555x202-04-01-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/ceo-succession-internet-society-friday-deadline-open-call-candidates/</loc>
		<lastmod>2018-04-03T19:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/kathy-browns-op-ed-canadas-hill-times/</loc>
		<lastmod>2018-04-04T10:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hill-op-ed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/apricot-2018-fellows/</loc>
		<lastmod>2018-04-04T10:59:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/APRICOT2018-blog-banner-555x202-04-01-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/countries-consider-penalties-spreading-fake-news/</loc>
		<lastmod>2018-04-04T14:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/penalties-fake-news.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/digital-empowerment-women-south-asia/</loc>
		<lastmod>2018-04-04T18:32:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/digital-empowerment-women.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/connecting-500k-bolivians-national-research-education-network/</loc>
		<lastmod>2018-04-04T19:33:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/red-academica-boliviana.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/building-new-website-posse-sharing-facebook-twitter-linkedin-google/</loc>
		<lastmod>2018-04-05T18:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/posse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/team-isoc-apricot-2018/</loc>
		<lastmod>2018-04-06T12:28:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/APRICOT2018-blog-banner-555x202-04-01-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/ceo-succession-internet-society-friday-deadline-open-call-candidates/</loc>
		<lastmod>2018-04-06T14:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security/</loc>
		<lastmod>2018-04-06T14:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-pros-know-iot-security-needs-work-arent-yet/</loc>
		<lastmod>2018-04-08T13:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/juma-baldeh-breaking-barriers-access-gambia/</loc>
		<lastmod>2018-04-09T18:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/juma-baldeh.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/connecting-500k-bolivians-national-research-education-network/</loc>
		<lastmod>2018-04-09T19:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/red-academica-boliviana.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/internet-shutdowns-cannot-solution-political-challenges-chad/</loc>
		<lastmod>2018-04-10T18:12:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/flickr_kendoerr_chad_8079981829_215a5b7678_1280x515.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security/</loc>
		<lastmod>2018-04-11T15:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/short-term-internet-shutdown-bali-tied-holiday/</loc>
		<lastmod>2018-04-11T16:43:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/bali-shutdown.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/internet-shutdowns-cannot-solution-political-challenges-chad/</loc>
		<lastmod>2018-04-11T17:16:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/flickr_kendoerr_chad_8079981829_215a5b7678_1280x515.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/fake-news-loss-privacy-hurting-internet-mozilla-says/</loc>
		<lastmod>2018-04-11T20:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/2018-mozilla-health-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/internet-shutdowns-cannot-solution-political-challenges-chad/</loc>
		<lastmod>2018-04-11T21:45:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/flickr_kendoerr_chad_8079981829_215a5b7678_1280x515.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/lenca-people-restoring-past-build-future/</loc>
		<lastmod>2018-04-11T21:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Comunidad_Intelligentes_Lenca.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/countries-consider-penalties-spreading-fake-news/</loc>
		<lastmod>2018-04-11T22:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/penalties-fake-news.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security/</loc>
		<lastmod>2018-04-11T22:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/muhammad-shabbbir-awan-reflections-wtdc17/</loc>
		<lastmod>2018-04-12T18:53:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/wtdc-delegation-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/countries-consider-penalties-spreading-fake-news/</loc>
		<lastmod>2018-04-12T19:17:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/penalties-fake-news.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/successful-first-event-canadian-multistakeholder-process-enhancing-iot-security-series/</loc>
		<lastmod>2018-04-12T19:26:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/canadian-iot-event.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/digital-empowerment-women-south-asia/</loc>
		<lastmod>2018-04-13T10:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/digital-empowerment-women.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/security-research-critical-protect-open-internet/</loc>
		<lastmod>2018-04-13T14:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-research-expert-statement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/piloting-use-tv-white-space-community-networks-rural-tanzania/</loc>
		<lastmod>2018-04-13T18:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/wave-ripple.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/successful-first-event-canadian-multistakeholder-process-enhancing-iot-security-series/</loc>
		<lastmod>2018-04-15T14:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/canadian-iot-event.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/fake-news-loss-privacy-hurting-internet-mozilla-says/</loc>
		<lastmod>2018-04-16T14:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/2018-mozilla-health-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17/</loc>
		<lastmod>2018-04-16T19:29:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/rsa-conference-2018-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-ai-goes-dogs/</loc>
		<lastmod>2018-04-17T13:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/space-invaders-consumer-grade-iot-enterprise/</loc>
		<lastmod>2018-04-18T13:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Checklist-IoT-Enterprise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/space-invaders-consumer-grade-iot-enterprise/</loc>
		<lastmod>2018-04-18T13:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Checklist-IoT-Enterprise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17/</loc>
		<lastmod>2018-04-19T11:07:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/rsa-conference-2018-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/new-space-race-beam-broadband-everywhere/</loc>
		<lastmod>2018-04-19T12:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/satellite-broadband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/voting-open-2018-internet-society-board-trustees-elections/</loc>
		<lastmod>2018-04-20T13:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/wouldnt-nice-trust-device/</loc>
		<lastmod>2018-04-20T13:09:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/iot-policymakers-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/call-for-participation-icann-dnssec-workshop-at-icann62-panama-city/</loc>
		<lastmod>2018-04-20T18:32:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/icann62-panama-city.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/introducing-a-new-manrs-ixp-programme-for-routing-security/</loc>
		<lastmod>2018-04-23T12:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/deconstructing-the-encryption-debate-the-internet-society-chatham-house-roundtable-on-encryption-and-lawful-access-report/</loc>
		<lastmod>2018-04-24T15:35:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/isoc-ch-encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/new-space-race-beam-broadband-everywhere/</loc>
		<lastmod>2018-04-25T09:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/satellite-broadband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/updated-privacy-policy-with-minor-clarifications/</loc>
		<lastmod>2018-04-25T09:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacy-highlight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/2018-internet-society-board-of-trustees-final-election-results-ietf-appointments/</loc>
		<lastmod>2018-04-25T09:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-working-toward-better-internet/</loc>
		<lastmod>2018-04-25T09:52:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/security-research-critical-protect-open-internet/</loc>
		<lastmod>2018-04-25T09:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-research-expert-statement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-ai-aint-gonna-steal-job-2/</loc>
		<lastmod>2018-04-25T10:08:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/connecting-500k-bolivians-national-research-education-network/</loc>
		<lastmod>2018-04-25T11:47:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/red-academica-boliviana.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/better-internet-kenyan-kids/</loc>
		<lastmod>2018-04-25T11:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Save_Online_Team-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/chapterthon-wins-2018-wsis-prize-international-regional-cooperation/</loc>
		<lastmod>2018-04-25T11:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/WSIS_Prize_2018_Winner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/building-sustainable-community-network-sarantaporo-greece/</loc>
		<lastmod>2018-04-25T11:49:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Sarantaporo_Network-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-ai-can-give-workers-creative-boost-many-arent-ready/</loc>
		<lastmod>2018-04-25T11:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/piloting-use-tv-white-space-community-networks-rural-tanzania/</loc>
		<lastmod>2018-04-25T12:23:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/wave-ripple.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Jabhera-Matogoro-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/larger-facebook-cambridge-analytica-question-really-signed/</loc>
		<lastmod>2018-04-25T13:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/luiz-hanfilaque-342635-unsplash-1280x515px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/larger-facebook-cambridge-analytica-question-really-signed/</loc>
		<lastmod>2018-04-25T14:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/luiz-hanfilaque-342635-unsplash-1280x515px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/continuing-support-for-the-work-of-the-ietf/</loc>
		<lastmod>2018-04-25T15:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security/</loc>
		<lastmod>2018-04-25T17:22:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-thief-data-hijack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/this-girls-in-ict-day-lets-make-more-women-visible-in-wikipedia/</loc>
		<lastmod>2018-04-25T20:25:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/editathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/equals-in-tech-awards-recognizing-womens-empowerment-initiatives/</loc>
		<lastmod>2018-04-26T14:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/equals-in-tech-awards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/the-cybersecurity-tech-accord-fits-squarely-in-the-collaborative-security-approach/</loc>
		<lastmod>2018-04-26T16:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/cybersecurity-tech-accord.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/security-research-critical-protect-open-internet/</loc>
		<lastmod>2018-04-26T18:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-research-expert-statement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/this-girls-in-ict-day-lets-make-more-women-visible-in-wikipedia/</loc>
		<lastmod>2018-04-26T21:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/editathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security/</loc>
		<lastmod>2018-04-26T21:47:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-thief-data-hijack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/amazons-route-53-bgp-hijack/</loc>
		<lastmod>2018-04-27T15:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/dos-attack-cyber-unsafe-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.23.35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.32.32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.24.39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.25.27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.38.45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.53.39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.57.25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/jazmin-fallas-kerr-empowering-women-to-create-opportunities-for-their-families/</loc>
		<lastmod>2018-04-27T15:29:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/jazmin-fallas-kerr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/juma-baldeh-breaking-barriers-access-gambia/</loc>
		<lastmod>2018-04-27T15:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/juma-baldeh.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/kate-ekanem-promoting-education-literacy-empowerment-girls-nigeria/</loc>
		<lastmod>2018-04-27T15:40:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateEkanem-IWD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/makkiya-jawed-intersection-technology-medicine/</loc>
		<lastmod>2018-04-27T15:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Makkiya-IWD-profile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/story-years-jonathan-b-postel-service-award-winner/</loc>
		<lastmod>2018-04-27T15:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/Kimberly-Claffy-9-e1510674278300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/deconstructing-the-encryption-debate-the-internet-society-chatham-house-roundtable-on-encryption-and-lawful-access-report/</loc>
		<lastmod>2018-04-27T17:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/isoc-ch-encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/the-week-in-internet-news-ai-could-reshape-the-music-industry-in-a-good-way/</loc>
		<lastmod>2018-04-27T20:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security/</loc>
		<lastmod>2018-04-27T21:37:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/security-thief-data-hijack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/this-girls-in-ict-day-lets-make-more-women-visible-in-wikipedia/</loc>
		<lastmod>2018-04-27T21:48:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/editathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/introducing-a-new-manrs-ixp-programme-for-routing-security/</loc>
		<lastmod>2018-04-29T14:29:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/introducing-a-new-manrs-ixp-programme-for-routing-security/</loc>
		<lastmod>2018-04-29T15:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/continuing-support-for-the-work-of-the-ietf/</loc>
		<lastmod>2018-04-30T19:42:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/hackathon-at-africa-internet-summit-focuses-on-time-vehicular-communications-and-network-programmability/</loc>
		<lastmod>2018-05-03T17:12:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hackathon-ais.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/the-week-in-internet-news-a-new-use-for-blockchain/</loc>
		<lastmod>2018-05-04T12:21:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/internet-society-lacnic-and-lac-ix-partner-to-strengthen-ixps-in-latin-america/</loc>
		<lastmod>2018-05-04T13:08:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/internet-society-lac-ix-y-lacnic-firman-acuerdo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/european-agenda-on-digital-for-development-can-the-multistakeholder-approach-help/</loc>
		<lastmod>2018-05-04T15:27:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/european-digital-for-development.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/encryption-is-key-to-safety-of-journalists/</loc>
		<lastmod>2018-05-04T15:45:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/press-freedom-encryption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/call-for-contributions-to-northern-public-affairs-internet-connectivity-in-indigenous-and-northern-communities/</loc>
		<lastmod>2018-05-04T15:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/equals-in-tech-awards-recognizing-womens-empowerment-initiatives/</loc>
		<lastmod>2018-05-04T21:08:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/equals-in-tech-awards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/future-thinking-paula-corte-real-freedom-expression-online/</loc>
		<lastmod>2018-05-07T15:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PaulaCorteRealPanel.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/future-thinking-harlem-desir/</loc>
		<lastmod>2018-05-07T16:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/HarlemDesir.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/future-thinking-wired-editor-chief-nicholas-thompson-role-media-2/</loc>
		<lastmod>2018-05-07T20:25:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/nicholas-thompson.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/jazmin-fallas-kerr-empowering-women-to-create-opportunities-for-their-families/</loc>
		<lastmod>2018-05-08T19:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/jazmin-fallas-kerr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/jazmin-fallas-kerr-empowering-women-to-create-opportunities-for-their-families/</loc>
		<lastmod>2018-05-08T20:14:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/jazmin-fallas-kerr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/call-for-contributions-to-northern-public-affairs-internet-connectivity-in-indigenous-and-northern-communities/</loc>
		<lastmod>2018-05-09T11:05:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/dna-tests-raise-privacy-questions/</loc>
		<lastmod>2018-05-09T14:19:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/test-tubes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-internet-things/</loc>
		<lastmod>2018-05-09T15:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IOT3-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/women-in-africa-call-for-a-trusted-and-inclusive-internet/</loc>
		<lastmod>2018-05-11T10:47:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Women-Africa-Inclusive-Internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks/</loc>
		<lastmod>2018-05-11T16:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Verge-Twitterbreach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/2fa-300x122.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-internet-society-and-african-union-commission-launch-personal-data-protections-guidelines-for-africa/</loc>
		<lastmod>2018-05-13T13:05:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Dcr_OsTXcAAeik1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/women-in-africa-call-for-a-trusted-and-inclusive-internet/</loc>
		<lastmod>2018-05-13T20:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Women-Africa-Inclusive-Internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/what-is-bgp-hijacking-anyway/</loc>
		<lastmod>2018-05-13T20:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/dos-attack-cyber-unsafe-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-first-nepal-school-on-internet-governance/</loc>
		<lastmod>2018-05-14T13:37:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/npSIG_ISOC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/12-innovative-projects-selected-for-beyond-the-net-funding/</loc>
		<lastmod>2018-05-14T13:39:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Beyond_the_Net_Grants_2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/innovative-licensing-approaches-enabling-access-in-hard-to-reach-places-through-collaborative-partnerships/</loc>
		<lastmod>2018-05-14T17:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/innovative-licensing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/internet-companies-have-more-work-to-do-on-privacy-freedom-of-expression-report-says/</loc>
		<lastmod>2018-05-15T16:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Freedom-Expression-Report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/encryption-isnt-perfect-thats-why-choices-are-important/</loc>
		<lastmod>2018-05-15T19:03:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/what-is-bgp-hijacking-anyway/</loc>
		<lastmod>2018-05-16T13:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/dos-attack-cyber-unsafe-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/calling-all-young-people-join-the-youth-observatory-and-help-change-how-internet-policy-is-made/</loc>
		<lastmod>2018-05-17T12:18:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/youngmansitting-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/innovative-licensing-approaches-enabling-access-in-hard-to-reach-places-through-collaborative-partnerships/</loc>
		<lastmod>2018-05-21T12:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/innovative-licensing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/european-agenda-on-digital-for-development-can-the-multistakeholder-approach-help/</loc>
		<lastmod>2018-05-21T16:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/european-digital-for-development.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/together-lets-switchiton-and-keepiton-the-internet-society-releases-joint-statement-with-access-now/</loc>
		<lastmod>2018-05-21T19:24:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/20170723_114046_DSCF7072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/building-the-digital-silk-road-together-isoc-kyrgyz-chapter-proposes-ideas-for-internet-development-in-central-asia-at-a-cambridge-university-forum/</loc>
		<lastmod>2018-05-22T13:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/digital-silk-road.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks/</loc>
		<lastmod>2018-05-23T19:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Verge-Twitterbreach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/community-networks-mexico-resources/</loc>
		<lastmod>2018-05-24T07:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/redes-mexico.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/innovative-licensing-approaches-enabling-access-in-hard-to-reach-places-through-collaborative-partnerships/</loc>
		<lastmod>2018-05-25T08:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/innovative-licensing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/gdpr-going-beyond-borders/</loc>
		<lastmod>2018-05-25T10:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/gdpr-beyond-borders.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/updated-privacy-policy-with-minor-clarifications/</loc>
		<lastmod>2018-05-25T10:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacy-highlight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/announcing-updated-privacy-policy/</loc>
		<lastmod>2018-05-25T10:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/priscilla-du-preez-216790-976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-online-privacy-personal-data-protection-africa/</loc>
		<lastmod>2018-05-25T10:39:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/AfricaPrivacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/dawn-new-digital-rights-finnish-citizens/</loc>
		<lastmod>2018-05-25T10:40:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/MOOC-team.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/nonprofit-isp-in-mexico-wins-court-battle-against-huge-federal-fee/</loc>
		<lastmod>2018-05-25T14:21:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/SupremeCourtBldgMexicoDF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/nonprofit-isp-in-mexico-wins-court-battle-against-huge-federal-fee/</loc>
		<lastmod>2018-05-25T16:18:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/SupremeCourtBldgMexicoDF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/community-networks-can-bridge-the-digital-divide-but-some-still-need-to-be-convinced/</loc>
		<lastmod>2018-05-28T08:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/cn-africa-bosco.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/digital-self-defense-for-palestinian-schoolgirls/</loc>
		<lastmod>2018-05-30T09:04:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Palestine-isoc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Ahmad-Alsadeh.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/connecting-the-unconnected-the-land-of-zero-connect/</loc>
		<lastmod>2018-05-30T15:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/van-gujarat.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/salt-gujarat-199x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/children-gujarat-300x169.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/to-tackle-the-vpnfilter-botnet-its-going-to-take-help-from-you-and-me/</loc>
		<lastmod>2018-05-30T16:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/router.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/global-editathon-making-women-visible-in-ict/</loc>
		<lastmod>2018-05-31T10:21:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/editathon-mexico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/gdpr-going-beyond-borders/</loc>
		<lastmod>2018-06-02T14:06:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/gdpr-beyond-borders.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/living-in-times-of-digital-uncertainty-are-control-and-trust-compatible/</loc>
		<lastmod>2018-06-04T12:42:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/cigi-survey-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/the-internet-of-food-is-on-the-table/</loc>
		<lastmod>2018-06-05T14:45:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Internet_of_Food_ISOC.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Johan-Jorgensen-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/great-hopes-and-some-concerns-at-the-african-internet-summit/</loc>
		<lastmod>2018-06-04T15:12:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/DcrFzvqXUAI0DLE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/watch-live-june-6-panel-on-innovation-security-and-the-internet-of-things-iot-in-ottawa/</loc>
		<lastmod>2018-06-05T14:46:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-e1521969062826.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/g7-leaders-the-world-is-looking-at-you-to-make-the-right-decisions/</loc>
		<lastmod>2018-06-05T18:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/crew-22235-unsplash-1280x515.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/video-vint-cerf-on-the-6th-anniversary-of-world-ipv6-launch-and-why-ipv6-is-so-critical-now/</loc>
		<lastmod>2018-06-06T10:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/vint-cerf-ipv6-6th-anniversary-1280x515.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->