<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.internetsociety.org/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/six-years-after-state-of-ipv6-deployment-2018/</loc>
		<lastmod>2018-06-06T18:35:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv63.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/my-data-your-business/</loc>
		<lastmod>2018-06-07T13:54:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/3piggybank.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/06/what-in-the-world-is-wcit/</loc>
		<lastmod>2018-06-07T14:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/menog-celebrating-10-years/</loc>
		<lastmod>2018-06-07T14:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/menog-logo-rgb-300x115.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/liquid-telecom-deploys-ipv6-in-africa/</loc>
		<lastmod>2018-06-07T15:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/liquid-telecom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/screen-capture-197-300x92.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/the-united-nations-human-rights-council-and-the-internet-society/</loc>
		<lastmod>2018-06-07T15:19:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/12/the-internet-and-the-right-to-participate-in-public-life-amplifying-voices/</loc>
		<lastmod>2018-06-07T15:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/day-4-here-comes-the-future/</loc>
		<lastmod>2018-06-07T15:25:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/carl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/day-3-human-rights-cyber-security-and-standing-up-for-inclusiveness/</loc>
		<lastmod>2018-06-07T15:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Day3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/ipv4-transfer-market-status/</loc>
		<lastmod>2018-06-07T15:32:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/IPv4-panel@APRICOT-2017-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Screenshot-2017-03-10-21.58.56-300x145.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Screenshot-2017-03-11-05.58.13-300x155.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Screenshot-2017-03-10-22.54.21-300x79.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/day-zero-youre-just-in-time/</loc>
		<lastmod>2018-06-07T15:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/awomansmiling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/day-1-be-a-part-of-opening-day-igf2016/</loc>
		<lastmod>2018-06-07T16:01:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Angie3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/nonprofit-isp-in-mexico-wins-court-battle-against-huge-federal-fee/</loc>
		<lastmod>2018-06-08T14:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/SupremeCourtBldgMexicoDF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/ceo-succession-at-internet-society-status-update-june-2018/</loc>
		<lastmod>2018-06-08T15:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/registration-open-for-applied-networking-research-workshop-tls-routing-privacy-and-more/</loc>
		<lastmod>2018-06-11T14:23:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/research.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/podcast-talking-data-privacy-and-gdpr-with-todd-tolbert/</loc>
		<lastmod>2018-06-13T13:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/todd-tolbert-podcast.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/new-video-explains-routing-security-and-how-manrs-can-help/</loc>
		<lastmod>2018-06-14T16:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-Video-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/04/vanthas-story-childrens-futures-technology-programme/</loc>
		<lastmod>2018-06-15T11:19:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/childrensfuture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/bridging-californias-rural-digital-divide/</loc>
		<lastmod>2018-06-15T11:19:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Facebook-Post1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/radio-menq-voices-of-armenias-blind-selected-as-wsis-prizes-2017-champion/</loc>
		<lastmod>2018-06-15T11:20:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/hackathonais-summary-report/</loc>
		<lastmod>2018-06-15T14:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ais-hackathon-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/eurodig-2018-gathers-the-internet-community-whats-new/</loc>
		<lastmod>2018-06-15T15:41:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Tbilisi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/ceo-succession-at-internet-society-status-update-june-2018/</loc>
		<lastmod>2018-06-18T11:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/reflecting-on-the-internet-societys-2017-asia-pacific-activities/</loc>
		<lastmod>2018-06-18T17:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/the-year-that-was-apac.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/new-video-explains-routing-security-and-how-manrs-can-help/</loc>
		<lastmod>2018-06-18T19:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-Video-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/alert-web-server-host-migration-on-june-19-2018/</loc>
		<lastmod>2018-06-19T13:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/isoc-site-speed-before-migration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/clic-quebec-lheure-du-declic-pour-la-decouverte-etlacces-enligne-au-contenu-culturel-quebecois/</loc>
		<lastmod>2018-06-20T09:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Click_Quebec_Internet_Society.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/clic-quebec-lheure-du-declic-pour-la-decouverte-etlacces-enligne-au-contenu-culturel-quebecois/</loc>
		<lastmod>2018-06-20T10:24:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Click_Quebec_Internet_Society.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/article-13/</loc>
		<lastmod>2018-06-20T13:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/working-together-with-apnic-on-routing-security-and-manrs-in-asia-pacific/</loc>
		<lastmod>2018-06-20T22:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-MoU-APNIC-Cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/new-video-explains-routing-security-and-how-manrs-can-help/</loc>
		<lastmod>2018-06-22T11:23:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-Video-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/working-together-with-apnic-on-routing-security-and-manrs-in-asia-pacific/</loc>
		<lastmod>2018-06-22T16:01:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-MoU-APNIC-Cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/working-together-with-apnic-on-routing-security-and-manrs-in-asia-pacific/</loc>
		<lastmod>2018-06-22T16:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-MoU-APNIC-Cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/routing-security-ipv6-at-nanog-73-in-denver/</loc>
		<lastmod>2018-06-24T13:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/owen-cl-571744-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/watch-live-on-monday-25-june-dnssec-workshop-at-icann-62-in-panama/</loc>
		<lastmod>2018-06-22T20:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/icann62_mobileapp_launch_banner_desktop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/great-hopes-and-some-concerns-at-the-african-internet-summit/</loc>
		<lastmod>2018-06-25T19:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/DcrFzvqXUAI0DLE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/if-we-care-about-the-internet-we-have-to-be-willing-to-do-our-part/</loc>
		<lastmod>2018-06-25T20:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/getiotsmart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/what-place-for-women-as-software-developers/</loc>
		<lastmod>2018-07-02T12:15:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/only-dead-fish-swim-with-the-stream/</loc>
		<lastmod>2018-07-02T12:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/scenic-bali.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/fishbowl1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/solution-room.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/noticing-the-cellophane-rights/</loc>
		<lastmod>2018-07-02T12:20:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/internet-governance-sustainable-development-the-case-of-small-island-developing-states/</loc>
		<lastmod>2018-07-02T12:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/sharing-and-intellectual-property-protection-an-incongruity/</loc>
		<lastmod>2018-07-02T12:27:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/isoc-booth-at-baku-expo-centre-experience/</loc>
		<lastmod>2018-07-02T12:32:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/SAM_0129-e1530534719900.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/igf-the-prelude/</loc>
		<lastmod>2018-07-02T12:50:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/DSC01273-e1530535788334.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/takeaway-no-130-digital-inclusion-and-public-access-to-the-internet-what-policymakers-need-and-how-libraries-and-other-community-services-can-deliver/</loc>
		<lastmod>2018-07-02T12:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/internet-of-humans/</loc>
		<lastmod>2018-07-02T13:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/P1010139.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/P1010132-e1530536454304.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/policy-making-and-understanding-the-impact-of-the-internet/</loc>
		<lastmod>2018-07-02T13:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/04/on-the-way-to-the-g7-ict-ministers-meeting-in-japan-multistakeholder-approaches-needed-to-address-internet-security/</loc>
		<lastmod>2018-07-13T09:14:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/G7-ICT-Ministers-Meeting-2016-rectangle-670px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/reflections-on-the-g7-ict-ministers-meeting/</loc>
		<lastmod>2018-07-13T09:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/G7-Kathy-onstage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/icann-49-wrap-up/</loc>
		<lastmod>2018-07-13T09:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ICANN_49_Wrap_Up1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/bienvenue-au-chapitre-isoc-madagascar-35e-chapitre-de-linternet-society-en-afrique/</loc>
		<lastmod>2018-07-20T22:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/mada.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/08/el-taller-de-lacigf-para-los-lideres-de-capitulos/</loc>
		<lastmod>2018-08-06T20:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/lac_chapters_workshop_2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/what-happened-last-night/</loc>
		<lastmod>2018-08-07T10:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/SAM_0054-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/meeting-with-fadi-chehade-icann-president-and-ceo-at-igf/</loc>
		<lastmod>2018-08-07T11:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/do-you-remember-we-met-yesterday/</loc>
		<lastmod>2018-08-07T11:20:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/SAM_0237_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/planes-headsets-and-big-ummm-tents/</loc>
		<lastmod>2018-08-07T11:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/A6_0MDcCQAAYJMI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2009/11/acceso-y-diversidad-permanece-como-un-tema-central-para-el-foro-de-gobernanza-de-internet-2/</loc>
		<lastmod>2018-08-07T11:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/ipv4-scarcity/</loc>
		<lastmod>2018-08-07T12:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/what-is-the-geography-of-cyberspace-excellent-panel/</loc>
		<lastmod>2018-08-07T12:18:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/SAM_0194.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/how-to-reform-basic-education-for-a-digital-future-views-from-a-multistakeholder-group/</loc>
		<lastmod>2018-08-09T13:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/basic-education-digital-future.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/lessons-from-attempts-at-ip-enforcement-on-the-internet/</loc>
		<lastmod>2018-08-09T15:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2012/11/SAM_0097.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/ipr-the-freedom-to-share/</loc>
		<lastmod>2018-08-09T15:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/digital-inclusion-and-public-libraries/</loc>
		<lastmod>2018-08-09T15:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/improving-gender-rights-online-in-the-global-south/</loc>
		<lastmod>2018-08-14T15:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/IGF-Group-Photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/08/improving-gender-rights-online-in-the-global-south/</loc>
		<lastmod>2018-08-23T12:06:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/IGF-Group-Photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/we-must-continue-to-advocate-passionately-and-fearlessly-an-interview-with-our-ceo-kathy-brown/</loc>
		<lastmod>2018-08-24T15:46:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/kathy-brown-Parliament-meets-Internet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-2017-BoT-group-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/las-marias-from-azacualpa-internet-for-raising-womens-voices/</loc>
		<lastmod>2018-08-28T16:24:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/ComunidadesInteligentes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/the-week-in-internet-news-u-s-doj-pressures-facebook-to-break-messenger-encryption/</loc>
		<lastmod>2018-08-29T08:43:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/tunapandanet-paves-the-way-for-kenya-to-connect-the-underserved/</loc>
		<lastmod>2018-08-29T09:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/TunapandaNET_Kenya-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Josephine-Miliza-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/safe-online-safe-on-land/</loc>
		<lastmod>2018-08-29T10:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/kenya-Safe-Online-Safe-On-Land.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/strengthening-foundations-for-creating-open-internet-standards/</loc>
		<lastmod>2018-08-29T10:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/announcing-the-online-trust-audit-honor-roll-methodology-for-2018/</loc>
		<lastmod>2018-08-29T11:09:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/OTA-Honor-Roll-Methodology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/until-we-meet-again/</loc>
		<lastmod>2018-08-29T11:17:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/kathy-brown-agua-azul.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/techlash-g20-should-listen/</loc>
		<lastmod>2018-08-29T11:19:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/techlash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/blockchain-digital-identity-good-fit/</loc>
		<lastmod>2018-08-29T11:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/blockchain-identity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/it-is-a-challenging-time-for-the-internet-we-must-not-let-it-be-undermined/</loc>
		<lastmod>2018-08-29T13:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/AndrewSullivan-Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/reflections-on-six-years-on-the-isoc-board-of-trustees/</loc>
		<lastmod>2018-08-29T15:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/narelle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/dns-privacy-in-new-android-9/</loc>
		<lastmod>2018-08-29T16:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/android-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/dns-privacy-in-new-android-9/</loc>
		<lastmod>2018-08-29T16:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/android-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/85730/</loc>
		<lastmod>2018-08-31T15:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/christel-white.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/meeting-europes-connectivity-challenge-the-role-for-community-networks/</loc>
		<lastmod>2018-09-03T13:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Europe-Connectivity-Challenge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/wsis10-consultations-next-week-the-negotiations-are-accelerating/</loc>
		<lastmod>2018-09-03T15:56:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/unhq-mononoke-flickr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/2016-world-development-report-shows-path-to-internet-of-opportunity-for-all/</loc>
		<lastmod>2018-09-03T15:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wdr2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/wsis10-and-the-challenge-of-securing-the-internet/</loc>
		<lastmod>2018-09-03T16:05:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Christiaan_Colen_20013034943_9d3d2605a8_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/trust-in-the-internet-is-critical-for-growing-the-digital-economy/</loc>
		<lastmod>2018-09-03T16:06:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr_sdsongster_14825947116_8385fb47da_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/wanted-community-builders/</loc>
		<lastmod>2018-09-03T16:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/communitynetwork_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/its-already-been-a-year/</loc>
		<lastmod>2018-09-03T16:19:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/raul-echeberria.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/if-we-lose-trust-we-lose-the-power-of-the-internet-to-change-lives-for-the-better-remarks-at-oecd-ministerial/</loc>
		<lastmod>2018-09-03T16:21:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/oecd-kathy-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/count-my-voice-demanding-an-internet-that-benefits-everyone/</loc>
		<lastmod>2018-09-04T07:21:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/Mary-Helda-Akongo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/growing-new-partnerships-to-connect-the-world/</loc>
		<lastmod>2018-09-04T08:36:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/4683250983_97b0b4cc19_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/partnerships-develop-the-internet/</loc>
		<lastmod>2018-09-04T08:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/partnership2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/building-strength-in-latin-america-and-caribbean/</loc>
		<lastmod>2018-09-04T08:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/columbia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/blockchain-technologies-internet-governance/</loc>
		<lastmod>2018-09-04T13:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/cryptocurrency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/08/blockchain-technologies-internet-governance/</loc>
		<lastmod>2018-09-04T13:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/cryptocurrency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/08/blockchain-technologies-internet-governance/</loc>
		<lastmod>2018-09-04T13:15:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/cryptocurrency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/privacy-in-the-digital-age-un-special-rapporteur-sets-priorities-in-new-report/</loc>
		<lastmod>2018-09-06T13:06:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacy-highlight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/introducing-collaborative-security-our-approach-to-internet-security-issues/</loc>
		<lastmod>2018-09-06T13:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/laptop-hands-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/trust-and-collaboration-key-features-for-the-internets-future/</loc>
		<lastmod>2018-09-06T13:17:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/sipa-innovation-panel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/will-the-right-to-hold-an-opinion-win-the-battle-against-pervasive-surveillance/</loc>
		<lastmod>2018-09-06T13:19:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iStock_000050455566_opinion_wonder.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/remarks-to-the-un-wsis10-informal-interactive-stakeholder-consultation/</loc>
		<lastmod>2018-09-06T13:23:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/constance-unga-wsis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/decoding-the-wsis-message-isoc-releases-matrix-of-countries-positions/</loc>
		<lastmod>2018-09-06T13:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wsis-matrix-976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/the-internet-society-and-freedom-house-announce-partnership-for-online-freedoms/</loc>
		<lastmod>2018-09-06T13:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/isoc-at-wsis10-day-2-kathy-brown-speech-access-side-event-cybersecurity-sessions/</loc>
		<lastmod>2018-09-06T13:30:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/UNGA-hall-wsis10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/midway-through-the-wtsa-late-nights-negotiating-text-in-the-medina/</loc>
		<lastmod>2018-09-06T13:42:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/wtsa-plenary-pic.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/turkish-hijacking-of-dns-providers-shows-clear-need-for-deploying-bgp-and-dns-security/</loc>
		<lastmod>2018-09-06T13:47:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/bgpmon-turkish-hijack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/ten-tips-to-manage-your-digital-footprint/</loc>
		<lastmod>2018-09-06T13:48:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/phone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/lets-build-the-future-of-the-open-internet-at-igf-2016-this-week/</loc>
		<lastmod>2018-09-11T15:42:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/foodguy2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/globalizing-iana-the-internet-society-submits-comments-to-the-icg/</loc>
		<lastmod>2018-09-11T16:06:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-IANA-ICG-Comments.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/2016-confronting-the-promise-and-the-challenge-of-a-global-open-internet-connection-and-security/</loc>
		<lastmod>2018-09-14T10:19:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/fireworks-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/teaching-sri-lankan-girls-code/</loc>
		<lastmod>2018-09-18T07:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/girls-tech-sri-lanka-chapter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/it-is-a-challenging-time-for-the-internet-we-must-not-let-it-be-undermined/</loc>
		<lastmod>2018-09-18T09:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/AndrewSullivan-Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/it-is-a-challenging-time-for-the-internet-we-must-not-let-it-be-undermined/</loc>
		<lastmod>2018-09-19T17:35:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/AndrewSullivan-Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/from-idea-to-action-beyond-the-net-selects-15-amazing-chapter-projects/</loc>
		<lastmod>2018-09-19T17:36:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Nyirarukobwa-Primary-School-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/third-summit-on-community-networks-in-africa/</loc>
		<lastmod>2018-09-19T17:38:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/CN-Summit-2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/the-week-in-internet-news-facebook-to-fact-check-videos-and-photos/</loc>
		<lastmod>2018-09-19T17:43:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/celebrating-one-year-with-our-new-website/</loc>
		<lastmod>2018-09-19T17:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/1-year-anniversary.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/three-languages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/we-havent-reached-our-full-potential/</loc>
		<lastmod>2018-09-19T17:46:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/gilbert-martinez.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/the-week-in-internet-news-five-eyes-demand-access-to-encrypted-information/</loc>
		<lastmod>2018-09-19T17:47:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/sovereignty-is-more-than-a-designation-it-is-a-responsibility/</loc>
		<lastmod>2018-09-19T21:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Brian-Tagaban.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/observations-from-isoc-chapter-fellows-on-the-itu-plenipotentiary-conference/</loc>
		<lastmod>2018-09-21T13:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/15017399883_e5bb75e939_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/plenipot-update-28-october-2014-the-real-work-begins/</loc>
		<lastmod>2018-09-21T13:15:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/itu-photo-for-the-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/plenipot-update-24-october-new-leadership-of-the-itu/</loc>
		<lastmod>2018-09-21T13:15:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/voting1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/congratulations-to-mr-houlin-zhao/</loc>
		<lastmod>2018-09-21T13:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/election1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/plenipot-update-23-october-election-results-ad-hoc-groups-and-formal-sessions/</loc>
		<lastmod>2018-09-21T13:16:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/itubigpicture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/itu-plenipotentiary-2014-opens/</loc>
		<lastmod>2018-09-21T13:16:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/pic1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/on-the-road-to-busan/</loc>
		<lastmod>2018-09-21T13:16:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/busan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/muhammad-shabbbir-awan-reflections-wtdc17/</loc>
		<lastmod>2018-09-21T13:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/wtdc-delegation-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/together-can-reduce-barriers/</loc>
		<lastmod>2018-09-21T13:26:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/We-Can-Reduce-Barriers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/building-world-free-barriers-vashkar-bhattacharjees-story/</loc>
		<lastmod>2018-09-21T13:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/VashkarPart3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/technology-purpose-vashkar-bhattacharjees-story/</loc>
		<lastmod>2018-09-21T13:26:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/VashkarBhattacharjee.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/for-me-the-internet-is-everything-supporting-local-heroes-in-armenia/</loc>
		<lastmod>2018-09-21T13:26:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Radio_Menq_WSIS_Prize.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/beyond-the-reach-a-new-vision-for-the-physically-challenged-of-sri-lanka/</loc>
		<lastmod>2018-09-21T13:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Sri_Lanka_Chapter_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Sri_Lanka_Chapter_Beyond_the_Reach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/announcing-beyond-the-net-selected-projects/</loc>
		<lastmod>2018-09-21T13:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/beyondthenet1_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/our-workshop-on-web-accessibility-in-pakistan-vips-visually-impaired-people-and-loads-of-energy/</loc>
		<lastmod>2018-09-21T13:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/09/igf-2018-mejoras-y-llamado-a-contribuciones/</loc>
		<lastmod>2018-09-24T16:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/IGF-2018-improvements-call-contributions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/dustins-internet-community-roadtrip-in-the-bay-area-what-redwoods-can-teach-us-about-the-internet/</loc>
		<lastmod>2018-09-26T17:40:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/CoastalRedwoodCommunity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/dustins-internet-community-roadtrip-portland/</loc>
		<lastmod>2018-09-26T17:46:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/dustins-corolla-laptop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/portland-editathon-300x129.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/dustins-internet-community-roadtrip-in-the-bay-area-the-people-who-make-the-internet-ecosystem-thrive/</loc>
		<lastmod>2018-09-26T17:49:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/InnovativeResilience.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/BrandieNonnecke-DevCafe-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/SFBayISOCAgTech-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/RedwoodUnderstory-225x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/the-facebook-breach-some-lessons-for-the-internet/</loc>
		<lastmod>2018-10-01T20:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/facebook-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/benefit-all-generations/</loc>
		<lastmod>2018-10-02T14:38:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/Merrill-Yazzie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/launch-of-gip-digital-watch-provides-new-education-resources-on-internet-governance/</loc>
		<lastmod>2018-10-03T10:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/digital-watch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/oecds-new-approach-for-digital-security-is-a-major-milestone-for-cybersecurity-policy/</loc>
		<lastmod>2018-10-03T11:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/oecd-dsrm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/women-innovation-internet-taking-on-the-tough-problems/</loc>
		<lastmod>2018-10-03T11:15:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/picture11_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/seeking-more-internet-leaders-for-the-routing-resilience-manifesto-do-you-have-manrs/</loc>
		<lastmod>2018-10-03T11:20:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/MANRS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/national-cybersecurity-awareness-month-international-iot-security-and-privacy-month/</loc>
		<lastmod>2018-10-04T19:25:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/10/la-presencia-de-redes-comunitarias-en-alc-2/</loc>
		<lastmod>2018-10-05T13:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/cn-lac.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/the-internet-and-sustainable-development/</loc>
		<lastmod>2018-10-05T09:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/internet-and-sdgs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/ietf-94-and-igf-2015-meeting-the-future-leadership-needs-of-the-internet/</loc>
		<lastmod>2018-10-05T09:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ietf93-fellows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/04/fellows-to-ietf-95-building-diverse-technical-communities/</loc>
		<lastmod>2018-10-05T09:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Tech-Fellows-IETF-94.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/day-of-women-in-science-at-the-un-shining-the-light-on-inspiring-women-around-the-world/</loc>
		<lastmod>2018-10-05T10:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/kathy-at-un.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/announcing-afilias-as-multi-year-ion-sponsor/</loc>
		<lastmod>2018-10-05T10:07:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/Afilias_No_Tag-300x114.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/no-haven-for-spam-collaborating-at-wsis-forum-2016-to-address-spam-in-emerging-economies/</loc>
		<lastmod>2018-10-05T10:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/spam_character.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/new-york-city-groups-take-broadband-into-their-own-hands/</loc>
		<lastmod>2018-10-05T21:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/nyc-broadband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/the-facebook-breach-some-lessons-for-the-internet/</loc>
		<lastmod>2018-10-05T21:45:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/facebook-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/we-need-a-common-language-for-the-internet-of-things/</loc>
		<lastmod>2018-10-10T08:39:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/new-language-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/from-imagination-to-action-building-the-internet-that-women-want-in-latin-america/</loc>
		<lastmod>2018-10-10T08:42:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/LACIGF-Angie-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/steven-huter-the-2018-jonathan-b-postel-service-award-winner/</loc>
		<lastmod>2018-10-10T08:53:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Steven-Huter-Postel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/montenegro-learning-coding-in-the-7th-grade/</loc>
		<lastmod>2018-10-10T08:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Montenegro_ISOC_CodeWeek.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Ivana_Corovic_ISOC_Montenegro_-274x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/leveling-up-women-one-edit-at-a-time/</loc>
		<lastmod>2018-10-10T09:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/India_Delhi_ISOC_Editathon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Amrita_Choudhury_ISOC-280x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/a-partnership-to-tackle-growing-risks-in-a-connected-world/</loc>
		<lastmod>2018-10-10T09:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/shibuya-2328029_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/building-awareness-of-digital-violence-against-barbadian-women/</loc>
		<lastmod>2018-10-10T09:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/barbados_chapter_cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Ashell-Forde-237x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/NOAH_campaign_Barbados.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/connecting-los-nevados-on-the-roof-of-the-andes/</loc>
		<lastmod>2018-10-10T09:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cover2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/road.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Paola_Perez_Gabriela-Munoz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Los_Nevados_School_Venezuela_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/nevaderos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/supporting-internet-development-gambia/</loc>
		<lastmod>2018-10-10T15:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Gambia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/are-you-ready-how-to-prepare-for-the-dnssec-root-ksk-rollover-on-october-11-2018/</loc>
		<lastmod>2018-10-11T14:37:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/skeleton-key-4055202668_7997e879a6_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/intercommunity-2015-using-the-internet-for-the-internet/</loc>
		<lastmod>2018-10-15T10:46:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/InterCommunity2015-worldwide-view.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/keeping-door-open/</loc>
		<lastmod>2018-10-15T11:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Mariano-blog-feature.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/join-global-celebrations-inspire-world/</loc>
		<lastmod>2018-10-15T11:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Fireworks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/help-shape-the-future-of-the-internet/</loc>
		<lastmod>2018-10-15T11:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/timothy-muza-572-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/website-update-experiencing-problems-with-translations-into-french-and-spanish/</loc>
		<lastmod>2018-10-15T17:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/website-update-experiencing-problems-with-translations-into-french-and-spanish/</loc>
		<lastmod>2018-10-15T17:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/10/le-senegal-devient-le-premier-pays-africain-a-mettre-en-oeuvre-les-recommandations-des-lignes-directrices-sur-la-protection-des-donnees-a-caractere-personnel-pour-lafrique/</loc>
		<lastmod>2018-10-16T18:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/Senegal-MS-Privacy-Data-Protection-worshop_11-12-Oct-2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/whitepaper-balancing-ip-address-distribution-and-decentralization/</loc>
		<lastmod>2018-10-17T10:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/a-fine-balance-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/02/the-danger-of-the-new-internet-choke-points/</loc>
		<lastmod>2018-10-18T01:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Warning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/the-internet-society-and-wikimedia-team-up-to-empower-everyday-heroes/</loc>
		<lastmod>2018-10-18T21:30:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/EverydayHero_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/connecting-indigenous-communities/</loc>
		<lastmod>2018-10-19T06:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/ICS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/encryption-is-crucial-to-a-trusted-internet/</loc>
		<lastmod>2018-10-19T06:40:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/business_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/what-is-the-digital-object-architecture-doa-read-our-new-information-paper/</loc>
		<lastmod>2018-10-19T06:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/doa-cover-blogpost.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/iana-transition-hearing-on-may-24-before-u-s-senate-iab-chair-andrew-sullivan-testifying/</loc>
		<lastmod>2018-10-19T06:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana-hearing-may2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/community-networks-indigenous-communities-indigenous-communities/</loc>
		<lastmod>2018-10-19T06:41:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/CommunityNetworksIndigenousCommunities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/collaborative-governance-leaders-canada-and-senegal-exchange-notes-on-iot-security-frameworks/</loc>
		<lastmod>2018-10-19T06:42:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/ottawa-senegal-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/net-neutrality-round-table/</loc>
		<lastmod>2018-10-19T06:42:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/net-neutrality-event.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/isoc-hosts-successful-inaugural-indigenous-connectivity-summit/</loc>
		<lastmod>2018-10-19T06:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/isoc_indigenous_connectivity_summit-55.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/isoc_indigenous_connectivity_summit-15-1024x683.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/isoc_indigenous_connectivity_summit-42-1024x729.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/celebrating-one-year-with-our-new-website/</loc>
		<lastmod>2018-10-19T06:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/1-year-anniversary.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/three-languages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/call-for-participation-icann-dnssec-workshop-at-icann63-barcelona-spain/</loc>
		<lastmod>2018-10-19T06:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/podcast-talking-data-privacy-and-gdpr-with-todd-tolbert/</loc>
		<lastmod>2018-10-19T06:49:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/todd-tolbert-podcast.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/01/state-of-dnssec-deployment-2016-report-shows-over-89-of-top-level-domains-signed/</loc>
		<lastmod>2018-10-19T06:49:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/state-of-dnssec-deployment-2016-976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/how-to-survive-a-dns-ddos-attack-consider-using-multiple-dns-providers/</loc>
		<lastmod>2018-10-19T06:49:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ddos-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/connecting-the-unconnected-the-story-of-a-visit-to-a-school-in-agua-azul-mexico/</loc>
		<lastmod>2018-10-19T06:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/agua-azul-title-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-02-road.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-03-school.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-04-pedro.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-05-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-06-rachel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-07-camilo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-08-girl.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-09-classroom.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-10-tower.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/mpaa-need-to-move-to-ipv6-for-improved-video-viewing-experience/</loc>
		<lastmod>2018-10-19T06:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/mpaa-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/08/webrtc-just-works-over-ipv6/</loc>
		<lastmod>2018-10-19T06:51:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/01/great-news-over-50-of-all-top-level-domains-now-signed-with-dnssec/</loc>
		<lastmod>2018-10-19T06:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/icann-tld-dnssec-20140120.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/rick-eng-br-trend-20140120.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/04/where-are-the-ipv6-only-wi-fi-routers-and-access-points/</loc>
		<lastmod>2018-10-19T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/introducing-internet-societys-intellectual-property-issues-paper/</loc>
		<lastmod>2018-10-19T06:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/buenos-aires-sera-el-centro-de-las-discusiones-sobre-gobernanza-de-internet/</loc>
		<lastmod>2018-10-19T07:10:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/buenos-aires-lacigf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/buenos-aires-sera-el-centro-de-las-discusiones-sobre-gobernanza-de-internet/</loc>
		<lastmod>2018-10-19T07:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/buenos-aires-lacigf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/bienvenue-au-chapitre-isoc-madagascar-35e-chapitre-de-linternet-society-en-afrique/</loc>
		<lastmod>2018-10-19T07:12:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/mada-e1532006069165.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/las-marias-from-azacualpa-internet-for-raising-womens-voices/</loc>
		<lastmod>2018-10-19T07:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/ComunidadesInteligentes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/internet-and-jobs-what-do-young-people-think-of-the-future-of-work/</loc>
		<lastmod>2018-10-19T07:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/youth-future-of-work.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/the-week-in-internet-news-facebook-to-fact-check-videos-and-photos/</loc>
		<lastmod>2018-10-19T07:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/the-week-in-internet-news-more-communities-building-their-own-broadband-networks/</loc>
		<lastmod>2018-10-19T07:16:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/the-week-in-internet-news-malaysia-repeals-recently-passed-fake-news-law/</loc>
		<lastmod>2018-10-19T07:16:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/the-week-in-internet-news-us-govt-wants-more-encryption-for-itself/</loc>
		<lastmod>2018-10-19T07:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/tech-companies-endorse-manrs-routing-security-actions/</loc>
		<lastmod>2018-10-19T07:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/MANRS-TechAccord.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/tech-companies-endorse-manrs-routing-security-actions/</loc>
		<lastmod>2018-10-19T07:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/MANRS-TechAccord.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/tech-companies-endorse-manrs-routing-security-actions/</loc>
		<lastmod>2018-10-19T07:16:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/MANRS-TechAccord.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/the-week-in-internet-news-iot-security-spending-predicted-to-skyrocket/</loc>
		<lastmod>2018-10-19T07:16:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-week-in-internet-news-facial-recognition-ids-politicians-as-criminals/</loc>
		<lastmod>2018-10-19T07:17:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/internet-drone-and-balloon-projects-move-forward/</loc>
		<lastmod>2018-10-19T07:17:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Google-Loon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/internet-drone-and-balloon-projects-move-forward/</loc>
		<lastmod>2018-10-19T07:17:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Google-Loon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/internet-drone-and-balloon-projects-move-forward/</loc>
		<lastmod>2018-10-19T07:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Google-Loon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-week-in-internet-news-startup-cash-for-spy-o-t/</loc>
		<lastmod>2018-10-19T07:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/community-networks-can-help-solve-worlds-problems-ebook-says/</loc>
		<lastmod>2018-10-19T07:17:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/TunapandaNET-team.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/community-networks-can-help-solve-worlds-problems-ebook-says/</loc>
		<lastmod>2018-10-19T07:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/TunapandaNET-team.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-week-in-internet-news-startup-finds-a-way-to-glue-fiber-to-roadways/</loc>
		<lastmod>2018-10-19T07:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-week-in-internet-news-whatsapp-looks-to-combat-the-spread-of-fake-news/</loc>
		<lastmod>2018-10-19T07:17:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-week-in-internet-news-wifi-gets-a-new-security-standard/</loc>
		<lastmod>2018-10-19T07:17:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/the-week-in-internet-news-governments-shut-down-internet-for-school-testing/</loc>
		<lastmod>2018-10-19T07:17:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/the-week-in-internet-news-governments-shut-down-internet-for-school-testing/</loc>
		<lastmod>2018-10-19T07:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/the-week-in-internet-news-x-ray-i/</loc>
		<lastmod>2018-10-19T07:18:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/this-week-in-internet-news-ai-diagnoses-skin-cancer-better-than-doctors/</loc>
		<lastmod>2018-10-19T07:18:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-week-in-internet-news-the-fbi-has-fewer-unopened-encrypted-devices-than-reported/</loc>
		<lastmod>2018-10-19T07:18:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-week-in-internet-news-email-encryption-has-efail-moment/</loc>
		<lastmod>2018-10-19T07:18:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-week-in-internet-news-artificial-intelligence-heads-to-the-final-frontier/</loc>
		<lastmod>2018-10-19T07:18:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-week-in-internet-news-criminal-cryptocurrency-miners-target-iot/</loc>
		<lastmod>2018-10-19T07:18:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/some-fake-news-fighters-embrace-ai-others-seek-the-human-touch/</loc>
		<lastmod>2018-10-19T07:18:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/fake-news-solutions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/the-week-in-internet-news-a-new-use-for-blockchain/</loc>
		<lastmod>2018-10-19T07:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/the-week-in-internet-news-ai-could-reshape-the-music-industry-in-a-good-way/</loc>
		<lastmod>2018-10-19T07:18:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-ai-goes-dogs/</loc>
		<lastmod>2018-10-19T07:18:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-ai-can-give-workers-creative-boost-many-arent-ready/</loc>
		<lastmod>2018-10-19T07:18:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/week-internet-news-pros-know-iot-security-needs-work-arent-yet/</loc>
		<lastmod>2018-10-19T07:18:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/lets-encrypt-offers-free-multi-domain-https-certificates/</loc>
		<lastmod>2018-10-19T07:18:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/wordpress-hosts-with-lets-encrypt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/lets-encrypt-offers-free-multi-domain-https-certificates/</loc>
		<lastmod>2018-10-19T07:18:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/wordpress-hosts-with-lets-encrypt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-good-time-iot-security/</loc>
		<lastmod>2018-10-19T07:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-quantum-computing-vs-encryption/</loc>
		<lastmod>2018-10-19T07:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-ai-aint-gonna-steal-job/</loc>
		<lastmod>2018-10-19T07:18:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-ai-aint-gonna-steal-job-2/</loc>
		<lastmod>2018-10-19T07:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/week-internet-news-working-toward-better-internet/</loc>
		<lastmod>2018-10-19T07:18:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/information-gatekeeping-not-laughing-matter/</loc>
		<lastmod>2018-10-19T07:19:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Gatekeeping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/information-gatekeeping-not-laughing-matter/</loc>
		<lastmod>2018-10-19T07:19:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Gatekeeping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/week-internet-news-blockchain-fights-slavery-seafood-industry/</loc>
		<lastmod>2018-10-19T07:19:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/InternetNews-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/week-internet-news-can-blockchain-improve-iot/</loc>
		<lastmod>2018-10-19T07:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/afpif-heres-why-you-shouldnt-miss-it/</loc>
		<lastmod>2018-10-19T07:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfPIF2_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/the-business-case-for-ipv6-in-pakistan/</loc>
		<lastmod>2018-10-19T07:23:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/Pakistan-flag.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/Screenshot-2017-02-20-22.57.33-300x204.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/Screenshot-2017-02-20-22.58.00-300x249.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/08/internet-society-participa-en-la-primera-reunion-de-operadores-de-red-en-mexico/</loc>
		<lastmod>2018-10-19T07:24:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/MexNOG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/internet-society-lacnic-and-lac-ix-partner-to-strengthen-ixps-in-latin-america/</loc>
		<lastmod>2018-10-19T07:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/internet-society-lac-ix-y-lacnic-firman-acuerdo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/construccion-de-infraestructura-comunitaria/</loc>
		<lastmod>2018-10-19T07:24:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/P1010011-e1521206367741.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/construccion-de-infraestructura-comunitaria/</loc>
		<lastmod>2018-10-19T07:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/strengthening-foundations-for-creating-open-internet-standards/</loc>
		<lastmod>2018-10-19T08:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/watch-the-experts-session-on-encryption-from-canberra/</loc>
		<lastmod>2018-10-19T08:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/Experts-Session-Encryption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/we-must-continue-to-advocate-passionately-and-fearlessly-an-interview-with-our-ceo-kathy-brown/</loc>
		<lastmod>2018-10-19T08:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/kathy-brown-Parliament-meets-Internet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-2017-BoT-group-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/we-must-continue-to-advocate-passionately-and-fearlessly-an-interview-with-our-ceo-kathy-brown/</loc>
		<lastmod>2018-10-19T08:03:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/kathy-brown-Parliament-meets-Internet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/ISOC-2017-BoT-group-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/84538/</loc>
		<lastmod>2018-10-19T08:03:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/sylvia-jordan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/84538/</loc>
		<lastmod>2018-10-19T08:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/sylvia-jordan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/84538/</loc>
		<lastmod>2018-10-19T08:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/sylvia-jordan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-what3words-ip-addresses-for-the-real-world/</loc>
		<lastmod>2018-10-19T08:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/what3words-crop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-roxanne-varza-on-the-internet-economy/</loc>
		<lastmod>2018-10-19T08:03:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Roxanne-Varza-Credit-Pascal-Othlingaus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-roxanne-varza-on-the-internet-economy/</loc>
		<lastmod>2018-10-19T08:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Roxanne-Varza-Credit-Pascal-Othlingaus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-roxanne-varza-on-the-internet-economy/</loc>
		<lastmod>2018-10-19T08:03:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Roxanne-Varza-Credit-Pascal-Othlingaus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-biddemu-bazil-mwotta/</loc>
		<lastmod>2018-10-19T08:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Biddemu-Bazil-Mwotta.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/were-going-to-visit-all-203-nations/</loc>
		<lastmod>2018-10-19T08:03:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Denise-Williams.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/future-thinking-augusto-mathurin/</loc>
		<lastmod>2018-10-19T08:03:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/augusto-mathurin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/future-thinking-getachew-engida/</loc>
		<lastmod>2018-10-19T08:03:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/getachew-engida.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/indigenous-connectivity-summit-participants-share-stories/</loc>
		<lastmod>2018-10-19T08:08:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Madeleine-Redfern.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/en-internet-society-estamos-profundamente-preocupados-por-los-bloqueos-de-internet-en-venezuela/</loc>
		<lastmod>2018-10-19T08:09:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr_deadhorse_367716072_bb5ee4f378_976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/the-philippines-embraces-the-multistakeholder-model-in-the-development-of-its-national-ict-ecosystem-framework-2022/</loc>
		<lastmod>2018-10-19T08:10:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/manila.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/DICT-300x200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/ISOC-300x200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/workshop-internet-governance-quezon-city/</loc>
		<lastmod>2018-10-19T08:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/IG-Training.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/nest-alert-protection-from-pwned-passwords/</loc>
		<lastmod>2018-10-19T08:17:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/nest-thermostat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/nest_alert_email-230x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/space-invaders-consumer-grade-iot-enterprise/</loc>
		<lastmod>2018-10-19T08:17:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Checklist-IoT-Enterprise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/cyber-incident-tsunami-time-get-ready/</loc>
		<lastmod>2018-10-19T08:17:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/OTA-cyber-incident-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/2017-online-trust-audit-released-what-did-we-learn/</loc>
		<lastmod>2018-10-19T08:17:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/OverallHonorRoleAchievement-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/internet-for-the-development-people-from-all-sides-is-needed/</loc>
		<lastmod>2018-10-19T08:27:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/encryption-backdoors-come-in-all-guises-reacting-to-apples-customer-letter/</loc>
		<lastmod>2018-10-19T08:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flickr-erix-19722999166-976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/the-future-internet-i-want-for-me-myself-and-ai/</loc>
		<lastmod>2018-10-19T08:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/samuel-zeller-118178-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/bringing-the-school-to-kids-the-importance-of-internet-in-times-of-conflict/</loc>
		<lastmod>2018-10-19T08:47:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/rubble.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/new-background-paper-available-about-next-weeks-oecd-ministerial-meeting-on-the-digital-economy/</loc>
		<lastmod>2018-10-19T08:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/oecd-ministerial-2016-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/wrapping-up-a-successful-wsis10-review/</loc>
		<lastmod>2018-10-19T08:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/WSIS-badges-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/setting-the-2015-wsis10-review-on-the-right-track/</loc>
		<lastmod>2018-10-19T08:47:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/womansmiling_blog-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/smart-shopping-starts-today/</loc>
		<lastmod>2018-10-19T08:51:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/shop-smart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/smart-shopping-starts-today/</loc>
		<lastmod>2018-10-19T08:51:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/shop-smart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102/</loc>
		<lastmod>2018-10-19T08:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/GCSC-at-IETF102-graphic-1-e1530085923306.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102/</loc>
		<lastmod>2018-10-19T08:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/GCSC-at-IETF102-graphic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102/</loc>
		<lastmod>2018-10-19T08:53:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/GCSC-at-IETF102-graphic-1-e1530085923306.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/tracking-dnssec-see-the-deployment-maps/</loc>
		<lastmod>2018-10-19T08:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/DNSSEC-deployment-map-March2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/tracking-dnssec-see-the-deployment-maps/</loc>
		<lastmod>2018-10-19T08:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/DNSSEC-deployment-map-March2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/tracking-dnssec-see-the-deployment-maps/</loc>
		<lastmod>2018-10-19T08:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/DNSSEC-deployment-map-March2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/at-ietf-102-the-global-commission-on-the-stability-of-cyberspace-cyber-diplomacy-meets-infosec-and-technology/</loc>
		<lastmod>2018-10-19T08:54:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/GCSC-at-IETF102-graphic-1-e1530085923306.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/new-state-of-ipv6-deployment-report/</loc>
		<lastmod>2018-10-19T08:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/01/World_IPv6_launch_badge_256.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/ndss-is-underway-in-san-diego-today/</loc>
		<lastmod>2018-10-19T08:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/zoom-watch-ion-trinidad-tobago-tomorrow/</loc>
		<lastmod>2018-10-19T08:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/ion_-trinidad-300x102.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/dns-privacy-in-new-android-9/</loc>
		<lastmod>2018-10-19T08:55:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/android-9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/DNS-over-TLS-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/DNS-over-TLS-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/DNS-over-TLS-3-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/internet-security-gets-a-boost/</loc>
		<lastmod>2018-10-19T08:56:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/TLS1.3-Badge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/internet-security-gets-a-boost/</loc>
		<lastmod>2018-10-19T08:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/TLS1.3-Badge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102/</loc>
		<lastmod>2018-10-19T08:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/to-tackle-the-vpnfilter-botnet-its-going-to-take-help-from-you-and-me/</loc>
		<lastmod>2018-10-19T08:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/router.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/encryption-isnt-perfect-thats-why-choices-are-important/</loc>
		<lastmod>2018-10-19T08:57:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/its-up-to-each-of-us-why-i-wannacry-for-collaboration/</loc>
		<lastmod>2018-10-19T08:57:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/oliver-thomas-klein-207908-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/responsible-disclosure-from-a-collaborative-security-perspective/</loc>
		<lastmod>2018-10-19T08:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/phones-71cjssb83wo-pavan-trikutam_jpg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/the-ddos-attack-against-liberia-we-must-take-collective-action-for-the-future-of-the-open-internet/</loc>
		<lastmod>2018-10-19T08:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/liberia-google-maps-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/lets-encrypt-enters-public-beta-to-increase-encryption-on-the-internet/</loc>
		<lastmod>2018-10-19T08:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/letsencrypt-logo-horizontal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/nic-br-and-the-internet-society-work-together-to-increase-routing-security-in-brazil/</loc>
		<lastmod>2018-10-19T08:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-video.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/nic-br-and-the-internet-society-work-together-to-increase-routing-security-in-brazil/</loc>
		<lastmod>2018-10-19T08:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-video.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/nic-br-and-the-internet-society-work-together-to-increase-routing-security-in-brazil/</loc>
		<lastmod>2018-10-19T08:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-video.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102-internet-of-things/</loc>
		<lastmod>2018-10-19T09:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/wouldnt-nice-trust-device/</loc>
		<lastmod>2018-10-19T09:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/iot-policymakers-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/blockchain-digital-identity-good-fit/</loc>
		<lastmod>2018-10-19T09:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/blockchain-identity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-internet-things/</loc>
		<lastmod>2018-10-19T09:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IOT3-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/rough-guide-ietf-100-internet-things/</loc>
		<lastmod>2018-10-19T09:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-e1521969062826.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/tiime-to-pay-attention-to-identity/</loc>
		<lastmod>2018-10-19T09:01:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/privacypic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/with-the-father-of-internet/</loc>
		<lastmod>2018-10-19T09:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/internet-access-and-education-transforming-lives-in-the-middle-east/</loc>
		<lastmod>2018-10-19T09:04:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/MENA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/community-networks-workshop-at-canto-annual-conference/</loc>
		<lastmod>2018-10-19T09:07:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/panama-city.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/community-networks-workshop-at-canto-annual-conference/</loc>
		<lastmod>2018-10-19T09:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/panama-city.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/07/innovative-approaches-to-connecting-indigenous-communities/</loc>
		<lastmod>2018-10-19T09:18:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Mackenzie-Road-Inuvik.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/07/innovative-approaches-to-connecting-indigenous-communities/</loc>
		<lastmod>2018-10-19T09:18:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Mackenzie-Road-Inuvik.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/enhancing-iot-security-project-continues-with-second-successful-multistakeholder-event-in-ottawa/</loc>
		<lastmod>2018-10-19T09:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Ottawa-Enhancing-IoT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/count-my-voice-demanding-an-internet-that-benefits-everyone/</loc>
		<lastmod>2018-10-19T09:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/Mary-Helda-Akongo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/08/afpif-2018-day-three-cloud-infrastructure-local-content-more/</loc>
		<lastmod>2018-10-19T10:26:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/afpif-day3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/08/afpif-day-two-connecting-cape-town-cairo/</loc>
		<lastmod>2018-10-19T10:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/afpif-day2-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/welcome-to-afpif-and-iweek-2018/</loc>
		<lastmod>2018-10-19T10:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AfPIF_Day2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/the-role-of-ixps-in-bridging-the-digital-divide/</loc>
		<lastmod>2018-10-19T10:27:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/20161117_160658.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/fourth-africa-dns-forum-to-take-place-in-marrakech-morocco/</loc>
		<lastmod>2018-10-19T10:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/morrocco1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/save-the-date-4th-africa-dns-forum-in-march-2016/</loc>
		<lastmod>2018-10-19T10:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/the-3rd-africa-dns-forum-comes-to-kenya/</loc>
		<lastmod>2018-10-19T10:27:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/kenyaq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/building-connections-in-the-republic-of-cape-verde/</loc>
		<lastmod>2018-10-19T10:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/HiRes1_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/manrs-come-from-down-under/</loc>
		<lastmod>2018-10-19T10:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/RoutingSecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/isoc-advocating-iot-trust-at-apan-46/</loc>
		<lastmod>2018-10-19T10:51:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/auckland.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/ietf-102-day-4/</loc>
		<lastmod>2018-10-19T10:52:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/ietf-102-day-3/</loc>
		<lastmod>2018-10-19T10:52:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/stephane-milot-135109-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/ietf-102-day-2/</loc>
		<lastmod>2018-10-19T10:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/ietf-102-day-1-ietf-arrive-a-montreal/</loc>
		<lastmod>2018-10-19T10:53:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102-all-about-ipv6/</loc>
		<lastmod>2018-10-19T10:54:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/isoc-advocates-good-manrs-with-european-re-community/</loc>
		<lastmod>2018-10-19T10:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/GEANT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/deploying-tls-1-3/</loc>
		<lastmod>2018-10-19T13:31:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/TLS-1-3-bottom-third.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/iot-security-is-the-heart-of-the-matter/</loc>
		<lastmod>2018-10-19T13:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Heart-Beat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-3-2-8-tls-dprive/</loc>
		<lastmod>2018-10-19T13:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/London-Phone-Booths-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/postfix-3-2-released/</loc>
		<lastmod>2018-10-19T18:03:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Postfix.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/ion-bucharest-ronog-3-the-case-for-dnssec-ipv6/</loc>
		<lastmod>2018-10-19T18:03:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/ION-Bucharest-450px-300x168.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/ION-Opening-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/IMG_0917-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/View-from-the-front-300x108.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/IMG_0918-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/promoting-routing-security-middle-east-re/</loc>
		<lastmod>2018-10-19T18:19:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/e-AGE-2017.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/ASREN.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/IMG_2252-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/ipv6-prefix-assignment-bcop-published-ripe-690/</loc>
		<lastmod>2018-10-19T18:22:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/best-practice-istock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/BCOP-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/enog-11-in-moscow/</loc>
		<lastmod>2018-10-19T18:27:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/enog11_banner-300x78.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/IMG_0512-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/IMG_0513-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/caribnog-13-lets-encrypt-dane/</loc>
		<lastmod>2018-10-19T18:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/CaribNOG-13-300x100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/deploy360-apricot-2016/</loc>
		<lastmod>2018-10-19T18:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/APRICOT-2016-300x75.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/phnog-thriller-in-manila/</loc>
		<lastmod>2018-10-19T18:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/PhNOG-2016-300x109.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/fruitful-discussions-at-apricot/</loc>
		<lastmod>2018-10-19T18:32:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/APRICOT-2016-300x75.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/APRICOT-2016-Opening-Plenary-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/Auckland-Sky-Tower-e1456748407855-225x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/icann-seeking-public-comment-ksk-rollover-process/</loc>
		<lastmod>2018-10-19T18:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Deploy360-Billboard_DNSSEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/ripe-ipv6-training-courses/</loc>
		<lastmod>2018-10-19T18:51:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/RIPE_NCC_Logo2015-300x73.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/hot-topics-ietf-100/</loc>
		<lastmod>2018-10-19T18:52:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Singapore-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ietf-logo-3-300x159.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/nlnog-day-2016/</loc>
		<lastmod>2018-10-19T18:54:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/nlnog_logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/NLNOG-Opening-300x109.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/isoc-supporting-ripe-690-netnod-meeting/</loc>
		<lastmod>2018-10-19T18:57:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Netnod-Meeting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/our-hot-topics-ietf-99/</loc>
		<lastmod>2018-10-19T18:59:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Prague-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/glif-2017-to-be-held-in-sydney/</loc>
		<lastmod>2018-10-19T19:01:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/GLIF-2017-300x124.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/ietf-102-day-5-au-revoir-montreal/</loc>
		<lastmod>2018-10-19T19:09:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/stephane-milot-135109-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/openssl-1-1-0-released/</loc>
		<lastmod>2018-10-19T19:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/OpenSSL.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/sinog-3-0-in-ljubljana/</loc>
		<lastmod>2018-10-19T19:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/SINOG-300x128.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/Ivan-Pepanjak-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/Anand-Buddhev-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/SINOG-room-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/SINOG-PC-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/akamai-state-of-the-internet/</loc>
		<lastmod>2018-10-19T19:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/12/Akamai-Logo-RGB-300x136.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/ipv6-usage-hits-10/</loc>
		<lastmod>2018-10-19T19:17:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-ipv6/</loc>
		<lastmod>2018-10-19T19:48:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-1-ipv6-iot-crypto/</loc>
		<lastmod>2018-10-19T19:49:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-3-2-8-tls-dprive/</loc>
		<lastmod>2018-10-19T19:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/London-Phone-Booths-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/deploy360ietf94-day-2-homenet-spring-sidr/</loc>
		<lastmod>2018-10-19T20:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/geoff-huston-apnic-38.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/ripe-71-highlights-from-day-2/</loc>
		<lastmod>2018-10-19T20:51:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/RIPE71_logo-300x90.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/more-on-ipv6-performance/</loc>
		<lastmod>2018-10-19T20:52:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/ripelabs_128.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/tribute-to-rob-blokzijl/</loc>
		<lastmod>2018-10-19T20:52:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/12/RobBlokzijl20102-202x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/lets-encrypt-today/</loc>
		<lastmod>2018-10-19T20:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/letsencrypt-300x106.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/is-rpki-ready-to-roa/</loc>
		<lastmod>2018-10-19T20:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/lets-encrypt-hits-1-million-certificates/</loc>
		<lastmod>2018-10-19T20:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/letsencrypt-300x106.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/see-5-in-tirana/</loc>
		<lastmod>2018-10-19T20:59:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/04/IMG_0413-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/04/IMG_0415-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/04/IMG_0417-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/ipv6-support-for-amazon-s3/</loc>
		<lastmod>2018-10-19T21:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/AmazonWebservices_Logo.svg_-300x113.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/deploy360-nlnog-day-2016/</loc>
		<lastmod>2018-10-19T21:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/nlnog_logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/rabobank-deploys-ipv6/</loc>
		<lastmod>2018-10-19T21:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/rabobank-logo68x80.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/sky-broadband-now-ipv6-enabled-for-90-of-customers/</loc>
		<lastmod>2018-10-19T21:09:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/Sky.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/final-report-on-tcpip-migration-in-1983/</loc>
		<lastmod>2018-10-19T21:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/IMG_0833-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/IMG_20121210_162958-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/IMG_0838-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/IMG_0837-225x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/09/why-you-need-ipv6-and-the-sad-tale-of-an-isp-that-didnt-deploy-it/</loc>
		<lastmod>2018-10-19T21:10:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/IPv6-image-300x175.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/cosmote-introduces-ipv6/</loc>
		<lastmod>2018-10-19T21:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/10/Cosmote.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/ipv6-inside-linkedin/</loc>
		<lastmod>2018-10-19T21:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/LinkedIn-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/light-up-the-ipv6-enabled-christmas-tree/</loc>
		<lastmod>2018-10-19T21:16:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/IPv6-Christmas-Tree-300x247.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/how-ripe-are-you-for-ipv6/</loc>
		<lastmod>2018-10-19T21:17:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/11/ripelabs_128.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/apple-to-mandate-tls-in-2017/</loc>
		<lastmod>2018-10-19T21:18:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/Apple-300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/icann-to-host-dns-symposium/</loc>
		<lastmod>2018-10-19T21:18:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/ICANN-logo-300x233.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/ripe-dns-measurements-hackathon-2017/</loc>
		<lastmod>2018-10-19T21:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/RIPE_NCC_Logo2015-300x73.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/the-network-forensics-problem-of-ipv4/</loc>
		<lastmod>2018-10-19T21:20:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Geoff-Huston@APRICOT-2017-300x149.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/securing-routing-manrs-rpsl-rpki-apricot-2017/</loc>
		<lastmod>2018-10-19T21:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Andrei@APRICOT-2017-1-300x239.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/verizon-to-stop-issuing-static-ipv4-addresses/</loc>
		<lastmod>2018-10-19T21:21:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Verizon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/google-cloud-platform-gets-ipv6-support/</loc>
		<lastmod>2018-10-19T21:21:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/Google-Cloud-Platform-300x90.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/sixxs-to-close-down/</loc>
		<lastmod>2018-10-19T21:25:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/SixXS.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/rfc-8094-dns-over-dtls-published/</loc>
		<lastmod>2018-10-19T21:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/ietf-logo-300x159.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/ripe-74-highlights-from-day-2-part-2/</loc>
		<lastmod>2018-10-19T21:28:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/IMG_0596-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/IMG_0604-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/12-steps-to-enable-ipv6-in-an-isp-network/</loc>
		<lastmod>2018-10-19T21:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/deploy360ietf99-day-5-kdo-se-moc-pta-moc-se-dozvi/</loc>
		<lastmod>2018-10-19T21:31:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Prague-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/deploy360ietf99-day-1-iot-ipv6-sidr/</loc>
		<lastmod>2018-10-19T21:31:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Prague-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/deploy360ietf99-day-2-iot-ipv6-dnssec-dpriv-tls/</loc>
		<lastmod>2018-10-19T21:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Prague-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/deploy360ietf99-day-3-ipv6-tls/</loc>
		<lastmod>2018-10-19T21:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/Prague-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/08/comcast-supporting-outbound-dane/</loc>
		<lastmod>2018-10-19T21:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/DNSSEC_thumb_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Comcast-300x106.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/dnssec-operational-il-cctld/</loc>
		<lastmod>2018-10-19T21:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/ISOC-IL.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/using-dnssec-improve-smime-security/</loc>
		<lastmod>2018-10-19T21:40:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/RoutingSecurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/10/ipv6-prefix-assignment-bcop-published-ripe-690/</loc>
		<lastmod>2018-10-19T21:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/best-practice-istock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/02/BCOP-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2017/11/deploy360ietf100-day-1-ipv6-iot/</loc>
		<lastmod>2018-10-19T22:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/100IETF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2017/11/deploy360ietf-100-day-3-sidr-tls-crypto/</loc>
		<lastmod>2018-10-19T22:01:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/first-tf-csirt-changing-face-cybersecurity/</loc>
		<lastmod>2018-10-19T22:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/first-tf-csirt-changing-face-cybersecurity/</loc>
		<lastmod>2018-10-19T22:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/security-general-blue-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/icann-seeking-public-comment-ksk-rollover-process/</loc>
		<lastmod>2018-10-19T22:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Deploy360-Billboard_DNSSEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-2-bit-rosie-lee-iot/</loc>
		<lastmod>2018-10-19T22:07:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/london-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/rough-guide-ietf-101-ipv6/</loc>
		<lastmod>2018-10-19T22:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Deploy360-Billboard_IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-2-bit-rosie-lee-iot/</loc>
		<lastmod>2018-10-19T22:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/london-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-2-bit-rosie-lee-iot/</loc>
		<lastmod>2018-10-19T22:10:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/london-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-1-ipv6-iot-crypto/</loc>
		<lastmod>2018-10-19T22:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-5-sorted-innit/</loc>
		<lastmod>2018-10-19T22:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/London-Phone-Booths-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/cloudflare-launches-enhanced-dns-service/</loc>
		<lastmod>2018-10-19T22:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/cloudflare-1-1-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/more-girls-in-ict-the-internet-society-signs-mou-with-the-mexican-government/</loc>
		<lastmod>2018-10-22T08:29:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/mexico-mou.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/MoUMexico-300x148.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/watch-live-dnssec-workshop-on-october-24-at-icann-63-in-barcelona/</loc>
		<lastmod>2018-10-23T21:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/icann63_website_banner_desktop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/new-whitepaper-explores-ways-to-make-ip-spoofing-a-problem-of-the-past/</loc>
		<lastmod>2018-10-24T09:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Security-OrangeCone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/bp-AntiSpoofing-20150904-en-cover-213x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/information-gatekeeping-not-laughing-matter/</loc>
		<lastmod>2018-10-24T10:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/Gatekeeping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/rough-guide-to-ietf-88-routing-resilience/</loc>
		<lastmod>2018-10-24T10:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/a-close-encounter-of-the-standards-kind-internet-society-rough-guide-to-ietf-88/</loc>
		<lastmod>2018-10-24T11:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/rough-guide-to-ietf-88-scalability-and-performance/</loc>
		<lastmod>2018-10-24T11:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/rough-guide-to-ietf-88-all-about-ipv6/</loc>
		<lastmod>2018-10-24T11:08:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/rough-guide-to-ietf-88-dnssec-dane-and-dns/</loc>
		<lastmod>2018-10-24T11:09:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/02/a-glimpse-into-the-state-of-internet-security/</loc>
		<lastmod>2018-10-24T11:14:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/02/Arbor-DDoS-450x157.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/isoc-togo-chapter-calls-togo-government-restore-internet-access/</loc>
		<lastmod>2018-10-24T12:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/killswitch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/new-internet-draft-considerations-on-internet-consolidation-and-the-internet-architecture/</loc>
		<lastmod>2018-10-24T13:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/vortext-paul-gilmore-1095389-unsplash_jpg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/08/local-content-in-local-languages-matters/</loc>
		<lastmod>2018-10-24T17:04:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/linda_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/from-tunis-to-baku-and-bali/</loc>
		<lastmod>2018-10-24T17:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/11/intellectual-property-rights-and-the-freedom-to-share-are-the-two-compatible/</loc>
		<lastmod>2018-10-24T17:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2010/09/the-words-of-igf/</loc>
		<lastmod>2018-10-24T17:06:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2010/09/igf2008_IGF2010-OpeningStatementsVisualisation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2010/09/igf2008_IGF2009-OpeningStatementsVisualisation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2010/09/workshop-no-26-teaching-internet-governance-experience-of-the-schools-on-ig/</loc>
		<lastmod>2018-10-24T17:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2009/12/management-of-critical-internet-resources-in-trinidad-tobago/</loc>
		<lastmod>2018-10-24T17:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2009/11/4th-internet-governance-forum-meeting-sharm-el-sheikh-14-18-november-2009/</loc>
		<lastmod>2018-10-24T17:08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2009/11/measuring-the-impact-of-internet-governance-on-sustainable-development/</loc>
		<lastmod>2018-10-24T17:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2009/11/promoting-cultural-diversity-through-cultural-heritage-in-cyberspace/</loc>
		<lastmod>2018-10-24T17:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2009/11/social-media-and-internet-governance-legal-issues-and-challenges/</loc>
		<lastmod>2018-10-24T17:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/article-13/</loc>
		<lastmod>2018-10-24T17:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/article-13/</loc>
		<lastmod>2018-10-24T17:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102-internet-infrastructure-resilience/</loc>
		<lastmod>2018-10-25T20:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/connecting-the-unconnected-the-story-of-a-visit-to-a-school-in-agua-azul-mexico/</loc>
		<lastmod>2018-10-26T15:09:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/agua-azul-title-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-01-1-450x338.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-02-road-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-03-school-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-04-pedro-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-05-server-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-06-rachel-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-07-camilo-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/agua-azul-08-girl.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-09-classroom-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/08/agua-azul-10-tower-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/caribbean-peering-interconnection-forum-streaming-live-today/</loc>
		<lastmod>2018-10-26T15:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/blog2_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/04/measure-your-bufferbloat-new-browser-based-tool-from-dslreports/</loc>
		<lastmod>2018-10-26T16:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/blog-pingresponse.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/blog-407.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/blog-pingresponse.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/04/blog-novariation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102/</loc>
		<lastmod>2018-10-29T15:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Montreal_night_view.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/the-voice-of-the-internet-society-community-early-numbers-from-ig-survey/</loc>
		<lastmod>2018-10-29T18:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/take-a-brief-survey-to-help-strengthen-internet-governance-in-2015/</loc>
		<lastmod>2018-10-29T18:02:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/internet-governance-survey-what-you-told-us/</loc>
		<lastmod>2018-10-29T18:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/PING-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/cybersecurity-is-the-top-internet-policy-concern-in-the-asia-pacific-region/</loc>
		<lastmod>2018-10-29T18:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/APACSurvey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/10-great-ways-the-internet-is-empowering-women-around-the-world/</loc>
		<lastmod>2018-10-30T10:27:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/13506266905_395f816e7a_o.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/amakomayaprojectcopyright_3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/samasource.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/hamara_copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/W2E2_copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/girlsinICT_copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/Tujiunge-copy_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/bolivia_copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/afchixcopyright.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/Niranjan-Meegammana.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/03/tackbacktech_copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/postal-services-the-future-of-digital-trust-interview-on-privacy-data-ethics-and-more/</loc>
		<lastmod>2018-10-30T10:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Screen-Shot-2015-02-24-at-10.33.22-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/Screen-Shot-2015-02-24-at-10.17.29-AM-450x370.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/un-members-strengthen-their-position-on-surveillance/</loc>
		<lastmod>2018-10-30T10:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iStock_000001277649Medium.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/12/UN-surveillance-blog_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/03/initial-routing-resilience-survey-results-show-at-least-10-of-incidents-are-real-threats/</loc>
		<lastmod>2018-10-30T10:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/Routing-Resilience-Slide-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/Routing-Resilience-Slide-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/Routing-Resilience-Slide-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/01/celebrating-new-year-2016-with-10-ipv6/</loc>
		<lastmod>2018-10-30T11:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Homepage_IPv6_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/01/IPv6-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/google-ipv6-traffic-passes-5-ipv6-internet-growing-faster-than-ipv4/</loc>
		<lastmod>2018-10-30T11:38:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Google5Percent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/explicando-a-exclusao-digital-no-brasil/</loc>
		<lastmod>2018-10-30T16:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/unconnectedconnected-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/Internet_penetration_ratePR.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/Population_3G.PR_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/Reasons_no_Internet.PR1_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/Reasons_no_Internet_populationPR.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/Need_interest_age.PR_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/rough-guide-to-ietf-103-internet-of-things/</loc>
		<lastmod>2018-10-31T10:15:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/10-extraordinary-women-in-tech-you-should-definitely-know-about/</loc>
		<lastmod>2018-10-31T12:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Ada.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Two_women_operating_ENIAC_0.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Grace_Hopper_and_UNIVAC_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/334px-Ada_Lovelace_portrait.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/7871829138_059f675b81_z_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/696px-NASA_Science_and_Engineering_Newsletter_Annie_Easley.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Kanchana-Kanchanasut_0_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Qh-Hu_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Mary_Kenneth_Keller_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/perlman-speech_0.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/06/Anriette-Esterhuysen_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/03/where-the-worlds-largest-gatherings-of-women-in-technology-gather-ghc15-and-%e2%80%aaghci15%e2%80%ac%e2%80%ac%e2%80%ac/</loc>
		<lastmod>2018-10-31T12:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/isoc.blog1__1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/03/isoc.blog2_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/the-data-driven-world-doesnt-run-on-data-it-runs-on-trust/</loc>
		<lastmod>2018-10-31T15:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Networks-Trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/anthem-data-breach-highlights-the-critical-role-we-each-play-in-cybersecurity/</loc>
		<lastmod>2018-10-31T15:48:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-16.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/iot-tales-of-horror-inspired-by-real-life-events/</loc>
		<lastmod>2018-10-31T17:59:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/iot-horror.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/iot-toys.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/rosemarys-baby-monitor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/grills-eyes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/freedom-on-the-internet-where-does-your-country-stand/</loc>
		<lastmod>2018-10-31T19:40:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/freedom-of-the-net-2015-976-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/the-long-decline-of-online-freedom/</loc>
		<lastmod>2018-10-31T19:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Smartphone-at-a-public-event.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/fotn2016_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/new-york-city-groups-take-broadband-into-their-own-hands/</loc>
		<lastmod>2018-11-01T08:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/nyc-broadband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/rough-guide-to-ietf-103/</loc>
		<lastmod>2018-11-02T17:25:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/thailand.max-4000x4000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/can-we-stop-ip-spoofing-in-the-internet/</loc>
		<lastmod>2018-11-03T00:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/backscatter-450x278.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/what-can-app-developers-learn-from-heartbleed/</loc>
		<lastmod>2018-11-03T01:22:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/heartbleed-bug.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/rough-guide-to-ietf-103-dnssec-dns-security-and-privacy/</loc>
		<lastmod>2018-11-04T23:37:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/bangkok-grand-palace.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/learning-by-doing-have-you-heard-of-the-suusamyr-community-network-in-kyrgyzstan/</loc>
		<lastmod>2018-11-05T10:43:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/suusamyr-net.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/02/chadian-youth-celebrates-the-internet-for-the-first-time/</loc>
		<lastmod>2018-11-05T17:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad1_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad2_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/chad8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/internet-society-members-across-the-globe-rally-to-call-to-action/</loc>
		<lastmod>2018-11-05T17:53:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/01/pastedImage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/isocs-hot-topics-at-ietf-103/</loc>
		<lastmod>2018-11-06T09:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Bangkok_at_night_01_MK_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/ietf-103-day-4/</loc>
		<lastmod>2018-11-07T22:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/buddhist-temple-lit-up-at-dawn-wat-arun-chao-phraya-river-bangkok-thailand_a-G-9415250-4990619.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/ietf-103-day-3-2/</loc>
		<lastmod>2018-11-06T22:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/buddhist-temple-lit-up-at-dawn-wat-arun-chao-phraya-river-bangkok-thailand_a-G-9415250-4990619.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/ietf-103-day-3/</loc>
		<lastmod>2018-11-06T14:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/buddhist-temple-lit-up-at-dawn-wat-arun-chao-phraya-river-bangkok-thailand_a-G-9415250-4990619.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/ietf-103-day-1/</loc>
		<lastmod>2018-11-06T14:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/buddhist-temple-lit-up-at-dawn-wat-arun-chao-phraya-river-bangkok-thailand_a-G-9415250-4990619.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/us-re-community-embraces-routing-security/</loc>
		<lastmod>2018-11-14T14:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Internet2-TechX.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/rough-guide-to-ietf-103-ipv6/</loc>
		<lastmod>2018-11-14T17:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/11/capitulo-honduras-comunidades-inteligentes-para-preservar-la-memoria/</loc>
		<lastmod>2018-11-15T15:46:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Azacualpa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/el-buen-fin-tips-to-shop-smart/</loc>
		<lastmod>2018-11-16T21:25:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/el-buen-fin-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/meeting-four-of-the-canadian-multistakeholder-process-enhancing-iot-security/</loc>
		<lastmod>2018-11-20T14:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/stakeholder-workshop-held-to-discuss-tajikistan-ixp-progress/</loc>
		<lastmod>2018-11-20T15:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/CRNC-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/cybersecurity-data-protection-and-iot-events-in-november-december/</loc>
		<lastmod>2018-11-26T09:05:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/inspecting-gadgets-dont-forget-the-asterisk-when-buying-smart-devices/</loc>
		<lastmod>2018-11-20T20:50:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/inspecting-gadgets-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/inspecting-gadgets-dont-forget-the-asterisk-when-buying-smart-devices/</loc>
		<lastmod>2018-11-20T20:51:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/inspecting-gadgets-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/route-leak-caused-a-major-google-outage/</loc>
		<lastmod>2018-11-22T03:05:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/RoutingSecurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Screenshot-2018-11-15-05.05.41-361x450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Screenshot-2018-11-15-05.06.25-450x204.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Screenshot-2018-11-15-04.46.07-432x450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Screenshot-2018-11-15-17.29.56-450x400.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Screenshot-2018-11-15-17.34.47-450x318.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/collaborative-governance-leaders-canada-and-senegal-exchange-notes-on-iot-security-frameworks/</loc>
		<lastmod>2018-11-26T10:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/ottawa-senegal-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/12/making-education-accessible-vashkar-bhattacharjees-story-part-two/</loc>
		<lastmod>2018-11-29T17:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/12/YPSA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/a-critical-first-step-for-iot-security-in-senegal/</loc>
		<lastmod>2018-12-04T13:57:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/senegal-mou.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/a-critical-first-step-for-iot-security-in-senegal/</loc>
		<lastmod>2018-12-04T13:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/senegal-mou.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2018/12/nuevo-informe-los-principales-comercios-en-linea-aumentan-la-confianza-en-el-marketing-por-correo-electronico-y-adoptan-las-mejores-practicas-sobre-cancelacion-de-suscripciones/</loc>
		<lastmod>2018-12-04T19:49:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/best-practice-istock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Infographic-pg1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Infographic-pg2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/12/nouveau-rapport-les-principaux-sites-de-vente-en-ligne-ameliorent-la-fiabilite-de-leur-marketing-electronique-et-respectent-les-recommandations-en-matiere-de-desabonnement/</loc>
		<lastmod>2018-12-04T19:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/best-practice-istock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Infographic-pg1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Infographic-pg2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/internet-society-netblocks-team-keep/</loc>
		<lastmod>2018-12-10T11:05:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/COSTTool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/12/the-benin-chapter-wins-chapterthon-2018/</loc>
		<lastmod>2018-12-10T13:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Chapterthon_Blog_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/customer-data-isnt-always-an-asset-lessons-from-the-marriott-data-breach/</loc>
		<lastmod>2018-12-10T13:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/marriott-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/join-us-to-discuss-attack-response-at-internet-scale/</loc>
		<lastmod>2018-12-10T13:24:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/nominations-now-open-for-2019-public-interest-registry-pir-board-of-directors/</loc>
		<lastmod>2018-12-10T13:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/join-us-to-discuss-attack-response-at-internet-scale/</loc>
		<lastmod>2018-12-12T09:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/senegal-kicks-off-enhancing-iot-security-project/</loc>
		<lastmod>2018-12-13T12:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/iot-senegal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/senegal-kicks-off-enhancing-iot-security-project/</loc>
		<lastmod>2018-12-13T12:18:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/iot-senegal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/watch-state-net-2018-live-monday-january-29/</loc>
		<lastmod>2018-12-13T20:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/sotn-main-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/leading-uruguayan-students-to-thrive-in-the-future-economy/</loc>
		<lastmod>2018-12-14T16:57:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Flor-de-Ceibo_ISOC_Uruguay.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/foto-MJMorales-b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/the-internet-society-and-global-scribes-work-together-to-amplify-young-voices/</loc>
		<lastmod>2018-12-20T11:25:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/Global-Scribes.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/creating-networks-youth-and-internet-governance/</loc>
		<lastmod>2018-12-20T14:32:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Youth_Observatory_ISOC_cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Youth_Observatory_profile_image-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/open-internet-for-all/</loc>
		<lastmod>2018-12-24T10:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/girlslookingataphone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/05/let-a-thousand-flowers-bloom-fm/</loc>
		<lastmod>2018-12-24T10:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/flowers-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/apricot-2018-fellows/</loc>
		<lastmod>2018-12-25T13:43:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/APRICOT2018-blog-banner-555x202-04-01-555x202.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/athirah-rosli-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/anand-raje.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hsu-myat-thwe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/see-7-connectivity-routing-security-iot/</loc>
		<lastmod>2018-12-26T10:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/SEE-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/sinog-5-ipv6-dns-privacy-and-iot-security/</loc>
		<lastmod>2018-12-26T10:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/SINOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/ripe-76-sees-strong-focus-on-routing-security/</loc>
		<lastmod>2018-12-26T10:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Marseille-Vieux-Port-e1526629892445.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/rough-guide-to-ietf-102-dnssec-dane-dns-security-and-privacy/</loc>
		<lastmod>2018-12-26T10:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/Deploy360-Billboard_DNSSEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/cloudflare-launches-enhanced-dns-service/</loc>
		<lastmod>2018-12-26T10:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/cloudflare-1-1-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/dns-privacy-solutions-emerging-but-deployment-lags/</loc>
		<lastmod>2018-12-26T10:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/PrivacyReportCover_rightcolumn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/dns-privacy-and-route-aggregation-research-awarded-2015-anrp-2016-nominations-open/</loc>
		<lastmod>2018-12-26T10:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/irtf-logo-1600-300x214.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/sanog-32-another-success-story-for-manrs/</loc>
		<lastmod>2018-12-26T10:17:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/sanog-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/39007505_2296438290381249_2301094239968165888_n-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/38840013_479589479120072_8128317283756933120_n-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/manrs-sanog-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/network-sec-2-300x225.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/network-sec-3-225x300.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/network-sec-1-300x225.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/network-sec-participants-300x200.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/even-better-manrs-during-august/</loc>
		<lastmod>2018-12-26T10:18:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/0004_MANRS_Hero_Images_R6_2-e1552917838448.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/IMG_0483-123x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/G33A1912-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/G33A2048-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/20180824-IMG_8647-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/20180824-IMG_8916-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/20180824-IMG_8938-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/NetworkSec-INNOG-300x225.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/INNOG-MoU-300x235.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/manrs-bcop-published-as-ripe-document/</loc>
		<lastmod>2018-12-26T10:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/RIPE-706-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/MANRS_square-5-e1524571710566-300x218.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/afpif-2018-kicks-off/</loc>
		<lastmod>2018-12-26T11:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/AfPIF-day-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/afpif-day-two-connecting-cape-town-cairo/</loc>
		<lastmod>2018-12-26T11:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/afpif-day2-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/11/the-ubernet-is-not-a-fait-accompli/</loc>
		<lastmod>2018-12-28T11:51:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/pulaski_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/the-week-in-internet-news-australia-adopts-controversial-encryption-law/</loc>
		<lastmod>2018-12-31T11:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/future-thinking-orla-lynskey/</loc>
		<lastmod>2018-12-31T11:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Orla-Lynskey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/jason-donenfeld-honored-with-the-isrgs-radiant-award/</loc>
		<lastmod>2018-12-31T11:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/jason-donenfeld-headshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/jason-donenfeld-honored-with-the-isrgs-radiant-award/</loc>
		<lastmod>2018-12-31T11:02:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/jason-donenfeld-headshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2018/12/murambinda-works-community-engagement-workshop/</loc>
		<lastmod>2019-01-02T15:30:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/murambinda-works-workshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/dns-privacy-in-linux-systemd/</loc>
		<lastmod>2019-01-10T14:47:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/DNS-over-TLS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-1-450x299.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-2-450x299.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-3-450x301.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/dns-privacy-in-linux-systemd/</loc>
		<lastmod>2019-01-10T14:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/DNS-over-TLS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-1-450x299.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-2-450x299.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/systemd-Config-3-450x301.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/how-far-are-you-from-the-internet/</loc>
		<lastmod>2019-01-10T14:48:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/sammie-vasquez-549428-unsplash-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/how-far-are-you-from-the-internet/</loc>
		<lastmod>2019-01-10T14:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/sammie-vasquez-549428-unsplash-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/afpif-2018-day-three-cloud-infrastructure-local-content-more/</loc>
		<lastmod>2019-01-18T12:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/afpif-day3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2019/01/update-on-lac-workshop-for-chapter-leaders/</loc>
		<lastmod>2019-01-21T16:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/LACWorkshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/nat64check-version-2-is-launched/</loc>
		<lastmod>2019-01-25T17:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/NAT64Check.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/NAT64Check-v2-output-172x450.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/future-thinking-orla-lynskey/</loc>
		<lastmod>2019-01-25T21:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Orla-Lynskey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/call-for-participation-icann-dnssec-workshop-at-icann64-in-kobe-japan/</loc>
		<lastmod>2019-01-30T14:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/icann64-kobe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/12/ipv6-privacy-addresses-provide-protection-against-surveillance-and-tracking/</loc>
		<lastmod>2019-02-01T09:30:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/starting-june-1-apple-requires-all-ios-apps-to-work-in-ipv6-only-networks/</loc>
		<lastmod>2019-02-01T09:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/05/apple-ios-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/working-to-keep-the-internet-open-in-yemen/</loc>
		<lastmod>2019-02-01T20:45:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/isoc-yemen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/dns-security-privacy-discussed-at-e-age18/</loc>
		<lastmod>2019-02-01T20:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/e-AGE18.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/e-AGE18-Opening-450x338.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/IMG_0094-e1545372100396-338x450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/ASREN.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/call-on-your-government-to-support-encryption/</loc>
		<lastmod>2019-02-01T20:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/chain-e1532358620537.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2010/09/igf-2010-in-vilnius-lithuania-gets-underway-with-internet-society-isoc-diplofoundation-giganet-and-apc-events/</loc>
		<lastmod>2019-02-04T11:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2010/09/igf2008_CIMG0165_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2010/09/igf2008_CIMG0176.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2010/09/igf2008_CIMG0169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2012/07/internet-governance-what-is-enhanced-cooperation/</loc>
		<lastmod>2019-02-04T12:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/the-trans-pacific-partnership-agreement-risks-harming-the-internet/</loc>
		<lastmod>2019-02-04T12:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/global-panel-to-address-future-of-internet-governance/</loc>
		<lastmod>2019-02-04T12:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/panel-on-global-internet-cooperation-and-governance-mechanisms/</loc>
		<lastmod>2019-02-04T12:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/10/building-bridges-enhancing-multistakeholder-cooperation-for-growth-and-sustainable-development/</loc>
		<lastmod>2019-02-04T12:35:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/06/smart-development/</loc>
		<lastmod>2019-02-04T12:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/01/i-just-want-to-communicate-confidentially-is-that-too-much-to-ask/</loc>
		<lastmod>2019-02-04T14:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/onlinecommunicationsecret.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/discussing-internet-related-challenges-and-progress-in-the-pacific-islands-pacinet-2015/</loc>
		<lastmod>2019-02-04T17:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/PacINET.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/isocs-hot-topics-ietf-100/</loc>
		<lastmod>2019-02-04T17:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-brass-tacks-dns-routing/</loc>
		<lastmod>2019-02-04T17:49:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/london-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/ietf-101-day-5-sorted-innit/</loc>
		<lastmod>2019-02-04T17:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/London-Phone-Booths-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/11/deploy360ietf100-day-4-doh-woohoo/</loc>
		<lastmod>2019-02-04T17:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/IPv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/amazons-route-53-bgp-hijack/</loc>
		<lastmod>2019-02-04T17:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/dos-attack-cyber-unsafe-security-e1526631203556.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.23.35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.32.32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.24.39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-16.25.27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.38.45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.53.39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/Screenshot-2018-04-26-20.57.25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/12/follow-deploy360-on-soundcloud-to-hear-our-audio-updates-and-event-recordings/</loc>
		<lastmod>2019-02-04T17:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/soundcloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/tnc18-routing-iot-time-security/</loc>
		<lastmod>2019-02-04T18:04:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Lerkendal-Stadium.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Lego-Figure-225x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/MANRS-Poster-225x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/getting-to-better-reflecting-on-ongoing-privacy-and-identity-work/</loc>
		<lastmod>2019-02-05T18:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Identity2-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/06/ethical-data-handling-and-facebooks-emotional-contagion-study/</loc>
		<lastmod>2019-02-05T18:42:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/issues_small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/will-artificial-intelligence-change-the-world-for-the-better-or-worse-read-our-new-policy-paper/</loc>
		<lastmod>2019-02-06T12:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/StockSnap_WUBMLJRYEK-e1521968487421.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/dns-flag-day/</loc>
		<lastmod>2019-02-08T14:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/DNS-Flag-Day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/do-you-want-privacy-with-that/</loc>
		<lastmod>2019-02-12T16:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/advocate-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/future-thinking-chris-riley/</loc>
		<lastmod>2019-02-14T01:06:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/chris-riley.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/future-thinking-natali-helberger/</loc>
		<lastmod>2019-02-14T01:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Helberger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-what3words-ip-addresses-for-the-real-world/</loc>
		<lastmod>2019-02-14T01:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/what3words-crop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/future-thinking-biddemu-bazil-mwotta/</loc>
		<lastmod>2019-02-14T01:09:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Biddemu-Bazil-Mwotta.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/future-thinking-augusto-mathurin/</loc>
		<lastmod>2019-02-14T01:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/augusto-mathurin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/future-thinking-getachew-engida/</loc>
		<lastmod>2019-02-14T01:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/getachew-engida.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/future-thinking-wired-editor-chief-nicholas-thompson-role-media-2/</loc>
		<lastmod>2019-02-14T01:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/nicholas-thompson.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-thinking-cyrating-cyber-threats/</loc>
		<lastmod>2019-02-14T01:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/CYRATING.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/future-thinking-harlem-desir/</loc>
		<lastmod>2019-02-14T01:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/HarlemDesir.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/01/future-thinking-paula-corte-real-freedom-expression-online/</loc>
		<lastmod>2019-02-14T01:15:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/PaulaCorteRealPanel.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/future-thinking-niel-harper-cyber-threats-2/</loc>
		<lastmod>2019-02-14T01:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/niel-harper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/future-thinking-alissa-cooper-technical-impact-internet-consolidation/</loc>
		<lastmod>2019-02-14T01:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/alissa-cooper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/future-thinking-chris-yiu/</loc>
		<lastmod>2019-02-14T01:17:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/chris-yiu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/future-thinking-orla-lynskey/</loc>
		<lastmod>2019-02-14T01:18:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/Orla-Lynskey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/future-thinking-payal-malik-competition-commission-of-india/</loc>
		<lastmod>2019-02-14T01:19:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Payal-Malik.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/kathy-browns-op-ed-canadas-hill-times/</loc>
		<lastmod>2019-02-14T10:34:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hill-op-ed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/community-network-champions-take-a-rural-dip-in-india/</loc>
		<lastmod>2019-02-14T10:52:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/def-cn-champs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/future-thinking-arnaud-castaignet-on-e-citizenship/</loc>
		<lastmod>2019-02-14T12:23:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Arnaud-C_Web-Summit-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/moving-forward-to-an-internet-thats-interplanetary-in-scope-and-function/</loc>
		<lastmod>2019-02-20T12:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/interplanetary_sig.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/celebrating-25-years-advocacy/</loc>
		<lastmod>2019-02-20T12:29:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25th.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/internet-societys-25th-anniversary-renewal-commitment/</loc>
		<lastmod>2019-02-20T12:33:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25thCake.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/the-week-in-internet-news-many-ugandans-quit-internet-services-after-tax-on-social-media/</loc>
		<lastmod>2019-03-04T13:51:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/is-the-internet-shrinking-the-global-internet-report-consolidation-in-the-internet-economy-explores-this-question/</loc>
		<lastmod>2019-03-05T13:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/bg_2019-hero.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/internet-society-welcomes-the-dominica-chapter/</loc>
		<lastmod>2019-03-07T21:14:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/Blog_Dominica_Chapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/Melisha.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/investing-in-indigenous-connectivity-is-an-investment-in-our-future-online/</loc>
		<lastmod>2019-03-07T21:21:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Arctic-Satellite-ics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/is-the-internet-shrinking-the-global-internet-report-consolidation-in-the-internet-economy-explores-this-question/</loc>
		<lastmod>2019-03-07T21:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/bg_2019-hero.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2019/01/emerging-technologies-bridging-the-digital-gap-in-africa/</loc>
		<lastmod>2019-03-07T21:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Zenzelini-community-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/internet-society-welcomes-the-dominica-chapter/</loc>
		<lastmod>2019-03-07T21:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/Blog_Dominica_Chapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/Melisha.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/is-the-internet-shrinking-the-global-internet-report-consolidation-in-the-internet-economy-explores-this-question/</loc>
		<lastmod>2019-03-07T21:40:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/bg_2019-hero.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/investing-in-indigenous-connectivity-is-an-investment-in-our-future-online/</loc>
		<lastmod>2019-03-07T21:41:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Arctic-Satellite-ics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2019/01/emerging-technologies-bridging-the-digital-gap-in-africa/</loc>
		<lastmod>2019-03-07T21:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Zenzelini-community-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/ipv6-security-faq/</loc>
		<lastmod>2019-03-12T01:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cybersecurity_0-29.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/the-week-in-internet-news-companies-encouraged-to-conduct-q-ai/</loc>
		<lastmod>2019-03-12T11:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/slaac-renum-reaction/</loc>
		<lastmod>2019-03-12T18:41:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Homepage_IPv6_1-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/scenario-443x450.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/apnic-enhances-support-for-routing-security/</loc>
		<lastmod>2019-03-12T18:43:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/RoutingSecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/02/good-bgp-neighbours-apricot-2019/</loc>
		<lastmod>2019-03-12T18:46:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/apricot2019.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/celebrating-the-30th-anniversary-of-the-world-wide-web/</loc>
		<lastmod>2019-03-12T22:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/www-info-cern-ch.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/celebrating-the-30th-anniversary-of-the-world-wide-web/</loc>
		<lastmod>2019-03-12T22:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/www-info-cern-ch.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/fact-or-fiction-with-iot-its-not-always-clear/</loc>
		<lastmod>2019-03-15T08:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/iot-fact-or-fiction.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/naomi-hebert-188183-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/brian-patrick-tagalog-680956-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/jose-soriano-1230119-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/quenten-janssen-588368-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/seeking-canadian-feedback-draft-report-on-securing-the-internet-of-things-in-canada/</loc>
		<lastmod>2019-03-15T17:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/outgoing-ietf-chair-governments-should-embrace-internet-standards/</loc>
		<lastmod>2019-03-18T11:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/03/whats-happening-at-the-ietf/</loc>
		<lastmod>2019-03-18T11:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/the-week-in-internet-news-four-visions-of-the-internet/</loc>
		<lastmod>2019-03-18T16:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/concluding-the-ietf-rough-guide-long-live-the-ietf-blog/</loc>
		<lastmod>2019-03-19T15:42:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ietf-logo-3-e1526047165787.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/blog/2019/03/celebration-du-1er-anniversaire-du-chapitre-guineen-de-linternet-society/</loc>
		<lastmod>2019-03-20T16:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/ISOC-Guinea-Chapter_anniversaire.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/fact-or-fiction-with-iot-its-not-always-clear/</loc>
		<lastmod>2019-03-20T18:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/naomi-hebert-188183-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/brian-patrick-tagalog-680956-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/jose-soriano-1230119-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/quenten-janssen-588368-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/deutsche-welle-profiles-community-networks-around-the-world/</loc>
		<lastmod>2019-03-20T18:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/fact-or-fiction-with-iot-its-not-always-clear/</loc>
		<lastmod>2019-03-20T18:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/naomi-hebert-188183-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/brian-patrick-tagalog-680956-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/jose-soriano-1230119-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/quenten-janssen-588368-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/deutsche-welle-profiles-community-networks-around-the-world/</loc>
		<lastmod>2019-03-20T18:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/making-the-internet-better-together-at-apricot-2019%ef%bb%bf/</loc>
		<lastmod>2019-03-20T19:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/apricot2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/ixdo-project-an-internet-exchange-point-in-the-dominican-republic/</loc>
		<lastmod>2019-03-20T19:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/IXDO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/seeking-canadian-feedback-draft-report-on-securing-the-internet-of-things-in-canada/</loc>
		<lastmod>2019-03-20T19:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/Draft-Report-Securing-IoT-Canada.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/coming-togther-for-an-all-inclusive-and-accessible-internet-in-south-asia/</loc>
		<lastmod>2019-03-22T02:26:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/Accessible-Internet-South-Asia.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/650-million.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/internet-resilience-discussions-at-ietf-104/</loc>
		<lastmod>2019-03-22T09:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/IETF104-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/seven-women-using-the-internet-to-make-a-difference/</loc>
		<lastmod>2019-03-22T16:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/makkiya-shine-the-light.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/Ithabeleng-Moreke.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/jazmin-fallas-kerr.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/juma-baldeh.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/KateEkanem-IWD.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Makkiya-IWD-profile.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/LayalJebran-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/KimberlyClaffy-StonehousePhotographic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/deutsche-welle-profiles-community-networks-around-the-world/</loc>
		<lastmod>2019-03-23T11:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Zenzelini-community-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/World-in-Progress-Zimbabwe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/World-in-Progress-Georgia.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/World-in-Progress-South-Africa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/the-week-in-internet-news-russia-moves-toward-test-of-internet-disconnect/</loc>
		<lastmod>2019-03-25T14:19:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/join-a-local-ietf-viewing-hub-in-africa/</loc>
		<lastmod>2019-03-26T14:23:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/ietf-viewing-hub-africa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/nominations-open-jonathan-b-postel-service-award-2019/</loc>
		<lastmod>2019-03-27T16:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/Jon-Postel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/what-is-the-internet-model-of-networking/</loc>
		<lastmod>2019-03-27T17:37:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/Internet-Model-Networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/03/iot-security-privacy-vital-from-the-outset/</loc>
		<lastmod>2019-03-29T15:19:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/IOT-Security-Delhi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-week-in-internet-news-u-s-census-seeks-help-with-fake-news-from-tech-giants/</loc>
		<lastmod>2019-04-01T19:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/ccaoi-isoc-delhi-webinar-on-the-draft-national-e-commerce-policy/</loc>
		<lastmod>2019-04-02T16:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/CCAOI-ISOC-Delhi-Webinar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/enabling-the-next-generation-of-community-network-builders-a-report-on-cnxapac-2018-and-cn-champs/</loc>
		<lastmod>2019-04-03T16:21:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/CNXAPAC-2018-CN-Champs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/celebrating-50-years-of-the-rfcs-that-define-how-the-internet-works/</loc>
		<lastmod>2019-04-08T06:33:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/rfc1-featured.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-week-in-internet-news-facebook-calls-for-new-internet-regulations/</loc>
		<lastmod>2019-04-08T17:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/internet-society-and-unesco-offer-a-capacity-building-program-for-judges/</loc>
		<lastmod>2019-04-09T16:06:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/capacity-building-program-judges.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/internet-society-and-unesco-offer-a-capacity-building-program-for-judges/</loc>
		<lastmod>2019-04-09T16:20:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/capacity-building-program-judges.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/safer-internet-day-2019-malaysia-gears-up-for-cyber-wellness/</loc>
		<lastmod>2019-04-10T17:56:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/safer-internet-day-malaysia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/celebrating-50-years-of-the-rfcs-that-define-how-the-internet-works/</loc>
		<lastmod>2019-04-11T09:08:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/celebrating-50-years-of-the-rfcs-that-define-how-the-internet-works/</loc>
		<lastmod>2019-04-11T09:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/internet-of-things-devices-as-a-ddos-vector/</loc>
		<lastmod>2019-04-11T12:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-e1521969062826.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/collaboration-connectivity-and-self-determination/</loc>
		<lastmod>2019-04-11T18:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/CrystalFraser.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/Dinjii-Zhuh-landscape.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/crystal-fraser-daughter.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/CrystalFraser-laptop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/John-Norbert.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/the-internet-is-knowledge-and-knowledge-is-power/</loc>
		<lastmod>2019-04-12T14:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Bolutife-Adisa.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/because-our-future-depends-on-it/</loc>
		<lastmod>2019-04-12T14:31:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Esther-H-Mwema.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/emerging-technologies-bridging-the-digital-gap-in-africa/</loc>
		<lastmod>2019-04-12T14:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/Zenzelini-community-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/how-far-are-you-from-the-internet/</loc>
		<lastmod>2019-04-12T14:31:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/sammie-vasquez-549428-unsplash-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/fellows-impressions-of-the-igf-and-the-youthigf-program/</loc>
		<lastmod>2019-04-12T14:33:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/jacob-ufkes-195221-unsplash-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/2018-Youth@IGF-Fellows-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/privacy-first-for-security-companies/</loc>
		<lastmod>2019-04-15T12:42:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Camera-With-Flags.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/07/reaffirming-the-internet-as-a-force-for-good-the-next-25-years/</loc>
		<lastmod>2019-04-15T12:55:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ChathamHouse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-week-in-internet-news-tech-giants-ethical-ai-efforts-scrutinized/</loc>
		<lastmod>2019-04-15T14:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/larger-facebook-cambridge-analytica-question-really-signed/</loc>
		<lastmod>2019-04-16T19:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/luiz-hanfilaque-342635-unsplash-1280x515px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/blog/2019/04/aplicaciones-abiertas-capacitacion-para-nuevos-lideres-de-capitulos-en-america-latina-y-el-caribe/</loc>
		<lastmod>2019-04-17T16:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/lac-pilot-program.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/2019-internet-society-board-of-trustees-final-election-results-ietf-appointment/</loc>
		<lastmod>2019-04-18T16:03:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-week-in-internet-news-arkansas-reverses-ban-on-municipal-broadband/</loc>
		<lastmod>2019-04-22T13:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/10-years-of-auditing-online-trust-whats-changed/</loc>
		<lastmod>2019-04-22T16:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/OTA-header-website.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-internet-of-things-why-trust-by-design-matters/</loc>
		<lastmod>2019-04-25T07:17:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/markus-spiske-1055858-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/equals-in-tech-awards-nominations-now-open/</loc>
		<lastmod>2019-04-26T12:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/equals-in-tech-nominations-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/consumers-international-summit-making-iot-privacy-and-security-a-priority/</loc>
		<lastmod>2019-04-26T12:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/pexels-photo-1615815-e1545822793345.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-week-in-internet-news-microsoft-reduces-password-count/</loc>
		<lastmod>2019-04-29T14:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/the-economics-of-trust-overcoming-obstacles-to-better-consumer-iot-security/</loc>
		<lastmod>2019-04-29T16:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/Economics-of-Trust-paper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/how-the-internet-societys-privacy-statement-stacks-up/</loc>
		<lastmod>2019-05-02T13:39:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/privacy-policies-internet-society.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/registration-for-afpif-2019-open/</loc>
		<lastmod>2019-05-02T14:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/afpif-image-from-2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/registration-for-afpif-2019-open/</loc>
		<lastmod>2019-05-02T17:44:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/afpif-image-from-2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/2019-internet-society-board-of-trustees-final-election-results-ietf-appointment/</loc>
		<lastmod>2019-05-06T11:08:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/2019-internet-society-board-of-trustees-final-election-results-ietf-appointment/</loc>
		<lastmod>2019-05-06T11:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/10-years-of-auditing-online-trust-whats-changed/</loc>
		<lastmod>2019-05-06T11:08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/the-week-in-internet-news-unencrypted-usb-drives-pose-security-risk/</loc>
		<lastmod>2019-05-06T14:02:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/talking-internet-of-things-in-canada-at-iot613-this-week/</loc>
		<lastmod>2019-05-06T16:56:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/young-people-building-an-internet-for-everyone/</loc>
		<lastmod>2019-05-13T11:24:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/pamela-gonzales-bolivia-tech-hub.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/the-week-in-internet-news-broadband-project-to-nowhere/</loc>
		<lastmod>2019-05-13T13:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/leaders-of-the-g7-a-safer-world-means-strong-secure-communication/</loc>
		<lastmod>2019-05-13T15:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/warren-wong-238678-unsplash-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/whatsapp-how-a-bug-relates-to-the-g7/</loc>
		<lastmod>2019-05-14T17:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/WhatsApp-How-Bug-Relates-G7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/my-privacy-online-championing-trust-in-the-era-of-iot/</loc>
		<lastmod>2019-05-16T09:42:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/data-privacy-jordan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/03/enhancing-iot-security-kicks-off-ottawa/</loc>
		<lastmod>2019-05-16T09:45:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/ottawa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/considerations-regarding-encryption-and-exceptional-access-briefing/</loc>
		<lastmod>2019-05-16T09:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/Encryption-Access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/canadian-youth-advocates-participate-in-enhancing-iot-project/</loc>
		<lastmod>2019-05-16T09:46:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/canadian-youth-iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/us-senate-makes-moves-to-reinstate-net-neutrality-but-sustainable-rules-are-still-necessary/</loc>
		<lastmod>2019-05-16T09:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/cra-vote.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/the-piikani-cultural-and-digital-literacy-camp-program/</loc>
		<lastmod>2019-05-16T09:46:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/Pikani_Blackfoot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/04/consent-privacy-is-key-to-reinforcing-trust/</loc>
		<lastmod>2019-05-16T09:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/consent-act.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/envisioning-the-future-in-the-middle-east/</loc>
		<lastmod>2019-05-16T19:17:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/mitscitech.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/dont-be-a-tool-verifying-subscriptions-and-honoring-unsubscribes/</loc>
		<lastmod>2019-05-17T15:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/the-week-in-internet-news-san-francisco-bans-use-of-facial-recognition-by-police/</loc>
		<lastmod>2019-05-20T13:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/10/routing-and-water-are-all-about-trust/</loc>
		<lastmod>2019-05-20T16:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/routing-security-policymakers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/internet-societys-new-policy-brief-series-provides-concise-information-on-critical-internet-issues/</loc>
		<lastmod>2019-05-27T11:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/policy-briefs-intro-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/11/igf-2015-tackling-key-challenges-with-everyone-at-the-table/</loc>
		<lastmod>2019-05-27T11:28:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/igf2015-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/08/lacigf-and-elac-internet-governance-events-in-mexico-this-week/</loc>
		<lastmod>2019-05-27T12:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/lacigf8-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/inet-colombo-celebrating-20-years-of-the-internet-in-sri-lanka/</loc>
		<lastmod>2019-05-27T12:03:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/inet-colombo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/net-users-in-apac-want-to-participate-in-internet-policymaking/</loc>
		<lastmod>2019-05-27T12:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/the-week-in-internet-news-broadband-goes-to-space/</loc>
		<lastmod>2019-05-27T21:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/your-voice-matters-the-world-can-learn-from-canadas-inclusive-solutions-to-make-citizens-safer-online/</loc>
		<lastmod>2019-05-28T11:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/04/canadian-iot-event.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/IoTReportCover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/finding-common-ground-on-us-net-neutrality/</loc>
		<lastmod>2019-05-29T10:51:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/washington.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/announcing-the-online-trust-audit-honor-roll-results/</loc>
		<lastmod>2019-05-29T19:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/growing-an-internet-exchange-in-burkina-faso/</loc>
		<lastmod>2019-05-31T14:57:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/Burkina-Faso-BIXP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/burkina-faso-ixp-stats.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/05/reducing-barriers-recap-of-the-webinar-on-digital-accessibility/</loc>
		<lastmod>2019-05-31T16:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/reducing-barriers-digital-accessibility.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/olaf-kolkman-speaking-on-internet-of-things-iot-security-in-dc-and-ny-this-week/</loc>
		<lastmod>2019-05-31T19:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IOT3-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/04/reaching-the-next-level-for-online-trust/</loc>
		<lastmod>2019-05-31T19:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ota-logo-976px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/03/ota-response-to-ntia-iot-green-paper/</loc>
		<lastmod>2019-05-31T19:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/02/the-internet-of-things-as-an-attack-tool/</loc>
		<lastmod>2019-05-31T19:50:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-e1521969062826.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/12/princetons-war-of-the-lights-the-pitfalls-of-enterprise-level-iot-projects/</loc>
		<lastmod>2019-05-31T19:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/baseball-1553412_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/paul-vixie-market-pressure-to-churn-out-iot-products-key-cause-of-compromised-safety-security/</loc>
		<lastmod>2019-05-31T19:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/paul-vixie-grey-976.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/iot-threats-what-we-can-do-today-and-tomorrow/</loc>
		<lastmod>2019-05-31T19:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/iot-global.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/11/us-ntia-multistakeholder-process-internet-of-things-iot-security-upgradability-and-patching/</loc>
		<lastmod>2019-05-31T19:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IoT-header-976px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/trust-isnt-easy-drawing-an-agenda-from-fridays-ddos-attack-and-the-internet-of-things/</loc>
		<lastmod>2019-05-31T19:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/dyn-ddos-attack-downdetector-level3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/10/the-road-to-yasmine-hammamet-expectations-for-wtsa-16/</loc>
		<lastmod>2019-05-31T19:55:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/WTSA-16.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/07/promoting-internet-of-things-iot-through-ietf-africa-initiative/</loc>
		<lastmod>2019-05-31T19:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-Africa-Meeting-IETF-96-Berlin-007.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/ISOC-Africa-Meeting-IETF-96-Berlin-002_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/07/ISOC-Africa-Meeting-IETF-96-Berlin-004_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/oecd-ministerial-technical-community-highlights-key-enablers-for-the-future-of-the-digital-economy/</loc>
		<lastmod>2019-05-31T19:56:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/itac-forum-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/video-olaf-kolkmans-tnc-16-keynote-on-collaborative-security-and-the-internet-of-things/</loc>
		<lastmod>2019-05-31T19:56:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/06/planting-the-seeds-of-the-internet-of-things-in-africa/</loc>
		<lastmod>2019-05-31T19:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/01_Beyond_the_Net_Zimbabwe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/02_Beyond_the_Net_Zimbabwe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/informal-meeting-of-internet-coordination-and-standardization-organizations/</loc>
		<lastmod>2019-05-31T19:56:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iStock_000032920990Small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/beyond-the-net-november-cycle-2015-summaries/</loc>
		<lastmod>2019-05-31T19:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/kids2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/innovate-or-die-asian-smes-move-to-cloud-computing/</loc>
		<lastmod>2019-05-31T19:57:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/20151123_161918_0-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/marconi-prize-awarded-to-peter-kirstein-symposium-discusses-internet-of-things/</loc>
		<lastmod>2019-05-31T19:59:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Kirstein_Marconi2015.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/teslas-software-update-to-enable-self-driving-cars-both-delights-and-concerns-me/</loc>
		<lastmod>2019-05-31T20:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/tesla-jt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/10/internet-society-releases-internet-of-things-iot-overview-whitepaper-understanding-the-issues-and-challenges-of-a-more-connected-world/</loc>
		<lastmod>2019-05-31T20:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IOT3-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/07/whats-your-answer-opting-out-of-the-iot/</loc>
		<lastmod>2019-05-31T20:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-of-Things-IoT-12.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/06/inclusion-of-things-iot-problem-spaces-and-opportunities-for-collaboration/</loc>
		<lastmod>2019-05-31T20:03:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/AIS-Seoul.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/03/certification-model-for-iot/</loc>
		<lastmod>2019-05-31T20:04:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/08/blog-chronicles-a-couples-automation-of-their-home-using-ipv6/</loc>
		<lastmod>2019-05-31T20:04:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/08/Our-adventures-in-IPv6-home-automation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/new-report-major-online-retailers-increase-email-marketing-trustworthiness-and-follow-unsubscribe-best-practices-2/</loc>
		<lastmod>2019-05-31T20:39:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/infographic-pg1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/infographic-pg2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/the-week-in-internet-news-germany-considers-banning-encryption-on-chat-apps/</loc>
		<lastmod>2019-06-03T14:53:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/make-a-difference-in-your-community-apply-for-a-beyond-the-net-grant/</loc>
		<lastmod>2019-06-05T16:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/zaria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/equals-in-tech-awards-nominations-now-open/</loc>
		<lastmod>2019-06-06T15:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/equals-in-tech-nominations-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/equals-in-tech-awards-nominations-now-open/</loc>
		<lastmod>2019-06-06T15:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/equals-in-tech-nominations-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/on-the-7th-world-ipv6-launchiversary-how-about-listening-to-a-podcast-about-ipv6/</loc>
		<lastmod>2019-06-06T20:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/boris-smokrovic-174784-unsplash-1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/ipv6-buzz-podcast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/community-week-share-ideas-to-help-make-the-internet-stronger/</loc>
		<lastmod>2019-06-07T02:24:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/lac-community-week.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/hong-kong-chapter-why-arent-there-more-women-in-tech/</loc>
		<lastmod>2019-06-07T14:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/more-women-in-tech-hk-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/the-week-in-internet-news-better-broadband-boosts-employment/</loc>
		<lastmod>2019-06-10T13:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/a-new-survey-shows-few-actively-encrypting-more-because-of-internet-distrust/</loc>
		<lastmod>2019-06-11T06:40:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/privacy-policy-2499720_1920-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/caribbean-community-gathers-together-to-discuss-improving-connectivity-in-the-region/</loc>
		<lastmod>2019-06-12T14:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/CarPIF-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/09/us-dods-dren-will-only-buy-products-with-an-ipv6-website/</loc>
		<lastmod>2019-06-14T09:47:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/09/DREN-IPv6-website-300x222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/the-week-in-internet-news-hackers-eye-security-cameras/</loc>
		<lastmod>2019-06-17T13:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/uruguay-joins-others-taking-action-to-strengthen-iot-security/</loc>
		<lastmod>2019-06-17T15:18:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/uruguay-iot.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/uruguay-joins-others-taking-action-to-strengthen-iot-security/</loc>
		<lastmod>2019-06-17T15:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/uruguay-iot.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/online-trust-audit-updates-translations-now-available/</loc>
		<lastmod>2019-06-18T18:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota-2018-trust-audit-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/save-the-date-hackathonais/</loc>
		<lastmod>2019-06-19T13:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ais-hackathon-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/05/hackathon-at-africa-internet-summit-focuses-on-time-vehicular-communications-and-network-programmability/</loc>
		<lastmod>2019-06-19T13:06:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/03/hackathon-ais.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/06/hackathonais-testimonies-of-the-fellows/</loc>
		<lastmod>2019-06-19T13:07:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/IMG_3283.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/IMG_3294-e1528461671403.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/2019-hackathonais-testimonials-from-the-trainers/</loc>
		<lastmod>2019-06-19T15:09:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/hackathon-ais-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/how-regulation-could-break-the-internet-in-conversation-with-andrew-sullivan/</loc>
		<lastmod>2019-06-23T10:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/london.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/the-week-in-internet-news-ai-and-iot-could-lead-to-industry-4-0/</loc>
		<lastmod>2019-06-24T13:23:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/the-internet-is-your-oyster-manrs-at-international-telecoms-week/</loc>
		<lastmod>2019-06-24T14:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/internet-oyster-manrs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/announcing-news-internetsociety-org-a-way-to-follow-what-is-published-across-all-internet-society-sites/</loc>
		<lastmod>2019-06-25T21:47:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/news-internetsociety-org-1280px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/community-dispatch-new-hawaii-chapter-says-the-internet-still-a-force-for-good/</loc>
		<lastmod>2019-06-28T16:19:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/hawaii-chapter-launch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/announcing-an-executive-director-for-the-internet-society-foundation/</loc>
		<lastmod>2019-07-01T13:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/Sarah-Armstrong_hh.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-small-routing-error-has-big-consequences/</loc>
		<lastmod>2019-07-01T19:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/transparency-fairness-and-respect-the-policy-brief-on-responsible-data-handling/</loc>
		<lastmod>2019-07-02T13:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/responsible-data-handling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/internet-society-asia-pacific-policy-survey-2019-now-open-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-07-03T18:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/APAC-Policy-Survey-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/becoming-broadband-ready-means-community-innovation-and-collaboration/</loc>
		<lastmod>2019-07-03T18:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/connected-city.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/myanmars-march-towards-a-digital-future/</loc>
		<lastmod>2019-07-05T17:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/Myanmar-March-Digital-Future.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-balloon-based-internet-service-passes-a-big-test/</loc>
		<lastmod>2019-07-08T13:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/internet-societys-online-trust-alliance-2019-cyber-incidents-breach-trends-report/</loc>
		<lastmod>2019-07-09T10:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/ota-cyber-breach-trends-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/for-smart-shoppers-its-about-making-the-connection/</loc>
		<lastmod>2019-07-12T13:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/lightbulb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-amazon-microsoft-look-to-expand-internet-access/</loc>
		<lastmod>2019-07-15T13:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/accessible-clear-and-appropriate-an-open-letter-to-amazon-on-privacy-policies/</loc>
		<lastmod>2019-07-17T14:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/amazon-open-letter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/05/how-the-internet-changed-the-nyirarukobwa-primary-school/</loc>
		<lastmod>2019-07-17T23:23:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/cover_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/07.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/rightscon-2019-human-rights-in-the-digital-age/</loc>
		<lastmod>2019-07-19T17:36:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/rightscon2019.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-community-broadband-offers-fastest-speeds-in-u-s/</loc>
		<lastmod>2019-07-22T13:47:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-the-internet-of-things-and-the-domain-name-system/</loc>
		<lastmod>2019-07-29T13:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/hackathon-at-africa-internet-summit-2019-network-programmability-network-time-ipv6-ipwave-and-measurement/</loc>
		<lastmod>2019-07-31T15:16:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/hackathon-summary-ais-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/asia-pacific-ict-ministers-focus-on-co-creating-the-future-of-the-internet/</loc>
		<lastmod>2019-08-02T13:39:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Asia-Pacific-ICT-Ministers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-amazon-microsoft-look-to-expand-internet-access/</loc>
		<lastmod>2019-08-02T17:06:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/the-week-in-internet-news-amazon-microsoft-look-to-expand-internet-access/</loc>
		<lastmod>2019-08-02T17:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-week-in-internet-news-capital-one-breach-affects-over-100-million/</loc>
		<lastmod>2019-08-05T13:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/07/african-peering-and-interconnection-forum-2019-fellows-announced/</loc>
		<lastmod>2019-08-06T11:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/07/AfPIF-2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/02/help-five-projects-connect-world/</loc>
		<lastmod>2019-08-06T15:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/WSIS_Internet_Society-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/working-together-for-an-internet-for-women/</loc>
		<lastmod>2019-08-07T15:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/FemHackParty.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/ulukhaktok-community-networking-in-the-far-north/</loc>
		<lastmod>2019-08-09T15:07:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Ulukhaktok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-week-in-internet-news-testing-1-2-3/</loc>
		<lastmod>2019-08-12T13:32:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/preserving-native-cultures-vote-now-for-the-internet-societys-panel-for-sxsw-2020/</loc>
		<lastmod>2019-08-14T14:26:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Preserving-Native-Cultures-sxsw.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/second-meeting-of-the-indian-network-operators-group-concludes-successfully/</loc>
		<lastmod>2019-08-15T13:19:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/apnic-innog-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-week-in-internet-news-white-house-proposes-social-media-monitoring/</loc>
		<lastmod>2019-08-19T16:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/deep-dive-how-healthcare-organizations-practice-privacy-and-security/</loc>
		<lastmod>2019-08-20T16:30:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Healthcare-Privacy-Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/measurement-lab-how-do-we-know-if-the-internet-is-open/</loc>
		<lastmod>2019-08-23T16:39:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/m-lab.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/g7-leaders-protect-strong-encryption-for-a-secure-world/</loc>
		<lastmod>2019-08-23T19:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/g7-letter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/afpif-day-three-a-record-number-of-women/</loc>
		<lastmod>2019-08-26T08:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/afpif-day-3-2019.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-week-in-internet-news-google-mozilla-block-surveillance-in-kazakhstan/</loc>
		<lastmod>2019-08-26T15:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/6th-middle-east-school-on-internet-governance-making-the-internet-community-stronger-in-the-middle-east/</loc>
		<lastmod>2019-08-27T11:06:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Day-1-114-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/how-fresh-is-that-privacy-statement/</loc>
		<lastmod>2019-08-27T14:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/calendar-3073971_1280-e1566916732426.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/DataStamps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-case-for-complementary-local-access-networks-by-the-community-for-the-community/</loc>
		<lastmod>2019-08-28T09:14:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/AJL9342.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/DEF-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/05/unleashing-opportunities-in-the-kyrgyz-republic/</loc>
		<lastmod>2019-08-30T14:48:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/bishkek-kyrgyzrepublic-kakadu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/beyond-the-palm-trees-local-action-key-to-fast-affordable-and-reliable-internet-solutions-in-rural-hawaii/</loc>
		<lastmod>2019-08-30T15:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/pascal-debrunner-M5zYk_lrb7s-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-your-doorbell-is-spying-on-you/</loc>
		<lastmod>2019-09-04T15:14:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/dorian-we-are-not-dormant/</loc>
		<lastmod>2019-09-06T14:04:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/dorian.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-covert-social-media-campaign-champions-military-rulers/</loc>
		<lastmod>2019-09-09T14:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/network-operators-in-mexico-strengthen-their-collaboration/</loc>
		<lastmod>2019-09-10T17:26:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/mexnog-meeting-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/network-operators-in-mexico-strengthen-their-collaboration/</loc>
		<lastmod>2019-09-10T17:50:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/mexnog-meeting-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/first-aprigf-in-the-pacific-a-resounding-success-2/</loc>
		<lastmod>2019-09-11T14:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/Kasek-Galgal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/announcing-joseph-hall-as-svp-for-a-strong-internet/</loc>
		<lastmod>2019-09-12T13:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/joehall-1200-690px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-antitrust-investigations-of-big-tech-heat-up/</loc>
		<lastmod>2019-09-16T14:10:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/beyond-the-palm-trees-local-action-key-to-fast-affordable-and-reliable-internet-solutions-in-rural-hawaii/</loc>
		<lastmod>2019-09-17T12:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/pascal-debrunner-M5zYk_lrb7s-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/sri-lanka-chapter-tackles-internet-restrictions-and-cybersecurity-threats/</loc>
		<lastmod>2019-09-17T16:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/colombo-sri-lanka.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/beyond-the-palm-trees-local-action-key-to-fast-affordable-and-reliable-internet-solutions-in-rural-hawaii/</loc>
		<lastmod>2019-09-19T11:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/pascal-debrunner-M5zYk_lrb7s-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/the-case-for-complementary-local-access-networks-by-the-community-for-the-community/</loc>
		<lastmod>2019-09-19T11:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/AJL9342.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/DEF-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/iot-privacy-for-policymakers-solutions-need-informed-discussion/</loc>
		<lastmod>2019-09-19T14:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/iot-privacy-policymakers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/improving-internet-trust-ironing-out-the-details/</loc>
		<lastmod>2019-09-19T17:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/Trust-Ironing-details.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/privacy-regulations-are-evolving-are-organizations-ready/</loc>
		<lastmod>2019-09-20T14:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/Orgs-Ready-New-Privacy-Regulations.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/announcing-joseph-hall-as-svp-for-a-strong-internet/</loc>
		<lastmod>2019-09-23T12:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/joehall-1200-690px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/apac-policy-survey-2019-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-09-23T14:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/apac-policy-survey-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_Infographic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/we-need-to-do-something-about-iot-security/</loc>
		<lastmod>2019-09-23T14:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac-PolicySurvey2018-Infographic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-iot-devices-could-put-privacy-at-risk-study-says/</loc>
		<lastmod>2019-09-23T20:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/dorian-we-are-not-dormant/</loc>
		<lastmod>2019-09-24T12:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/iot-privacy-for-policymakers-solutions-need-informed-discussion/</loc>
		<lastmod>2019-09-24T12:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/iot-privacy-policymakers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-antitrust-investigations-of-big-tech-heat-up/</loc>
		<lastmod>2019-09-24T12:45:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-covert-social-media-campaign-champions-military-rulers/</loc>
		<lastmod>2019-09-24T12:45:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/in-colombia-latin-american-summit-on-community-networks/</loc>
		<lastmod>2019-09-24T15:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/field-703287_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/empowering-more-gretas-introducing-the-2019-igf-youth-ambassadors/</loc>
		<lastmod>2019-09-25T13:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/2019-igf-youth-ambassadors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/deep-dive-how-do-banks-score-on-privacy-and-security/</loc>
		<lastmod>2019-09-26T13:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-trust-deep-dive-banks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-2018-banks-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/internet-hall-of-fame-nominations-open-1-january/</loc>
		<lastmod>2019-09-26T19:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-role-of-south-asias-nogs-in-community-building/</loc>
		<lastmod>2019-09-27T15:37:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/sanog34-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-covert-social-media-campaign-champions-military-rulers/</loc>
		<lastmod>2019-09-30T13:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/dorian-we-are-not-dormant/</loc>
		<lastmod>2019-09-30T13:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/dorian.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/voices-from-the-pacific-at-aprigf/</loc>
		<lastmod>2019-09-30T13:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APrIGF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/our-chapters-connecting-the-world-one-community-at-a-time/</loc>
		<lastmod>2019-09-30T13:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/Community-Networks-Zenzelini-S.Africa-June-2018-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/afpif-day-three-a-record-number-of-women/</loc>
		<lastmod>2019-09-30T13:46:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/afpif-day-3-2019.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-the-new-internet-space-race/</loc>
		<lastmod>2019-09-30T14:15:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-iot-devices-could-put-privacy-at-risk-study-says/</loc>
		<lastmod>2019-10-01T08:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-your-doorbell-is-spying-on-you/</loc>
		<lastmod>2019-10-01T08:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/celebrating-national-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-02T13:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Cybersecurity-Awareness-Month.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-antitrust-investigations-of-big-tech-heat-up/</loc>
		<lastmod>2019-10-02T21:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/network-operators-in-latin-america-and-the-caribbean-take-steps-to-strengthen-routing-security/</loc>
		<lastmod>2019-10-04T16:25:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/lac-routing-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/network-operators-in-latin-america-and-the-caribbean-take-steps-to-strengthen-routing-security/</loc>
		<lastmod>2019-10-04T16:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/lac-routing-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/privacy-regulations-are-evolving-are-organizations-ready/</loc>
		<lastmod>2019-10-04T17:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/Orgs-Ready-New-Privacy-Regulations.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/apac-policy-survey-2019-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-10-04T17:36:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/apac-policy-survey-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_Infographic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-iot-devices-could-put-privacy-at-risk-study-says/</loc>
		<lastmod>2019-10-04T17:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-your-doorbell-is-spying-on-you/</loc>
		<lastmod>2019-10-04T17:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/celebrating-national-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-07T11:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Cybersecurity-Awareness-Month.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-the-new-internet-space-race/</loc>
		<lastmod>2019-10-07T11:55:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/deep-dive-how-do-banks-score-on-privacy-and-security/</loc>
		<lastmod>2019-10-07T11:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-trust-deep-dive-banks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-2018-banks-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-governments-pressure-facebook-to-halt-encryption-plans/</loc>
		<lastmod>2019-10-07T17:33:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/announcing-the-2020-u-s-presidential-campaign-audit/</loc>
		<lastmod>2019-10-08T10:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/2020-Presidential-Campaign-Audit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/islamabad-chapter-brings-first-internet-governance-event-to-quetta-pakistan/</loc>
		<lastmod>2019-10-10T08:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/PKSIG-2019.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/examiner-le-gifct-a-la-loupe/</loc>
		<lastmod>2019-10-11T12:58:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/looking-the-gifct-in-the-mouth/</loc>
		<lastmod>2019-10-11T12:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Looking-GIFCT-Mouth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-week-in-internet-news-the-new-internet-space-race/</loc>
		<lastmod>2019-10-14T11:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/empowering-more-gretas-introducing-the-2019-igf-youth-ambassadors/</loc>
		<lastmod>2019-10-14T11:44:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/2019-igf-youth-ambassadors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/member-news-helping-schools-get-access-to-internet-educational-materials/</loc>
		<lastmod>2019-10-14T11:46:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Member-News-1280x550.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/in-colombia-latin-american-summit-on-community-networks/</loc>
		<lastmod>2019-10-14T11:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/field-703287_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/network-operators-in-latin-america-and-the-caribbean-take-steps-to-strengthen-routing-security/</loc>
		<lastmod>2019-10-14T11:50:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/lac-routing-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/network-operators-in-mexico-strengthen-their-collaboration/</loc>
		<lastmod>2019-10-14T11:51:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/mexnog-meeting-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-china-and-russia-target-illegal-content/</loc>
		<lastmod>2019-10-14T14:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/meet-three-aprigf-2019-fellows/</loc>
		<lastmod>2019-10-16T16:39:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/aprigf-2019-camera.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/shah-zahidur-rahman.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/SeinMaMa.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/sebastian-hoe-wee-kiat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/tarek-kamel-a-loss-to-the-internet-community/</loc>
		<lastmod>2019-10-17T10:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/tarek-kamel-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/afpif-day-two-international-traffic-the-economics-of-peering-and-a-look-ahead-to-2030/</loc>
		<lastmod>2019-10-17T11:59:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/nlfEQRUQ.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/celebrating-national-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-21T10:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Cybersecurity-Awareness-Month.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/remembering-tarek-kamel/</loc>
		<lastmod>2019-10-21T10:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/remembering-tarek-kamel/</loc>
		<lastmod>2019-10-21T10:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/g7-leaders-protect-strong-encryption-for-a-secure-world/</loc>
		<lastmod>2019-10-21T10:21:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/g7-letter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/g7-leaders-protect-strong-encryption-for-a-secure-world/</loc>
		<lastmod>2019-10-21T10:21:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/g7-letter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/11/global-cybersecurity-and-the-internet-conundrum/</loc>
		<lastmod>2019-10-21T11:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/internet-conundrum-hourglass.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/09/igf-2018-improvements-and-call-for-contributions/</loc>
		<lastmod>2019-10-21T11:19:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/IGF-2018-improvements-call-contributions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/day-zero-2019-bringing-together-young-people-to-talk-about-internet-governance/</loc>
		<lastmod>2019-10-21T11:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/youth-igf-usa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/04/a-world-without-the-igf/</loc>
		<lastmod>2019-10-21T11:23:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/world-without-igf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/12/the-importance-of-the-multistakeholder-approach-my-experience-at-the-internet-governance-forum/</loc>
		<lastmod>2019-10-21T11:26:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/gustavo-babo-youth-igf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/tarek-kamel-a-loss-to-the-internet-community/</loc>
		<lastmod>2019-10-21T16:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/tarek-kamel-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/the-role-of-south-asias-nogs-in-community-building/</loc>
		<lastmod>2019-10-21T16:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/sanog34-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/iot-privacy-for-policymakers-solutions-need-informed-discussion/</loc>
		<lastmod>2019-10-21T16:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/iot-privacy-policymakers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/announcing-joseph-hall-as-svp-for-a-strong-internet/</loc>
		<lastmod>2019-10-21T16:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/joehall-1200-690px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/deep-dive-how-do-banks-score-on-privacy-and-security/</loc>
		<lastmod>2019-10-21T16:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-trust-deep-dive-banks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/ota-2018-banks-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/looking-the-gifct-in-the-mouth/</loc>
		<lastmod>2019-10-21T17:20:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Looking-GIFCT-Mouth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/looking-the-gifct-in-the-mouth/</loc>
		<lastmod>2019-10-21T17:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Looking-GIFCT-Mouth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-a-fight-over-community-broadband-in-missouri/</loc>
		<lastmod>2019-10-24T13:05:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/nominations-now-open-for-2020-internet-society-board-of-trustees-elections/</loc>
		<lastmod>2019-10-25T15:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/isoc-purple-e1571934624311.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-a-fight-over-community-broadband-in-missouri/</loc>
		<lastmod>2019-10-28T14:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/these-are-our-first-roadways-internet-access-and-self-determination-in-puuhonua-o-waimanalo/</loc>
		<lastmod>2019-10-28T14:21:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Pu-uhonua-O-Waimanalo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/your-day-with-encryption/</loc>
		<lastmod>2019-10-28T14:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/your-day-with-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-phone-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-website-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-credit-card-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-videoconference-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-phone-pay-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-fitness-tracker-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-digital-assistant-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/nominations-now-open-for-2020-internet-society-board-of-trustees-elections/</loc>
		<lastmod>2019-10-28T14:21:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/isoc-purple.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/nominations-now-open-for-2020-internet-society-board-of-trustees-elections/</loc>
		<lastmod>2019-10-28T14:23:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/isoc-purple.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/your-day-with-encryption/</loc>
		<lastmod>2019-10-28T14:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/your-day-with-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-phone-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-website-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-credit-card-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-videoconference-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-phone-pay-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-fitness-tracker-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/encryption-digital-assistant-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/these-are-our-first-roadways-internet-access-and-self-determination-in-puuhonua-o-waimanalo/</loc>
		<lastmod>2019-10-28T14:23:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Pu-uhonua-O-Waimanalo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-a-fight-over-community-broadband-in-missouri/</loc>
		<lastmod>2019-10-28T14:34:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-u-s-big-tech-firms-skip-chinese-internet-conference/</loc>
		<lastmod>2019-10-28T14:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-invisible-internet/</loc>
		<lastmod>2019-10-29T12:38:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/leonard-kleinrock-ucla.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-u-s-big-tech-firms-skip-chinese-internet-conference/</loc>
		<lastmod>2019-10-30T14:24:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/the-week-in-internet-news-u-s-big-tech-firms-skip-chinese-internet-conference/</loc>
		<lastmod>2019-10-30T14:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/what-scary-movies-can-teach-us-about-internet-trust/</loc>
		<lastmod>2019-10-31T17:22:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-movies-internet-trust.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-phone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-car.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-barricade.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-book.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-mirror.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-denial.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-alone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-russian-law-allows-country-to-disconnect-from-internet/</loc>
		<lastmod>2019-11-04T14:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/owning-your-keys-the-technical-and-human-side-of-encryption/</loc>
		<lastmod>2019-11-05T17:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/owning-your-keys-encryption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/a-step-further-in-making-pakistan-digitally-accessible/</loc>
		<lastmod>2019-11-06T16:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Pakistan-Digitally-Accessible.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/social-media-crisis-drives-ongoing-decline-in-global-internet-freedom/</loc>
		<lastmod>2019-11-07T14:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-map.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-election-map.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-facebook-moves-forward-with-encryption-despite-concerns/</loc>
		<lastmod>2019-11-11T14:31:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/heads-up-a-slight-change-to-the-internet-society-election-process/</loc>
		<lastmod>2019-11-11T21:23:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/election-timeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-chapter-election.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-organization-member-election.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/peace-and-cyber-hygiene/</loc>
		<lastmod>2019-11-12T14:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Peace-Cyber-Hygiene.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-russian-law-allows-country-to-disconnect-from-internet/</loc>
		<lastmod>2019-11-12T14:47:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/heads-up-a-slight-change-to-the-internet-society-election-process/</loc>
		<lastmod>2019-11-14T17:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/election-timeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-chapter-election.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-organization-member-election.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-facebook-moves-forward-with-encryption-despite-concerns/</loc>
		<lastmod>2019-11-14T17:19:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-facebook-moves-forward-with-encryption-despite-concerns/</loc>
		<lastmod>2019-11-15T19:19:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-russian-law-allows-country-to-disconnect-from-internet/</loc>
		<lastmod>2019-11-15T19:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/10/what-scary-movies-can-teach-us-about-internet-trust/</loc>
		<lastmod>2019-11-18T03:13:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-movies-internet-trust.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-phone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-car.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-barricade.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-book.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-mirror.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-denial.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/scary-alone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-internet-society-and-public-interest-registry-a-new-era-of-opportunity/</loc>
		<lastmod>2019-11-18T10:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-internet-society-and-public-interest-registry-a-new-era-of-opportunity/</loc>
		<lastmod>2019-11-18T13:15:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-lets-encrypt-doubles-the-number-of-secure-websites/</loc>
		<lastmod>2019-11-18T14:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/peace-and-cyber-hygiene/</loc>
		<lastmod>2019-11-20T10:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Peace-Cyber-Hygiene.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/social-media-crisis-drives-ongoing-decline-in-global-internet-freedom/</loc>
		<lastmod>2019-11-20T10:17:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-map.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-election-map.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/alain-aina-2019-jonathan-b-postel-service-award-winner/</loc>
		<lastmod>2019-11-20T10:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/aina-alain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/heads-up-a-slight-change-to-the-internet-society-election-process/</loc>
		<lastmod>2019-11-20T13:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/election-timeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-chapter-election.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/2018-2019-organization-member-election.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/social-media-crisis-drives-ongoing-decline-in-global-internet-freedom/</loc>
		<lastmod>2019-11-20T13:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-map.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fotn-election-map.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/alain-aina-2019-jonathan-b-postel-service-award-winner/</loc>
		<lastmod>2019-11-20T21:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/aina-alain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/rachel-player-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-11-21T15:43:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/rachel-player.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/alain-aina-2019-jonathan-b-postel-service-award-winner/</loc>
		<lastmod>2019-11-24T18:52:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/aina-alain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/peace-and-cyber-hygiene/</loc>
		<lastmod>2019-11-24T18:52:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Peace-Cyber-Hygiene.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-lets-encrypt-doubles-the-number-of-secure-websites/</loc>
		<lastmod>2019-11-24T19:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-balloon-based-internet-comes-to-the-amazon/</loc>
		<lastmod>2019-11-25T14:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/what-is-a-man-in-the-middle-mitm-attack/</loc>
		<lastmod>2019-11-26T16:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/man-in-the-middle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/deep-dive-a-look-at-top-retailers-security-practices/</loc>
		<lastmod>2019-11-27T14:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Retailers-Security-Practices.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-lets-encrypt-doubles-the-number-of-secure-websites/</loc>
		<lastmod>2019-11-26T22:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/rachel-player-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-11-29T02:48:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/rachel-player.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-1200-a-month-for-internet-service/</loc>
		<lastmod>2019-12-02T14:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/member-news-island-nation-looks-for-ways-to-connect-farmers/</loc>
		<lastmod>2019-12-02T16:14:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Member-News-1280x550.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/winners-of-the-2019-chapterthon-to-be-announced-on-december-11-voting-is-open-now/</loc>
		<lastmod>2019-12-02T16:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/20191028_113440_DSCF5798.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/deep-dive-a-look-at-top-retailers-security-practices/</loc>
		<lastmod>2019-12-02T16:15:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Retailers-Security-Practices.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-balloon-based-internet-comes-to-the-amazon/</loc>
		<lastmod>2019-12-02T16:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/what-is-a-man-in-the-middle-mitm-attack/</loc>
		<lastmod>2019-12-02T16:16:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/man-in-the-middle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/what-is-a-man-in-the-middle-mitm-attack/</loc>
		<lastmod>2019-12-02T16:17:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/man-in-the-middle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/member-news-island-nation-looks-for-ways-to-connect-farmers/</loc>
		<lastmod>2019-12-02T16:17:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Member-News-1280x550.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-internet-society-and-public-interest-registry-a-new-era-of-opportunity/</loc>
		<lastmod>2019-12-04T09:19:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/online-trust-audit-for-2020-presidential-campaigns-update/</loc>
		<lastmod>2019-12-04T11:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/joshua-sukoff-5DDYHjk_KMU-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/supplement.table1_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/winners-of-the-2019-chapterthon-to-be-announced-on-december-11-voting-is-open-now/</loc>
		<lastmod>2019-12-04T11:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/20191028_113440_DSCF5798.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/our-chapters-connecting-the-world-one-community-at-a-time/</loc>
		<lastmod>2019-12-04T11:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/Community-Networks-Zenzelini-S.Africa-June-2018-4-e1567521113503.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/02/trust-and-taxes/</loc>
		<lastmod>2019-12-04T13:12:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/12/it-sees-you-when-youre-sleeping-it-knows-when-youre-awake/</loc>
		<lastmod>2019-12-04T13:12:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2015/09/does-your-favorite-presidential-candidate-make-the-grade/</loc>
		<lastmod>2019-12-04T13:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-sale-of-pir-the-internet-society-board-perspective/</loc>
		<lastmod>2019-12-04T20:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/ethos-pir-isoc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/rural-development-special-interest-group-organizes-internet-connectivity-tag-2019/</loc>
		<lastmod>2019-12-05T13:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/rd-sig-Internet-Connectivity-Tag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/five-key-takeaways-from-the-summit-in-asia-pacific-on-deploying-sustaining-and-scaling-community-networks/</loc>
		<lastmod>2019-12-05T17:03:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Key-Takeaways-APAC-CN-Summit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/deep-dive-a-look-at-top-retailers-security-practices/</loc>
		<lastmod>2019-12-07T14:38:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Retailers-Security-Practices.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/winners-of-the-2019-chapterthon-to-be-announced-on-december-11-voting-is-open-now/</loc>
		<lastmod>2019-12-07T14:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/20191028_113440_DSCF5798.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/the-week-in-internet-news-balloon-based-internet-comes-to-the-amazon/</loc>
		<lastmod>2019-12-07T14:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/rachel-player-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-12-07T14:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/rachel-player.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-1200-a-month-for-internet-service/</loc>
		<lastmod>2019-12-07T14:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/passion-and-dedication-at-the-4th-summit-on-community-networks-in-africa/</loc>
		<lastmod>2019-12-07T14:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/cn-summit-africa-dodoma.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-1200-a-month-for-internet-service/</loc>
		<lastmod>2019-12-07T14:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/passion-and-dedication-at-the-4th-summit-on-community-networks-in-africa/</loc>
		<lastmod>2019-12-07T14:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/cn-summit-africa-dodoma.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/rural-development-special-interest-group-organizes-internet-connectivity-tag-2019/</loc>
		<lastmod>2019-12-09T15:19:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/rd-sig-Internet-Connectivity-Tag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-sale-of-pir-the-internet-society-board-perspective/</loc>
		<lastmod>2019-12-09T15:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/ethos-pir-isoc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-australian-lawmakers-push-for-fix-to-encryption-law/</loc>
		<lastmod>2019-12-09T19:08:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/passion-and-dedication-at-the-4th-summit-on-community-networks-in-africa/</loc>
		<lastmod>2019-12-11T10:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/cn-summit-africa-dodoma.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/claudio-jeker-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-12-11T17:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/claudio-jeker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/online-trust-audit-for-2020-presidential-campaigns-update/</loc>
		<lastmod>2019-12-12T02:06:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/joshua-sukoff-5DDYHjk_KMU-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/supplement.table1_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/celebrating-a-successful-2019-chapterthon/</loc>
		<lastmod>2019-12-12T16:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/2019-nyc-mesh-installathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-sale-of-pir-the-internet-society-board-perspective/</loc>
		<lastmod>2019-12-13T14:08:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/ethos-pir-isoc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/rural-development-special-interest-group-organizes-internet-connectivity-tag-2019/</loc>
		<lastmod>2019-12-13T14:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/rd-sig-Internet-Connectivity-Tag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/online-trust-audit-for-2020-presidential-campaigns-update/</loc>
		<lastmod>2019-12-16T14:53:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/joshua-sukoff-5DDYHjk_KMU-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/supplement.table1_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/claudio-jeker-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-12-16T14:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/claudio-jeker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-australian-lawmakers-push-for-fix-to-encryption-law/</loc>
		<lastmod>2019-12-16T14:57:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/from-content-blocking-to-national-shutdowns-understanding-internet-disruptions/</loc>
		<lastmod>2019-12-18T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/understanding-internet-shutdowns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/deutsche-welle-spotlights-tanzanias-kondoa-community-network/</loc>
		<lastmod>2019-12-20T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-community-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-cn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-australian-lawmakers-push-for-fix-to-encryption-law/</loc>
		<lastmod>2019-12-20T16:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-neutral.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/claudio-jeker-honored-by-internet-security-research-group-with-radiant-award/</loc>
		<lastmod>2019-12-20T16:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/12/ISRG-RadiantAward.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/claudio-jeker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/celebrating-a-successful-2019-chapterthon/</loc>
		<lastmod>2019-12-20T16:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/2019-nyc-mesh-installathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/celebrating-a-successful-2019-chapterthon/</loc>
		<lastmod>2019-12-20T16:33:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/2019-nyc-mesh-installathon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/working-together-to-build-bigger-stronger-internet/</loc>
		<lastmod>2019-12-20T17:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/WaimanaloInternetSociety011-e1576578253992.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-u-s-lawmakers-threaten-anti-encryption-regulations/</loc>
		<lastmod>2019-12-20T17:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-india-sets-record-for-longest-internet-shutdown-in-a-democracy/</loc>
		<lastmod>2019-12-23T15:46:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/manrs-observatory-monitoring-the-state-of-internet-routing-security/</loc>
		<lastmod>2019-12-24T14:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/manrs-observatory.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/08/manrs-observatory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/lessons-learned-from-the-multistakeholder-process-in-the-philippines/</loc>
		<lastmod>2019-12-24T15:27:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Philippines-Department-ICT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/08/internet-security-gets-a-boost/</loc>
		<lastmod>2019-12-25T12:19:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/08/TLS1.3-Badge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/06/mptcp-and-tls-1-3-big-announcements-from-apple/</loc>
		<lastmod>2019-12-25T12:19:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/Screenshot-2017-06-20-13.03.33-300x181.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/06/Screenshot-2017-06-20-22.15.45-300x232.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/06/community-week-share-ideas-to-help-make-the-internet-stronger/</loc>
		<lastmod>2019-12-25T16:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/06/lac-community-week.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/isocs-hot-topics-at-ietf-102/</loc>
		<lastmod>2019-12-25T16:03:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/stephane-milot-135109-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2016/05/a-brochure-on-the-use-and-benefits-of-ripe-atlas-probes-and-anchors-now-available/</loc>
		<lastmod>2019-12-25T16:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/RIPEAtlasmap_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/04/internet-for-differently-abled-communities-in-uganda/</loc>
		<lastmod>2019-12-25T16:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2014/10/the-internet-society-joins-the-fight-against-ebola/</loc>
		<lastmod>2019-12-25T16:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ebola.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2013/11/protecting-children-the-most-vulnerable-online-users/</loc>
		<lastmod>2019-12-25T16:09:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2011/09/blocking-internet-content-harmful-or-efficient/</loc>
		<lastmod>2019-12-25T16:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/08/save-the-date-4th-summit-on-community-networks-in-africa/</loc>
		<lastmod>2019-12-28T08:01:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/11/34768943561_903466701f_o.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/deutsche-welle-spotlights-tanzanias-kondoa-community-network/</loc>
		<lastmod>2019-12-30T14:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-community-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-cn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/deutsche-welle-spotlights-tanzanias-kondoa-community-network/</loc>
		<lastmod>2019-12-30T14:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-community-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/dw-kondoa-cn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/working-together-to-build-bigger-stronger-internet/</loc>
		<lastmod>2019-12-30T14:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/WaimanaloInternetSociety011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/working-together-to-build-bigger-stronger-internet/</loc>
		<lastmod>2019-12-30T14:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/WaimanaloInternetSociety011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-india-sets-record-for-longest-internet-shutdown-in-a-democracy/</loc>
		<lastmod>2020-01-06T16:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-teal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/lessons-learned-from-the-multistakeholder-process-in-the-philippines/</loc>
		<lastmod>2020-01-06T16:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Philippines-Department-ICT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-worries-of-a-fragmenting-internet/</loc>
		<lastmod>2020-01-06T16:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/from-content-blocking-to-national-shutdowns-understanding-internet-disruptions/</loc>
		<lastmod>2020-01-07T15:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/understanding-internet-shutdowns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/from-content-blocking-to-national-shutdowns-understanding-internet-disruptions/</loc>
		<lastmod>2020-01-07T15:24:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/understanding-internet-shutdowns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-how-does-the-consumer-sector-score-on-privacy-and-security/</loc>
		<lastmod>2020-01-07T17:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-consumers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2017/09/celebrating-25-years-advocacy/</loc>
		<lastmod>2020-01-08T11:49:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/25th.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/indian-community-making-the-right-connections/</loc>
		<lastmod>2020-01-08T16:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/IIESoc-Connections-2019.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/internet-society-delhi-chapter-and-ccaoi-organize-webinar-on-draft-intermediary-rules/</loc>
		<lastmod>2020-01-09T09:19:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/india-draft-intermediary-rules.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/01/india-days-left-to-comment-rules-could-impact-your-privacy/</loc>
		<lastmod>2020-01-09T09:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/01/data-privacy-india-draft-rules.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/fourth-annual-insig-boosts-indias-capacity-to-shape-the-internets-future/</loc>
		<lastmod>2020-01-09T09:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/inSIG2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/deep-dive-how-the-news-and-media-sector-scores-on-security-and-privacy/</loc>
		<lastmod>2020-01-09T16:01:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/ota-2019-deep-dive-news-media.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-new-chinese-law-regulates-encryption/</loc>
		<lastmod>2020-01-09T16:01:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/fourth-annual-insig-boosts-indias-capacity-to-shape-the-internets-future/</loc>
		<lastmod>2020-01-09T16:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/inSIG2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/strong-encryption-is-central-to-good-security-indias-proposed-intermediary-rules-puts-it-at-risk/</loc>
		<lastmod>2020-01-09T19:41:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/AJL2011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/member-news-internet-society-highlights-from-2019/</loc>
		<lastmod>2020-01-10T13:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Member-News-1280x550.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/major-initiatives-in-cybersecurity-shows-everyone-can-contribute-to-trust/</loc>
		<lastmod>2020-01-10T17:14:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/major-initiatives-in-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2018/07/a-deeper-dive-into-public-dns-resolver-quad9/</loc>
		<lastmod>2020-01-13T03:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Quad-9-Logo-e1530845650421.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/quad9_infographic@2x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Screenshot-2018-07-04-18.13.29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Screenshot-2018-07-04-18.13.06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Screenshot-2018-07-04-18.16.50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Screenshot-2018-07-06-12.08.41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/Screenshot-2018-07-06-12.08.55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-mexico-nyc-push-for-internet-access-for-all/</loc>
		<lastmod>2020-01-13T16:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/member-news-internet-society-highlights-from-2019/</loc>
		<lastmod>2020-01-13T17:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/Member-News-1280x550.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-new-chinese-law-regulates-encryption/</loc>
		<lastmod>2020-01-13T17:28:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-new-chinese-law-regulates-encryption/</loc>
		<lastmod>2020-01-13T22:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/the-week-in-internet-news-worries-of-a-fragmenting-internet/</loc>
		<lastmod>2020-01-13T22:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-dark-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/12/deep-dive-how-the-news-and-media-sector-scores-on-security-and-privacy/</loc>
		<lastmod>2020-01-13T22:07:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/ota-2019-deep-dive-news-media.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/fourth-annual-insig-boosts-indias-capacity-to-shape-the-internets-future/</loc>
		<lastmod>2020-01-14T19:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/inSIG2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-mexico-nyc-push-for-internet-access-for-all/</loc>
		<lastmod>2020-01-14T19:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/major-initiatives-in-cybersecurity-shows-everyone-can-contribute-to-trust/</loc>
		<lastmod>2020-01-14T19:34:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/major-initiatives-in-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/strong-encryption-is-central-to-good-security-indias-proposed-intermediary-rules-puts-it-at-risk/</loc>
		<lastmod>2020-01-14T19:34:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/AJL2011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-how-does-the-consumer-sector-score-on-privacy-and-security/</loc>
		<lastmod>2020-01-14T19:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-consumers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/11/five-key-takeaways-from-the-summit-in-asia-pacific-on-deploying-sustaining-and-scaling-community-networks/</loc>
		<lastmod>2020-01-14T21:52:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/Key-Takeaways-APAC-CN-Summit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-u-s-federal-governments-security-and-privacy-practices/</loc>
		<lastmod>2020-01-16T03:06:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-federal-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/indian-community-making-the-right-connections/</loc>
		<lastmod>2020-01-16T03:08:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/IIESoc-Connections-2019.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/community-radio-and-network-providers-join-force-to-grow-the-internet/</loc>
		<lastmod>2020-01-16T14:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/cnx-apac-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/pacific-report-to-the-dynamic-coalition-of-small-island-developing-states-in-the-internet-economy/</loc>
		<lastmod>2020-01-17T17:46:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/Pacific-Report-Dynamic-Coalition-SIDS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-kentucky-broadband-program-stalls/</loc>
		<lastmod>2020-01-20T14:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-scoring-isps-and-hosts-on-privacy-and-security/</loc>
		<lastmod>2020-01-21T17:33:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-isps-hosts.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/community-radio-and-network-providers-join-force-to-grow-the-internet/</loc>
		<lastmod>2020-01-21T22:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/cnx-apac-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-u-s-federal-governments-security-and-privacy-practices/</loc>
		<lastmod>2020-01-21T22:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-federal-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-how-does-the-consumer-sector-score-on-privacy-and-security/</loc>
		<lastmod>2020-01-21T22:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-consumers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/strong-encryption-is-central-to-good-security-indias-proposed-intermediary-rules-puts-it-at-risk/</loc>
		<lastmod>2020-01-21T22:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/AJL2011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/major-initiatives-in-cybersecurity-shows-everyone-can-contribute-to-trust/</loc>
		<lastmod>2020-01-21T22:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/major-initiatives-in-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/community-radio-and-network-providers-join-force-to-grow-the-internet/</loc>
		<lastmod>2020-01-21T22:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/cnx-apac-2019.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/CNX-APAC-2019-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-mexico-nyc-push-for-internet-access-for-all/</loc>
		<lastmod>2020-01-21T22:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/the-week-in-internet-news-kentucky-broadband-program-stalls/</loc>
		<lastmod>2020-01-23T14:45:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/07/In-the-news-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2019/09/voices-from-the-pacific-at-aprigf/</loc>
		<lastmod>2020-01-23T14:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APrIGF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/isps-should-strongly-consider-manrs-to-fight-cybercrime-world-economic-forum-report/</loc>
		<lastmod>2020-01-23T21:24:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/WEF-ISPs-MANRS-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/blog/2020/01/deep-dive-scoring-isps-and-hosts-on-privacy-and-security/</loc>
		<lastmod>2020-01-24T15:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/01/ota-deep-dive-isps-hosts.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->