<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securityscholar.org/2022/02/18/security-scholar-suggests-6/</loc><lastmod>2022-02-20T22:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/12/10/security-scholar-suggests-5/</loc><lastmod>2021-12-10T10:02:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/12/03/security-scholar-suggests-an-indonesian-military-primer/</loc><lastmod>2021-12-02T20:38:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/10/22/security-scholar-suggests-music-and-memories-of-war/</loc><lastmod>2021-10-24T23:07:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/10/15/security-scholar-suggests-4/</loc><lastmod>2021-10-15T01:46:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/10/08/security-scholar-suggests-three-military-memoirs/</loc><lastmod>2021-10-07T23:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/09/24/security-scholar-suggests-aukus-southeast-asia-edition/</loc><lastmod>2021-09-29T07:33:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/09/10/security-scholar-suggests-3/</loc><lastmod>2021-09-10T06:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2021/09/05/security-scholar-suggests-2/</loc><lastmod>2021-09-05T10:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/about/</loc><lastmod>2021-08-27T00:50:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityscholar.org/2021/08/27/security-scholar-suggests/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2021/08/20210824adf8298528_0168-1.jpg</image:loc><image:title>ADF Support to Afghanistan</image:title><image:caption>Royal Australian Air Force Airfield Defence Guards provide aircraft security on the flight line of Hamid Karzai International Airport as Australian citizens and visa holders prepare to be evacuated from Afghanistan. *** Local Caption *** The Ready Combat Team including members of the 1st Battalion, the Royal Australian Regiment, have been working with Australian Government officials from the Department of Foreign Affairs and Trade, Department of Home Affairs and Australian Border Force to identify, collect and assist Australian nationals and approved foreign nationals enter Hamid Karzai International Airport at Abbey Gate.</image:caption></image:image><lastmod>2021-08-27T00:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/contact/</loc><lastmod>2017-01-07T03:23:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityscholar.org/2016/06/09/a-glimpse-inside-indonesias-bela-negara-defend-the-nation-program/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2016/06/2016-06-06t230537z_1156629858_s1aetikuabaa_rtrmadp_3_indonesia-security.jpg</image:loc><image:title>The Wider Image: Defending the nation against perceived threats</image:title><image:caption>A female participant of the Bela Negara - "defend the nation" - programme applies camouflage face paint on another participant's face at a training centre in Rumpin, Bogor, West Java, Indonesia June 2, 2016. REUTERS/Darren Whiteside          SEARCH "DEFEND DARREN" FOR THIS STORY. SEARCH "THE WIDER IMAGE" FOR ALL STORIES      TPX IMAGES OF THE DAY</image:caption></image:image><lastmod>2016-06-09T06:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2015/07/01/the-cost-of-indonesias-c-130s/</loc><lastmod>2016-09-10T22:01:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2015/06/08/indonesias-next-military-chief-mr-proxy-wars/</loc><lastmod>2015-09-01T16:57:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/01/16/british-boots-on-the-ground-in-mali/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/01/raf-regiment-shoulder.jpg</image:loc><image:title>RAF-REGIMENT-SHOULDER</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/01/raf_trf-svg.png</image:loc><image:title>RAF_TRF.svg</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/01/raf-reg-afp.jpg</image:loc><image:title>RAF Reg (AFP)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/01/66419_10151178040805940_1613987795_n.jpg</image:loc><image:title>66419_10151178040805940_1613987795_n</image:title></image:image><lastmod>2015-04-12T23:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/11/19/tuesdays-indonesia-defence-and-military-links-not-a-good-day-edition/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/11/22041.jpg</image:loc></image:image><lastmod>2015-04-12T23:43:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/05/04/my-military-is-bigger-than-yours/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/05/20837.jpeg</image:loc></image:image><lastmod>2015-04-12T23:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/03/26/indonesia-and-strategic-trust-no-one-knows-what-it-means-but-its-provocative/</loc><lastmod>2015-04-12T23:42:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/04/03/indonesias-strategic-flexibility-something-something-devil-something-something-detail/</loc><lastmod>2015-04-12T23:42:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/06/23/the-raid/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/06/picture-16.png</image:loc><image:title>Picture 16</image:title><image:caption>Source: https://twitter.com/George_Roberts/status/347550592966737920</image:caption></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/06/picture-15.png</image:loc><image:caption>Source: https://twitter.com/mbachelard/status/347541309533347840</image:caption></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/06/picture-14.png</image:loc><image:caption>Image source: https://twitter.com/mbachelard/status/347554314056761345</image:caption></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/06/194763_620.jpeg</image:loc><image:caption>Source: http://en.tempo.co/read/news/2013/06/20/055489855/Civilian-Supports-Kopassus-During-Cebongan-Trial</image:caption></image:image><lastmod>2015-04-12T23:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/08/19/dirgahayu-indonesia-president-sbys-national-day-address/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/08/21429.jpeg</image:loc><image:title>Presiden SBY menyampaikan pidato kenegaraan di hadapan sidang bersama DPR dan DPD RI di Gedung DPR/MPR, Jakarta, Jumat (16/8) pagi. (foto: cahyo/presidenri.go.id)</image:title></image:image><lastmod>2015-04-12T23:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/08/27/indonesias-new-military-chief/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/08/210916_kepala-staf-tni-angkatan-darat-ksad-jenderal-moeldoko_663_382.jpg</image:loc><image:title>General Moeldoko</image:title></image:image><lastmod>2015-04-12T23:42:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/10/23/indonesia-defence-news-and-links/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/10/picture-20.png</image:loc><image:title>Picture 20</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/10/02-wirra-jaya-20131.jpeg</image:loc><image:title>02-Wirra-Jaya-2013</image:title></image:image><lastmod>2015-04-12T23:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/10/30/wednesdays-indonesia-defence-and-military-links/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/10/kapal-tni-al.jpg</image:loc></image:image><lastmod>2015-04-12T23:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/11/04/indonesia-defence-security-and-military-links/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/11/koko.png</image:loc><image:title>koko</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/11/sertijab.jpg</image:loc></image:image><lastmod>2015-04-12T23:41:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/11/06/a-wrap-up-of-indonesia-and-allegations-of-australian-spying/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/11/635321-121121-aseanhighered.jpeg</image:loc></image:image><lastmod>2015-04-12T23:41:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2014/04/05/indonesia-security-links-and-other-interesting-stuff/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2014/04/02russiasidebar-3-articlelarge.jpg</image:loc><image:title>Near the left shoulder of the soldier at right is a small green plastic box. Suspended in front of the soldier’s green face mask is a small microphone on a flexible arm. Credit C. J. Chivers/The New York Times</image:title></image:image><lastmod>2015-04-12T23:39:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/10/24/indonesia-defence-news-and-links-2/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/10/picture-19.png</image:loc></image:image><lastmod>2013-10-30T06:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/10/28/mondays-indonesia-defence-and-military-links/</loc><lastmod>2013-10-30T06:10:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/05/31/identification-and-analysis-of-small-arms-ammunition-in-libya/</loc><lastmod>2013-05-31T11:01:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/05/03/photo-of-the-day-polri-and-gangnam-style/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/05/ur-may_day-967593-01-02_preview.jpeg</image:loc></image:image><lastmod>2013-05-03T14:17:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2013/03/24/indonesia-and-the-us-pivot/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2013/03/8463150257_7d90eeea11_c.jpeg</image:loc><image:title>8463150257_7d90eeea11_c</image:title></image:image><lastmod>2013-03-24T01:49:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/10/20/update-australian-multicam-pattern-amp/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/20101006adf8262658_555.jpg</image:loc><image:title>OP SLIPPER SOTG</image:title></image:image><lastmod>2013-03-12T11:10:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/11/28/more-than-words-australia-indonesia-strategic-relations/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/11/20120726raaf8207218_0148.jpg</image:loc><image:title>Exercise Pitch Black 2012</image:title></image:image><lastmod>2012-11-28T01:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/10/21/ak-103-and-f2000-assault-rifles-in-gaza/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/10/f2000_gaza_2.jpg</image:loc><image:title>F2000_Gaza_2</image:title></image:image><lastmod>2012-10-20T18:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/06/17/jumping-the-gun-what-does-the-ak-100-series-really-mean-for-libyas-rebels/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/06/libyan-rebel-ak-1031.jpg</image:loc><image:title>Libyan Rebel - AK-103</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/06/libyan-rebel-ak-103.jpg</image:loc><image:title>Libyan Rebel - AK-103</image:title></image:image><lastmod>2012-10-20T13:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/22/kriss-vector-smg-for-the-australian-federal-police/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/smg-tp-13-3_4-right1.jpg</image:loc><image:title>KRISS Vector SMG</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/smg-tp-13-3_4-right.jpg</image:loc><image:title>SMG TP 13 3_4 right</image:title><image:caption>KRISS Vector SMG</image:caption></image:image><lastmod>2012-10-18T09:17:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/03/indonesia-series-special-forces-and-foreign-policy-part-ii/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/20060220adf8185016_0012.jpeg</image:loc><image:title>20060220adf8185016_0012</image:title></image:image><lastmod>2012-10-11T00:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/10/12/the-bali-2002-bombing-nine-years-on/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17532.jpg</image:loc><image:title>IMG_1753[2]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_175711.jpg</image:loc><image:title>IMG_1757[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17571.jpg</image:loc><image:title>IMG_1757[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_175311.jpg</image:loc><image:title>IMG_1753[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17531.jpg</image:loc><image:title>IMG_1753[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17581.jpg</image:loc><image:title>IMG_1758[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_16502.jpg</image:loc><image:title>IMG_1650[2]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_176111.jpg</image:loc><image:title>IMG_1761[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17611.jpg</image:loc><image:title>IMG_1761[1]</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/img_17551.jpg</image:loc><image:title>IMG_1755[1]</image:title></image:image><lastmod>2012-10-06T01:08:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/10/02/a-rights-based-approach-to-women-in-combat/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/10/3046353112_ec89c9df92_b.jpeg</image:loc><image:title>The sun sets behind a C-17 Globemaster III as Soldiers wait in line to board the aircraft taking them back to the United States Nov. 17 at Joint Base Balad, Iraq. C-17s can carry payloads up to 169,000 pounds and can land on small airfields. The C-17 is deployed from the 437th Airlift Wing at Charleston Air Force Base, S.C. (U.S. Air Force photo/Tech. Sgt. Erik Gudmundson)</image:title></image:image><lastmod>2012-10-02T09:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/09/09/photo-of-the-day-tni-al-boarding-party-during-exercise-kakadu/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/09/20120906ran8100087_029.jpg</image:loc><image:title>Exercise Kakadu 2012_3</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/09/20120906ran8100087_020.jpg</image:loc><image:title>Exercise Kakadu 2012_2</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/09/tni-al-kopaska.jpg</image:loc><image:title>Exercise Kakadu 2012</image:title></image:image><lastmod>2012-09-09T12:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/09/08/hedging-our-bets-in-uruzgan/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/09/4570832344_9ae0ff617c_b.jpeg</image:loc><image:title>SOTG in Gizab</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/09/art-550461625-420x0.jpeg</image:loc><image:title>Matiullah Khan</image:title></image:image><lastmod>2012-09-08T07:37:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/08/09/in-brief-the-netherlands-de-zeven-provincien-class-frigates/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/enhanced-boarding-element-royal-netherlands-marine-corps-3.jpg</image:loc><image:title>Enhanced Boarding Element, Royal Netherlands Marine Corps (3)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/enhanced-boarding-element-royal-netherlands-marine-corps-2.jpg</image:loc><image:title>Enhanced Boarding Element, Royal Netherlands Marine Corps (2)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/enhanced-boarding-element-royal-netherlands-marine-corps-1.jpg</image:loc><image:title>Enhanced Boarding Element, Royal Netherlands Marine Corps (1)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/hnlms-evertsen-1.jpg</image:loc><image:title>F805 Evertsen (1)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/f802-de-zeven-provincic3abn.jpg</image:loc><image:title>F802 De Zeven Provinciën</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/f802-de-zeven-provincic3abn-1.jpg</image:loc><image:title>F802 De Zeven Provinciën (1)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/enhanced-boarding-element-royal-netherlands-marine-corps.jpg</image:loc><image:title>Enhanced Boarding Element, Royal Netherlands Marine Corps</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/cdre-bekkering-with-the-commander-of-the-djiboutian-navy-capt-aden-cher.jpg</image:loc><image:title>Cdre Bekkering with the commander of the Djiboutian Navy, Capt Aden Cher</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/558173_333914296695018_161950202_n.jpg</image:loc><image:title>F805 Evertsen</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/hnlms-evertsen.jpg</image:loc><image:title>F805 Evertsen (2)</image:title></image:image><lastmod>2012-08-09T05:36:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/08/01/in-brief-singapores-formidable-class-frigates/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/rss-supreme-73.jpg</image:loc><image:title>RSS Supreme (73)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/rss-steadfast-70.jpg</image:loc><image:title>RSS Steadfast (70)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/rss-intrepid-69.jpg</image:loc><image:title>RSS Intrepid (69)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/08/rss-formidable-68-at-rimpac-2012.jpg</image:loc><image:title>RSS Formidable (68) at RIMPAC 2012</image:title></image:image><lastmod>2012-08-08T17:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/17/photo-of-the-day-canada-in-the-asian-century/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/7546086142_5007aea5d9_b1.jpeg</image:loc><image:title>7546086142_5007aea5d9_b</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/7546086142_5007aea5d9_b.jpeg</image:loc><image:title>7546086142_5007aea5d9_b</image:title></image:image><lastmod>2012-07-17T10:54:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/14/our-new-partners-at-cimsec/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/7563366062_1536de73d6_h.jpeg</image:loc><image:title>7563366062_1536de73d6_h</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/7563366062_66fb698345_c.jpeg</image:loc><image:title>7563366062_66fb698345_c</image:title></image:image><lastmod>2012-07-14T04:53:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/01/01/a-year-in-security/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/01/067.jpg</image:loc><image:title>067</image:title></image:image><lastmod>2012-07-13T01:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/05/23/indonesia-great-power-on-our-doorstep/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/05/sby.jpg</image:loc><image:title>SBY</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/05/756517-indonesia-australia.jpg</image:loc><image:title>756517-indonesia-australia</image:title></image:image><lastmod>2012-07-13T01:07:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/02/indonesia-series-post-1-sasr-kopassus-and-foreign-policy-part-i-2/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/20060222adf8185016_0007.jpg</image:loc><image:title>20060222adf8185016_0007</image:title></image:image><lastmod>2012-07-09T12:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/06/indonesia-series-post-6-australia-indonesia-relations-by-the-numbers/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/20120702raaf82072180083-x3.jpeg</image:loc><image:title>20120702raaf82072180083-X3</image:title></image:image><lastmod>2012-07-06T13:56:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/06/indonesia-series-post-5-like-a-boss/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/20120513adf8225051_-75.jpeg</image:loc><image:title>20120513adf8225051_ 75</image:title></image:image><lastmod>2012-07-05T14:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/04/indonesia-series-post-4-need-to-know-about-indonesias-military-tni-4/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/picture-6.png</image:loc><image:title>Picture 6</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/07/picture-7.png</image:loc><image:title>Picture 7</image:title></image:image><lastmod>2012-07-04T21:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/03/insight-into-indonesias-president-sby-2/</loc><lastmod>2012-07-03T04:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/30/photo-of-the-day-pacific-partnership-2012/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/7462046470_083cc930cd_k.jpg</image:loc><image:title>7462046470_083cc930cd_k</image:title></image:image><lastmod>2012-07-03T04:41:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/07/02/indonesia-week-on-security-scholar/</loc><lastmod>2012-07-01T15:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/25/240mm-heavy-mortars-in-syria-a-closer-examination/</loc><lastmod>2012-06-25T07:07:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/02/15/female-disengagement-teams-in-afghanistan/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/02/6548526777_c6227666d3_b.jpg</image:loc><image:title>6548526777_c6227666d3_b</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/02/5915064975_e660caf239_b1.jpg</image:loc><image:title>110608-A-NR754-002</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/02/5915064975_e660caf239_b.jpg</image:loc><image:title>110608-A-NR754-002</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/02/3888700.jpg</image:loc><image:title>3888700</image:title><image:caption>Photo by Paula Bronstein/Getty Images</image:caption></image:image><lastmod>2012-06-23T11:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/21/all-of-the-teams-on-cst-fet-and-lioness-teams-5-2/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/5915064975_e660caf239_b.jpg</image:loc><image:title>110608-A-NR754-002</image:title></image:image><lastmod>2014-11-07T20:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/14/wounded-warriors-disability-and-the-military-3-2/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/dog_36_0.jpg</image:loc><image:title>dog_36_0</image:title></image:image><lastmod>2012-06-21T04:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/19/us-marsec-capability-development-programs-in-west-africa-current-status-and-future-prospects/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/100222-f-8577g-128.jpg</image:loc><image:title>(DoD photo by Senior Airman Jocelyn A. Guthrie)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/100222-f-8577g-069.jpg</image:loc><image:title>100222-f-8577g-069</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/dsc00977.jpg</image:loc><image:title>DSC00977</image:title></image:image><lastmod>2012-10-10T10:11:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/18/blame-canada-on-women-in-combat-and-research-4/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/290648-female-soldier.jpg</image:loc><image:title>290648-female-soldier</image:title></image:image><lastmod>2013-11-02T04:44:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/29/the-strategic-implications-of-a-gender-equal-adf/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/submarine27306_wideweb__470x3090.jpg</image:loc><image:title>submarine27306_wideweb__470x309,0</image:title></image:image><lastmod>2012-06-18T02:45:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/10/03/nancy-wake-isnt-enough-the-challenges-for-adf-gender-reform/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/taliban_offensive.jpg</image:loc><image:title>AUSTRALIAN TROOPS TALIBAN OFFENSIVE</image:title></image:image><lastmod>2012-06-18T02:45:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/06/15/photo-of-the-day-6/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/06/20120417adf8439709_113.jpg</image:loc><image:title>Operation Slipper</image:title></image:image><lastmod>2012-06-15T14:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/11/20/a-snipers-view-of-bali-ground-zero/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/3171.jpg</image:loc><image:title>317</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/018.jpg</image:loc><image:title>018</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/011.jpg</image:loc><image:title>011</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/014.jpg</image:loc><image:title>014</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/317.jpg</image:loc><image:title>317</image:title></image:image><lastmod>2012-06-13T15:49:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/11/15/update-kriss-systems-k10-kard-sphinx-sdp-compact/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/sphinx_sdp_311011.jpg</image:loc><image:title>sphinx_sdp_311011</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/kriss-k10-3.jpg</image:loc><image:title>KRISS K10 (3)</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/sphinx-sdp-9mm.png</image:loc><image:title>Sphinx SDP 9mm</image:title></image:image><lastmod>2012-06-13T15:46:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/11/21/small-steps-for-australia-indonesia-relations/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/333.jpg</image:loc><image:title>333</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/135.jpg</image:loc><image:title>135</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/149.jpg</image:loc><image:title>149</image:title></image:image><lastmod>2012-06-13T15:46:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/11/22/run-through-the-jungle-colombias-jungla-commandos/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/11/cnp-aviation-screengrab.png</image:loc><image:title>CNP Aviation screengrab</image:title></image:image><lastmod>2012-06-13T15:40:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/03/31/us-drones-and-indonesia-australia-relations-4/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/03/kemlu1.jpg</image:loc><image:title>kemlu</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/03/kemlu.jpg</image:loc><image:title>kemlu</image:title></image:image><lastmod>2012-04-04T20:44:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/03/19/madness-this-is-twittaaaaaaah/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/03/this-is-twittaaaaaah.jpg</image:loc><image:title>This Is Twittaaaaaah!</image:title></image:image><lastmod>2012-03-19T13:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2012/01/13/an-industry-based-approach-to-maritime-security-in-west-africa/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2012/01/nigerian-navy-counter-piracy-demonstration-warboats-org.jpg</image:loc><image:title>Nigerian Navy counter-piracy demonstration</image:title></image:image><lastmod>2012-03-01T09:38:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/12/13/why-has-security-scholar-been-so-quiet-lately/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/12/111218_database_screenshot-draft.png</image:loc><image:title>111218_Database_screenshot-DRAFT</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/12/dewa-yadnya.jpg</image:loc><image:title>Dewa Yadnya</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/12/111212_database_screenshot-draft.png</image:loc><image:title>111212_Database_screenshot-DRAFT</image:title></image:image><lastmod>2012-01-27T12:30:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/01/23/the-problem-with-defence-journalism/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/01/sotg.jpg</image:loc><image:title>OP SLIPPER SOTG TF66</image:title></image:image><lastmod>2012-01-19T22:31:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/10/31/update-ii-ak-103-exports-to-libya/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/libyan-ak-103-2-serial.jpg</image:loc><image:title>AK-103-2_Serial</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/10/libyan-ak-103-2.jpg</image:loc><image:title>AK-103-2_Libya</image:title></image:image><lastmod>2012-08-02T21:35:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/16/update-ak-103-exports-to-libya/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/103-packaging1.jpg</image:loc><image:title>103 Packaging</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/103-packaging.jpg</image:loc><image:title>AK-103 Packaging</image:title><image:caption>AK-103 packaging in Libya</image:caption></image:image><lastmod>2011-12-12T12:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/05/03/australia-and-a-post-bin-laden-pakistan/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/05/sotg-nvg.jpg</image:loc><image:title>OP SLIPPER SOTG</image:title></image:image><lastmod>2011-09-14T08:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/05/30/an-sotg-squirrel-so-secret-%e2%80%a6/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/05/sotg-op-slipper-isaf-jan-11.jpg</image:loc><image:title>Operation Slipper - Special Operations Task Group</image:title></image:image><lastmod>2011-09-14T08:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/06/03/separating-strategy-and-tactics-in-the-afghanistan-debate/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/06/110603-brett-wood-afg.jpg</image:loc><image:title>OP SLIPPER - Special Operations Task Group</image:title></image:image><lastmod>2011-09-14T08:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/06/25/big-boys-dont-crye-multicam-for-australia/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/06/20101024adf8262658_510.jpg</image:loc><image:title>OP SLIPPER SOTG - MultiCam</image:title></image:image><lastmod>2015-01-01T11:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/07/08/losing-the-narrative-battle-civilian-deaths-and-defence-pr/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/07/captain_matt_whitwell_talks_with_local_elders_in_sorkh_lez_web.jpg</image:loc><image:title>OP SLIPPER - MRTF-2</image:title></image:image><lastmod>2011-09-14T08:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/08/22/security-scholar-synopsis-afghanistans-national-interdiction-unit-niu/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/08/niu-in-action1.jpg</image:loc><image:title>NIU raid 3</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/08/niu-in-action.jpg</image:loc><image:title>NIU raid 3</image:title></image:image><lastmod>2011-09-14T08:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/13/australia%e2%80%99s-spend-on-counterterrorism/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/ct-police.jpg</image:loc><image:title>CT Police</image:title></image:image><lastmod>2011-09-21T03:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/04/security-scholar-forum-what-is-a-civilian-strategist/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/forum01_screencap.png</image:loc><image:title>forum01_screencap</image:title></image:image><lastmod>2011-09-22T22:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/08/31/female-commentators-in-ir-we%e2%80%99re-here-on-our-terms/</loc><lastmod>2011-09-01T02:57:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/01/reader-reply-women-in-international-relations/</loc><lastmod>2011-09-01T02:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/09/01/female-exceptionalism-and-reconceptualising-the-field/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/09/110901-fets.jpg</image:loc><image:title>100315-M-6641C-024</image:title></image:image><lastmod>2011-09-01T02:57:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/08/18/strategy-a-symphony-not-a-solo/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/08/2380469759_52cb213dc3.jpg</image:loc><image:title>2380469759_52cb213dc3</image:title></image:image><lastmod>2011-08-18T06:42:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/08/03/in-defence-of-civilian-strategists/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/08/800px-australian_american_memorial_towards_kings_avenue.jpg</image:loc><image:title>800px-Australian_American_Memorial_towards_Kings_Avenue</image:title></image:image><lastmod>2011-08-12T00:46:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/08/02/there-is-no-justification-for-risking-australian-lives-in-afghanistan-a-review/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/08/216750_10150727565615263_855735262_19948904_2986344_n.jpg</image:loc><image:title>216750_10150727565615263_855735262_19948904_2986344_n</image:title></image:image><lastmod>2011-09-07T21:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/07/12/what-wibowo-means-for-australia/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/07/110712-pramono-wibowo.jpg</image:loc><image:title>110712 Pramono Wibowo</image:title></image:image><lastmod>2011-07-14T14:26:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/03/19/will-australia-go-to-war-in-libya/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/afp-libya-warplane-benghazi.jpg</image:loc><image:title>AFP Libya warplane Benghazi</image:title></image:image><lastmod>2011-07-02T17:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/05/24/defence-ambiguity-on-female-engagement-teams/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/05/20101013adf8239682_365.jpg</image:loc><image:title>Operation Slipper</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/05/20090618adf8144078_116.jpg</image:loc><image:title>OP Astute</image:title></image:image><lastmod>2011-05-24T10:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/05/11/reader-reply-defence-pr-still-stuck-in-first-gear/</loc><lastmod>2011-05-11T00:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/05/07/defence-public-relations-see-no-evil-hear-no-evil/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/05/20110429_sotg_140.jpg</image:loc><image:title>OP SLIPPER - Special Operations Task Group</image:title></image:image><lastmod>2011-05-10T09:48:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/04/07/the-serious-scarcity-of-defence-data/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/04/majgen-angus-campbell1.jpg</image:loc><image:title>Operation Slipper</image:title></image:image><lastmod>2011-04-08T06:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/04/06/australia-malaysia-relations-mahathirs-ghost/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/04/mahathir.jpg</image:loc><image:title>Dr Mahathir</image:title></image:image><lastmod>2011-04-06T08:43:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/03/08/afghanistans-war-dogs-the-good-the-bad-and-the-ugly/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/liam_and_theo.jpg</image:loc><image:title>liam_and_theo</image:title><image:caption>Photo courtesy of UK Forces Afghanistan</image:caption></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/dog_fighting_08.jpg</image:loc><image:title>dog_fighting_08</image:title></image:image><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/herbie.jpg</image:loc><image:title>OP SLIPPER</image:title></image:image><lastmod>2011-04-02T23:16:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/04/02/australia-india-indonesia-ties-strategic-choices-and-national-identity/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/04/rudd-natalegawa.jpg</image:loc><image:title>Foreign Ministers Rudd and Natalegawa</image:title></image:image><lastmod>2011-04-01T15:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/03/22/indonesias-military-its-business-baby/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/panglima.jpg</image:loc><image:title>panglima</image:title></image:image><lastmod>2011-03-22T08:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/03/10/australian-fets-in-afghanistan/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/03/capt-vesey-dod.jpg</image:loc><image:title>OP SLIPPER</image:title></image:image><lastmod>2011-03-10T05:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/02/21/nato-and-asean-relations-lets-get-serious-for-a-moment/</loc><image:image><image:loc>https://securityscholar.org/wp-content/uploads/2011/02/nato.jpg</image:loc><image:title>nato</image:title></image:image><lastmod>2011-02-26T19:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2010/12/21/welcome/</loc><lastmod>2011-02-17T00:01:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2010/12/21/linking-matiullah-khan-to-kabul/</loc><lastmod>2011-02-17T00:01:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/01/11/australias-options-on-kopassus-and-human-rights/</loc><lastmod>2011-02-17T00:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/01/13/afghanistan-law-bibliography/</loc><lastmod>2011-02-17T00:01:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org/2011/01/14/reader-reply-australia-and-kopassus/</loc><lastmod>2011-02-17T00:01:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityscholar.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-02-20T22:18:49+00:00</lastmod></url></urlset>
