<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://environmental-security.org/environmental-security-resources</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/futures</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/using-drama-for-impact</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/expert-search</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/environmental-security-games</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/research-shorts</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/exploring-the-intersection-of-environmental-security-and-national-defense</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/accessing-alternative-imaginaries</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/thematicclusters</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/rebuilding-spaces-for-education-and-collaboration</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/networkleads</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/environmental-security-podcasts</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/terms-and-conditions</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/reprinting-and-linking-permissions</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/research-shorts-copy</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/privacy-policy</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/underrated-ideas</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/exploring-the-intersection-of-security-and-environmental-challenges</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/new-voices-new-faces-blog</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>1.0</priority></url><url><loc>https://environmental-security.org/environmental-security-about-us</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/publications</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/environmental-security-projects</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url><url><loc>https://environmental-security.org/environmental-security-services</loc><lastmod>2026-03-28T22:05:45.000Z</lastmod><priority>0.5</priority></url></urlset>