<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securityhistorynetwork.com/2026/03/10/shn-booktalk-rethinking-the-liberal-international-order/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/03/kopie-van-threat-imaginaries-of-the-mediterranean-3-1.png</image:loc><image:title>Kopie van Threat Imaginaries of the Mediterranean (3)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/03/kopie-van-threat-imaginaries-of-the-mediterranean-2.png</image:loc><image:title>Kopie van Threat Imaginaries of the Mediterranean (2)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/03/kopie-van-threat-imaginaries-of-the-mediterranean-3.png</image:loc><image:title>Kopie van Threat Imaginaries of the Mediterranean (3)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/03/2024_08_29-yale-fas-laura-robson_lavitt_5598_r.jpeg</image:loc><image:title>Yale FAS Heads</image:title><image:caption>© Photo by Mara Lavitt&#13;2024-08-29 10:03:13 AM &#13;Humanities Quadrangle Student Lounge, Yale University, New Haven, CT&#13;&#13;Yale FAS Heads&#13;Yale Faculty of Arts &amp; Sciences headshots.</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/03/joe.jpg</image:loc><image:title>joe</image:title></image:image><lastmod>2026-03-10T10:21:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2026/02/10/the-security-catastrophe-of-the-paris-commune-from-the-perspective-of-the-communards/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/02/gislason3.jpg</image:loc><image:title>Gislason3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/02/gislason2.jpg</image:loc><image:title>Gislason2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/02/gislason1.jpg</image:loc><image:title>Gislason1</image:title></image:image><lastmod>2026-02-10T15:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/members/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/benjamin_duerr-10-highres.jpg</image:loc><image:title>Benjamin Duerr&#13;&#13;Portretfoto's gemaakt door portretfotograaf Gregor Servais. Meer op www.gregorservais.nl</image:title><image:caption>Benjamin Duerr&#13;Portretfoto's gemaakt door portretfotograaf Gregor Servais  Meer op www.gregorservais.nl</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/christenunie-111-bewerkt2.png</image:loc><image:title>ChristenUnie-111 bewerkt2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/10/linkedinpf.jpg</image:loc><image:title>LinkedInpf</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/09/knipsel.png</image:loc><image:title>Knipsel</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/07/img_1045-e1615999732886.jpg</image:loc><image:title>img_1045-e1615999732886</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/03/unnamed.jpg</image:loc><image:title>unnamed</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/picture1-1.jpg</image:loc><image:title>picture1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/unnamed.jpg</image:loc><image:title>unnamed</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/picture1.jpg</image:loc><image:title>picture1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/nordhagen-ottosen.jpg</image:loc><image:title>Nordhagen Ottosen</image:title></image:image><lastmod>2026-02-10T14:43:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2026/01/22/death-to-the-traitor-securitization-and-the-dreyfus-affair/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/degradation_alfred_dreyfus.jpg</image:loc><image:title>Degradation_alfred_dreyfus</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-10T14:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2026/02/09/new-shn-member-benjamin-duerr/</loc><lastmod>2026-02-09T07:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2026/01/09/shn-symposium-threat-imaginaries-of-the-mediterranean-corsairs-and-maritime-dominion-in-european-music-theatre/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/babic.jpg</image:loc><image:title>babic</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/lucie-de-saint-vincent-01-c2a9-clemence-rolland-studio-iconographia.jpg</image:loc><image:title>Lucie-de-Saint-Vincent-01-©-Clemence-Rolland-Studio-Iconographia</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2026/01/threat-imaginaries-of-the-mediterranean.png</image:loc><image:title>Threat Imaginaries of the Mediterranean</image:title></image:image><lastmod>2026-01-09T18:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/11/13/nieuwe-policy-brief-van-shn-lid-simon-polinder-over-terrorisme-en-religie-in-nigeria-en-kenia-gepubliceerd/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/11/foto-simon-polinder.jpg</image:loc><image:title>Foto Simon Polinder</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/11/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-08T12:55:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/11/03/book-presentation-state-making-in-an-age-of-revolution-1830-1880/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/11/9781836245629.cover_.jpg</image:loc><image:title>9781836245629.cover</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/11/christosaliprantis_062425_0001.jpg</image:loc><image:title>christosaliprantis_062425_0001</image:title></image:image><lastmod>2025-11-03T13:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/10/21/shn-lecture-temmers-van-geweld-de-opkomst-van-de-moderne-wereldorde-van-vrede-en-recht/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/10/ontwerp-zonder-titel.png</image:loc><image:title>Ontwerp zonder titel</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/banner-lezing-benjamin-duerr-1.png</image:loc><image:title>Banner lezing Benjamin Duerr (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/omslag-en-auteursfoto-de-droom-van-den-haag-1-1.jpg</image:loc><image:title>Kopie van Kopie van Ontwerp zonder titel - 1</image:title><image:caption>Kopie van Kopie van Ontwerp zonder titel - 1</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/omslag-en-auteursfoto-de-droom-van-den-haag-1.jpg</image:loc><image:title>Kopie van Kopie van Ontwerp zonder titel - 1</image:title><image:caption>Kopie van Kopie van Ontwerp zonder titel - 1</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/banner-lezing-benjamin-duerr.png</image:loc><image:title>Banner lezing Benjamin Duerr</image:title></image:image><lastmod>2025-10-22T13:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/10/01/urgent-two-book-events-in-one-day-prussia-at-crossroads-state-society-and-monarchy-in-crisis/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/10/prussia-at-crossroads.png</image:loc><image:title>Prussia at Crossroads</image:title></image:image><lastmod>2025-10-21T15:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/09/18/shn-lecture-prussia-at-crossroads-state-society-and-monarchy-in-crisis/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/09/header.png</image:loc><image:title>header</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/09/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/09/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2025-10-01T15:13:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/09/19/beatrice-de-graaf-to-speak-at-psia-on-the-return-of-imperial-thinking-in-international-politics/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/09/1758183789504.jpeg</image:loc><image:title>1758183789504</image:title></image:image><lastmod>2025-09-19T15:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/events/</loc><lastmod>2025-09-18T14:51:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2025/09/09/erik-de-lange-genomineerd-voor-libris-geschiedenis-prijs-2025/</loc><lastmod>2025-09-09T14:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/07/03/sterkenburgh-wilhelm-i-as-german-emperor/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/07/nationaldenkmal_kaiser_wilhelms_i._gesamtansicht.jpg</image:loc><image:title>Nationaldenkmal_Kaiser_Wilhelms_I._Gesamtansicht</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/07/einweihung_siegessaeule_berlin.jpg</image:loc><image:title>Einweihung_Siegessaeule_Berlin</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/07/bundesarchiv_bild_146-1970-077-18_kaiser_wilhelm_i.jpg</image:loc><image:title>Kaiser Wilhelm I.</image:title><image:caption>Kaiser Wilhelm I., 1884</image:caption></image:image><lastmod>2025-07-07T12:54:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/06/09/duerr-defence-of-the-sword-or-the-law/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/06/default.jpg</image:loc><image:title>default</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/06/dum-dum-bullet-2.jpg</image:loc><image:title>Landesarchiv Baden-WÃ¼rttemberg - Dokument:</image:title><image:caption>Landesarchiv Baden-WÃ¼rttemberg - Dokument:</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/06/dum-dum-bullet.jpg</image:loc><image:title>Dum dum bullet</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/06/the_first_international_peace_conference_the_hague_may_-_june_1899_hu67224.jpg</image:loc><image:title>The_First_International_Peace_Conference,_the_Hague,_May_-_June_1899_HU67224</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/06/omslag-en-auteursfoto-de-droom-van-den-haag-2.jpg</image:loc><image:title>Kopie van Kopie van Ontwerp zonder titel - 1</image:title><image:caption>Kopie van Kopie van Ontwerp zonder titel - 1</image:caption></image:image><lastmod>2025-06-03T14:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/05/22/publicatie-polarisatie-escalatie-en-alledaagse-vrede-door-dr-luuk-slooter/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/maxim-hopman-mupyxf276pk-unsplash.jpg</image:loc><image:title>maxim-hopman-MupyXf276pk-unsplash</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/luukslooter.jpg</image:loc><image:title>luukslooter</image:title></image:image><lastmod>2025-05-22T14:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/05/21/publicatie-de-laatste-dagen-van-barbarije-door-erik-de-lange/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/alonso-reyes-mg_rp41ayqm-unsplash.jpg</image:loc><image:title>alonso-reyes-mG_rp41aYqM-unsplash</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/austin-neill-emh2e5sbife-unsplash.jpg</image:loc><image:title>austin-neill-emH2e5SBifE-unsplash</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/05/20241127100005-auteur-69993.jpg</image:loc><image:title>20241127100005-auteur-69993</image:title></image:image><lastmod>2025-05-20T14:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/04/02/shn-lecture-treasonous-subversion-the-struggle-for-domestic-security-in-austria-hungary/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/04/mark-cornwall-2020-2.jpg</image:loc><image:title>Mark Cornwall 2020 2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/04/lecture-mark-cornwall-banner.png</image:loc><image:title>Lecture Mark Cornwall Banner</image:title></image:image><lastmod>2025-04-02T11:06:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/03/12/nrc-publicatie-hoe-gevaarlijk-is-wit-christelijk-nationalisme/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/03/natilyn-hicks-photography-o7e-kl4o3ra-unsplash-2.0.png</image:loc><image:title>natilyn-hicks-photography-O7e-kL4o3RA-unsplash 2.0</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/03/natilyn-hicks-photography-o7e-kl4o3ra-unsplash.jpg</image:loc><image:title>natilyn-hicks-photography-O7e-kL4o3RA-unsplash</image:title></image:image><lastmod>2025-03-12T11:04:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/03/11/german-history-beyond-bismarck-wilhelm-i-augusta-and-the-hohenzollern-monarchy-in-the-19th-century/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/03/wilhelm-und-augusta.png</image:loc><image:title>Wilhelm-und-Augusta</image:title></image:image><lastmod>2025-03-12T10:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/02/26/digital-book-launch-the-radical-redemption-model-by-beatrice-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/02/flyer-book-launch-the-radical-redemption-model-1.jpg</image:loc><image:title>Flyer Book Launch The Radical Redemption Model</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/02/levi-meir-clancy-lhehiv3xpgm-unsplash.jpg</image:loc><image:title>levi-meir-clancy-LheHIV3XpGM-unsplash</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/02/flyer-book-launch-the-radical-redemption-model.jpg</image:loc><image:title>Flyer Book Launch The Radical Redemption Model</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/02/beatrice-de-graaf.jpg</image:loc><image:title>Beatrice-de-Graaf</image:title></image:image><lastmod>2025-02-26T09:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/01/28/polinder-poetin-geopolitiek-en-religie-serieus-nemen/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/putin-anncounces-special-operation.png</image:loc><image:title>Putin anncounces special operation</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/fotos4.jpeg</image:loc><image:title>Fotos4</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/2048px-kirill_and_putin_2010-05-24_04.jpg</image:loc><image:title>2048px-Kirill_and_Putin_(2010-05-24)_04</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/1024px-vladimir_putin_2022_annexation_speech-1.jpg</image:loc><image:title>1024px-Vladimir_Putin_2022_Annexation_Speech</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/1024px-vladimir_putin_2022_annexation_speech.jpg</image:loc><image:title>1024px-Vladimir_Putin_2022_Annexation_Speech</image:title></image:image><lastmod>2025-01-28T13:17:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2025/01/10/shn-lecture-spycraft-nadine-akkerman/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/n.n.w.-nadine-akkerman-2021-1.jpg</image:loc><image:title>n.n.w.-nadine-akkerman-2021</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/n.n.w.-nadine-akkerman-2021.jpg</image:loc><image:title>n.n.w.-nadine-akkerman-2021</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2025/01/a-lecture-by-prof.-dr.-nadine-akkerman-leiden-university.png</image:loc><image:title>A lecture by Prof. dr. Nadine Akkerman, Leiden University</image:title></image:image><lastmod>2025-01-10T12:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/11/11/shn-lecture-by-eugene-rogan/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/lecture-eugene-rogan-banner.png</image:loc><image:title>Lecture Eugene Rogan banner</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/images-1-1.jpg</image:loc><image:title>images (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/images-1.jpg</image:loc><image:title>images</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/11/images.jpg</image:loc><image:title>images</image:title></image:image><lastmod>2024-11-11T14:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/09/17/love-as-an-analytical-lens/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/09/glenn-carstens-peters-npxxwgq33zq-unsplash.jpg</image:loc><image:title>glenn-carstens-peters-npxXWgQ33ZQ-unsplash</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/09/picture-simon.jpg</image:loc><image:title>Picture-Simon</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/09/getimage.jpeg</image:loc><image:title>GetImage</image:title></image:image><lastmod>2024-11-07T14:57:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/10/24/weber-faith-and-security/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/13-nara-44-pa-0996.jpg</image:loc><image:title>13 NARA-44-pa-0996</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/13-nara-pbs-goebbels_hitler_canonical-resize-1200x0-50.jpg</image:loc><image:title>13 NARA-PBS-goebbels_hitler_canonical-resize-1200x0-50</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/13-bundesarchiv_bild_183-j05235_berlin_groskundgebung_im_sportpalast.jpg</image:loc><image:title>Berlin, Großkundgebung im Sportpalast</image:title><image:caption>Das deutsche Volk fordert den grossen Krafteinsatz zur Erzwingung des Sieges.
Am Donnerstagabend fand im Berliner Sportpalast eine Grosskundgebung der Bevölkerung Berlins statt, in der Reichsminister Dr. Goebbels mit schonungsloser Offenheit die Gefahr aufzeigte, in der Europa schwebt. Die von dem alten nationalsozialistischen Kampfgeist getragene Veranstaltung brachte das einmütige und leidenschaftliche Bekenntnis der Teilnehmer, der Männer und Frauen, der Ritterkreuzträger und Rüstungsarbeiter, der Verwundeten und zahllosen Männer aus allen Schaffens- und Wissensgebieten, den Krieg rücksichtslos und in seiner radikalsten Totalität zu führen und den Sieg über den Bolschewismus zu erzwingen.
UBz: Uebersicht über den Sportpalast während der Kundgebung.
Fot. Schwahn 18.2.1943 J 5235</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/13-fuv-poster-usanl.jpg</image:loc><image:title>13 FuV-poster-USA&amp;NL</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/776-thomas-weber_160308_130257-1.jpg</image:loc><image:title>776-thomas-weber_160308_130257</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/10/776-thomas-weber_160308_130257.jpg</image:loc><image:title>776-thomas-weber_160308_130257</image:title></image:image><lastmod>2024-10-27T20:15:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/09/04/new-researchers-conference-call-for-papers/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/09/aaron-burden-y02jex_b0o0-unsplash-2.0.jpg</image:loc><image:title>aaron-burden-y02jEX_B0O0-unsplash 2.0</image:title></image:image><lastmod>2024-09-04T10:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/07/04/shn-book-launch-menacing-tides/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/07/banner-book-launch-erik-de-lange-2.png</image:loc><image:title>Banner Book Launch Erik de Lange (2)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/07/banner-book-launch-erik-de-lange-1.png</image:loc><image:title>Banner Book Launch Erik de Lange (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/07/banner-book-launch-erik-de-lange.png</image:loc><image:title>Banner Book Launch Erik de Lange</image:title></image:image><lastmod>2024-08-19T15:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/08/15/the-bosporus-in-the-shadow-of-geopolitics/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/images.jpeg</image:loc><image:title>images</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/james-baldwin.jpg</image:loc><image:title>James Baldwin</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/hilton.jpg</image:loc><image:title>Hilton</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/ayasli-yalisi.jpg</image:loc><image:title>Ayasli Yalisi</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/philby.jpg</image:loc><image:title>Philby</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/ulus.jpg</image:loc><image:title>Ulus</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/pera.jpg</image:loc><image:title>Pera</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/08/bosporus.jpg</image:loc><image:title>Bosporus</image:title></image:image><lastmod>2024-08-15T11:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/06/27/ep7-revolutionary-scripts-with-erik-de-lange-and-maurizio-isabella/</loc><lastmod>2024-07-25T08:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/07/15/shns-academic-year-2023-24/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/07/img_20240117_190544.jpg</image:loc><image:title>IMG_20240117_190544</image:title></image:image><lastmod>2024-07-15T12:25:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/06/27/lorena-de-vita-wins-heineken-award/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/06/lorena-de-vita-rijswijk.jpg</image:loc><image:title>Lorena de Vita - Rijswijk</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/06/de-vita-belloni.jpg</image:loc><image:title>De Vita Belloni</image:title></image:image><lastmod>2024-06-27T12:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/06/24/phd-defence-annelotte-janse/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/06/pursuit-of-white-security-4009122396-e1719224263749.jpg</image:loc><image:title>Pursuit of White Security</image:title></image:image><lastmod>2024-06-24T12:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/05/06/welcome-lars-janssen/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/05/shn-lars-janssen-1.png</image:loc><image:title>SHN Lars Janssen (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/05/lars-janssen.jpeg</image:loc><image:title>lars-janssen</image:title></image:image><lastmod>2024-05-06T09:06:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/04/25/shn-lecture-series-maurizio-isabella/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/04/banner-maurizio-isabella-1.png</image:loc><image:title>Banner Maurizio Isabella (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/04/banner-maurizio-isabella.png</image:loc><image:title>Banner Maurizio Isabella</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/04/maurizio-isabella.jpg</image:loc><image:title>maurizio-isabella</image:title></image:image><lastmod>2024-05-02T11:44:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/11/05/book-degraaf-tegen-de-terreur/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/tegen-de-terreur.jpg</image:loc><image:title>Tegen de Terreur</image:title></image:image><lastmod>2024-04-18T09:07:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/03/21/shn-lecture-series-ayse-zarakol/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/03/shn-lecture-ayse-zarakol-22-april-2024-banner_-1.png</image:loc><image:title>SHN lecture Ayse Zarakol 22 april 2024 Banner_</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/03/shn-lecture-ayse-zarakol-22-april-2024-banner_.png</image:loc><image:title>SHN lecture Ayse Zarakol 22 april 2024 Banner_</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/03/ayse-zarakol.jpg</image:loc><image:title>ayse-zarakol</image:title></image:image><lastmod>2024-04-11T09:31:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/04/08/closing-conference-blueprints-of-hope/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/04/eu-flag.jpg</image:loc><image:title>PENTAX DIGITAL CAMERA</image:title><image:caption>PENTAX DIGITAL CAMERA</image:caption></image:image><lastmod>2024-04-08T09:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/04/08/ep6-ottoman-passports-with-ozan-ozavci-and-ilkay-yilmaz/</loc><lastmod>2024-04-08T08:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/09/28/blog-janse-manfred-roeder/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/09/manfred-roeder.png</image:loc><image:title>manfred-roeder</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/09/asylum-seekers-hamburg.jpg</image:loc><image:title>Asylum seekers Hamburg</image:title></image:image><lastmod>2024-03-11T10:05:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/12/07/blog-vantil-the-restoration-of-imperial-power/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/kruseman-baron-van-der-capellen.jpg</image:loc><image:title>Kruseman - Baron van der Capellen</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/territorial_evolution_of_the_dutch_east_indies.png</image:loc><image:title>territorial_evolution_of_the_dutch_east_indies</image:title></image:image><lastmod>2024-03-11T10:01:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/02/22/blog-lissi-sacred-band/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/02/ramorino.jpeg</image:loc><image:title>ramorino</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/02/harring.png</image:loc><image:title>Harring</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/02/rauschenplat.jpg</image:loc><image:title>rauschenplat</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/02/lissi-afbeelding1-cover.jpeg</image:loc><image:title>Lissi - afbeelding1 - cover</image:title></image:image><lastmod>2024-02-22T10:26:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/02/13/shn-lecture-series-gert-huskens/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/02/shn-lecture-gert-huskens-14-maart-2024-banner.png</image:loc><image:title>SHN lecture Gert Huskens 14 maart 2024 banner</image:title></image:image><lastmod>2024-02-15T12:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/07/27/symposium-polarisering-verbinding/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/07/polarisering-verbinding.png</image:loc><image:title>polarisering-verbinding</image:title></image:image><lastmod>2024-01-25T13:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/10/03/shn-lectures-series-duco-hellema/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/10/duco-hellema-met-qr-banner.png</image:loc><image:title>Duco Hellema met QR (Banner)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/10/security-history-network-lecture-series-2023-2024-banner-duco-zonder-qr.png</image:loc><image:title>Security History Network Lecture Series 2023-2024 (Banner DUCO zonder qr)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/10/hellema.jpg</image:loc><image:title>Hellema</image:title></image:image><lastmod>2024-01-25T13:24:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/12/01/shn-film-night-napoleon/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/18-december-3-1.png</image:loc><image:title>18 December (3)</image:title></image:image><lastmod>2024-01-25T13:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/01/16/shn-lecture-davide-rodogno/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/01/banner-davide-rodogno.png</image:loc><image:title>Banner Davide Rodogno</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/01/poster-lezing-dazvide-rodogno-8-februari-2024.png</image:loc><image:title>Poster lezing Dazvide Rodogno 8 februari 2024</image:title></image:image><lastmod>2024-01-25T13:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/12/19/shn-lecture-series-hubert-smeets/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2024/01/davide-rodogno.jpg</image:loc><image:title>davide-rodogno</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/banner-website-nhs-lecture-hubert-smeets-2.png</image:loc><image:title>Banner website NHS Lecture Hubert Smeets (2)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/hubert-smeets.jpg</image:loc><image:title>Hubert Smeets</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/12/smeetshubert.jpg</image:loc><image:title>smeetshubert</image:title></image:image><lastmod>2024-01-25T13:22:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2024/01/25/ep5-new-napoleonic-history-with-alexander-mikerabidze/</loc><lastmod>2024-01-25T10:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/11/28/shns-latest-about-napoleon/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/11/fracois-gerard-austerlitz.jpg</image:loc><image:title>Öèôðîâàÿ ðåïðîäóêöèÿ íàõîäèòñÿ â èíòåðíåò-ìóçåå Gallerix.ru</image:title><image:caption>Öèôðîâàÿ ðåïðîäóêöèÿ íàõîäèòñÿ â èíòåðíåò-ìóçåå Gallerix.ru</image:caption></image:image><lastmod>2023-11-28T13:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/04/24/intrigue-at-the-dutch-palace/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/afb.-2-dutch-consulate.png</image:loc><image:title>afb.-2-dutch-consulate</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/afb.-1-dutch-palace.jpg</image:loc><image:title>afb.-1-dutch-palace</image:title></image:image><lastmod>2023-10-11T20:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/12/14/shn-lecture-series-dewilde/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/12/online-poster-jaap-de-wilde-lecture-series-612231516-e1671026761213.png</image:loc><image:title>Online poster Jaap de Wilde Lecture Series</image:title></image:image><lastmod>2023-10-05T13:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/01/25/news-utrecht-political-history-bell/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/announcement-shn-2272795970-e1674635117774.png</image:loc><image:title>Ánnouncement SHN</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/bell-david_c.webp</image:loc><image:title>bell-david_c</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/princeton_seal.svg_.png</image:loc><image:title>princeton_seal.svg_</image:title></image:image><lastmod>2023-10-05T13:02:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/02/24/shn-lecture-series-ilkay-yilmaz/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/mediapost-dr.-ilkay-yilmaz-interimperial-diplomacy-security-and-administrative-refrom-in-the-ottoman-east-1878-1913-1.png</image:loc><image:title>Mediapost Dr. Ilkay Yilmaz Interimperial Diplomacy, Security and Administrative Refrom in The Ottoman East (1878-1913) (1)</image:title></image:image><lastmod>2023-10-05T13:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/03/07/utrecht-lectures-in-political-history-barbara-stollberg-rilinger/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/stillinger.jpg</image:loc><image:title>stillinger</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/social-media-post-sollberg-rilinger.jpg</image:loc><image:title>Social Media Post Sollberg-Rilinger</image:title></image:image><lastmod>2023-10-05T13:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/04/04/shn-lecture-series-hitlers-quest-for-sustainable-security/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/kopie-van-mediapost-dr.-ilkay-yilmaz-interimperial-diplomacy-security-and-administrative-refrom-in-the-ottoman-east-1878-19131.png</image:loc><image:title>Kopie van Mediapost Dr. Ilkay Yilmaz Interimperial Diplomacy, Security and Administrative Refrom in The Ottoman East (1878-1913)(1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/thomas-weber.jpg</image:loc><image:title>Thomas Weber</image:title></image:image><lastmod>2023-10-05T13:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/04/04/history-of-international-relations-and-commissioned-research-intelligence-security/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/intelligence-security4-1.png</image:loc><image:title>Intelligence &amp; Security(4)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/intelligence-security4-3238566866-e1680610080260.png</image:loc><image:title>intelligence-security4</image:title></image:image><lastmod>2023-10-05T12:59:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/04/11/e3-business-history-and-security/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/mark-jakob.jpg</image:loc><image:title>mark-jakob</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/christian-kleinschmidt.jpg</image:loc><image:title>christian-kleinschmidt</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/nina-kleinoder.png</image:loc><image:title>nina-kleinoder</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/04/marcus-boick.jpg</image:loc><image:title>marcus-boick</image:title></image:image><lastmod>2023-10-05T12:59:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/05/15/event-christopher-clark/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/banner-chris-clark1.png</image:loc><image:title>Banner Chris Clark(1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/knaw-logo-1.png</image:loc><image:title>knaw-logo-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/shn-logo.png</image:loc><image:title>shn-logo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/foto-christopher-clark.jpg</image:loc><image:title>Foto Christopher Clark</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/banner-chris-clark.png</image:loc><image:title>Banner Chris Clark</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/knaw-logo.png</image:loc><image:title>knaw-logo</image:title></image:image><lastmod>2023-10-05T12:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/06/19/blogpost-jorrit-steehouder/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/06/nl-hana_2.24.01.03_0_935-1807-groot-1.jpg</image:loc><image:title>NL-HaNA_2.24.01.03_0_935-1807-groot</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/06/sikorski-mayski_1941_agreement.jpg</image:loc><image:title>sikorski-mayski_1941_agreement</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/06/allied_soldiers_like_london_and_london_likes_them-_overseas_troops_in_england_1940_d1730.jpeg</image:loc><image:title>allied_soldiers_like_london_and_london_likes_them-_overseas_troops_in_england_1940_d1730</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/06/nl-hana_2.24.01.03_0_935-1807-groot.jpg</image:loc><image:title>nl-hana_2.24.01.03_0_935-1807-groot</image:title></image:image><lastmod>2023-06-19T09:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/06/08/e4-bridging-nationalisms/</loc><lastmod>2023-06-08T13:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2020/01/01/vom-nachkrieg-zum-vorkrieg-by-thomas-weber/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/csm_978-3-8487-7728-0_4b1088ab00.jpg</image:loc><image:title>csm_978-3-8487-7728-0_4b1088ab00</image:title></image:image><lastmod>2023-05-22T14:17:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2017/11/01/becoming-hitler-by-thomas-weber/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/becoming-hitler.jpg</image:loc><image:title>Becoming Hitler</image:title></image:image><lastmod>2023-05-22T12:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/01/01/bloodshed-on-a-rather-large-scale/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/boek-harinck-2.jpg</image:loc><image:title>Boek Harinck 2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/foto-harinck-1.jpg</image:loc><image:title>foto-harinck-1</image:title></image:image><lastmod>2023-05-01T12:12:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/01/01/zoeken-aangrijpen-en-vernietigen-by-christiaan-harinck/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/boek-harinck.jpg</image:loc><image:title>Boek Harinck</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/foto-harinck.jpg</image:loc><image:title>foto-harinck</image:title></image:image><lastmod>2023-05-01T12:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/01/01/andrea-wiegershoff-chapter/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/boek-wiegershof.jpg</image:loc><image:title>boek-wiegershof</image:title></image:image><lastmod>2023-05-01T11:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/05/01/re-imagining-security-minor/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/05/security-minor-website.jpg</image:loc><image:title>security-minor-website</image:title></image:image><lastmod>2023-05-01T09:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/03/28/kutuzov-by-alexander-mikaberidze/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/kutukov.jpg</image:loc><image:title>Kutukov</image:title></image:image><lastmod>2023-03-28T11:48:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/03/20/meet-the-team-beatrice-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/shn-announcement-template.png</image:loc><image:title>SHN Announcement Template</image:title></image:image><lastmod>2023-03-20T09:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/03/06/blogpost-beatrice-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/blogpost-beatrice-afb.-3-1.png</image:loc><image:title>Blogpost Beatrice, afb. 3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/blogpost-beatrice-afb.-2.png</image:loc><image:title>blogpost-beatrice-afb.-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/blogpost-beatrice-afb.-1.png</image:loc><image:title>blogpost-beatrice-afb.-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/03/blogpost-beatrice-afb.-3.png</image:loc><image:title>blogpost-beatrice-afb.-3</image:title></image:image><lastmod>2023-03-06T18:14:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/02/22/shn-lecture-series/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/shn-lecture-card-2022-2023-1.png</image:loc><image:title>shn-lecture-card-2022-2023-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/shn-lecture-series-website-post.png</image:loc><image:title>SHN Lecture Series Website Post</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/shn-lecture-card-2022-2023.png</image:loc><image:title>SHN Lecture Card 2022-2023</image:title></image:image><lastmod>2023-02-22T13:48:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/02/20/arenberg-award-ceremony-for-beatrice-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/paleis-arenberg.jpg</image:loc><image:title>Paleis Arenberg</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/02/arenberg-uitnodiging.jpg</image:loc><image:title>arenberg-uitnodiging</image:title></image:image><lastmod>2023-02-20T11:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/13/shn-podcast-e1-aksan-ozavci/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/shn-podcast-logo.jpg</image:loc><image:title>SHN Podcast logo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/battle-scene-from-the-greek-war-of-independence-by-german-painter-georg-perlberg-1807-1884-e1657713212337.jpg</image:loc><image:title>battle-scene-from-the-greek-war-of-independence-by-german-painter-georg-perlberg-1807-1884</image:title></image:image><lastmod>2023-01-24T12:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/11/24/podcast-e2-klem-delange/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/shn-podcast-logo.png</image:loc><image:title>SHN Podcast Logo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/20221017110331-70168.jpg</image:loc><image:title>20221017110331-70168</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/9789044647020.jpg</image:loc><image:title>9789044647020</image:title></image:image><lastmod>2023-01-24T12:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2023/01/24/blog-lissi-culture-sedition/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/lynching-of-giuseppe-prina-3-18394858-e1674554439637.jpg</image:loc><image:title>Lynching of Giuseppe Prina</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/pellico-silvio-austrian-national-library-austria.jpg</image:loc><image:title>pellico-silvio-austrian-national-library-austria</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/portrait-of-luigi-porro-lambertenghi-galleria-darte-moderna-milano.jpg</image:loc><image:title>portrait-of-luigi-porro-lambertenghi-galleria-darte-moderna-milano</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/niccolo-fontani-litography-of-federico-confalonieri-milan-1864.jpg</image:loc><image:title>niccolo-fontani-litography-of-federico-confalonieri-milan-1864</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/lynching-of-giuseppe-prina-2.jpg</image:loc><image:title>lynching-of-giuseppe-prina-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/lynching-of-giuseppe-prina-1.jpg</image:loc><image:title>lynching-of-giuseppe-prina-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2023/01/lynching-of-giuseppe-prina.jpg</image:loc><image:title>lynching-of-giuseppe-prina</image:title></image:image><lastmod>2023-01-24T12:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/20/shn-podcast-first-episode/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/shn-podcast-logo-3-c397-2-in-2150968474-e1674564184598.png</image:loc><image:title>SHN Podcast Logo (3 × 2 in)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/the-ottomans-1700-1923-an-empire-beseiged.jpg</image:loc><image:title>The Ottomans 1700-1923 An Empire Beseiged</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/virginia-askan.jpg</image:loc><image:title>virginia-askan</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/www.securityhistorynetwork.com1_-e1658316652715.png</image:loc><image:title>www.SecurityHistoryNetwork.com(1)</image:title></image:image><lastmod>2023-01-24T12:43:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/08/31/event-dangerous-gifts-webinar/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/screenshot-2022-10-03-at-09-42-33-edit-post-e280b9-the-security-history-network-e28094-wordpress.com_-1.png</image:loc><image:title>Screenshot 2022-10-03 at 09-42-33 Edit Post ‹ The Security History Network — WordPress.com</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/screenshot-2022-10-03-at-09-42-33-edit-post-e280b9-the-security-history-network-e28094-wordpress.com_-e1664782977533.png</image:loc><image:title>Screenshot 2022-10-03 at 09-42-33 Edit Post ‹ The Security History Network — WordPress.com</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/dangerous-gifts-aspect-ratio-1090-610-1.webp</image:loc><image:title>DANGEROUS-GIFTS-aspect-ratio-1090-610</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/e9e1c9b1-68b6-4ca4-b4c6-bc6deef9eec6.png</image:loc><image:title>e9e1c9b1-68b6-4ca4-b4c6-bc6deef9eec6</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/screenshot-2022-08-31-at-08-18-12-dangerous-gifts-imperialism-security-and-civil-wars-in-the-levant-1798-1864-with-ozan-ozavci-and-aimee-genell-institute-for-middle-east-studies.png</image:loc><image:title>Screenshot 2022-08-31 at 08-18-12 Dangerous Gifts Imperialism Security and Civil Wars in the Levant 1798-1864 with Ozan Ozavci and Aimee Genell - Institute for Middle East Studies</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/dangerous-gifts-aspect-ratio-1090-610.webp</image:loc><image:title>DANGEROUS-GIFTS-aspect-ratio-1090-610</image:title></image:image><lastmod>2023-01-24T09:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/11/07/event-ozan-ozavci-the-end-of-the-eastern-question/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/screenshot-2022-11-07-at-11-59-00-6-ozan-ozavci-40ozanozavci1-_-twitter.png</image:loc><image:title>Screenshot 2022-11-07 at 11-59-00 (6) Ozan Ozavci (@ozanozavci1) _ Twitter</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/screenshot-2022-11-07-at-11-46-54-6-ozan-ozavci-40ozanozavci1-_-twitter-1.png</image:loc><image:title>Screenshot 2022-11-07 at 11-46-54 (6) Ozan Ozavci (@ozanozavci1) _ Twitter</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/fgolikgxoaayqi8-3-2359732603-e1674550863409.jpg</image:loc><image:title>fgolikgxoaayqi8-3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/fgolikgxoaayqi8-2-4221671917-e1674550815277.jpg</image:loc><image:title>fgolikgxoaayqi8-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/screenshot-2022-11-07-at-11-46-54-6-ozan-ozavci-40ozanozavci1-_-twitter.png</image:loc><image:title>screenshot-2022-11-07-at-11-46-54-6-ozan-ozavci-40ozanozavci1-_-twitter</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/fgolikgxoaayqi8-1.jpg</image:loc><image:title>fgolikgxoaayqi8-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/fgolikgxoaayqi8.jpg</image:loc><image:title>fgolikgxoaayqi8</image:title></image:image><lastmod>2023-01-24T09:01:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/11/08/event-wellington-lecture-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/screenshot-2023-01-24-at-09-57-02-edit-post-e280b9-the-security-history-network-e28094-wordpress.com_-3524660731-e1674550743649.png</image:loc><image:title>Screenshot 2023-01-24 at 09-57-02 Edit Post ‹ The Security History Network — WordPress.com</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/announcement-shn-260631385-e1674550716806.jpg</image:loc><image:title>Announcement SHN</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/zack-white-wellington.png</image:loc><image:title>zack-white-wellington</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/beatrice-wellington.jpg</image:loc><image:title>beatrice-wellington</image:title></image:image><lastmod>2023-01-24T08:59:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/10/01/a-new-perspective-on-the-european-security-culture-after-1815-beatrice-de-graaf-et-al/</loc><lastmod>2022-12-07T09:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/06/03/meet-the-team-part-2-erik-de-lange/</loc><lastmod>2022-11-24T09:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/12/01/vorstin-op-vredespad-beatrice-de-graaf/</loc><lastmod>2022-11-15T09:45:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2016/11/01/imperial-anxieties-eric-de-lange/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2016/11/tijdschrift-voor-geschiedenis-2792154561-e1668504991668.png</image:loc><image:title>Tijdschrift voor Geschiedenis</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/tijdschrift-voor-geschiedenis-2792154561-e1668504792880.png</image:loc><image:title>Tijdschrift voor Geschiedenis</image:title></image:image><lastmod>2022-11-15T09:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/10/01/article-degraaf-securityculture-1815/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/contemporanea.gif</image:loc><image:title>Contemporanea</image:title></image:image><lastmod>2022-11-09T15:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/11/03/shn-lecture-series-borderless-revolutions-organising-and-curtailing-transnational-political-opposition-in-1848/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/ignacio-garcia-de-paso.jpg</image:loc><image:title>Ignacio Garcia de Paso</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/borderless-revolutions-organising-and-curtailing-transnational-political-opposition-in-1848-presentatie-169-3-c397-2-in.png</image:loc><image:title>Borderless revolutions Organising and curtailing transnational political opposition in 1848 (Presentatie (169)) (3 × 2 in)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/borderless-revolutions.jpg</image:loc><image:title>Borderless Revolutions</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/11/shn-colored-logo402x.png</image:loc><image:title>shn-colored-logo402x</image:title></image:image><lastmod>2022-11-03T11:04:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/10/25/blog-schenk-preaching-neutrality/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/screenshot-2022-10-25-at-12-14-51-file-1884-map-of-the-belgium-congo.jpg-wikimedia-commons.png</image:loc><image:title>Screenshot 2022-10-25 at 12-14-51 File 1884 Map of the Belgium Congo.jpg - Wikimedia Commons</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1884_map_of_the_belgium_congo-3.jpg</image:loc><image:title>1884_Map_of_the_Belgium_Congo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1884_map_of_the_belgium_congo-2.jpg</image:loc><image:title>1884_Map_of_the_Belgium_Congo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1884_map_of_the_belgium_congo-1.jpg</image:loc><image:title>1884_Map_of_the_Belgium_Congo</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1884_map_of_the_belgium_congo.jpg</image:loc><image:title>1884_map_of_the_belgium_congo</image:title></image:image><lastmod>2022-10-27T12:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/blog/</loc><lastmod>2022-10-25T10:31:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2022/10/03/event-the-parallax-1922/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1500x500-e1664783825123.jpg</image:loc><image:title>1500x500</image:title></image:image><lastmod>2022-10-06T07:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/10/03/maand-van-de-geschiedenis-2022/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/logo-op1.png</image:loc><image:title>logo-op1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/index.jpg</image:loc><image:title>index</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/ovt.1400.a8b528dc2ef735daa92663d79547cdba.jpg</image:loc><image:title>ovt.1400.a8b528dc2ef735daa92663d79547cdba</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/1920_logoop1-.png</image:loc><image:title>1920_logoop1-</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/gw_hum_boek_crisis_770x510-e1664787329812.jpg</image:loc><image:title>GW_HUM_boek_crisis_770x510</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/screenshot-2022-10-03-at-10-50-38-beatrice-de-graaf-over-haar-essay-crisis-ovt.png</image:loc><image:title>screenshot-2022-10-03-at-10-50-38-beatrice-de-graaf-over-haar-essay-crisis-ovt</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/de-ongelooflijke-podcast.300.b949946a2f70707fc2827e4f7843a97e.jpg</image:loc><image:title>de-ongelooflijke-podcast.300.b949946a2f70707fc2827e4f7843a97e</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/cover_essay_beatrice-1.jpg2c4870c1b910cc6f7e7454ad9720e017-1.jpg</image:loc><image:title>cover_essay_beatrice-1.jpg2c4870c1b910cc6f7e7454ad9720e017-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/cover_essay_beatrice.jpg2c4870c1b910cc6f7e7454ad9720e017.jpg</image:loc><image:title>cover_essay_beatrice.jpg2c4870c1b910cc6f7e7454ad9720e017</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/10/mvdg2017_twitter_omslagfoto.pngdecbb51154fd3ed736e61c687b1d8664.jpg</image:loc><image:title>mvdg2017_twitter_omslagfoto.pngdecbb51154fd3ed736e61c687b1d8664</image:title></image:image><lastmod>2022-10-03T09:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/08/31/conference-ww1-middle-east/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/middenoosten_01-1-e1664783110652.jpg</image:loc><image:title>middenoosten_01</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/middenoosten_01-e1661928855198.jpg</image:loc><image:title>middenoosten_01</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/1561.png</image:loc><image:title>1561</image:title></image:image><lastmod>2022-10-03T07:45:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/09/14/segal-movement-gendarmerie-19century/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/img_20190624_212402-480x591-1.jpg</image:loc><image:title>img_20190624_212402-480x591-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture2-1-e1663150743337.jpg</image:loc><image:title>Picture2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture5.jpg</image:loc><image:title>picture5</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture4.jpg</image:loc><image:title>picture4</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture3.jpg</image:loc><image:title>picture3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture2.jpg</image:loc><image:title>picture2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/09/picture1.jpg</image:loc><image:title>picture1</image:title></image:image><lastmod>2022-09-14T11:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/09/02/annelotte-janse-receives-hofvijverkring-fellowship/</loc><lastmod>2022-09-02T09:08:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/08/23/conference-war-peace-napoleon/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/shn-news-template-e1661260963864.jpg</image:loc><image:title>SHN News Template</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-in-the-age-of-napoleon-conference.jpg</image:loc><image:title>war-and-peace-in-the-age-of-napoleon-conference</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_7.jpg</image:loc><image:title>war-and-peace-2-programme_page_7</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_6.jpg</image:loc><image:title>war-and-peace-2-programme_page_6</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_5.jpg</image:loc><image:title>war-and-peace-2-programme_page_5</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_4.jpg</image:loc><image:title>war-and-peace-2-programme_page_4</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_3.jpg</image:loc><image:title>war-and-peace-2-programme_page_3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_2.jpg</image:loc><image:title>war-and-peace-2-programme_page_2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/war-and-peace-2-programme_page_1.jpg</image:loc><image:title>war-and-peace-2-programme_page_1</image:title></image:image><lastmod>2022-08-24T13:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/08/18/event-radicalization-extremism-unrest/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/lorne-dawson.jpg</image:loc><image:title>lorne-dawson</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/sophia-moskalenko.jpg</image:loc><image:title>sophia-moskalenko</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/john-horgan.jpg</image:loc><image:title>john-horgan</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/sos-event-announcement-for-shn-e1660808880865.png</image:loc><image:title>SOS Event Announcement for SHN</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/new-threats-old-practices_1024_1.png</image:loc><image:title>NEW THREATS, OLD PRACTICES_1024_1</image:title></image:image><lastmod>2022-08-18T07:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/05/12/chapter-conservative-holy-alliance/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/cosmopolitan-conservatisms-1.jpg</image:loc><image:title>cosmopolitan-conservatisms-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/cosmopolitan-conservatisms-e1660556411700.jpg</image:loc><image:title>Cosmopolitan Conservatisms</image:title></image:image><lastmod>2022-08-15T09:53:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/chapters/</loc><lastmod>2022-08-15T09:50:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2020/10/08/chapter-park-sino-japanese-war/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2020/10/east-asia-in-the-world-twelve-events-that-shaped-the-modern-international-order-e1660556849851.jpg</image:loc><image:title>east asia in the world twelve events that shaped the modern international order</image:title></image:image><lastmod>2022-08-15T09:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/09/05/chapter-taming-the-evil/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-politics-of-moderation-in-modern-european-history-1.webp</image:loc><image:title>the-politics-of-moderation-in-modern-european-history-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-politics-of-moderation-in-modern-european-history-e1660554965803.webp</image:loc><image:title>The Politics of Moderation in Modern European History</image:title></image:image><lastmod>2022-08-15T09:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/06/29/ozavci-forgotten-hero-wood/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-1-740x906-1-1.jpg</image:loc><image:title>Mayer, Lieron, active 1838-1878; Sir Richard Wood (1806-1900), Consul-General to Tunisia (1855-1879)</image:title><image:caption>Mayer, Lieron; Sir Richard Wood (1806-1900), Consul-General to Tunisia (1855-1879); Government Art Collection; http://www.artuk.org/artworks/sir-richard-wood-18061900-consulgeneral-to-tunisia-18551879-28814</image:caption></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-5-740x493-1.jpeg</image:loc><image:title>14o-photo-5-740x493-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-4-740x416-1.jpeg</image:loc><image:title>14o-photo-4-740x416-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-2.jpeg</image:loc><image:title>14o-photo-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-3.jpeg</image:loc><image:title>14o-photo-3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/14o-photo-1-740x906-1.jpg</image:loc><image:title>Mayer, Lieron, active 1838-1878; Sir Richard Wood (1806-1900), Consul-General to Tunisia (1855-1879)</image:title><image:caption>Mayer, Lieron; Sir Richard Wood (1806-1900), Consul-General to Tunisia (1855-1879); Government Art Collection; http://www.artuk.org/artworks/sir-richard-wood-18061900-consulgeneral-to-tunisia-18551879-28814</image:caption></image:image><lastmod>2022-08-08T22:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/podcasts/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/03/tpv-met-vaandel.jpg</image:loc><image:title>TPV met vaandel</image:title></image:image><lastmod>2022-08-08T12:01:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/interviews/</loc><lastmod>2022-08-08T11:09:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2022/04/04/interview-meet-team-1/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/shn-announcement-tamplate1.jpg</image:loc><image:title>SHN Announcement tamplate(1)</image:title></image:image><lastmod>2022-08-08T10:50:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2012/11/09/chapter-aksan-ottoman-absence-seven-years-war/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-seven-years-war-e1659954486478.webp</image:loc><image:title>The Seven Years War</image:title></image:image><lastmod>2022-08-08T10:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/06/30/chapter-park-reordering-east-asian-ir/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-two-worlds-of-nineteenth-century-international-relations-e1659953561650.jpg</image:loc><image:title>The Two Worlds of Nineteenth Century International Relations</image:title></image:image><lastmod>2022-08-08T10:16:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2017/05/01/book-sovereignty-status-east-asia/</loc><lastmod>2022-08-08T10:04:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2017/11/01/article-lessersohn-longing-belonging/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/nora-lessersohn.jpg</image:loc><image:title>Nora Lessersohn</image:title></image:image><lastmod>2022-08-08T09:31:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/01/28/article-ozavci-priceless-grace/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-english-historical-review-e1659950567214.png</image:loc><image:title>The English Historical Review</image:title></image:image><lastmod>2022-08-08T09:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/18/event-applied-history-conferentie-2022/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/academiegebouw.jpg</image:loc><image:title>Academiegebouw</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/untitled-design2-1-e1658313306387.png</image:loc><image:title>Untitled design(2)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/untitled-design2-e1658313129270.png</image:loc><image:title>Untitled design(2)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/untitled-design1-e1658152916671.png</image:loc><image:title>Untitled design(1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/untitled-design.png</image:loc><image:title>Untitled design</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/email-handtekening-e1658152290293.png</image:loc><image:title>email-handtekening</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/email-banner-ahc.png</image:loc><image:title>Email banner AHC</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/programma-ahc-1.png</image:loc><image:title>programma-ahc-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/programma-ahc.png</image:loc><image:title>programma-ahc</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/poster-ahc.png</image:loc><image:title>poster-ahc</image:title></image:image><lastmod>2022-08-04T09:11:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/08/01/conference-videos-rebuilding-europe/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/sale-e1659332267187.png</image:loc><image:title>sale</image:title></image:image><lastmod>2022-08-03T08:41:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/06/01/article-yilmaz-governing-armenian-question/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/journal-of-historical-sociology-e1659338297790.jpg</image:loc><image:title>Journal of Historical Sociology</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/ilkay-yilmaz.jpg</image:loc><image:title>ilkay yılmaz</image:title></image:image><lastmod>2022-08-01T07:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/1991/01/01/book-saved-from-oblivion/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/saved-from-oblivion-1-e1659337575880.png</image:loc><image:title>saved-from-oblivion-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/saved-from-oblivion.png</image:loc><image:title>saved-from-oblivion</image:title></image:image><lastmod>2022-08-01T07:08:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2016/09/25/chapter-dewilde-anachronistic-research-ir/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/rethinking-security-in-the-twenty-first-century-1-e1659336923532.webp</image:loc><image:title>Rethinking Security in the Twenty-First Century</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/rethinking-security-in-the-twenty-first-century.webp</image:loc><image:title>Rethinking Security in the Twenty-First Century</image:title></image:image><lastmod>2022-08-01T06:57:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/12/09/chapter-dewilde-balance-power/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-1713-peace-of-utrecht-and-its-enduring-effects-1-e1659336376906.jpg</image:loc><image:title>The 1713 Peace of Utrecht and its Enduring Effects</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/08/the-1713-peace-of-utrecht-and-its-enduring-effects.jpg</image:loc><image:title>The 1713 Peace of Utrecht and its Enduring Effects</image:title></image:image><lastmod>2022-08-01T06:50:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/20/de-wilde-honorary-member-shn/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/jaap-de-wilde.jpg</image:loc><image:title>jaap-de-wilde</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/www.securityhistorynetwork.com_-e1658315369327.png</image:loc><image:title>www.SecurityHistoryNetwork.com</image:title></image:image><lastmod>2022-08-01T06:34:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/news/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/12/napoleon-deathbed-e1649070625881.jpeg</image:loc><image:title>napoleon-deathbed</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/12/post-napoleonic-territory-changes-after-congress-of-vienna.jpeg</image:loc><image:title>post-napoleonic territory changes after congress of vienna</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/11/napoleon.jpeg</image:loc><image:title>Napoleon</image:title></image:image><lastmod>2022-08-01T05:30:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2022/05/10/seminar-search-lasting-peace/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/05/the-search-for-lasting-peace-may-2022-1-1-e1659331744490.jpg</image:loc><image:title>The Search for Lasting Peace may 2022</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/05/the-search-for-lasting-peace-may-2022-.jpg</image:loc><image:title>The Search for Lasting Peace may 2022</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/05/the-search-for-lasting-peace-may-2022.jpg</image:loc><image:title>the-search-for-lasting-peace-may-2022</image:title></image:image><lastmod>2022-08-01T05:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/02/27/book-ardeleanu-european-commission-danube/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/the-european-commission-of-the-danube-1856e280931948-1.jpg</image:loc><image:title>The European Commission of the Danube, 1856–1948</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/the-european-commission-of-the-danube-1856e280931948.jpg</image:loc><image:title>the-european-commission-of-the-danube-1856e280931948</image:title></image:image><lastmod>2022-07-28T09:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2011/06/01/the-european-commission-of-the-danube-constantin-ardeleanu/</loc><lastmod>2022-07-28T09:32:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2016/09/30/article-heere-racial-chasm/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/constantin-ardeleanu.jpg</image:loc><image:title>constantin-ardeleanu</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/cees-heere-3.jpg</image:loc><image:title>Cees Heere</image:title></image:image><lastmod>2022-07-28T09:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/12/19/book-heere-empire-ascendant/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/empire-ascendant-1.jpg</image:loc><image:title>Empire Ascendant</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/empire-ascendant.jpg</image:loc><image:title>empire-ascendant</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/cees-heere-2.jpg</image:loc><image:title>cees-heere-2</image:title></image:image><lastmod>2022-07-28T09:01:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2020/04/30/article-wiegeshoff-quarantine-safety-repertoire/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/soziopolis-e1658997495143.jpg</image:loc><image:title>Soziopolis</image:title></image:image><lastmod>2022-07-28T08:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/19/announcement-degraaf-wins-arenberg-prize/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/arenberg.png</image:loc><image:title>arenberg</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/gw_hum_boek_fighting-terror-after-napoleon_770x510-e1658841246695.png</image:loc><image:title>GW_HUM_boek_fighting-terror-after-napoleon_770x510</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/9781108842068-1.jpg</image:loc><image:title>9781108842068</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/9781108842068_large-e1658841103831.jpg</image:loc><image:title>9781108842068_large</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/9781108842068.jpg</image:loc><image:title>9781108842068</image:title></image:image><lastmod>2022-07-26T13:41:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/01/01/book-securing-europe-after-napoleon/</loc><lastmod>2022-07-25T13:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/books/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/02/fighting-terror-after-napoleon.jpeg</image:loc><image:title>delete</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/11/ozan-image.jpeg</image:loc><image:title>Ozan image</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/11/img_1043.jpg</image:loc><image:title>IMG_1043</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/11/book-cover-dg-e1638894236231.png</image:loc><image:title>Book Cover DG</image:title></image:image><lastmod>2022-07-25T13:16:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2016/11/14/chapter-mikaberidze-dreams-of-empires/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2016/11/the-battle-of-new-orleans-in-history-and-memory.jpg</image:loc><image:title>The Battle of New Orleans in History and Memory</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/the-battle-of-new-orleans-in-history-and-memory-e1658754183342.jpg</image:loc><image:title>The Battle of New Orleans in History and Memory</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/alexander-mikaberidze.jpg</image:loc><image:title>Alexander Mikaberidze</image:title></image:image><lastmod>2022-07-25T13:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2014/01/07/chapter-askan-mobilization-warrior-populations/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2014/01/fighting-for-a-living-e1658754623878.webp</image:loc><image:title>Fighting for a Living</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/fighting-for-a-living.webp</image:loc><image:title>Fighting for a Living</image:title></image:image><lastmod>2022-07-25T13:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2017/01/06/chapter-wiegeshoff-security-epidemics/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2017/01/security-turns-its-eye-exclusively-to-the-future-e1658754564628.png</image:loc><image:title>Security turns its eye exclusively to the future</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/security-turns-its-eye-exclusively-to-the-future.png</image:loc><image:title>Security turns its eye exclusively to the future</image:title></image:image><lastmod>2022-07-25T13:09:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/01/25/ardeleanu-wallachian-correspondents/</loc><lastmod>2022-07-25T13:08:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/01/25/chapter-lok-congress-vienna-missed-opportunity/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2019/01/securing-europe-after-napoleon-e1658754472837.jpg</image:loc><image:title>Securing Europe After Napoleon</image:title></image:image><lastmod>2022-07-25T13:07:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/11/14/chapter-neutrality-restoration-restraint/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2019/11/a-history-of-the-european-restorations-e1658754357361.jpg</image:loc><image:title>A History of the European Restorations</image:title></image:image><lastmod>2022-07-25T13:06:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/08/01/article-wiegeshoff-insecurities-across-european-empires/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/andrea-wiegeshoff-2.jpg</image:loc><image:title>Andrea Wiegeshoff (2)</image:title></image:image><lastmod>2022-07-25T12:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/06/20/article-storm-rise-of-nation-state/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/nations-and-nationalism-e1658750344566.jpg</image:loc><image:title>nana_28_3_Cover_NJD_CMYK.indd</image:title></image:image><lastmod>2022-07-25T11:59:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/12/06/article-de-graaf-national-security-transnational-issue/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/contemporanea-e1649272794678.jpg</image:loc><image:title>Contemporanea</image:title></image:image><lastmod>2022-07-25T11:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/09/19/book-writing-history-nationalism-storm/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/writing-the-history-of-nationalism.jpg</image:loc><image:title>writing-the-history-of-nationalism</image:title></image:image><lastmod>2022-07-25T10:25:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2016/02/10/colonial-soldiers-in-europe-1914-1945-by-eric-storm/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/colonial-soldiers-in-europe-1914-1945.jpg</image:loc><image:title>Colonial Soldiers in Europe, 1914-1945</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/eric-storm-2.jpg</image:loc><image:title>eric-storm-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/07/eric-storm-1.jpg</image:loc><image:title>eric-storm-1</image:title></image:image><lastmod>2022-07-25T10:11:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/18/yazicioglu-unexpected-threat/</loc><lastmod>2022-07-18T08:49:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/06/09/louis-philippe-european-project/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/afbeelding1-3.jpg</image:loc><image:title>Afbeelding1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/louis-philippe-serment-1830-1.webp</image:loc><image:title>louis-philippe-serment-1830 (1)</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/afbeelding1-2.jpg</image:loc><image:title>Afbeelding1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/fig4.jpg</image:loc><image:title>fig4</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/fig3.png</image:loc><image:title>fig3</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/fig-2-1-1.jpg</image:loc><image:title>fig-2-1-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/fig-2-.jpg</image:loc><image:title>Fig 2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/afbeelding1-1.jpg</image:loc><image:title>afbeelding1-1</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/afbeelding1.jpg</image:loc><image:title>afbeelding1</image:title></image:image><lastmod>2022-07-18T08:31:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/07/12/conference-report-8th-transnational-rhine/</loc><lastmod>2022-07-12T11:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/06/22/online-event-global-conversation-de-graaf/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/capture-e1655884278861.jpg</image:loc><image:title>Capture</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/bdg-global-conversations-1.png</image:loc><image:title>BdG Global Conversations</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/06/bdg-global-conversations.png</image:loc><image:title>bdg-global-conversations</image:title></image:image><lastmod>2022-06-22T07:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/05/23/online-event-lok-seminar/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/05/matthijs-lok-seminar-23-5-22-2.jpg</image:loc><image:title>Matthijs Lok Seminar 23-5-22 2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/05/www.securityhistorynetwork.com_-e1653290587595.jpg</image:loc><image:title>www.SecurityHistoryNetwork.com</image:title></image:image><lastmod>2022-05-24T13:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/03/22/paper-call-war-peace-napoleon/</loc><lastmod>2022-05-10T12:50:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/19/contributions-call-weaponizing-history/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/flyer_special_issue_joah-2.jpg</image:loc><image:title>Flyer_Special_Issue_JOAH-2</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/journal-of-applied-history-e1652187104957.jpg</image:loc><image:title>Journal of Applied History</image:title></image:image><lastmod>2022-04-19T15:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/19/conference-8th-transnational-rhine/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/katz_castle_goarshausen_i.e._sankt_goarshausen_the_rhine_germany-lccn2002714108-e1650366762382.jpg</image:loc><image:title>Katz_Castle_Goarshausen_i.e._Sankt_Goarshausen_the_Rhine_Germany-LCCN2002714108</image:title></image:image><lastmod>2022-04-19T11:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/07/22/book-dangerous-gifts/</loc><lastmod>2022-04-13T09:14:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/13/book-talk-ozavci-dangerous-gifts/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/poster-ozan-book-talk-1-e1649840614513.jpg</image:loc><image:title>Poster Ozan book talk</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/poster-ozan-book-talk.jpg</image:loc><image:title>Poster Ozan book talk</image:title></image:image><lastmod>2022-04-13T09:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/03/16/cutsi/</loc><lastmod>2022-04-07T14:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/01/31/rhine-disputes-1840s/</loc><lastmod>2022-04-07T14:47:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/05/22/mediterranean-surveillance-imperial-precedents/</loc><lastmod>2022-04-07T14:31:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2018/11/19/security-plague-cholera/</loc><lastmod>2022-04-07T14:24:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2017/11/16/price-of-security/</loc><lastmod>2022-04-07T14:23:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/06/launch-shn/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/poster-shn-image-3.jpg</image:loc><image:title>Poster SHN image</image:title></image:image><lastmod>2022-04-07T09:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/06/01/article-de-graaf-terrorists-others/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/perspectives-on-politics.jpeg</image:loc><image:title>Perspectives on Politics</image:title></image:image><lastmod>2022-04-07T09:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2014/01/01/article-askan-ottoman-studies/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/journal-of-the-ottoman-and-turkish-studies-association-e1649322219582.jpg</image:loc><image:title>Journal of the Ottoman and Turkish Studies Association</image:title></image:image><lastmod>2022-04-07T09:03:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2011/01/31/article-mikaberidze-non-belligerent-russia/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/revue-napoleonica-e1649317184532.jpg</image:loc><image:title>Revue Napoleonica</image:title></image:image><lastmod>2022-04-07T08:54:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/06/22/from-letters-to-bombs-annelotte-janse/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/behavioral-sciences-of-terrorism-and-political-aggression-e1649319863351.jpg</image:loc><image:title>untitled</image:title></image:image><lastmod>2022-04-07T08:28:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/articles/</loc><lastmod>2022-04-07T08:19:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2019/10/17/book-industrial-globalization/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/first-age-of-industrial-globalization.jpg</image:loc><image:title>First Age of Industrial Globalization</image:title></image:image><lastmod>2022-04-07T07:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2012/10/01/article-ardeleanu-cannery-moldavia/</loc><lastmod>2022-04-06T19:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2013/05/31/article-park-sovereignty-east-asia/</loc><lastmod>2022-04-06T19:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/08/23/article-lissi-great-illusion-italy-germany/</loc><lastmod>2022-04-06T19:06:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/04/glancing-eye-shn/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/algiers.-general-engagement-viewed-from-an-eminence-south-of-the-city.-bombardment-of-algiers-1816-e1649322135545.jpg</image:loc><image:title>General engagement viewed from South of the city. Bombardment of Algiers 27 August 1816.</image:title><image:caption>General engagement viewed from South of the city. Bombardment of Algiers 27 August 1816.</image:caption></image:image><lastmod>2022-04-06T14:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2019/11/07/book-ottoman-war-peace/</loc><lastmod>2022-04-06T14:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/09/06/book-ottomans-askan/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/the-ottomans-1700-1923-an-empire-beseiged.jpg</image:loc><image:title>The Ottomans 1700-1923 An Empire Beseiged</image:title></image:image><lastmod>2022-04-06T10:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/05/06/book-cosmopolitan-conservatisms/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/cosmopolitan-conservatisms.jpg</image:loc><image:title>Cosmopolitan Conservatisms</image:title></image:image><lastmod>2022-04-06T10:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/07/29/book-face-of-battle/</loc><lastmod>2022-04-06T10:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/01/12/book-velvet-empire/</loc><lastmod>2022-04-06T09:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2020/04/09/book-mikaberidze-napoleonic-wars-global-history/</loc><lastmod>2022-04-06T09:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2020/03/01/book-fighting-terror-after-napoleon/</loc><lastmod>2022-04-06T08:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/04/04/conference-ypres-ww1-middle-east/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/04/gw_hum_ottoman-empire-declaration-of-war-during-wwi_770x510.jpg</image:loc><image:title>GW_HUM_Ottoman-Empire-declaration-of-war-during-WWI_770x510</image:title></image:image><lastmod>2022-04-04T11:15:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2022/02/16/paper-call-rebuilding-europe/</loc><lastmod>2022-04-04T11:14:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/2021/11/24/conference-rebuilding-europe/</loc><lastmod>2022-04-04T11:13:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com/about/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2021/12/book-cover-dg.png</image:loc><image:title>Book Cover DG</image:title></image:image><lastmod>2022-03-30T09:33:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityhistorynetwork.com/2018/06/29/rhine-napoleonic-tourist/</loc><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/03/800px-hoffmanns_starkefabriken_-_postkarte_landschaft_rhein_001.jpg</image:loc><image:title>800px-Hoffmanns_Stärkefabriken_-_Postkarte_Landschaft_Rhein_001</image:title></image:image><image:image><image:loc>https://securityhistorynetwork.com/wp-content/uploads/2022/03/beleg-van-mainz.jpg</image:loc><image:title>Beleg-van-Mainz</image:title></image:image><lastmod>2022-03-29T13:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityhistorynetwork.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-10T10:21:38+00:00</lastmod></url></urlset>
