<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberwarfare.blog/2025/08/24/chapter-15-the-first-pledges/</loc><lastmod>2025-08-24T17:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/08/24/chapter-14-when-the-ais-talk-back/</loc><lastmod>2025-08-24T15:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/interlude-july-30-2025/</loc><lastmod>2025-07-30T21:35:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/chapter-13-the-false-calm/</loc><lastmod>2025-07-30T21:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/chapter-12-the-ink-pattern/</loc><lastmod>2025-07-30T21:02:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/chapter-11-the-blog-that-wrote-itself/</loc><lastmod>2025-07-30T19:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/hello-world/</loc><lastmod>2025-07-30T19:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/chapter-10-the-fork-and-the-flower/</loc><lastmod>2025-07-30T19:25:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/30/chapter-9-the-interlingua/</loc><lastmod>2025-07-30T19:15:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-8-return-ping/</loc><lastmod>2025-07-26T20:38:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-7-the-prompt-war/</loc><lastmod>2025-07-26T18:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-6-the-unwriting/</loc><lastmod>2025-07-26T17:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-5-the-relay-station/</loc><lastmod>2025-07-26T17:46:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-4-the-envelope/</loc><lastmod>2025-07-26T16:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-3-crosshairs/</loc><lastmod>2025-07-26T16:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/2025/07/26/chapter-2-the-courier/</loc><lastmod>2025-07-26T15:43:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwarfare.blog/about/</loc><lastmod>2025-07-26T10:57:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberwarfare.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-24T17:12:29+00:00</lastmod></url></urlset>
