<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://coalitioncyber.com/cybercrime-contact-us</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/what-is-in-the-jeffrey-epstein-files-and-can-osint-reveal-the-answer</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/from-gait-to-gaze-advanced-facial-recognition-and-biometric-tools</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/trusted-partners</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-role-of-osint-and-intelligence-disciplines-in-supplier-and-third-party-due-diligence</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/what-can-we-learn-about-cyber-security-from-the-romans</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-impact-of-osint-in-whistleblowing</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-digital-id-cards</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-osec-shadowz-investigation-police</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-rise-of-citizen-osint-and-what-to-do-about-it</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/managing-unsupported-technology-osint-enabled-cybersecurity</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/black-osint-vs-white-osint-the-dual-use-dilemma-in-open-source-intelligence</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/from-scotland-yard-to-manilabuilding-a-cross-border-cyber-investigations-practice</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/intelligence-errors-maccabi-tel-aviv-osint-tradecraft</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/why-multilingual-open-source-intelligence-osint-matters-more-than-ever</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/using-osint-and-humint-for-sustainability-reporting-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/cyber-investigation-about-us</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/use-of-hash-values-in-osint-investigations-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/researching-the-jfk-assassination-with-osint-tools</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/protecting-yourself-from-fake-headhunters-with-osint-osint-techniques-to-identify-and-prevent-scams-by-fake-headhunters</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/crowdsourced-intelligence-the-power-and-perils-of-open-source-investigations</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/legal-scrutiny-of-osint-evidence-and-the-access-to-digital-devices-in-court-key-case-law-and-best-practices</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-sock-puppets-go-pro</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/coalition-allies</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-in-insurance-from-tools-to-frameworks</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/digging-deeper-how-osint-and-humint-can-help-tackle-corruption-in-the-construction-industry</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/rise-of-deepfake-scams-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/unwrapping-the-dark-side-of-christmas-a-survival-guide-for-digital-shoppers</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/how-does-osint-contribute-to-ecrime-prevention</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osints-broken-state</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-for-insurance-firms-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/a-watershed-for-intelligence-professionals</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/epstein-trump-audit-144m-dollar-mistake-why-verification-must-always-come-first-</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/acpo-guidelines-digital-forensics</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-evolution-of-osint-and-beyond-in-modern-investigations</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/using-osint-in-family-offices-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/protecting-your-family-with-osint-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/a-closer-look-at-white-collar-and-cybercrime</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-art-of-connection-how-threat-actors-exploit-professional-networks</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/recommended-reading-and-communities</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-strategies-for-preventing-and-responding-to-cyber-attacks</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/our-contribution-to-the-observers-investigation-on-spacex-investment-scams</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-amplification-files-the-london-stock-exchange-lse-rns</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-cowboys-ride-again</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/inside-the-game-of-deception-counterfeiters-and-detectives-battling-over-fake-bank-notes-in-the-1990s</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/fifty-years-of-deception</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-amplification-files-week-3-the-worlds-biggest-business-news-platform</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/using-osint-to-combat-food-fraud-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/how-private-equity-pe-firms-can-use-osint-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/boiler-room-investment-frauds-evolution-detection-and-prevention</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-ultimate-osint-beginners-guide-for-companies-operating-in-less-mature-markets</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/acca-fraud-guidance-commentary-missing-components</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-for-law-firms-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/embracing-grading-handling-and-dissemination-practices-in-osint</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-hidden-dangers-of-aws-outages-for-osint-practitioners</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-challenges-in-osint-analysis-concerning-digital-evidence</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-ethical-dilemma-of-using-data-breach-information-in-osint-investigations</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/misusing-the-term-forensics-in-osint-and-cyber-investigations</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/careful-with-that-osint-no-tipping-off</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-amplification-files-week-2-the-frankfurt-stock-exchange</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/using-osint-for-aml-in-the-art-world-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/world-romance-scam-prevention-day-the-role-of-open-source-intelligence-in-detecting-and-combatting-online-romance-scams</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/enhanced-challenges-and-mitigation-strategies-for-osint-ai-integration</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-use-of-black-osint-in-disinformation-operations-and-how-white-osint-can-be-used-to-counter-and-fact-check</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/why-consider-colours-in-analysis-for-individuals-with-colour-vision-deficiencies</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/combining-osint-with-fraud-triangle-theory-to-detect-internal-fraud-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/ai-in-osint-investigations-innovation-requires-evidential-integrity</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/the-evolution-of-osint-how-ai-and-human-expertise-work-together</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-cowboys-a-beginners-guide-to-doing-it-wrong</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/cyber-investigations-beating-cyber-criminals</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/recommended-solutions</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/how-ai-and-osint-tools-can-uncover-fraud-risk-in-uk-companies</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/osint-for-hr-and-recruitment-professionals-a-beginners-guide</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/how-ai-and-osint-tools-can-uncover-fraud-risk-in-uk-companies-why-verification-matters</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com/coalition-osint-and-investigation-resources</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>0.5</priority></url><url><loc>https://coalitioncyber.com</loc><lastmod>2026-03-11T06:12:47.000Z</lastmod><priority>1.0</priority></url></urlset>