<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.aisi.gov.uk</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/careers</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/about</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/grants</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/grants/example-projects</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/careers/apply</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research-agenda</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/frontier-ai-trends-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/frontier-ai-trends-report/pdf</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/a-pipeline-for-transcript-analysis-using-inspect-scout</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/advanced-ai-evaluations-may-update</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/advancing-the-field-of-systemic-ai-safety-grants-open</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/advancing-voice-ai-security-with-elevenlabs</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/ai-and-the-future-of-work-measuring-ai-driven-productivity-gains-for-workplace-tasks</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/ai-safety-summit-2023</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/aisis-research-direction-for-technical-solutions</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/an-evaluation-framework-for-ai-misuse-in-fraud-and-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/announcing-our-san-francisco-office</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/announcing-the-alignment-project</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/announcing-the-uk-and-france-ai-research-institutes-collaboration</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/announcing-the-uk-and-us-aisi-partnership</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/ask-dont-tell-reducing-sycophancy-in-large-language-models-2</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/can-ai-agents-escape-their-sandboxes-a-benchmark-for-safely-measuring-container-breakout-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/conference-on-frontier-ai-safety-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/do-chatbots-inform-or-misinform-voters</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/early-insights-from-developing-question-answer-evaluations-for-frontier-ai</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/early-lessons-from-evaluating-frontier-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/evals-bounty</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/evaluating-whether-ai-models-would-sabotage-ai-safety-research</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/evidence-for-inference-scaling-in-ai-cyber-tasks-increased-evaluation-budgets-reveal-higher-success-rates</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/examining-backdoor-data-poisoning-at-scale</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/first-progress-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/fourth-progress-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/from-bugs-to-bypasses-adapting-vulnerability-disclosure-for-ai-safeguards</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/funding-60-projects-to-advance-ai-alignment-research</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/harnessing-frontier-ai-for-cyber-defence</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-are-ai-agents-used-evidence-from-177000-ai-agent-tools</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-do-ai-models-persuade-exploring-the-levers-of-ai-enabled-persuasion-through-large-scale-experiments</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-do-environmental-factors-impact-ai-behaviour</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-do-frontier-ai-agents-perform-in-multi-step-cyber-attack-scenarios</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-to-evaluate-control-measures-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-were-working-with-frontier-ai-developers-to-improve-model-security</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/how-will-ai-enable-the-crimes-of-the-future</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/inspect-cyber</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/inspect-evals</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/international-ai-network-consensus-and-open-questions</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/international-joint-testing-exercise-agentic-testing</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/international-scientific-report-on-the-safety-of-advanced-ai-interim-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/interviewing-researchers-on-automation</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/introducing-controlarena-a-library-for-running-ai-control-experiments</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/investigating-models-for-misalignment</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/llm-judges-on-trial-a-new-statistical-framework-to-assess-autograders</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/long-form-tasks</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/managing-risks-from-increasingly-capable-open-weight-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/mapping-the-limitations-of-current-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/navigating-the-uncharted-building-societal-resilience-to-frontier-ai</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/new-updates-to-the-aisi-challenge-fund</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/open-sourcing-our-testing-framework-inspect</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-2025-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-approach-to-ai-capability-elicitation</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-approach-to-evaluations</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-approach-to-tackling-ai-generated-child-sexual-abuse-material</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-evaluation-of-openais-gpt-5-5-cyber-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/our-first-year</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/partnering-with-microsoft-to-strengthen-frontier-ai-safety</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/pre-deployment-evaluation-of-anthropics-upgraded-claude-3-5-sonnet</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/pre-deployment-evaluation-of-openais-o1-model</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/principles-for-safeguard-evaluation</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/replibench-measuring-autonomous-replication-capabilities-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/research-agenda</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/safety-case-template-for-inability-arguments</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/safety-cases-at-aisi</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/second-progress-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/strengthening-ai-resilience</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/the-inspect-sandboxing-toolkit-scalable-and-secure-ai-agent-evaluations</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/third-progress-report</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/transcript-analysis-for-ai-agent-evaluations</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/what-can-sandboxed-ai-agents-learn-about-their-evaluation-environments</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/why-i-joined-aisi---geoffrey-irving</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/blog/why-were-working-on-white-box-control</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/alignment</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/analysis</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/chem-bio</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/control</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/cyber</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/engineering</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/human-influence</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/model-transparency</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/organisation</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/safeguards</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/safety-cases</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/science-of-evaluations</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/societal-resilience</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/category/strategic-awareness</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/alan-cooney</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/alex-remedios</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/alexandra-souly</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/asa-cooper-stickland</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/ben-millwood</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/benjamin-hilton</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/chris-summerfield</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/eric-winsor</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/geoffrey-irving</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/hannah-kirk</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jade-leung</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jake-pencharz</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jay-bailey</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jerome-wunne</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jerome-wynne</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/jessica-wang</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/marie-buhl</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/michael-schmatz</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/oliver-sourbut</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/ollie-matthews</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/robert-kirk</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/sid-black</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/technical-staff</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/tomek-korbak</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/xander-davies</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/people/yarin-gal</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/a-mathematical-philosophy-of-explanations-in-mechanistic-interpretability</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/a-multi-turn-framework-for-evaluating-ai-misuse-in-fraud-and-cybercrime-scenarios</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/a-sketch-of-an-ai-control-safety-case</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/agentharm-a-benchmark-for-measuring-harmfulness-of-llm-agents</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/aisi-frontier-ai-trends-report-2025</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/an-alignment-safety-case-sketch-based-on-debate</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/an-example-safety-case-for-safeguards-against-misuse</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/ask-dont-tell-reducing-sycophancy-in-large-language-models</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/async-control-stress-testing-asynchronous-control-measures-for-llm-agents</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/avoiding-obfuscation-with-prover-estimator-debate</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/boundary-point-jailbreaking-of-black-box-llms</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/breaking-agent-backbones-evaluating-the-security-of-backbone-llms-in-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/chain-of-thought-monitorability-a-new-and-fragile-opportunity-for-ai-safety</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/conversational-ai-increases-political-knowledge-as-effectively-as-self-directed-internet-search</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/deep-ignorance-filtering-pretraining-data-builds-tamper-resistant-safeguards-into-open-weight-llms</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/does-self-evaluation-enable-wireheading-in-language-models</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/emerging-practices-in-frontier-ai-safety-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/evaluating-explanations-an-explanatory-virtues-framework-for-mechanistic-interpretability</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/evaluating-whether-ai-models-would-sabotage-ai-safety-research</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/fundamental-limitations-in-defending-llm-finetuning-apis-2</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/hibayes-a-hierarchical-bayesian-modeling-framework-for-ai-evaluation-statistics</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/how-are-ai-agents-used-evidence-from-177-000-mcp-tools</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/how-to-evaluate-control-measures-for-llm-agents-a-trajectory-from-today-to-superintelligence</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/infusion-shaping-model-behaviour-by-editing-training-data-via-influence-functions</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/lessons-from-a-chimp-ai-scheming-and-the-quest-for-ape-language</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/lessons-from-studying-two-hop-latent-reasoning</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/measuring-ai-agents-progress-on-multi-step-cyber-attack-scenarios</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/model-tampering-attacks-enable-more-rigorous-evaluations-of-llm-capabilities-2</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/open-technical-problems-in-open-weight-ai-model-risk-management</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/practical-challenges-of-control-monitoring-in-frontier-ai-deployments</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/principles-for-evaluating-misuse-safeguards-of-frontier-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/propensity-inference-environmental-contributors-to-llm-behaviour</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/quantifying-frontier-llm-capabilities-for-container-sandbox-escape</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/replibench-evaluating-the-autonomous-replication-capabilities-of-language-model-agents</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/safety-case-template-for-frontier-ai-a-cyber-inability-argument-2</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/safety-cases-a-scalable-approach-to-frontier-ai-safety</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/security-challenges-in-ai-agent-deployment-insights-from-a-large-scale-public-competition</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/seven-simple-steps-for-log-analysis-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/skewed-score-a-statistical-framework-to-assess-autograders</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/stack-adversarial-attacks-on-llm-safeguard-pipelines</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/the-levers-of-political-persuasion-with-conversational-ai</loc>
    </url>
    <url>
        <loc>https://www.aisi.gov.uk/research/why-human-ai-relationships-need-socioaffective-alignment-2</loc>
    </url>
</urlset>