GENERAL Archives - SHIP IP LTD

The U.S. Coast Guard is set to publish this week its final rule covering maritime security regulations by establishing minimum cybersecurity requirements for U.S.-flagged vessels, outer continental shelf facilities, and facilities subject to the Maritime Transportation Security Act of 2002 regulations. This final rule addresses current and emerging cybersecurity threats in the marine transportation system by adding minimum cybersecurity requirements to help detect risks and respond to and recover from cybersecurity incidents.

In a final rule scheduled for publication in the Federal Register, the Department of Homeland Security through the Coast Guard aims to enhance cybersecurity within the marine transportation system. The proposal includes mandates to create and uphold a Cybersecurity Plan, appoint a Cybersecurity Officer, and implement various strategies to ensure cybersecurity is maintained. Additionally, the Coast Guard is inviting feedback on a possible extension for the implementation timelines for U.S.-flagged vessels.

The final rule aims to protect the marine transportation system from cybersecurity threats by establishing minimum cybersecurity requirements. These requirements are designed to detect, respond to, and recover from risks that could lead to transportation security incidents (TSIs). The rule specifically targets risks arising from the increased interconnectivity and digitalization of the marine transportation system, addressing current and emerging cybersecurity threats to maritime security.

The Coast Guard noted that with this final rule, it has to finalize the requirements that were proposed in the notice of proposed rulemaking (NPRM), ‘Cybersecurity in the Marine Transportation System,’ published last February 22. The agency also responded to the public comments that we received to the NPRM and made several clarifications regarding the regulatory framework.

The Cybersecurity Plan must include seven account security measures for owners or operators of a U.S.-flagged vessel, facility, or outer continental shelf facility enabling of automatic account lockout after repeated failed login attempts on all password protected IT systems; changing default passwords (or implementing other compensating security controls if unfeasible) before using any IT or operational technology (OT) systems; and maintaining a minimum password strength on IT and OT systems technically capable of password protection.

It also covers implementing multi-factor authentication on password-protected IT and remotely accessible OT systems; applying the principle of least privilege to administrator or otherwise privileged accounts on both IT and OT systems; maintaining separate user credentials on critical IT and OT systems; and removing or revoking user credentials when a user leaves the organization.

The U.S. Coast Guard outlined that the Cybersecurity Plan also must include four device security measure requirements. They are developing and maintain a list of any hardware, firmware, and software approved by the owner or operator that may be installed on IT or OT systems; ensure that applications running executable code are disabled by default on critical IT and OT systems; maintain an accurate inventory of network-connected systems including those critical IT and OT systems; and develop and document the network map and OT device configuration information.

Additionally, the Cybersecurity Plan must include two data security measure requirements that ensure that logs are securely captured, stored, and protected and accessible only to privileged users, and deploy effective encryption to maintain confidentiality of sensitive data and integrity of IT and OT traffic when technically feasible.

The U.S. Coast Guard prescribed that owners or operators of U.S.-flagged vessels, facilities or outer continental shelf facilities must also prepare and document a Cyber Incident Response Plan that outlines instructions on how to respond to a cyber incident and identifies key roles, responsibilities, and decision-makers amongst personnel.

Furthermore, owners or operators must also designate a Cybersecurity Officer (CySO) who must ensure that U.S.-flagged vessel, facility, or outer continental shelf facility personnel implement the Cybersecurity Plan and the Cyber Incident Response Plan. The CySO must also ensure that the Cybersecurity Plan is up-to-date and undergoes an annual audit. The CySO must also arrange for cybersecurity inspections, ensure that personnel have adequate cybersecurity training, record and report cybersecurity incidents to the owner or operator, and take steps to mitigate them.

The Coast Guard estimates that this final rule creates costs for industry and government of about US$1.2 billion total and $138.7 million annualized, discounted at 2 percent (2022 dollars). This increased estimate from the NPRM is primarily driven by increases to our estimates of costs related to cybersecurity drills, exercises, and penetration testing. Cost estimates are also increased due to updated affected population data.

The final rule also notes that its benefits include reduced risk and mitigation of cyber incidents to protect impacted entities and downstream economic participants, and improved protection of marine transportation system business operations to build consumer trust and promote increased commerce in the U.S. economy. Additional benefits include improved minimum standards of cybersecurity to protect the marine transportation system, which is vital to the nation’s economy and national security, and to avoid supply chain disruptions.

The U.S. Coast Guard also requires owners and operators of U.S.-flagged vessels, facilities, and outer continental shelf facilities to segment their IT and OT networks, and log and monitor connections between them. Based on information from CGCYBER, CG-CVC, and NMSAC, network segmentation can be particularly difficult in the marine transportation system, largely due to the age of infrastructure in the affected population of U.S.- flagged vessels, facilities, and outer continental shelf facilities. The older the infrastructure, the more challenging network segmentation may be.

The document also laid down that it will require owners and operators of U.S.-flagged vessels, facilities, and outer continental shelf facilities to limit physical access to IT and OT equipment; secure, monitor, and log all personnel access; and establish procedures for granting access on a by-exception basis.

Last July, the DHS’ Office of Inspector General (OIG) published a final report identifying that the U.S. Coast Guard has made progress in enhancing the cyber posture of the marine transportation system by establishing maritime cybersecurity teams over the past two years, in line with statutory requirements. Based on its findings, the report proposes four recommendations to improve the Coast Guard’s cyber readiness and precautions to secure the U.S. supply chain. The DHS has concurred with four recommendations.

 

Source : Industrial Cyber


As Industry 4.0 continues to redefine operations, the lines between Information Technology (IT) and Operational Technology (OT) systems are increasingly blurred. Marine terminals now face unique cybersecurity risks to both types of systems, each requiring tailored defenses.

IT Systems: Protecting Data and Networks

IT systems manage critical business data and communication infrastructure. Cybersecurity risks for IT systems include malware, phishing attacks, and data breaches. Employing strong network security protocols, regular software updates, and staff training are essential for safeguarding sensitive data.

OT Systems: Securing Operational Processes

OT systems, which control equipment and automation at marine terminals, face distinct risks. These include attacks on Industrial Control Systems (ICS) and vulnerabilities in legacy systems. Protecting OT involves ensuring real-time monitoring, regular upgrades, and physical security to prevent unauthorized access.

Best Practices for Marine Terminals:

  • For IT systems: Implement multi-factor authentication, regularly update software, and train employees to spot phishing attempts.
  • For OT systems: Maintain an inventory of all assets, update outdated systems, and ensure secure remote access.

With both IT and OT systems now interconnected, a unified approach to cybersecurity is crucial. Protecting these systems is not just about safeguarding data but also ensuring the continued safe operation of critical infrastructure.


Modern commercial ports are a critical infrastructure which is highly dependent on information systems. The security of a port thus relies on the integrity of both physical and cyber assets. Despite evidence that ports are becoming targets for hackers, whose attacks can affect both cyber and physical assets and halt operations, too many ports have inadequate cybersecurity. Physical threats, incidents, and accidents to the physical assets (e.g., terminals, gates, buildings) of the maritime infrastructures or cyber threats and attacks to the cyber assets (e.g., Port Community Systems, navigation systems) can jeopardise the maritime operations, disrupt supply chains and destroy international trade and commerce.

 

https://rusieurope.eu/wp-content/uploads/2024/02/cybersecurity-in-maritime-critical-infrastructure-crimson-report-english.pdf


🔒 Strengthening Maritime Cybersecurity: The Importance of OT Inventory for Ships 🚢

With evolving cybersecurity regulations like the IMO’s MSC-FAL.1/Circ.3 and upcoming EU NIS2 Directive, ships must enhance their Operational Technology (OT) security to prevent cyber threats. A crucial step in compliance and risk mitigation is maintaining an accurate OT inventory.

📌 Why is OT Inventory Important?

Regulatory Compliance – Authorities require clear documentation of OT assets onboard.
Vulnerability Management – Knowing what systems exist helps identify security risks.
Incident Response – A complete inventory speeds up recovery from cyber incidents.
Network Segmentation – Mapping OT systems helps separate critical assets from IT networks.

🔹 How to Build an Effective OT Inventory?

Identify & Categorize – List all OT systems (e.g., ECDIS, VDR, engine control, ballast systems).
Document Connectivity – Map each device’s network connections to spot potential weak points.
Assess Cyber Risks – Regularly evaluate vulnerabilities and update security measures.
Monitor & Update – Keep inventory updated to reflect new installations or modifications.

🌍 Take Action Now!
With cyber threats rising in maritime operations, a well-managed OT inventory is a key first step to ensuring compliance and safeguarding your vessel. Start today to protect your fleet from cyber risks!


Optimising vessel operations has become crucial for the industry to achieve sustainability and decarbonisation goals. In the long term, large investments will focus on building ships ready for alternative fuels, but in the meantime, owners and operators are turning to digitalisation technologies to save fuel and emissions by becoming more energy efficient.

Owners and operators are also using faster low-latency satellite communications to tackle the challenges of retaining and retraining crew, and to keep track of growing fleets and changing trading patterns. Communications, digital applications and electronic hardware help to tackle these issues, enabling owners to offer career development pathways, almost limitless communications, and technology to make seafarer’s lives easier.

Shipping has turned to digital applications, low-latency connectivity, cloud-based solutions, artificial intelligence and machine learning, while tackling cyber risks with enhanced security.

New LEO constellations overtake established GEO

One company run by an established billionaire, who will soon be part of Trump’s new US administration, has transformed maritime satellite communications during 2024 with owners installing new technology to keep up.

Elon Musk’s SpaceX’s Starlink low Earth orbit (LEO) satellite constellation has revolutionised maritime and offshore communications, providing fast connectivity with low latency to vessels, for crew welfare services and operational applications.

LEO satellite communications has taken the maritime sector to new heights in terms of providing connectivity and welfare support to seafarers. Starlink has become popular with the masses with shipmanagers, owners and operators increasing its deployment across fleets. Whereas two years ago, flat-panel antennas for Starlink were only just being tested, now it is difficult to find a ship without Starlink on board.

Another LEO constellation gaining traction is Eutelsat OneWeb, albeit at a slower pace, with early adoption on offshore vessels, drilling and production facilities. As this global coverage is implemented, more cruise and commercial ships will consider this as a viable alternative. Marella Cruises is investing in OneWeb to operate alongside Starlink on its cruise ships.

Despite the rise of LEO, there is still demand for reliable geostationary orbit (GEO) satellite communications and very small aperture terminal (VSAT) connectivity, but distributors are integrating these services into hybrid smart solutions, where connections will take the cost-efficient, secure pathways. There is also still a need for L-band through Inmarsat, Iridium and Thuraya for maritime safety and security communications.

Inmarsat has reacted to LEO competition by launching a combined hybrid of GEO with LEO and long-term evolution (LTE) in one package. Global container shipowners K Line and Hapag-Lloyd are testing out NexusWave with an eye to roll it out across their fleets.

Class raises requirements for cyber resilience

As the maritime industry adopts more digitalisation applications and ships become more connected, they come under greater risk of cyber attacks. Therefore, enhancing cyber resilience and security is essential to ship operators, owners and builders.

In 2024, the International Association of Classification Societies (IACS) introduced unified requirements (URs) for cyber security and outlined how to demonstrate compliance with them. These URs, E26 and E27, are seen as new benchmarks for shipping’s response to its growing exposure to cyber attacks.

As of 1 July 2024, updated URs E26 and E27 require newbuild vessels and their connected systems to meet certain minimum and unified cyber-resilience standards.

UR E26 is aimed at ensuring the secure integration of both operational technology (OT), information technology (IT) and equipment in a vessel’s network, during the design, construction, commissioning and operational life of the ship.

This UR targets the ship as a collective entity for cyber resilience and covers five key aspects: equipment identification, protection, attack detection, response and recovery.

UR E27 is written to support manufacturers and OEMs of onboard operational systems and equipment in evaluating and improving their cyber resilience. This has led to suppliers and system integrators introducing upgrades to ensure cyber resilience. It also encouraged classification societies to develop and introduce their own interpretations of these URs.

Introducing IACS requirements and raising awareness and demand for enhanced cyber security has led to a trend of class societies acquiring companies with these skills. One of the main deals in 2024 was DNV’s acquisition of CyberOwl, which regularly reports on the shipping industry’s risks and responses to cyber attacks.

According to a study led by CyberOwl published in Q4 2024, a typical fleet of 30 cargo vessels now experiences an average of 80 cyber incidents a year. The study found the average cost of unlocking computer systems in the maritime sector reached US$3.2M.

We can expect more advanced and integrated solutions to be unveiled and new innovative cyber threats to emerge in 2025.

Source : Riviera


BIMCO Compliant: What Does It Mean?
The Baltic and International Maritime Council (BIMCO) has developed guidelines to help ship owners protect their vessels and IT systems from cyber threats and digital attacks. BIMCO is a global trade organization representing shipping companies and ship owners. Countries like the UK, Greece, Singapore, the Netherlands, Germany, the US, Japan, China, and South Korea collaborate with BIMCO to ensure compliance with international maritime rules.

What Are BIMCO’s Cybersecurity Guidelines for Ships?

  1. Cybersecurity Policy
    BIMCO recommends that ship owners and operators establish a cybersecurity policy. This policy should outline how the ship’s IT systems will be protected from cyber threats and how to handle any incidents that may arise.
  2. Risk Assessment
    BIMCO emphasizes the importance of regular cybersecurity risk assessments. These assessments help identify and address potential risks and vulnerabilities in systems such as communication, navigation, electronic cargo documents, and payment transactions.
  3. Preventive Measures
    To protect their systems, BIMCO advises ship owners to install firewalls, encrypt data, use strong authentication methods, and keep security updates up to date.
  4. Training and Awareness
    Educating staff and crew on cybersecurity is crucial. Ship owners should ensure that their employees can recognize potential threats, such as phishing attacks, and know how to respond to various cybersecurity incidents.
  5. Incident Management
    BIMCO recommends preparing a comprehensive plan for handling cyberattacks. This includes reporting incidents to the appropriate authorities, isolating affected systems, and restoring operations as quickly as possible.
  6. Security for Suppliers
    Since ships often rely on third-party suppliers for IT services and equipment, BIMCO advises ensuring that these suppliers also meet cybersecurity requirements and implement adequate security measures.
  7. Certification and Compliance
    BIMCO encourages shipping companies and ship owners to comply with international cybersecurity standards, such as the IMO Cybersecurity Code, and other relevant maritime regulations.

Why Is This Important?

BIMCO’s cybersecurity guidelines provide ship owners and operators with a robust framework for managing cyber risks. By following these guidelines, ships can reduce their vulnerability to cyberattacks and maintain safe and efficient operations.

For ship owners, using a BIMCO-certified IT platform ensures that your IT infrastructure meets the latest security standards and international cybersecurity regulations. This minimizes the risk of cyberattacks, operational downtime, and legal issues while strengthening trust with business partners and authorities. Additionally, it simplifies incident management and ensures compliance with maritime regulations.

 

Cyber Security Manual


Maersk is warning customers to be prepared for complications due to the ongoing security issues in the Red Sea and Gulf of Aden and the potential for “significant disruption to the global network,” as it extended its decision to divert vessels of the “foreseeable future.” In an advisory issued to customers on January 5, the carrier said that it understands the potential impact of its decision and hopes by announcing that it is suspending all voyages in the region it can bring “consistency and predictability despite the associated delays.”

The world’s second-largest container carrier has warned since mid-December when it began diverting some voyages that 15 of its service routes were being directly impacted by rerouting vessels. After an attempt to let some vessels continue their scheduled voyages, Maersk however again paused all transits in the region after one of its vessels was attacked on two consecutive days. While the crew was safe and the vessel was able to continue its voyage, Maersk said it had to prioritize the safety of its vessels, seafarers, and customers’ cargo.

“The situation is constantly evolving and remains highly volatile, and all available intelligence at hand confirms that the security risk continues to be at a significantly elevated level,” writes in its customer advisory. “We have therefore decided that all Maersk vessels due to transit the Red Sea / Gulf of Aden will be diverted south around the Cape of Good Hope for the foreseeable future.”

Maersk says the decision was made after careful consideration and while it continues to hope for a “sustainable resolution in the near future,” it believes this is the best course of action both for the company and customers. They warn that the previously announced Transit Disruption Surcharge, Peak Season Surcharge, and Emergency Contingency Surcharge for all cargo on vessels affected by the disruption remain in effect. However, they believe by announcing the decision customers can better prepare.

Maersk is not alone in monitoring the situation while reporting that it remains too unstable for vessels to pass through the region. Hapag-Lloyd also began diversions on December 21 while its crisis committee continues to review the situation. Hapag confirmed today that its team will review the situation again on Monday, January 9, but currently, nothing has changed in its position since it began rerouting vessels last month.

While reports have said over 200 containerships have been rerouted, some carriers continue some service in the region. Data from the Panama Canal shows overall traffic was down by a quarter in the second half of December with the biggest decline coming from all segments of cargo ships. The number of tanker transits was mostly stable.

One carrier, CMA CGM, is following a different strategy. They confirmed to Reuters today that they continue to send vessels through the Red Sea and Suez Canal and are continuing with a plan to gradually increase the number of vessels returning to the routes through the Suez Canal and the Red Sea. This comes despite confirmation from CMA CGM that one of its vessels experienced nearby explosions. The Houthis said they targeted the CMA CGM Tage (9,200 TEU) at the beginning of the week because the company’s other vessels sail to Israel.


Washington, D.C.—A federal watchdog agency told Congress the Maritime Administration (MarAd) should develop regulations to enforce cargo preference requirements intended to support the U.S.-flag shipping industry.

Those requirements are to ensure the industry has sufficient vessels and mariners to supplement the cargo-carrying capacity of military ships during times of war and national emergencies, said Andrew Von Ah, director of Physical Infrastructure, Government Accountability Office (GAO).

Appearing before the House Transportation and Infrastructure Subcommittee on Coast Guard and Maritime Transportation, Von Ah based his testimony on GAO’s newly released report on enhancing cargo preference oversight.

GAO reported MarAd has never taken enforcement action on potential violations even though it has notified federal agencies and contractors of the potential violations. In its report, the agency blamed MarAd’s lack of enforcement action in part on its failure to develop regulations.

GAO also recommended that MarAd publicly report cargo preference data it receives.

Testifying on behalf of USA Maritime, Eric Ebeling, president and CEO of American Roll-On Roll-Off Carrier Group, expressed hope the GAO report will demonstrate robust support for enforcement of cargo preference laws.

“U.S. cargo preference laws are crucial to the continued existence of the active, commercially viable, privately-owned U.S.-flag commercial shipping fleet, the most cost-effective sealift capability available to the U.S. government,” Ebeling said.

In her testimony to the panel, MarAd Administrator Ann Phillips, a retired Navy rear admiral, spoke of the importance of the Jones Act, the Maritime Security Program and cargo preference programs.

Phillips also testified about a future rulemaking effort, cited the Biden administration’s proposal to eliminate a three-year waiting period to attract new vessels and told the House panel of a summit with industry and labor on mariner recruitment and retention.

For some, however, those efforts would be doomed to fail.

“I believe we need a new law,” Rep. John Garamendi (D-Calif.) said, citing the lack of progress made by Phillips’ predecessors.   

Permitting Reform

Despite stout opposition from fellow Democrats and others, Senate Majority Leader Chuck Schumer (D-N.Y.) predicted success for his plan to place permitting reform legislation in a must-pass continuing resolution (CR) to keep federal agencies funded.

“I’m going to add it to the CR, and it will pass,” Schumer said.

He explained his agreement on moving permitting reform with Sen. Joe Manchin (D-W.Va.) was part of an agreement on the Inflation Reduction Act whose passage continues to be celebrated by President Joe Biden and other Democratic leaders.

Sen. Bernie Sanders of Vermont, an independent who caucuses with Democrats, described the plan to attach Manchin’s fossil fuel “side deal” to the CR as an outrage.

“We must take on the greed of Big Oil & reject this dirty deal,” Sanders tweeted.

Over on the House side, more than 70 members have signed letters to Speaker Nancy Pelosi (D-Calif.) opposing putting a permitting rider in the CR.

Led by Rep. Raul Grijalva (D-Ariz.), chair of the House Natural Resources Committee, one letter described the language cited in media reports as “destructive provisions” that would allow polluting projects to be rushed through before those impacted would even be aware of them.

CG Reauthorization

A key Senate committee advanced a bipartisan bill reauthorizing the Coast Guard and providing funding to help keep the maritime economy moving and the ports and waterways safe.

Passed by a voice vote, S.4802 now goes to the full Senate.

In addition to the core mission, Sen. Maria Cantwell (D-Wash.), chair of the Senate Committee on Commerce, Science, and Transportation, said the bill also helps the Coast Guard crack down on illegal fishing, improve oil spill response and bolster the nation’s presence in the Arctic.

Cantwell also cited language she worked on with Sen. Ted Cruz (R-Texas) to help members of the military become merchant mariners.

She was joined in introducing the bill by Sen. Roger Wicker (R-Miss.), the panel’s ranking member, and Sen. Tammy Baldwin (D-Wis.), chair of Subcommittee on Oceans, Fisheries, Climate Change and Manufacturing.

BWMS Updates

The Coast Guard has provided two clarifications on a Ballast Water Management System (BWMS) concerning a Type Approval Certificate’s expiration date and on the use of existing type approval data in BWMS type approval for viability.

According to an update posted on the Marine Safety Center’s website, a BWMS Type Approval Certificate (TAC) expiration date indicates the dates between which a BWMS must be manufactured.

A type-approved BWMS manufactured within the TAC applicability dates remains in compliance for the lifetime of the system, assuming it is operated and maintained according to the Operation, Maintenance and Safety Manual. Stored onboard, the TAC is replaced only upon modification of the BWMS to comply with a revised TAC.

The other clarification concerns the Coast Guard’s position regarding consideration of existing testing data in type approving a BWMS using a viability testing method, should the Coast Guard accept such a testing method.

Source: https://www.waterwaysjournal.net/2022/09/16/gao-maritime-administration-should-develop-cargo-preference-requirements/

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022

 


U.S. Federal Maritime Commissioner Carl Bentzel says that he hopes to win the approval from maritime stakeholders for new data transparency standards organized under the proposed Maritime Transportation Data Initiative (MTDI).

He hopes MTDI will mitigate any future supply chain congestion crisis such as the one the nation experienced between 2020 and 2022.

Bentzel made a presentation of his findings at the Intermodal Association of North America’s (IANA) Intermodal Safety Committee on September 12th during the IANA Intermodal Expo at Long Beach, California.

Bentzel was nominated by President Trump on June 12, 2019 to a term expiring on June 30, 2024. Prior to his appointment at the Federal Maritime Commission (FMC), Commissioner Bentzel created and established a consulting services company where he represented clients on regulatory and legislative issues within the areas of transportation, energy, and other areas of federal regulatory oversight.

U.S. Federal Maritime Commissioner Carl Bentzel

In an interview with AJOT, Bentzel said: “I think the proposed Maritime Transportation Data Initiative (MTDI) will mitigate this from happening again because you will have the information earlier in the process. Right now, no steps can be taken to mitigate because the information usually comes after the event. This will provide a network of information that will give the possibility of trying to adjust … including repositioning the equipment. So yes, I think this will mitigate the impacts of severe alterations … However, that said, supply and demand or natural events can overcome even information. So, I think it will help because we’ll be getting real time information about equipment incidents.”

He said the genesis for the MTDI came as congestion problems mounted in 2020: “We were in contact with port authorities during the early part of the congestion. In July of 2020, we started to assess what was happening at the ports. We started to hear that there were backups of cargo at the Ports of Los Angeles and Long Beach. At that time, I was in contact with the port authorities about the causes of the congestion. It was clear that the information flow was at least contributing to the challenges. Shippers were getting ETAs from the carriers that were being revised continually.”

The feedback from maritime stakeholders has been mostly positive: “The feedback that we have been receiving from maritime stakeholders is that they have information, and it would perhaps require some adjustment to how they provide the information. But they can do this… We are not getting cargo information per se. And we’re allowing that to be closed. And that’s what they tell us is proprietary. What I’m requiring to be open … (is what) … you can see with your eyes. That’s something we might request further harmonization and further specificity. But these are not issues that are proprietary, they are common knowledge. Open information is public information that the public should have access to related to the transportation and real time operations related to the status of operations and for the ancillary facilities that service the ports. So, this would include a terminal when they are open and (when) they are closing it to empty returns and policies that govern access to that facility. Closed is information with parties that are legally entitled to receive the information with appropriate encryption … We’re not changing that at all.”

Railroads

He said railroads will have to provide some information, but they are not directly under the jurisdiction of the Federal Maritime Commission: “We don’t have direct jurisdiction over the railroads. We have jurisdiction over the practices of ocean carriers and marine terminals under a through bill of lading. The only way that I can enforce it is to go after a regulated entity and say you can’t, in your intermodal practices, have a carrier that’s not compliant with these same standards.”

China’s Container & Chassis Dominance

Finally, Bentzel recently published a report warning about China’s dominance of container and chassis manufacturing markets entitled: “Assessment of P.R.C. Control of Container and Intermodal Chassis Manufacturing.”

Bentzel noted that the three largest Chinese manufacturers control over 86% of the world’s supply of intermodal chassis and those same companies manufacture over 95% of the world’s market in containers, including “U.S. domestic train and truck intermodal containers.”

He further noted that the U.S. Department of Commerce has determined that “Chinese container and chassis manufacturers are state-owned and controlled and are recipients of large government subsidies.”

Bentzel’s report concluded: “… the global supply chain is too interdependent not to have broad access and manufacturing capabilities for intermodal operational equipment. The United States should assess whether given (China’s) market dominance that further trade action be contemplated and whether to invest more aggressively in next generation container manufacturing technology.”

Source: https://ajot.com/insights/full/ai-fmcs-bentzel-explains-proposed-maritime-transportation-data-initiative

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022

 


Offshore installation specialist Jan De Nul Group said Thursday that the shipyard in China where its flagship jack-up installation vessel Voltaire is being built, was hit by typhoon Muifa in China during the night of 14 to 15 September 2022.

“The eye of the typhoon passed over the shipyard, causing the vessel to come loose from its moorings. Fortunately, no one was injured. Voltaire is now safely moored back in the shipyard and first sight assessments show limited damage to certain parts of the crane and the helideck. Further assessments are ongoing,” Jan De Nul said.

The vessel, being built for offshore wind and decommissioning work, was recently launched at the COSCO Shipping Shipyard in Nantong, China.

Jan De Nul said in March that the Voltaire had been fitted with what it said was the world’s largest leg encircling crane.

The Voltaire has been designed to install the offshore wind turbines of the future, with turbines over 270 meters high and blades 120 meters long.

The vessel will transport, hoist and install offshore wind turbines, transition pieces, and foundations.

For these lifting works, the vessel was equipped with a main crane of more than 3,000 tonnes.

Upon delivery, the jack-up will mobilize to the United Kingdom for the construction of the 3.6 GW Dogger Bank offshore wind farm, the world’s largest offshore wind farm, transporting and installing in total 277 GE Haliade-X turbines up to 14MW.

The delivery had been scheduled for the “second half of 2022.” Offshore Engineer has reached out to Jan De Nul to see if the typhoon incident would delay the delivery date.

A Jan De Nul spokesperson confirmed the incident had happened but said that “more info can’t be given at this stage.”

Reuters reported Wednesday that the Typhoon Muifa landed around 8:30 p.m. local time as a strong typhoon, the second-highest in China’s tropical cyclone classification system, with the maximum wind speed near its center reaching 151 km per hour (94 miles per hour), powerful enough to damage homes, topple trees and down power lines.”

The news agency said Thursday that the typhoon had been downgraded to a strong tropical storm but that it would bring heavy rains and flash flooding across several provinces as it moved north across populated coastal provinces.

Source: https://www.marinelink.com/news/jan-de-nuls-newbuild-jackup-voltaire-499521

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022

 


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED