Jan De Nul Group has moved its entire fleet of 82 vessels and jack-up barges to a new connectivity set-up, rolling out VSAT from Castor Marine with Iridium L-band back-up following the agreement of a long-term contract.

The Group managed to successfully migrate 98% of the fleet within three months of signing the deal, with up to six migrations taking place per day, the companies said.

The vessels have implemented a tailored VSAT system, with quality of service specified on the VLAN level. Bandwidth can be scaled up as required, based on ad hoc demands from each vessel.

Along with the VSAT and Iridium services, Castor Marine delivered 15 new Sailor 900 VSAT antennas and Sailor 4300 Iridium Certus antennas to replace existing hardware onboard. For the newbuild offshore jack-up installation vessel Voltaire and the offshore heavy lift vessel Les Alizés, Castor Marine supplied a set of antenna systems from the recently launched Sailor 1000 XTR VSAT range, including below deck equipment.

“It is nice to work with an agile and technically advanced partner. Flexibility is very important to Jan De Nul to cater for temporary project upgrades and downgrades. Castor Marine monitors these developments and communication lines are very short. We attach great importance to mutual trust. So far, everything is going as desired with our new Ku- and L-band supplier,” said Nils Crabeel, Communication Manager at Jan De Nul Group.

SOURCE READ THE FULL ARTICLE

Jan De Nul moves fleet to new connectivity system


Intellian has signed a new contract worth 71.1 billion won (approx. $61 million) with satellite operator SES, to build antennas for the O3b mPOWER medium Earth orbit (MEO) satellite network, to be located 8000 km above the Earth’s equator.

The deal covers antennas for both terrestrial and marine use in various sizes.

SES plans to introduce the O3b mPOWER service in the first half of next year, launching additional satellites to supplement its existing O3b service.

The new satellite network is expected to provide communication services between 50Mbps and 20Gbps using the Ka-band frequency, through a total of 20 medium-orbit communication satellites located 8000km above the Earth’s equator.

 

SOURCE READ THE FULL ARTICLE

Intellian to build SES MEO antennas in $61m deal


actively exploited in the wild.

Apache Software Foundation has released HTTP Web Server 2.4.51 to address an actively exploited path traversal vulnerability (CVE-2021-41773) that was only partially addressed with a previous release.

An attacker can trigger the flaw to map URLs to files outside the expected document root.

“A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root.” reads the advisory. “If files outside of the document root are not protected by “require all denied” these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts.”

The vulnerability affects only version 2.4.49, earlier versions are not impacted. A few days ago, Apache released Apache HTTP 2.4.50 to address the CVE-2021-41773

Immediately after the release of the Apache HTTP 2.4.50 experts disclosed that the exploitation of the flaw could lead to remote code execution when the mod_cgi module was loaded and the default “Require all denied” option was missing.

According to an updated advisory, Apache released version 2.4.51 to definitively fix the vulnerability. This new path traversal flaws is tracked as CVE-2021-42013.

“It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives,” announced Apache in an updated advisory. “If files outside of these directories are not protected by the usual default configuration “require all denied”, these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution.”

The vulnerability was reported by Juan Escobar from Dreamlab Technologies, Fernando Muñoz from NULL Life CTF Team, and Shungo Kumasaka.

The United States Computer Emergency Readiness Team (US-CERT) warns of ongoing active scanning of Apache HTTP Server CVE-2021-41773 and CVE-2021-42013 that could lead to imminent exploitation, for this reason, the US-CERT urges organizations to immediately patch their installs.

 

SOURCE READ THE FULL ARTICLE

Apache rolled out a new update in a few days to fix incomplete patch for an actively exploited flaw


The Dutch government announced that it will not tolerate cyberattacks that pose a risk to its national security and will employ intelligence or military services to counter them.

Cyberespionage and sabotage attacks, and also ransomware attacks against critical infrastructure and government offices will trigger the response of the Dutch authorities, explained Ben Knapen, Dutch Minister of Foreign Affairs.

 

ransomware

The Dutch Minister added that the response to severe cyber attacks could be escalated, an attack against a critical response will require the rapid reply of the cyber defense, a response that disregards diplomatic relations between the countries involved.

Knapen highlighted the difficulty of attributing a ransomware operation to a specific threat actor, it explained that it is very complex to demonstrate that a non-state actor carries out the operation on the explicit instruction of or under the control of a state. As a result, the legal attribution of an act of a non-state actor to a state is usually not easy.

“For several years, the threat of ransomware attacks has been increasing around the world. A broad explanation of this threat is included in the Cyber Security Assessment Netherlands (CSBN) 2021, which was shared with the Chamber in June by the Minister of Justice and Security. One of the conclusions of CSAN 2021 is that cybercrime can affect national security if an attack causes massive damage, for example by disrupting vital processes. In a number of cases, cybercriminals enjoy the protection of the state from which they operate or there is cooperation.” Knapen wrote in a letter to the Dutch Parliament. “Due care principle In situations where attribution appears not to be possible in a legal sense, it may be desirable to look into a possible violation of the due care principle in the context of state liability law. The principle of due care means that states are expected to take into account the rights of other states when exercising their sovereignty. States have a duty to act when they have knowledge of the use of their territory in a way that harms the rights of a third state. Failure to comply with this obligation is a violation of an international law obligation.”

 

SOURCE READ THE FULL ARTICLE

https://securityaffairs.co/wordpress/123113/security/the-netherlands-war-ransomware-operations.html?utm_source=rss&utm_medium=rss&utm_campaign=the-netherlands-war-ransomware-operations


There has never been a more important time to listen. “Seek first to understand,” is a lesson I picked up early in my career that has generally proved effective in many situations as a leader, colleague and employee. (Not to mention at home as a partner, father, and friend; it’s a versatile maxim.) Eighteen months into this pandemic, given that the experience and effects of COVID-19 are simultaneously something that is universally shared and individually experienced, it’s more useful than ever to listen before you leap.

I have found the most rewarding moments are when you listen not just as a leader but also as a learner. With so many sources of education available, it’s tempting to gloss over the one right in front of you: your team.

Here are four examples where I recently learned from the people I lead. And remember, it doesn’t have to be a new piece of information to count as learning; the point is to be ready to adapt to something new.

1. Create a safe space

Demonstrate that you can hold a safe space for any kind of conversation. Be emotionally, mentally, and physically present (if you’re on video) to focus on the person in front of you, and what they want to talk about. Someone recently thanked me for creating a safe space after a conversation about a path to promotion, and while my initial response was to reply, “It’s a pleasure and it’s my job,” it made me think that if such a seemingly standard discussion requires a safe space, what about all the conversations currently not being had about more potentially sensitive topics?

It made me think about additional conversations we should be having about mental health, grief, anxiety, uncertainty, being overwhelmed, handling the return to work, among many others. As leaders, we must find ways to build trust and provide opportunities for our teams and colleagues to thrive.

2. Encourage open conversations

One of the ways to encourage more open conversation is to lean in. A usual weekly one-on-one coaching meeting recently opened with “How are you doing?” When I answered “Good!” the question came back, “How are you really doing?” I must have looked tired, maybe it was a Monday, either way it was an excellent question. It caught me off guard, as I was not really “Good,” rather more “Meh,” and we proceeded to have a really honest, open, authentic conversation both about some minor irritants I had experienced that day, and the importance of talking about such things together.

We are undergoing a seismic shift in our professional, social, and family lives. It’s one thing to say that “It’s OK to not be OK.” It’s quite another to model how this should work in practice. It’s OK to say you are not OK. Gently pressing on a topic in a non-confrontational way, perhaps with a time-bound get-out clause, can really open up a valuable discussion. The simple, but powerful, question: “How are you really doing, today?” Might help someone let off a little steam about current events and avert an explosion caused by bigger issues.

3. Get to know your team all over again

It can be hard to calibrate how much social interaction to try and foster as a distributed team all stuck WFH; weekly happy hours in crazy hats seems too much, never seems too distant. It’s impossible to get right, and it’s vital to try.

During a recent team discussion, someone randomly asked a teammate, a former Wall Street trader, about his opinion of our quarterly earnings call. The person asking the question did not know about his finance background, despite having been colleagues for almost two years. Once all the jokes had died down and we had agreed to stage a version of Mad Money on a subsequent team call, it made me think about all the connections that could break unless we protect them, such as small pieces of personal information that would get shared in an office or at a dinner, that help build familiarity (and inform team jokes and rituals).

Leaders need to find time for these group interactions and for one-on-one meetings that are more than just status updates. Another colleague advocates setting up quick introductory Webex meetings with people she meets in peripheral situations through the course of work to get to know them better, with no agenda except networking. Two years ago, I might have dismissed this as a distraction; now I think it’s vital and I do the same.

4. Listen to the most important member of the team: you

Whether you’re the leader, or the loudest person, or the longest-serving team member who everyone goes to for advice; whoever you are, check in with yourself. Make like a parent on a plane who is told to put their own oxygen mask on before attending to their family in case of emergency.

Self-care takes many forms and it’s worth remembering it can be as simple as taking one big meaningful breath. It could be the first breath of the morning, or between meetings to help context shift, or in the middle of a frustrating moment to help avoid being overwhelmed or when you walk out of your door for exercise. Whatever it is, whenever during the day it is, focus on your breath, fill your lungs to bursting, be in the moment, realize that there is always something to be grateful for (even if the only thing you can think of is the breath you are currently experiencing) and shut out the noise. Hold that breath for a moment, then a moment longer and then, as you exhale, let something go. Say goodbye to a worry or a negative thought and turn your mind toward things you’re grateful for.

I am grateful for the team I get to work with every day, and I love learning from them about how we can focus on the present, reflect on our past, and plan for our future.

At Cisco, we are leading a more inclusive future for all. To learn more about our open positions around the world, click here.

 

SOURCE READ THE FULL ARTICLE

https://blogs.cisco.com/security/4-keys-to-create-a-thriving-cybersecurity-team-for-long-term-success


Intelligence company applying AI to transform global maritime trade, is proud to announce that the US Patent and Trademark Office (USPTO) issued U.S. patent No 10,922,981 for its Risk Event Identification in Maritime Data and Usage Thereof. 

The patent relates to technology for identifying risk events for vessels by analyzing raw maritime data and constructing a vessel activity overview for each vessel. Patterns in vessel behavior are identified to indicate the occurrence of risk events, which can be validated by comparing them to other vessel’s behavior or using raw maritime data. This technique can identify risk events, including compliance risk, security risk, safety risk, and others, using reduced resources without increasing false positive metrics.

“We are pleased to have reached the remarkable milestone of having been granted this patent by the USPTO,” said Ami Daniel, CEO and Co-Founder of Windward. “Across the maritime trade industry insurers, banks, shipowners, and energy companies alike have been using manual methods to assess risk. At Windward we are revolutionizing maritime risk identification by developing proven, and now patented, methods of analysis to provide accurate and timely risk assessments which are then used by maritime professionals for decision support.”

Windward’s Maritime AI is powered by hundreds of behavioral analytics models and over 10 billion data points, giving its customers the power to make smarter decisions, faster. Windward’s AI analyzes existing behaviors to predict in real-time which companies and vessels are likely to be high risk, and which are safe to conduct business with. Windward’s solution is easily integrated into existing workflows, enabling businesses to look to the future and optimize business practices.

 

Source: prnewswire


The Belgian Shipping Code, applicable since September 2020, regulates under its chapter 2.5.2 which requirements ports and port facilities (such as commercially operated port terminals) must comply with in terms of maritime security.

 

 

Each port facility must, among other things, appoint a security officer and draw up a security plan, which must be submitted for approval to the competent minister charged with the North Sea.

 

 

Since the Port of Antwerp is considered an international hub for illegal traffic in drugs e.g. cocaine, the fighting of which is understandably a top priority for both the local and national authorities, the importance of maritime security has only increased in recent years. The Belgian seaports are also a point of attention in the context of the increased pressure from illicit migration.

 

 

In this context, the Minister responsible for the North Sea announced at the end of September 2021 stricter rules in the field of port security, which are expected to include increased attention to camera surveillance, increased restrictions on terminal access, and stricter penalties for intruders (who may face up to fifteen years in prison).

 

 

Undoubtedly, all stakeholders in carriage of goods from, to or via the Belgian ports will sooner or later be confronted with the above and will have to strike the right balance between the smooth continuing of their trade operations on the one hand, and compliance with the new security measures on the other hand.

 

 

Ciska Servais (administrative law department) and Ruud De Houwer (maritime and transport law department) combined the expertise of their teams and assisted the FPS Mobility and Transport in 2020 and 2021 in administrative summary proceedings concerning port security and port security plans. They will continue to closely monitor all new developments in this respect.

 

Source: astrealaw


With an established presence throughout China’s “near seas” in East Asia and further abroad in the North Pacific on fishery patrols, the possibility of additional long-distance deployments by the CCG should be seen as a matter of when and not if. This is especially true in waters where Chinese interests and citizens are threatened but the cooperative look of the CCG’s white hulls presents a more appealing optic than the more confrontational appearance of China’s People’s Liberation Army Navy’s (PLAN) gray hulls. One such location is off the west coast of Latin America in the Eastern Pacific on counter-narcotic patrols due the increasing problem of illegal drugs from Latin America making their way across the Pacific to Chinese consumers.

The expansion and modernization of China’s maritime forces, in particular the PLAN, has received a great deal of attention. The PLAN is also the largest navy in the world with an overall battle force of over 360 ships, including more than 130 major surface combatants and more than 60 submarines along with its own aviation arm of more than 300 land-and sea-based fixed and rotary wing aircraft of all types. The PLAN is an increasingly modern and flexible force capable of conducting a wide range of peacetime and wartime missions at expanding distances from the Chinese mainland. From counter-piracy patrols in the Gulf of Aden, to hospital ship deployments to Latin America, to submarine patrols in the Indian Ocean, and long-range operations in the Central Pacific, the PLAN is an increasingly global force. It now operates in all of the U.S. Navy’s numbered fleet areas of responsibility in support of China’s expanding interests.

Matching the PLAN’s impressive modernization is the growth of the CCG. The modern CCG is the result of the 2013 consolidation of four legacy maritime law enforcement agencies. With a combination of the agencies’ older ships, repurposed PLAN ships, and increasingly new construction, the CCG has rapidly grown into the largest maritime law enforcement agency in the world. The white-hulled ships of the CCG are now a common sight throughout China’s “near seas” within the first island chain, particularly in contested waters near features such as Scarborough Reef, the Senkaku Islands, and Second Thomas Shoal as well as near foreign drilling rigs and survey operations. Backed up by the PLAN and the ships of China’s Maritime Militia, the CCG is Beijing’s tool of choice for intimidating rival maritime claimants throughout the region. However, with 140 ocean-going ships of 1000 tons or greater—including 60 ships of 2500 tons or greater—the CCG has more than enough capacity to expand its operations beyond regional waters.

 

Source: maritimecyprus


The presence of Chinese trawlers in the Indian Ocean, Arabian Sea and Bay of Bengal jeopardises India’s maritime security by fishing in India’s EEZ.

 

China happens to be the largest fishing nation producing approximately one-fifth of the global catch. Apart from freshwater fish, a vital part of the Chinese exports also come from the oceanic fish found in the deep sea. Interestingly, as per available reports, no fish are left in the South China Sea due to overconsumption. On the other hand, India occupies the second largest position (6.3 per cent) in producing fish that sustain 14,500,000 fishers. China does eye these fish not only for its domestic consumption but also for exporting them to support its fisheries sector. Beijing’s illegal, unreported and unregulated (IUU) fishing in other countries’ Exclusive Economic Zone (EEZ) has so far been overlooked.

According to the 2020 FAO report, “The State of World Fisheries and Aquaculture”, in 2018, China reported about 2.26 million tonnes from its “distant-water fishery” but provided details on species and fishing area only for 40 % of its”distant water catch”. Thus, it has not divulged 60 per cent of its catch from the “distant waters” data. A significant part of this 60 per cent probably comes from its illegal fishing in the Indo-Pacific region, Eastern Indian Ocean and the Arabian Sea in particular and is at the economic cost of other nations.’The IUU Fishing Index’, a civil society organisation headquartered in Geneva, ranked China first in its 2019 index.

China heavily subsidises to the extent of 94 per cent of its fishing trawlers to encourage shipping in the international waters. Further subsidies and tax benefits on selling the “distant water” catch to the foreign markets apart from various medical benefits in case of injuries while fishing provides enough incentives to its people to carry out fishing activities. It comes as no surprise that China has the world’s largest fishing fleet.

Beijing’s illegal “fishing vessels”are equipped with state of the art ‘catch and pack facilities’and are commonly sighted in the Eastern and Western Indian Ocean near the Andaman and Nicobar Islands, apart from the Arabian Sea. The 572 islands of Andaman and Nicobar witness the Chinese fishing trawlers carrying out illegal fishing as most of the islands are uninhabited. The Chinese trawlers make their way through the Coco and Greater Coco Islands and fish in the dark pitch hours, assuming that the Indian Coast Guard and Navy would not be alert.

The presence of the Chinese trawlers in the Indian Ocean, Arabian Sea and Bay of Bengal is a violation of India’s sovereignty, as the fishing zones of these seas and ocean comes under India’s EEZ, a rule well outlined by the UNCLOS in Article 56. The issue holds relevance to the national security narratives because of the following factors. First, it jeopardises India’s maritime security by fishing in India’s EEZ. Secondly, overfishing, especially in the regulated months when breeding happens, affects the marine environment. Moreover, India’s economic and cyber security can be exposed to sabotage.

From a geopolitical perspective, these “civilian” trawlers violate India’s EEZ as People’s Armed Forces Maritime Militia(paramilitary forces)accompanies them in the guise of civilian fishermen. These fishing vessels do not keep their automatic identification systems transmitter/responder activated, which is a mandatory requirement by the international agencies for fishing. Reports of 2020 suggest that around 450 such research vessels and fishing trawlers had entered various sectors of the Indian Ocean Region.

The role of Chinese maritime militia in fishing camouflage is well established. It was recognised by the PLA Daily in 2014 when it quoted that, “Putting on camouflage, they qualify as soldiers; taking off the camouflage, they become law-abiding fishermen”. The PLA controls these “fishermen”, and their objectives overlap with the Chinese Communist Party (CCP) agenda of “ocean grabbing”, a method of fishing in which the small fishers of the victim countries are denied the marine resources of their own EEZ.

As these trawlers have space for storing live ammunition, a condition made mandatory for being called “Chinese fishing trawlers” and are equipped with sophisticated intelligence and surveillance systems, they amount to incremental strategies of asymmetrical advantage in order to have a gradual maritime foothold in the water bodies surrounding India. It blurs the distinction between combatants and non-combatants, a necessary condition for hot pursuits in UNCLOS and the International Humanitarian Law (IHL). As a thumb rule, civilian trawlers cannot be carrying either the elite irregular forces, live ammunition or surveillance mechanisms. Chinese trawlers have provisions for all three. Besides that, fishing trawlers can potentially be used for trafficking drugs and arms from the Arabian Sea. The nexus of China, Pakistan and the Taliban poses serious drug trafficking issues for India. Maritime security is hence at threat because of IUU.

Militarisation of the Chinese artificial islands either in the SCS or in Feydhoo Finolhu Island can provide its militia with the possible support to accomplish the agenda of the CCP. In such a case, can the Chinese trawlers or research vessels then speak for its “right of innocent passage”?An objective of the Chinese trawlers and militia is to regularise the Chinese presence in the “distant seas”to project power that helps Beijing in both peacetime and wartime. Maritime security and the freedom of high seas thus are hence strongly co-related with Chinese illegal and unregulated fishing.

China’s illegal and unregulated fishing amounts to economic plunder of a nation’s resources as they deplete the fishery resources can result in food and employment deprivation of the people of the coastal areas of India. The fishing industry provides employment to three critical sectors- catching, processing and marketing and contributes 1.07 per cent to the country’s GDP. Fishes and Prawns are an essential source of protein in India’s coastal areas. The demand for ‘blue food’ has increased due to an increasing population worldwide and in India. Any food resource depletion would increase prices and affect the fiscal budget. Adverse effects on any of these sectors can hinder rural development and food security, thereby having the potential to cause social unrest.

From an environmental security perspective, the coral reefs near the Andaman and Nicobar Islands constitute a part of the world heritage and should be protected from the perils of IUU. Further, the use of LED lights and squid jigging equipment can eventually result in overexploitation leading to a scarcity of fish. There have been reports that illegal fishing is also done by dynamite blasts as well as bottom trawling. The Indian government also bans such materials and hence it requires more stringent measures by the necessary agencies. With an active policy of fusion of military and civilian facilities, Beijing’s shipping trawlers can also damage India’s undersea cables and cyber security.

Adoptingthe Marine Fisheries (Regulation and Management) Bill of 2019 and the National Fisheries Policy of 2020 have introduced novel measures such as the mandatory requirement for trawlers to have suitable transponders and communication systems. Nevertheless, Chinese IUU has not stopped and still poses a danger to the maritime security of India and other coastal states. In the above context, both Quad and European Union’s future Indo-Pacific policy have included IUU as an agenda for cooperation. Its strategic frustration related to Quad and AUKUS, apart from the EU’s Indo-Pacific policy, is also related to its future control of its IUU, apart from its expansionist policies.

 

Source: channel16.dryadglobal


When plotting a course on the open ocean, conditions rarely allow a navigator to chart a straight line home. Hazards below the surface of every ocean and the unpredictability of weather systems require a crew to consistently reassess the vessel’s position and adjust maneuvering to reach its destination safely. Both the captain and the crew are expected to navigate using all means available, a lens that should apply to approaching recommendations to reduce cybersecurity risks for the MTS as a whole: actors within the MTS must be capable of tapping into every available resource.

The approach to maritime cybersecurity must ultimately be holistic; even if every component of the MTS was cyber secure, the interconnection of the subsystems might not result in a secure MTS. Taking the steps necessary to build a secure maritime domain will require a better understanding of the cybersecurity-threat landscape, coupled with a segmented view of MTS infrastructure. This will allow developers, policy makers, owners, and regulators to match the best policy levers with particular maritime systems, and achieve better cybersecurity outcomes across the entire MTS.

This report puts forward twelve recommendations—split into three overarching themes—to help better secure all subsystems of the MTS from evolving cyber threats. First, stakeholders operating within the MTS must raise the baseline for cybersecurity across the maritime industry and shipping communities. Knowing is half the battle, and stakeholders must develop a sector-specific cyber risk framework, a global intelligence clearinghouse, and a common cyber-incident threat matrix, while pushing for an active, industry-wide vulnerability disclosure policy.

Second, MTS stakeholders must deepen their understanding of maritime cybersecurity and associated risks by building cross-sector linkages, especially through new professional and international exchanges between academia, industry, and government. Stakeholders must design MTS cyber-specific educational certifications to support these new workforce initiatives, with the goal of upskilling the industry and attracting talent into a cyber-aware MTS. Developers and the maritime industry must collaborate on eradicating systemic software vulnerabilities from MTS software. Lawmakers and regulators must complement these efforts by ensuring that MTS receive adequate resources to improve cybersecurity.

Third, executives and high-level stakeholders in the public and private sectors globally must prioritize cybersecurity as part of their broader risk management efforts, leveraging increased security measures and appropriate risk mitigations to help support long-term improvements in cybersecurity. MTS stakeholders should assess risk by relating their cybersecurity maturity to those of other sectors, like energy, better integrating cybersecurity with traditional maritime insurance coverage, and finally, improving cybersecurity proactively through multistakeholder simulations.

The bulk of these identified actions build on or integrate existing programs, such as the US Department of Energy-backed Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program,1 run across four national labs and the Department of Transportation (DOT) Maritime Administration (MARAD) 2021 Port Infrastructure Development Program (PIDP).2 These programs are embedded in broader lines of policy effort and come with well-established relationships—both virtues over starting from scratch.

The maturity and effectiveness of contemporary approaches to cybersecurity in the MTS fail to reflect the vital role maritime transportation plays in supporting global commerce, diverse energy systems, and national security. Cyber threats will only continue to metastasize, accelerating both in quantity and consequence. Navigating through such turbulent waters requires an all-hands-on-deck approach—both in the United States and beyond—to improve the collective cybersecurity of the MTS.

 

Source: atlanticcouncil


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED