versity of St. Thomas in Houston, Texas, in the United States, said Xi
wants to convey a specific message: that China sees the BRI as a method by which it can make
a substantial and permanent contribution to lasting peace, common security and global prosperity.
“While some Westerners may scoff at the impact they think the BRI m
ay have on these issues, Xi genuinely sees the BRI as a global development project and will cont
inue to wholeheartedly put China’s money, resources and energies into this project,” he said.
Chen Weihua in Brussels, Bo Leung in London, Zhao Huanxin in Washington, Edith Muteth
ya in Nairobi and Chen Yingqun in Beijing contributed to this story.The profits of China’s major indu
strial firms surged by 13.9 percent in March, a drastic rebound compared to the 14-percent decline in January-Febru
ary period, official data from the National Bureau of Statistics (NBS) showed Saturday.
ancing needs, sustainable development and debt sustainability, according to Finance Minister Liu Kun.
“We will build a high-standard and high-quality financing system to s
upport long-term and sustainable BRI investment while preventing debt risks,” Liu said.
He suggested promoting financing cooperation for projects in
third-party countries, equity investment and attracting more private funding.
Enhancing debt and risk management is a key consideration for deepening BRI financi
ng cooperation, said Yi Gang, governor of the People’s Bank of China, the central bank.
“The debt issue in developing countries should be treated objective
ly. If debt growth is accompanied by infrastructure improvement, enhancement of people’s liveliho
ods and productivity and poverty reduction, it will be beneficial for the sustainability of long-term debt,” Yi said.
tween law enforcement departments, intelligence agencies and
private institutions. In short, it authorizes Australia’s national law enforcement to issu
e mandatory “Technical Assistance Notices”, “Technical Capability Notices” and “Computer Access and Assistance Ord
ers” to all communication providers. Upon receiving the notification and instruction, the communication provider mu
st undertake a number of activities, for example, decrypting specific communications, installing specific softw
are on the network, modifying or replacing services, providing assistance in accessing facilities, and providing sour
ce code, third-party provider profiles, network device encryption schemes, and more.