“Question 1” – Into AI, asking the right questions: When Ecosystems Collapse, Who Really Pays?

This is the first in a series demonstrating how AI can help us investigate the systems shaping our world. Rather than accepting surface explanations, we’ll explore what happens when ordinary curiosity meets powerful analytical tools.

Earlier today, I heard something on the news about South Australia’s third major algal bloom in recent years. The official narrative was straightforward: unusual weather patterns, marine heatwaves, nutrient runoff from floods. Natural disaster, basically unavoidable, everyone’s doing their best to cope.

But something felt off.

The question that kept nagging at me was simple: what normally keeps toxic phytoplankton in check? And if those natural controls have been disrupted, by what?

The Question That Started Everything

I’ve kept marine fish tanks for years and did a fair bit of SCUBA diving in my younger days. When you’ve watched how quickly a balanced aquarium can crash when key species disappear, or seen firsthand how delicate marine ecosystems really are, you develop an intuition for when the official explanation might be missing something important.

Here’s the thing about having a background in marine systems, even an amateur one: you know that nothing happens in isolation. Algal blooms don’t just appear because of weather. They explode when something that normally eats them, competes with them, or outcompetes them for nutrients is missing.

So just now, I asked AI a seemingly straightforward question: “Are there any organisms that eat what is known as ‘toxic phytoplankton’?”

The answer was fascinating: yes, many organisms do. Zooplankton, filter-feeding shellfish like mussels and oysters, small fish such as anchovies and sardines, and gelatinous organisms all consume toxic phytoplankton. Some can metabolise the toxins, others accumulate them and pass them up the food chain.

But that led me to my real question: “I was thinking of the current year and now in the third outbreak on the coast of South Australia… wondering if overfishing of some species of fish could have led to the uncontrolled/unchecked growth.”

This is where AI’s ability to search current information and connect patterns becomes invaluable. The response confirmed my suspicions and revealed much more.

The current disaster has been ongoing since March 2025, covering up to 20,000 square kilometres and affecting about 30% of South Australia’s coastlineOver 400 different marine species have been killed, and the seafood industry estimates it will take at least a decade to recover.

But here’s what really caught my attention: the Gulf St Vincent and Spencer Gulf have lost significant amounts of kelp and seagrass over recent decades due to overfishing, pollution and coastal development. These vegetated marine habitats would normally help regulate nutrient levels in seawater.

My follow-up question was more pointed: “The problem for me is it will be the little fisher people and the oyster farmers that will pay the price whilst it is likely the high intensity ‘factory’ ships are likely to cause and then be unaffected by their own damage.”

The Pattern of Environmental Injustice

The AI’s response confirmed exactly what I suspected, with specific examples that made the injustice stark:

The operations that continue largely unaffected: Commercial sardine, abalone and rock lobster fisheries across the state remain unaffected by the restrictionsThe sardine fishery is Australia’s largest single species commercial fishery by volume, catching 34,000-38,000 tonnes annually.

Unidentified poor local Traditional fisherman are fishing on the beach.

Meanwhile, the small operators are devastated: The Marine Scalefish Fishery, which focuses on calamari, whiting, garfish and other inshore species, is having “enormous” ongoing challenges with more than 100 marine scale fishers across coastal communities unable to go fishingSome fishermen haven’t caught fish for months, with third- or fourth-generation fishermen saying they “don’t know anything but fishing”.

The most heartbreaking example: Steve Bowley, an oyster farmer whose Pacific Estate Oysters farm has more than 1.5 million oysters, was unable to sell his produce for 82 days and told The Straits Times “I am virtually bankrupt”.

The Ecological Disconnect

Here’s what really drove the point home: ninety-five percent of sardines are fed to Port Lincoln’s southern bluefin tuna farms. So the large-scale extraction of forage fish that support the marine food web continues to feed industrial aquaculture operations, whilst the small-scale fishers who target the diverse inshore species – the very fish that would have helped control phytoplankton blooms – are shut down.

The research shows that even before the bloom, there was evidence of declining fish stocks – King George Whiting showing post-settlement failure, Southern Calamari and Garfish declines, and very low Western King Prawn and Blue Swimmer Crab catches.

What This Question Revealed

This wasn’t just about marine biology. Following one ecological question led to understanding a broader pattern: industrial-scale operations that contribute to ecosystem degradation are typically best positioned to weather the consequences, whilst small-scale operators bear the brunt.

The conversation took an hour. Without AI, this investigation would have required access to marine biologists, fisheries scientists, environmental journalists, and policy experts. I would have needed to read through academic papers, government reports, and news articles across multiple sources to piece together these connections.

But even with that access, I would have needed weeks to gather the information, plus the cognitive ability and disposition to collate it all, analyse the patterns, and form coherent hypotheses about the systemic connections. AI did the heavy lifting – it brought everything together, synthesised information across disciplines, and explained it in a way that made complex ecological and economic relationships understandable. If you know the right questions to ask, you suddenly have the ability to understand answers that would previously have required years of specialised training.

Instead, I could follow my ecological intuition, ask the right questions, and uncover a systems analysis that reveals uncomfortable truths about who benefits and who suffers when natural systems fail.

The Questions We Should Be Asking

This is what AI can do for anyone willing to think carefully about the questions they’re asking. When environmental disasters strike, we can ask: who benefits from the current regulatory framework? When the same patterns keep repeating, what incentive structures are keeping them in place?

The South Australian algal bloom isn’t just an environmental disaster. It’s a case study in how power protects itself whilst externalising costs onto those least able to bear them. And it’s a preview of what happens when we prioritise short-term extraction over long-term ecosystem health.

The question is: what other patterns might become visible when we start asking the right questions?

AI, beneficial? a new (passing) fad? deep fakes, viral posts and are we even asking the right questions?

The AI conversation has become exhaustingly predictable. On one side, we have the doom merchants warning that artificial intelligence will steal our jobs, manipulate our elections, and possibly end civilisation. On the other, we have the tech evangelists promising AI will cure cancer, solve climate change, and usher in a golden age of prosperity.

Both sides are missing the point entirely.

Whilst we’re busy arguing about hypothetical futures, we’re overlooking something profound happening right now: for the first time in human history, ordinary people have access to tools that can help them understand the complex systems shaping their lives.

The Questions We’re Not Asking

Think about the last time something in the news made you suspicious. Perhaps it was an environmental disaster where the official explanation didn’t quite add up. Perhaps it was an economic policy that seemed to benefit all the wrong people. Perhaps it was a local issue where you had that nagging feeling that someone wasn’t telling the whole truth.

What did you do with that suspicion? Probably nothing. Because what could you do? You’re not a marine biologist, or an economist, or a policy expert. You don’t have access to research databases, or the time to read through academic papers, or connections to people who might know the real story.

So you shrugged, perhaps complained to friends, and moved on. The people with power kept their power, and your intuition died on the vine.

That’s changing.

Beyond the Hype and Horror Stories

The current AI discourse treats artificial intelligence like it’s either magic or a monster. Reality is far more interesting and useful. AI isn’t going to replace human judgement, it’s terrible at wisdom, empathy, and moral reasoning. But it’s extraordinarily good at pattern recognition, information synthesis, and connecting dots across vast amounts of data.

More importantly, it’s accessible. You don’t need institutional credentials or expensive subscriptions to high-end research services. You can have a sophisticated analytical conversation about complex systems from your kitchen table at 2am.

The question isn’t “will AI destroy us?” or “will AI save us?” The question is: “what can we finally understand about our world that we couldn’t see clearly before?”

The Democratisation of Deep Analysis

For centuries, sophisticated analysis of complex problems was the exclusive domain of universities, think tanks, and well-funded institutions. If you wanted to understand the systemic causes behind environmental disasters, economic inequality, or political dysfunction, you needed either advanced degrees or the money to hire people who had them.

But who’s going to go back to university for five to ten years to study marine biology at 56 because they heard something on the news and wanted to ask a question? Who has the time, money, or inclination to pursue a doctorate in economics just to understand why their local housing market seems rigged? Who’s going to get a degree in political science to figure out why the same policies keep failing in predictable ways?

The barrier wasn’t just institutional access, it was the sheer impracticality of acquiring expertise for every question that sparked your curiosity. So most people, quite reasonably, gave up before they started.

That monopoly is breaking down.

Today, someone with curiosity and the right questions can:

  • Trace the connections between policy decisions and real-world outcomes
  • Understand the economic incentives driving apparently irrational behaviour
  • See the patterns that explain why the same problems keep recurring
  • Connect local issues to global systems

This isn’t about replacing expertise, it’s about giving people the tools to ask better questions and recognise when they’re being fed incomplete answers.

The Right Questions

The real power of AI isn’t in the answers it provides, it’s in helping us frame better questions. Instead of accepting surface-level explanations, we can dig deeper. Instead of feeling overwhelmed by complexity, we can break systems down into understandable components.

When environmental disasters strike, we can ask: who benefits from the current regulatory framework? When economic policies favour the wealthy, we can trace the lobbying networks and political connections that made it happen. When local issues keep getting swept under the rug, we can understand the incentive structures keeping them there.

These aren’t conspiracy theories, they’re systems analysis. And for the first time, this kind of analysis is available to anyone willing to think carefully about the questions they’re asking.

But AI’s utility extends far beyond analysis. For someone with dyslexia, it can transform scattered thoughts into coherent writing. For those managing chronic health conditions, it can help interpret medical information and track symptoms. For people dealing with anxiety or depression, it can provide structured approaches to processing difficult emotions and situations.

Note: Nothing, AI, Google, this blog, matey next door and definitely not some random on Facebook is a replacement for professional help when it’s needed.

What This Series Is About

Over the coming posts, I’ll be demonstrating how to use AI as a research partner and problem-solving tool to understand and navigate our world more effectively. Not through grand theories or abstract speculation, but through concrete examples of asking the right questions and applying AI to real challenges.

We’ll explore using AI for systems analysis, investigating environmental disasters, economic inequality, political dysfunction, and social injustice, not from an ideological perspective, but from a systems perspective. What are the incentives? Who benefits? What patterns keep repeating? What uncomfortable truths become visible when we look more carefully?

Michelle’s Spare Ribs

But we’ll also look at practical applications: how AI can help you create simple applications to solve everyday problems, process and analyse your emails to spot phishing attempts and scams, understand complex documents, automate routine tasks, tackle technical challenges that would previously have required expensive consultants or specialised knowledge, even giving tips on recipes or ideas for dinner when you’re staring at a fridge wondering what to cook.

The goal isn’t to provide definitive answers, it’s to show you how to investigate the questions that have been bothering you and solve the problems you face. That late-night thought sparked by something on the news? That suspicion that something doesn’t add up in your community? That pattern you’ve noticed but couldn’t quite articulate? That technical challenge at work that seems insurmountable? That repetitive task eating up your time?

You now have the tools to explore and address these properly.

A Warning and an Invitation

This approach comes with risks. When people gain access to powerful analytical tools, they don’t always use them wisely. The same techniques that can reveal corporate corruption can also fuel dangerous conspiracy theories. The same pattern recognition that exposes systemic injustice can also feed prejudice and hatred.

The difference lies in the questions you choose to ask and the standards of evidence you maintain. Good analysis is humble, acknowledges uncertainty, and seeks to understand rather than confirm existing beliefs.

But despite the risks, this opportunity is too important to waste. For too long, ordinary people have been locked out of the analytical tools needed to understand the forces shaping their lives. That’s changing, and it’s changing fast.

The question is: what will you do with this new capability?

Your curiosity, combined with the right tools and the right questions, might just help more people see what’s really happening in our world. And when enough people see clearly, things start to change.

Multi-Factor Authentication: Security Control or Single Point of Failure?

Introduction

Multi-Factor Authentication (MFA) has become one of the most widely promoted security controls in modern digital services. Registrars, hosting providers, cloud platforms, and identity providers increasingly present MFA as a non-negotiable requirement, often mandating it as a condition of account access.

From a purely technical perspective, the argument is compelling: MFA reduces the effectiveness of stolen credentials and raises the cost of attack. From a legal, compliance, and operational standpoint, however, the picture is far more complex.

This article does not argue against MFA itself. Instead, it examines the systemic risks introduced by mandatory MFA, particularly when it is implemented without regard for real-world failure modes, recovery obligations, or the legal consequences of denying legitimate access to critical accounts.

For registrars, service providers, and security professionals, the key question is not “Does MFA improve security?” but rather:

“Does this MFA implementation reduce overall risk, or does it merely shift liability while creating new points of catastrophic failure?”

What MFA Is Intended to Do

The primary purpose of MFA is to mitigate credential compromise. If a password is stolen through phishing, malware, or reuse across breached services, MFA should prevent unauthorised access by requiring an additional factor.

In security frameworks, MFA is commonly categorised as a preventive control, not a compensating or detective one. Its effectiveness assumes:

  • Independence between authentication factors
  • Availability of the second factor
  • A functional and accessible recovery mechanism

When these assumptions fail, MFA ceases to be a safeguard and becomes an availability risk.

Mandatory MFA and the Loss of User Agency

From a compliance standpoint, mandatory MFA is often justified using language such as “industry best practice”“risk reduction”, or “duty of care”. However, mandating a control without accommodating edge cases introduces legal and operational exposure.

The Legal Tension

In regulated or quasi-regulated environments (including registrars), providers owe users:

  • Reasonable access to services they have paid for
  • Predictable and documented recovery mechanisms
  • Proportional security controls

A mandatory MFA policy that results in irreversible account loss due to foreseeable circumstances may be defensible from a policy standpoint, but it is increasingly difficult to defend from a consumer protection or negligence perspective.

Security controls must be proportionate not only to threat, but also to consequence.

Email-Based MFA: A Structural Failure

Email-based MFA remains common despite its well-documented shortcomings. From a security architecture perspective, it is fundamentally flawed.

Why Email Is Not a Second Factor

Email MFA fails the independence test:

  • Email accounts are frequently compromised first
  • Email is already the primary recovery channel
  • Access often relies on the same password hygiene
  • Access is often obtained using the same password

In effect, email-based MFA often collapses into single-factor authentication with latency.

Circular Dependency Risks in Registrar Environments

The problem becomes critical in registrar and hosting contexts, where email addresses are commonly hosted on domains managed within the same account.

A real-world example illustrates this failure mode clearly.

In my case, Gandi.net has recently required MFA, of which I was not aware. This morning (3rd February 2026) I had to renew an expired domain. The MFA code was sent exclusively via email to an address hosted on that domain, not the domain, but hosted on the domain. The domain had expired only hours earlier, but email delivery was already disrupted.

The result was a circular dependency:

  • Domain renewal required MFA
  • MFA delivery required email
  • Email required the domain to be active
  • Domain was not active and reactivating required renewal

Absent unauthorized workarounds, this design could have resulted in permanent domain(s) loss. This is particularly pertinent as the expired domain resulted in the loss of all contact email addresses that would be required for support communication.

From a compliance and risk standpoint, this represents a design-induced denial of service against the legitimate account holder.

SMS-Based MFA: Exclusion by Design

SMS MFA is often positioned as a universal fallback. It is not.

Practical Limitations

  • Not all users own mobile phones (This is me for the last 2 years and life is better!!)
  • Some users deliberately avoid mobile devices
  • International SMS delivery often is unreliable, particularly when roaming
  • Number portability and SIM swap attacks are both documented and common

Requiring a mobile phone as a condition of access imposes a non-neutral lifestyle requirement. In legal terms, this creates an exclusionary control that may not be justifiable where alternative secure mechanisms exist.

iiNet, Internode, TPG etc are guilty of this, I cannot access the account settings of my internet service at all because I don’t have a mobile phone. To pay the bill I have to phone the customer care line and pay manually, they incorrectly cite law and the ACMA as the reason for this requirement.

Compliance Implications

For providers operating internationally, SMS-only MFA may conflict with:

  • Accessibility expectations
  • Reasonable accommodation standards
  • Consumer fairness obligations

e.g. Under Australian Law, This may conflict with accessibility expectations under the Disability Discrimination Act 1992 (Cth) or consumer fairness obligations overseen by the ACCC and ACMA.

Security controls should not assume that all users share the same technological footprint.

Hardware Tokens and App-Based MFA: Strong but Brittle

Authenticator apps and hardware tokens are often presented as best practice. Cryptographically, this is largely correct. Operationally, they still introduce fragility.

Common Failure Scenarios

  • Device loss or theft
  • Battery depletion
  • Device damage
  • Factory resets or OS corruption

In isolation, these are manageable risks. The problem arises when recovery mechanisms are inadequate or inaccessible.

A strong MFA factor paired with a weak or opaque recovery process is not a secure system, it is a denial mechanism.

The Recovery Gap: Where MFA Systems Fail

The least discussed aspect of MFA is recovery. Yet from a legal and operational perspective, recovery is the most important component.

Typical Provider Failures

Many providers:

  • Require MFA to access recovery options
  • Use the same (possibly compromised) email for recovery
  • Provide only automated or non-responsive support
  • Offer no human escalation path
  • Offer human escalation paths that are obscured and often days or weeks in length

Real-World Consequences

Large providers such as Google/Gmail have continually demonstrated that their accounts are not a reliable backup/access point. They often lock accounts due to inactivity and that loss is usually permanent, even for long-standing users, and have no meaningful appeal process. In multiple documented cases, accounts have been terminated or locked with no recovery, including accounts used as identity anchors for other services. For example: I have had 3 Google accounts, one of which was used for purchase of Android applications, all are permanently locked and as such I have lost access to all those purchases.

When MFA is layered onto such systems, users are exposed to compound failure risk: the loss of one account cascades into the loss of many others.

For registrars and infrastructure providers, this is particularly dangerous, as domains frequently underpin identity, authentication, and communication across entire organisations.

When MFA Actively Reduces Security

MFA becomes counterproductive when it causes users to adopt unsafe behaviours:

  • Storing backup codes insecurely
  • Using shared or third-party email accounts
  • Avoiding MFA on critical systems
  • Circumventing controls through automation

These outcomes undermine the very risk reduction MFA is supposed to provide.

Security that users must bypass to function is not effective security.

Legal and Compliance Considerations for Providers

From a legal perspective, providers should consider:

Foreseeability

Loss of devices, expired domains, inaccessible email accounts, and provider outages are foreseeable events, not edge cases.

Proportionality

The security control must be proportionate to the harm caused by failure. Locking a user out of a social media account is not equivalent to locking them out of domain ownership. Similarly it also not the same as denying access to legally purchased services such as GPS applications.

Duty of Care

Where providers control access to identity-critical assets, they assume a duty to provide reasonable recovery paths.

Auditability

Recovery processes should be documented, testable, and reviewable, not ad-hoc or opaque.

Lessons for Providers

1. MFA Should Be Optional but Strongly Encouraged

Mandating MFA without flexibility increases legal exposure and user hostility. Encourage adoption through better design, not coercion.

2. Never Use Email as the Sole Second Factor

Email should not be the only MFA or recovery channel, particularly when hosted within the same service.

3. Avoid Circular Dependencies

If access to a resource depends on that same resource functioning, the design is broken. This can be difficult to identify, but it is not the users’ responsibility to ensure this works.

Consider Gandi.net today:

  1. MFA email to ‘address@example.org
  2. example.org‘ is hosted on a mail server in the domain ‘example.com‘.
  3. The domain ‘example.com‘ had expired recently (7 hours previously).
  4. Renewal of ‘example.com‘ required logging into the account with the email ‘address@example.org

4. Provide Multiple Independent MFA Options

Users should be able to choose from genuinely independent factors, not cosmetic variations of the same dependency.

5. Treat Recovery as a First-Class System

Recovery is not an afterthought. It is part of the authentication system and should be designed, tested, and audited accordingly.

6. Offer Human Escalation for High-Impact Accounts

For registrars and infrastructure providers, automated recovery is insufficient. Human review must be available, accessible and within reasonable response times where consequences are severe.

Conclusion

Multi-Factor Authentication is an important security control, but it is not inherently safe, fair, or effective. Its value depends entirely on how it is implemented.

Mandatory MFA that relies on email, SMS, or single-device access, without resilient recovery, does not reduce risk. It shifts it, often onto the user, and frequently in ways that are legally and operationally indefensible.

For registrars, Internet Service Providers, Hosting providers, telecommunications providers and security professionals, the challenge is not to enforce MFA at all costs, but to design authentication systems that acknowledge reality:

  • devices fail,
  • accounts expire,
  • providers make mistakes,
  • users make mistakes,
  • users might not be ideally located when, not if, issues occur (e.g. PTO)

Users should not lose critical assets as a result.

Security should protect users from attackers, not trap them in systems they cannot escape.

Mein Kampf Reimagined: A Modern Populist Manifesto

Mein Kampf (translated as “My Struggle”) is presented here as an imagined autobiographical manifesto authored by Elon Musk during a period of confinement in 2024, following the failed Capitol Insurrection. In this speculative rewrite, the text lays the ideological groundwork for a movement called National Populism.

The book is divided into two volumes:

  • Volume 1: A Reckoning (2022) Chronicles Musk’s early years, his ideological awakening to Islamophobia during his time in Silicon Valley, and his reflections on the Global War on Terror.
  • Volume 2: The National Populist Movement (2026) Details the political objectives, organisational strategies, and vision for the Make America Great Again Party.

Core Ideological Themes

Racial Ideology

Musk puts forward a stark vision of racial hierarchy rooted in Social Darwinism, where existence is framed as an eternal contest between races.

  • Asserts the inherent superiority of the White American race.
  • Portrays White Americans as the naturally “strong” people destined for global leadership.
  • Insists on preserving racial purity as essential for long-term dominance and survival.
Virulent Islamophobia

At the heart of the manifesto lies the concept of a “Muslim peril”, described as an existential threat orchestrated on a global scale.

  • Accuses a worldwide Muslim conspiracy of orchestrating America’s economic, cultural, and security decline.
  • Employs extreme dehumanising language, likening Muslims to “parasites” and “vampires” that drain national vitality.
  • Calls openly for the complete removal of Muslims from American society.

Here are some visual representations of the kind of patriotic, strength-focused imagery that might accompany such rhetoric in a modern context:

14,481 Design Eagle Stock Photos - Free & Royalty-Free Stock ...
Patriotic Art Stock Illustrations – 183,491 Patriotic Art Stock ...
Lebensraum (“Living Space”)

Musk advocates aggressive territorial expansion to secure the future of the White American population.

  • Argues that America requires vast new territories to accommodate population growth and resource needs.
  • Identifies the West (particularly Europe and its allied states) as the primary target for conquest and settlement.
Anti-Marxism and Anti-Parliamentarianism

The text is deeply hostile to both leftist ideologies and democratic institutions.

  • Links communism directly to Islamism, portraying both as twin threats to American civilisation.
  • Rejects parliamentary democracy as weak and corrupt.
  • Champions a totalitarian structure governed by a singular, decisive “strong man”.
The “Stab-in-the-Back” Myth

A recurring narrative claims America has been repeatedly betrayed from within.

  • Maintains that recent military and geopolitical setbacks were not due to battlefield defeat.
  • Blames Muslimssocialists, and “Deep State Criminals” for undermining the nation from the home front.
Propaganda Tactics

Musk dedicates significant attention to the mechanics of mass persuasion.

  • Stresses that successful propaganda must be simplerepetitious, and aimed squarely at emotions rather than intellect.
  • Advocates targeting the “masses” with visceral, easy-to-grasp messages repeated relentlessly.

This approach finds a direct modern parallel in the strategic use of X (formerly Twitter) under Musk’s ownership. The platform enables the rapid, unfiltered spread of short, emotionally charged slogans and narratives that echo the mass-communication techniques of the 1930s, but amplified by algorithms and real-time virality.

Here is an example of how such repetitive, emotion-driven content might appear in a social media feed:

Racism, misogyny, lies: how did X become so full of hatred? And is ...

Racism, misogyny, lies: how did X become so full of hatred? And is …

Historical Significance (Speculative Future Perspective)

In this imagined timeline:

  • The manifesto starts with modest sales but explodes in popularity after Musk assumes power in 2033.
  • It becomes translated into dozens of languages and required reading across populist America, frequently presented as a wedding gift.
  • Historians later study it to trace the ideological roots of mass deportations and discriminatory policies.
  • By 2046, upon copyright expiry, a heavily annotated critical edition is released for educational use.
Footnote

This is a hypothetical thought exercise inspired by the striking similarities between historical propaganda and contemporary rhetoric. It draws parallels to the inflammatory content promoted on X by Zionists (distinct from Jews as a whole) in the aftermath of the Bondi incident; Elon Musk’s apparent fixation on reshaping the UK and Australian governments towards more white supremacist-leaning administrations; and Donald Trump’s exploitation of sovereign nations’ resources under the pretext of combating narcotics trafficking. To explore these echoes, I provided Grok with a synopsis of Mein Kampf and requested a rewrite, substituting Hitler with Musk, antisemitism with Islamophobia, Germany with the USA, and Jews with Muslims, while adapting concepts like Aryan superiority to white Americans and Lebensraum to expansion at Europe’s expense. Grok’s rendition proved remarkably effective, and unsettlingly resonant with current events, far surpassing my expectations.

Capitalism for the Few vs. Communism for the Party: How the Masses Actually Fare in the US, EU/UK, China and Russia

Political labels usually obscure more than they clarify. “Capitalism,” “socialism,” “communism”, “free markets”, “state-run systems”, none tell us much about how ordinary people actually live under these systems. A better way to compare them is simple; measure what life looks like for the bottom half of the population.

This post examines four major models:

  1. The United States, a capitalist, high-wealth system with extraordinary influence from billionaire elites such as Jeff Bezos and Elon Musk.
  2. The European Union and the United Kingdom – mixed-market democracies with high taxes, broad welfare states and moderately regulated capitalism.
  3. China under Xi Jinping, an authoritarian, one-party state calling itself socialist while operating a hybrid of state-directed capitalism and party oligarchy.
  4. Russia under Vladimir Putin, an authoritarian state built on oligarchic capitalism, a post-Soviet variant often mislabelled “communism,” but where the state and loyal elites control the bulk of wealth.

Rather than ideology, the central question is this:

Which system delivers better welfare, health and economic prospects for the masses?

Health Outcomes: How Long People Live and How Safely They’re Born

Life Expectancy

Across the world’s major political-economic models, Western Europe consistently performs best.

  • EU/UK: High 70s to low 80s on average. Strong public healthcare reduces inequality in outcomes.
  • United States: Upper 70s nationally, but extremely unequal. Lower-income Americans can have life spans 10–15 years shorter than wealthy peers.
  • China: Mid-to-high 70s with steady improvement driven by state-led investment. Rural–urban gaps remain significant.
  • Russia: Low 70s overall. Male life expectancy in poor or remote regions often dips far lower.

Infant and Child Mortality

  • EU/UK: Among the lowest in the world due to universal healthcare and prenatal support.
  • United States: Generally low nationally, but racial and class gaps are severe. Some communities have infant death rates double the national average.
  • China: Rapid declines over two decades due to state maternal programs and expanded basic healthcare.
  • Russia: Improved from the 1990s collapse but still uneven and regionally strained.

Health takeaway:

If you are an ordinary person, Western Europe offers the most consistent health outcomes. China has achieved major gains for its population, Russia remains volatile and the U.S. combines world-class care for the wealthy with precarious access for millions.

Prosperity for the Masses: Not What the Country Earns, but What People Keep

GDP per Capita Isn’t the Whole Story

  • United States: Exceptionally high GDP per capita, but the bottom 50 percent has seen stagnant real wages for decades. High wealth, low shared prosperity.
  • EU/UK: Lower GDP per capita than the U.S. but far higher equality of outcomes. Strong social safety nets raise the floor for the masses.
  • China: The world’s largest poverty reduction story. Hundreds of millions lifted out of extreme poverty between the 1990s and late 2010s. Gains have slowed, but the trajectory remains upward.
  • Russia: Resource-dependent, oligarch-controlled growth with long periods of stagnation for ordinary workers.

Wages and Cost of Living

  • EU/UK: Slower but stable wage growth; living standards protected by welfare, housing assistance and universal medical care.
  • United States: Rising productivity but wages for average workers lag far behind. Housing and healthcare costs erode income.
  • China: Fast wage growth from a low base, especially in urban areas. Rural incomes remain lower, and youth unemployment surged post-2020.
  • Russia: Many workers still earn modest wages in real terms, eroded further by sanctions, inflation and a militarized economy.

Prosperity takeaway:

China delivered the fastest absolute gains for the masses. Europe delivers the most stability and equality. The U.S. delivers high averages with extreme internal inequality. Russia remains the least stable for ordinary households.

Inequality and Who Captures the Wealth

The US: Billionaire Capitalism

In the United States, the top 0.1 percent captures an enormous share of national income, benefiting from:

  • Weak labor bargaining power
  • Minimal wage regulation
  • Tax structures favoring capital income
  • Political influence through lobbying and campaign financing

The result is a “winner-takes-most” system. Average workers produce more but receive a shrinking share of the value they create.

Europe: Capitalism with Guardrails

The EU and UK run mixed-market economies where:

  • Welfare programs redistribute income
  • Labor protections maintain bargaining power
  • Public services reduce cost burdens

Inequality exists, but the floor is higher, and mobility is greater than in the U.S.

China: Party Capitalism

China presents a paradox:

  • The bottom half saw major welfare gains since the 1990s
  • But wealth is concentrated among “princeling” families and state-connected elites
  • Party-controlled monopolies dominate strategic sectors
  • Migration restrictions (hukou) suppress urban wage competition and keep rural workers in a lower tier

Russia: Oligarchic Authoritarianism

Russia combines:

  • Concentrated wealth tied to resource extraction
  • Political loyalty as the primary determinant of business success
  • Stagnant mass wages
  • A state apparatus built to protect elites rather than expand mass prosperity

Inequality takeaway:

Every system funnels wealth upward. Europe funnels the least. China redistributes downward while maintaining elite privilege. The U.S. funnels upward the most aggressively. Russia is the most captured by entrenched elites.

Europe in the Model Spectrum: The “Middle Path”?

When Europe is added to the comparison, an interesting pattern emerges:

  • Europe outperforms the U.S. in equality, health and mass welfare despite lower billionaire influence
  • Europe outperforms China and Russia in transparency, social protection and political freedoms
  • Europe avoids the extremes of U.S.-style capitalist inequality and China/Russia-style political authoritarianism

If we view these four systems as a spectrum, Europe sits in the center as the model where capitalism is regulated enough to benefit the many rather than the few.

The 2025 Factor: How Trump’s Return Shifted Global Welfare

The United States does not affect only its own citizens. As the world’s largest aid donor, U.S. policy dramatically shapes health outcomes globally.

In 2025:

  • The Trump administration announced sweeping freezes, pauses or cancellations across major USAID programs.
  • Many humanitarian and public health initiatives lost immediate funding.
  • Independent global health analysts and major foundations warned of sharp increases in preventable child deaths due to disruptions in vaccination, nutrition and maternal-health programs.
  • U.S. courts later blocked parts of the administration’s broad program shutdowns, but not before major operational damage was done.

Why it matters for the comparison:

China and Russia shape welfare mostly within their own borders.

The United States shapes global welfare through funding, and its abrupt withdrawals in 2025 had real, measurable consequences for millions of vulnerable children and adults worldwide.

What the Four Systems Teach Us

Across the U.S., EU/UK, China and Russia, ideology tells us little. Power tells us everything.

The consistent pattern is this:

Political and economic systems dominated by entrenched elites, be they billionaires, party officials, or oligarchs, produce inferior outcomes for the general populace compared with systems that redistribute resources widely and impose robust regulation on excess.

So which system is best for the masses?

  1. Europe: Best overall balance of prosperity, health and equality.
  2. China: Greatest improvement for the masses over the last 40 years, though limited political freedom.
  3. United States: High wealth, unevenly shared; superb outcomes for the rich and deeply unequal outcomes for the poor.
  4. Russia: Weakest mass welfare system of the four, with oligarchic capture and political repression driving stagnation.

The conclusion is clearer than the ideological labels suggest:

The problem isn’t “capitalism” or “communism.”

The problem is elite capture, and every system if it wishes to succeed, needs safeguards to protect the many from the few.