EFTA00770605.pdf

DataSet-9 1 page 365 words document
👁 1 💬 0
📄 Extracted Text (365 words)
From: ' To: [email protected], Subject: Re: Date: Sun, 27 Sep 2009 19:57:53 +0000 This sounds very interesting. I do think there is a tendency to look at the very small when we seek answers about pathogens. Sometimes the right answer is really much more obvious. For example, no one has ever been able to figure out how parasites get into the brain. I've takena lot of them out of the brain and written a lot about them and I am convinced that it is actually very simple - they need to eat and myelin is a perfect "roadmap" straight to the brain. It is a great dietary resource for them and all the have to do is eat their way to the brain. And there is no immune system waiting for them as they eat their way to the brain. Similar story for herpesviruses (except vzv). All they need to do is get past the endothelial cells and they have a back door passage to anything they want. It's not cryptography. It's more like Food Channel. Original Message From: Jeffrey Epstein <[email protected]> To: Martin Nowak S • < ›; Sent: Thu, Sep 24, 2009 5:22 am I think -An example of deception and bio-cryptograhy woud be the herpes virus. Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. EFTA00770605
ℹ️ Document Details
SHA-256
3d89e3629d44637936df88c4d41f377d7422ca4085c3317f4b8688fb0e6b8510
Bates Number
EFTA00770605
Dataset
DataSet-9
Type
document
Pages
1

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!