📄 Extracted Text (507 words)
To: Charles L. Harper Jr.
From: Jeffrey Epstein
Sent Fri 11/12/2010 2:49:03 AM
Subject: Re: Very interesting research area on the evolution of deception
The signals , from one cell to another, are the things that undergo the first evolution or co-
evolution„ the eavesdroppers , or free riders , get the benefit without cost. The deception or code
, keeps the predator at bay, ( misdirection, camaflauge, mimicicry)// the alice -bob dynamic, is
what I want. I need code theory experts, with a bioligical understanding. Not database mining,
crypto's who want to understand origins of life.
On Fri, Nov 12, 2010 at 2:57 AM, Charles L. Harper Jr. wrote:
Dear Jeffrey,
Quick note:
I have done a bit more research on one area you mentioned to me last week.
Darwin himself wrote a book on deception in orchids:
"On the various contrivances by which orchids are fertilized by insects." (1885)
I have discovered that there is a rich and broad-ranging contemporary research literature in this
topical area.
(I've found hundreds of papers as well as overview books, gene databases, etc.)
Apparently, the rate of speciation-evolution in orchids having to do with food and sexual
deception,
and with plant-pollinator pairing and co-evolution is very rapid. It seems to be a rapidly
expanding research field
that is seriously connected into evolutionary theory and plant genetics.
The topic is not (yet) connected in any way to issues in cryptography. However, I note
extensive work
on gene complexes called "MADS-box" genes in orchids. This kind of work relates to one of
the significant
research frontiers I mentioned: systems biology and evolution towards understanding the
dynamics of variation:
how does a plant specoes "learn" to re-create insect sex phermones as well as insect shapes?
(Probably you will know Marc Kirschner at Harvard,
who is a key pioneer in systems biology and research on the "evolution of evolution" dynamics
of variation).
I have identified some serious plant geneticists working in this arena.
I think there may be potential to connect with innovation agendas in
cryptography pursuing "nature inspired" approaches.
For example, the work of the cryptologist John A. Clark (See: http://www-
thet s cs.vork.ac ttk Jac tV.ndf):
Paper: "Nature-Inspired Cryptography: Past, Present and Future." (2003) and
EFTA_R1_004613611
EFTA01980465
Paper: "Fusing Natural Computational Paradigms for Cryptography:
Or, How to Create Quantum Solvable Cryptographic Problems with Heuristic
Search." (2006)
This note relays a quick pass only into the literature to report that there seems to be a lot there
that looks seriously interesting.
Allbest,
Charles Harper
*************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to ice% acationagmail coin, and
destroy this communication and all copies thereof,
including all attachments.
EFTA_R1_00468612
EFTA01980466
ℹ️ Document Details
SHA-256
9ea3e0343bf8ed3b9050f8d90875dcbf2ed7643ed0a839f2ed1743a4187a59bf
Bates Number
EFTA01980465
Dataset
DataSet-10
Document Type
document
Pages
2
Comments 0