📄 Extracted Text (178 words)
From: Jeffrey Epstein
Sent Thur 9/24/2009 12:22:04 PM
I think -An example of deception and bio-cryptograhy woud be the herpes virus.
Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging
effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions
utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes
encoding known or potential immunomodulatory proteins. include inhibition of complement and
antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and
potential disruption of cellular recognition of virally infected targets.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected] and
destroy this communication and all copies thereof,
including all attachments.
EFTA_R1_00191402
EFTA01819013
ℹ️ Document Details
SHA-256
a5ea9c98ef80b62ff351ac5c9d4e59287cc13a108874dc66febfb782eb06b309
Bates Number
EFTA01819013
Dataset
DataSet-10
Document Type
document
Pages
1
Comments 0