EFTA01819012
EFTA01819013 DataSet-10
EFTA01819014

EFTA01819013.pdf

DataSet-10 1 page 178 words document
P17 P19 V16 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (178 words)
From: Jeffrey Epstein Sent Thur 9/24/2009 12:22:04 PM I think -An example of deception and bio-cryptograhy woud be the herpes virus. Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected] and destroy this communication and all copies thereof, including all attachments. EFTA_R1_00191402 EFTA01819013
ℹ️ Document Details
SHA-256
a5ea9c98ef80b62ff351ac5c9d4e59287cc13a108874dc66febfb782eb06b309
Bates Number
EFTA01819013
Dataset
DataSet-10
Document Type
document
Pages
1

Comments 0

Loading comments…
Link copied!