EFTA00884368
EFTA00884370 DataSet-9
EFTA00884371

EFTA00884370.pdf

DataSet-9 1 page 187 words document
P17 V16 P19 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (187 words)
From: Jeffrey Epstein <[email protected]> II To: Martin Nowak c a Subject: Date: Thu, 24 Sep 2009 12:22:04 +0000 I think -An example of deception and bio-cryptograhy woud be the herpes virus. Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and destroy this communication and all copies thereof, including all attachments. EFTA00884370
ℹ️ Document Details
SHA-256
a6aa1ec6d06277c98ab56b687a0ce42ff41b5338a7077ae6aa1d69a013e8a677
Bates Number
EFTA00884370
Dataset
DataSet-9
Document Type
document
Pages
1

Comments 0

Loading comments…
Link copied!