EFTA02526145.pdf
👁 1
💬 0
📄 Extracted Text (194 words)
From: Jeffrey Epstein <[email protected]>
Sent: Thursday, September 24, 2009 12:22 PM
To: Martin Nowak;
I think -An example of deception and bio-cryptograhy woud be the herpes =irus.
Herpesviruses have acquired a variety of different =echanisms to protect itself from the damaging effects of host
immunity. Fr=quently, these viruses subvert normal immune regulatory functions utilized by the host. This is=a typical
predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins.
include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine
receptors, and potential disruption of cellular recognition of virally infected targets.
The information contained in this co=munication is confidential, may be attorney-client privileged, may constitute inside
information, and is intended only for the use of the a=dressee. It is the property of Jeffrey Epstein Unauthorized use,
di=closure or copying of this communication or any part thereof is strict'= prohibited and may be unlawful. If you have
received this communication in error, p=ease notify us immediately by return e-mail or by e-mail to
[email protected], =nd destroy this communication and all copies thereof, including all attachments.
--001636c5b9f219c67d047451e10e-- conversation-id 152845 date-last-viewed 0 date-received 1253794924 flags
8590195713 remote-id 40727
EFTA_R1_01666306
EFTA02526145
ℹ️ Document Details
SHA-256
c7df7984d5b789b921fb9b59f67400486119c2c5cd4129ef01f4b0fc6c69351f
Bates Number
EFTA02526145
Dataset
DataSet-11
Type
document
Pages
1
💬 Comments 0