EFTA02526145.pdf

DataSet-11 1 page 194 words document
👁 1 💬 0
📄 Extracted Text (194 words)
From: Jeffrey Epstein <[email protected]> Sent: Thursday, September 24, 2009 12:22 PM To: Martin Nowak; I think -An example of deception and bio-cryptograhy woud be the herpes =irus. Herpesviruses have acquired a variety of different =echanisms to protect itself from the damaging effects of host immunity. Fr=quently, these viruses subvert normal immune regulatory functions utilized by the host. This is=a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this co=munication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the a=dressee. It is the property of Jeffrey Epstein Unauthorized use, di=closure or copying of this communication or any part thereof is strict'= prohibited and may be unlawful. If you have received this communication in error, p=ease notify us immediately by return e-mail or by e-mail to [email protected], =nd destroy this communication and all copies thereof, including all attachments. --001636c5b9f219c67d047451e10e-- conversation-id 152845 date-last-viewed 0 date-received 1253794924 flags 8590195713 remote-id 40727 EFTA_R1_01666306 EFTA02526145
ℹ️ Document Details
SHA-256
c7df7984d5b789b921fb9b59f67400486119c2c5cd4129ef01f4b0fc6c69351f
Bates Number
EFTA02526145
Dataset
DataSet-11
Type
document
Pages
1

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!