📄 Extracted Text (185 words)
From: Jeffrey Epstein <[email protected]>
To: Martin Nowak II
Subject:
Date: Thu, 24 Sep 2009 12:22:04 +0000
I think -An example of deception and bio-cryptograhy woud be the herpes virus.
Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host
immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a
typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory
proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of
cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation®gmail.com, and
destroy this communication and all copies thereof,
including all attachments.
EFTA00739909
ℹ️ Document Details
SHA-256
dfc5ede21833857be1ee044654dec1d9cfe97da042190a3069c071f6495aa4b8
Bates Number
EFTA00739909
Dataset
DataSet-9
Document Type
document
Pages
1
Comments 0