EFTA00739908
EFTA00739909 DataSet-9
EFTA00739910

EFTA00739909.pdf

DataSet-9 1 page 185 words document
P17 V16 P19 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (185 words)
From: Jeffrey Epstein <[email protected]> To: Martin Nowak II Subject: Date: Thu, 24 Sep 2009 12:22:04 +0000 I think -An example of deception and bio-cryptograhy woud be the herpes virus. Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and destroy this communication and all copies thereof, including all attachments. EFTA00739909
ℹ️ Document Details
SHA-256
dfc5ede21833857be1ee044654dec1d9cfe97da042190a3069c071f6495aa4b8
Bates Number
EFTA00739909
Dataset
DataSet-9
Document Type
document
Pages
1

Comments 0

Loading comments…
Link copied!