Skip to main content
Skip to content
Case File
efta-02417530DOJ Data Set 11Other

EFTA02417530

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02417530
Pages
2
Persons
0
Integrity

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
To: Jeffrey Epsteinueevacation@gmaiLcom] From: Al seckel Sent Sun 10/31/2010 1:50:36 AM Subject: Latest Today you sent the following list of topics for funding for 2011. I will have to go through this and make it comprehensible (not just a stream of consciousness, connected and unconnected words) and a little more serious/rigorous for academic solicitation/respect, hope you can drop the flaky pseudoscience and junk science stuff, mixed in here as well. Your science site now looks very serious. It is a good site, and as we continue to build on it, it will be a real benefit, not just a misdirection. Same thing with the charity site, which I believe needs a lot of work, but needed to get it up there quickly. best, me 1. biology versus mathematics, yin/yang. A. Truth vs deception.. the most efficient mathematical algorithm , is biologically the most vulnerable. Easy to become prey. Therefore deception needed for protection.,, viruses, technology now available encryption , de-encryption , code theorytn wavelet analysis elliptical transformations, real random generators. Topics include Self deception, alice — bob, type communication protocols„ well established , codebreaking, evolution of signal and signal processing, butterfly camoflage, mimickry, misinformation.. computer programs are all readable.can't deceive. No life. 2. cognitive neuro- science , pattern recognition, feedback, loops, optical illusions , emotion, definition , mirror neurons. , finri,pet, tms. Music as language, enzymes cutting away useless connections. 3. quantum computing, deception, entaglement, photosynthesis, now proven to work by wave effects. More than photons. 4 . psychology, moral game. sex, display social prosthetic. feminism, anxiety. psscho pharmacology. 5. evolutionary strategy, game, niche specific to input. Niche filling , observer interaction in prisoner dilemma and ultimatum game. 6. Power, financial , intellectual physical, political, trust, reputation, different cultures, values, awe, transaction, history, friction of transactions and intial value of culture, and genetics. 7.Human intelligence., ( limited resource, ) algorithm for smell. Limited resouce. transaction based gender differences, racial . origins. 8. genetics. Code No fabrication, stem cells. bounded , junk, 9. energy, physics, astro biology, elements of life, replication advantage, energy level competition 10. mathematics, algebraic topology, category theory. li groups code theory, derivation of the power laws parcto and zipfs ( autonomous agents only? ) II. finance and money, currency, history , antiquated . 12, alternative medcine, placebo , chi belief, acupuncture, shamanism 13, cancer, signal proscessing, membrane computing. 14 philosiphy — senecas shortness of life EFTA_R1_0 1482422 EFTA02417530 computing and artificial intelliegence„ education vs skill building. 15 search for new explorers, frontiennan, in the sciences. Genius program in conjunction with other foundations 16 Edge master classes. nsa codebreaking prop trading, foundation chronicales. Pardon, legal, phulantropic advisors, harper EFTA_R1_0 1482423 EFTA02417531

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.