Case File
efta-efta00770605DOJ Data Set 9OtherFrom: '
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00770605
Pages
1
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: '
To: [email protected],
Subject: Re:
Date: Sun, 27 Sep 2009 19:57:53 +0000
This sounds very interesting.
I do think there is a tendency to look at the very small when we seek answers about pathogens. Sometimes the
right answer is really much more obvious. For example, no one has ever been able to figure out how parasites get
into the brain. I've takena lot of them out of the brain and written a lot about them and I am convinced that it is
actually very simple - they need to eat and myelin is a perfect "roadmap" straight to the brain. It is a great dietary
resource for them and all the have to do is eat their way to the brain. And there is no immune system waiting for
them as they eat their way to the brain.
Similar story for herpesviruses (except vzv). All they need to do is get past the endothelial cells and they have a
back door passage to anything they want.
It's not cryptography. It's more like Food Channel.
Original Message
From: Jeffrey Epstein <[email protected]>
To: Martin Nowak
Sent: Thu, Sep 24, 2009 5:22 am
S
•
<
›;
I think -An example of deception and bio-cryptograhy woud be the herpes virus.
Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host
immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a
typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory
proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of
cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments.
EFTA00770605
Technical Artifacts (1)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Email
[email protected]Related Documents (6)
DOJ Data Set 9OtherUnknown
From: Jeffrey Epstein <[email protected]>
1p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01867203
0p
DOJ Data Set 10OtherUnknown
EFTA01682184
186p
DOJ Data Set 10OtherUnknown
EFTA01873814
3p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01984612
0p
DOJ Data Set 10OtherUnknown
EFTA02082292
2p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.