Skip to main content
Skip to content
Case File
efta-efta00770605DOJ Data Set 9Other

From: '

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00770605
Pages
1
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: ' To: [email protected], Subject: Re: Date: Sun, 27 Sep 2009 19:57:53 +0000 This sounds very interesting. I do think there is a tendency to look at the very small when we seek answers about pathogens. Sometimes the right answer is really much more obvious. For example, no one has ever been able to figure out how parasites get into the brain. I've takena lot of them out of the brain and written a lot about them and I am convinced that it is actually very simple - they need to eat and myelin is a perfect "roadmap" straight to the brain. It is a great dietary resource for them and all the have to do is eat their way to the brain. And there is no immune system waiting for them as they eat their way to the brain. Similar story for herpesviruses (except vzv). All they need to do is get past the endothelial cells and they have a back door passage to anything they want. It's not cryptography. It's more like Food Channel. Original Message From: Jeffrey Epstein <[email protected]> To: Martin Nowak Sent: Thu, Sep 24, 2009 5:22 am S < ›; I think -An example of deception and bio-cryptograhy woud be the herpes virus. Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes encoding known or potential immunomodulatory proteins. include inhibition of complement and antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and potential disruption of cellular recognition of virally infected targets. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. EFTA00770605

Technical Artifacts (1)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.