Skip to main content
Skip to content
Case File
efta-efta00880468DOJ Data Set 9Other

From: Jeffrey Epstein <[email protected]>

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00880468
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Jeffrey Epstein <[email protected]> To: Martin Nowak Cc: trivers Subject: Re: Date: Fri, 04 Sep 2009 11:01:40 +0000 yes„ many of the codes are to DECEIVE the other side.. false info... butterfly camoofluge in its wings. --dna would have developed deceiving codes to fool viruses. THIS is the key, deception in the code.. ala trivers .. its not simply what the gene codes for , but what message it is sending. the intermediate protein could then fold differently , blocking or killing predators., or any other code that is interfering On Thu, Sep 3, 2009 at 10:13 PM, Martin Nowak < jeffrey my class started today. there seem to be brilliant new students. wrote: i wonder to what extent natural selection can be seen as "code breaking" more generally? there is often an arms race between predator and prey (or between parasite and host). the prey enhances its code by augmenting anti-predator behavior. the predator has to evolve to break the new code. this arms race is a selective force for discovery in biology. it could be all-encompassing. m On Sep 3, 2009, at 6:45 AM, Jeffrey Epstein wrote: the evolutinary code dynamics, should include multi dimensional codes. for example , a code that sets up a electric circuit, that now depends on magnetism to find result. assume the dna code codes for proteins. proteins fold and code for a three dimensional topology, that then codes for weak force interaction. , even if one dimension of the code is broken, you have nothing *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and EFTA00880468 destroy this communication and all copies thereof, including all attachments. The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. EFTA00880469

Technical Artifacts (2)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.