Case File
efta-efta00880468DOJ Data Set 9OtherFrom: Jeffrey Epstein <[email protected]>
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00880468
Pages
2
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Jeffrey Epstein <[email protected]>
To: Martin Nowak
Cc: trivers
Subject: Re:
Date: Fri, 04 Sep 2009 11:01:40 +0000
yes„ many of the codes are to DECEIVE the other side.. false info... butterfly camoofluge in its wings. --dna
would have developed deceiving codes to fool viruses. THIS is the key, deception in the code.. ala trivers .. its
not simply what the gene codes for , but what message it is sending. the intermediate protein could then fold
differently , blocking or killing predators., or any other code that is interfering
On Thu, Sep 3, 2009 at 10:13 PM, Martin Nowak <
jeffrey
my class started today.
there seem to be brilliant new students.
wrote:
i wonder to what extent natural selection can be seen as "code breaking" more generally?
there is often an arms race between predator and prey (or between parasite and host).
the prey enhances its code by augmenting anti-predator behavior.
the predator has to evolve to break the new code.
this arms race is a selective force for discovery in biology.
it could be all-encompassing.
m
On Sep 3, 2009, at 6:45 AM, Jeffrey Epstein wrote:
the evolutinary code dynamics, should include multi dimensional codes. for example , a code that sets up a
electric circuit, that now depends on magnetism to find result. assume the dna code codes for proteins. proteins
fold and code for a three dimensional topology, that then codes for weak force interaction. , even if one
dimension of the code is broken, you have nothing
***********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
EFTA00880468
destroy this communication and all copies thereof,
including all attachments.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments.
EFTA00880469
Technical Artifacts (2)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Email
[email protected]Email
[email protected]Related Documents (6)
DOJ Data Set 9OtherUnknown
From: Jeffrey Epstein <[email protected]>
1p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01867203
0p
DOJ Data Set 10OtherUnknown
EFTA01682184
186p
DOJ Data Set 10OtherUnknown
EFTA01873814
3p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01984612
0p
DOJ Data Set 10OtherUnknown
EFTA02082292
2p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.