Case File
efta-02437391DOJ Data Set 11OtherEFTA02437391
Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02437391
Pages
2
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
To:
'eevacation
mail.com 'eevacation
mail.com •
Sent:
Sun 9/27/2009 7:57:53 PM
Subject: Re:
This sounds very interesting.
I do think there is a tendency to look at the very small when we seek answers about pathogens.
Sometimes the right answer is really much more obvious. For example, no one has ever been able
to figure out how parasites get into the brain. I've takena lot of them out of the brain and written
a lot about them and I am convinced that it is actually very simple - they need to eat and myelin is
a perfect "roadmap" straight to the brain. It is a great dietary resource for them and all the have to
do is eat their way to the brain. And there is no immune system waiting for them as they eat their
way to the brain.
Similar story for herpesviruses (except vzv). All they need to do is get past the endothelial cells
and they have a back door passage to anything they want.
It's not cryptography. It's more like Food Channel.
Original Message
From: Jeffrey Epstein <• v
i n
it m>
To: Martin Nowak
Sent: Thu, Sep 24, 2009 5:22 am
I think -An example of deception and bio-cryptograhy woud be the herpes virus.
Herpesviruses have acquired a variety of different mechanisms to protect itself from the damaging
effects of host immunity. Frequently, these viruses subvert normal immune regulatory functions
utilized by the host. This is a typical predator prey. The focus should be herpesvirus genes
encoding known or potential immunomodulatory proteins. include inhibition of complement and
antibody function, herpesvirus-encoded homologues of cytokines and chemokine receptors, and
potential disruption of cellular recognition of virally infected targets.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jgcvacation@ ginail coin, and
destroy this communication and all copies thereof,
EFTA_R1_01510201
EFTA02437391
including all attachments.
EFTA_R1_01510202
EFTA02437392
Technical Artifacts (3)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
mail.comPhone
2437391Phone
2437392Related Documents (6)
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01984612
0p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01867203
0p
DOJ Data Set 10OtherUnknown
EFTA01873814
3p
DOJ Data Set 9OtherUnknown
From: Jeffrey Epstein <jeevacation@gmail.com>
1p
DOJ Data Set 10OtherUnknown
EFTA01682184
186p
DOJ Data Set 10OtherUnknown
EFTA02082292
2p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.