Skip to main content
Skip to content
Case File
efta-02466443DOJ Data Set 11Other

EFTA02466443

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02466443
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: jeffrey E. <jeevacation@gmail.com> Sent: Monday, April 11, 2016 7:00 PM To: Peter Thiel Subject: Re: FW: evolution seems to invade culture as well as biological sy=tems. in any socially competitive game govt=C2 . grants. relationships deception is a usefu= strategy, when you have observers, even more so. =s it provides leverage over a group at a small cost/. and yes =uch more to discuss On Mon, Apr 11, 2016 at 2:44 PM, Peter Thiel > wrote: Jeff -= much longer discussion, but not sure I even made my questions clear: (1). I don't question that there is a line of evolutionary thinking und=r which deception is highly adaptive (and in this sense, it is quite compa=ible with the findings of science). I meant it more as a question of=the sociology of science: If there is a lot of deception in science,=then there are a lot of fake scientists trying to get government grant mon=y and thereby replace the real scientists. I think this is a pretty =ig phenomenon and seriously underestimated. (2). The related question of whether the amount of deception goes up or dow= over time is not about evolutionary biology (since I assume our evolution=ry nature doesn't change that quickly), but more about politics and te=hnology. Thus, if there are better ways of detecting deception, then=there may be less taking place (the cost/benefit calculus just shifts). =AO And perhaps conversely, if there is a stronger government, then perhaps=it will be able to get away with more deception (think fascist/communist p=opaganda, or Orwell's 1984) and will find it easier to pretend that it=is solving problems than actually to solve problems. --Peter From: Peter Thiel < <mailto » Sent: Monday, April 11, 2016 10:31 AM Subject: FW: To: <mailt <mailt <mailt > From: jeffrey E. [mailto:jeevacati=n@gmail.com cmailto:jeevacation@gmail.com> Sent: Monday, April 11, 2016 3:39 AM To: Peter Thiel <mailto: Subject: EFTA_R1_01574995 EFTA02466443 briefly, trivers and I share the same belief in the major=role of deception. - a tool to protect or conquer =ree energy.. in essence if the predator can read your algorit=m, you are easy food . so deception is the first line of defen=e as it usually the cheapest. if a prey knows its own algorit=m it is open to interrogation. so nature hides it =rom the" self". Deceptive self confidence is also a =inning game strategy. Ants engage in the p=actise of mimetic. camouflage. , false direction. etc. T= some extent, so do most viruses. ie since HIV clearly m=squerades itself as a unit of self. your question re is =eception increasing, - yes as fast as methods of detecti=n. note I assume you are awake please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeev=cation@gmail.com <mailto:jeevacation@gmail.com> <mailto:je=vacation@gmail.com <mailto:jeevacation@gmail.com», and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please =ote The information contained in this communication is confiden=ial, may be attorney-client privileged, may constitute inside informati=n, and is intended only for the use of the addressee. It is the propert= of JEE Unauthorized use, disclosure or copying of this communica=ion or any part thereof is strictly prohibited and may be unlawful. If =ou have received this communication in error, please notify us immediat=ly by return e-mail or by e-mail to jeevacation@gmail.com <mailto:jeevacation@gmail=com> , and destroy this comm=nication and all copies thereof, including all attachments. copyright -=11 rights reserved 2 EFTA_R1_01574996 EFTA02466444

Technical Artifacts (6)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Emailcation@gmail.com
Emailjeevacation@gmail.com
Emailn@gmail.com
Emailvacation@gmail.com
Phone2466443
Phone2466444

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.