EFTA00753978.pdf
PDF Source (No Download)
Extracted Text (OCR)
From: "Al seckel"
To: "Jeffrey Epstein" <jeevacation@gmail.com>
Subject: Re: Your input needed.
Date: Mon, 01 Nov 2010 13:07:13 +0000
when can you spare a couple of minutes to talk so i can clarify some things you wrote?
Everything is completely set for your conference, It is an exceptional group, smart, eclectic,
informed, and fun.
From: Jeffrey Epstein <jeevacation@gmail.com>
To: AI seckel <
Sent: Mon, November 1, 2010 5:02:57 AM
Subject: Re: Your input needed.
add new financial systems, important.. add pre life as replication of signals.. how is our conference coming?
On Sun, Oct 31, 2010 at 9:43 PM, Al seckel <
> wrote:
Jeffrey,
You sent me the other day a stream of consciousness about your funding interests for 2011. I
have taken my own stab at trying to put it into some sort of order and accessibility to the
catered audience. I have corrected some things, which were unclear, spelled incorrectly (Lie
Groups and Algebras, no Li) or not phrased correctly. I have added some of my own edits. This
is NOT complete, and I have left out some of your material, specifically issues outside of the
hard sciences. For reference this is what you sent me:
"TOPICS for Funding in the year 1011..
I. biology versus mathematics, yin/yang. A. Truth vs deception.. the most efficient mathematical algorithm , is biologically the most vulnerable.
Easy to become prey. Therefore deception needed for protection.„ viruses, technology now available encryption , de-encryption , code theorym
wavelet analysis elliptical transformations, real random generators. Topics include Self deception, alice — bob, type communication protocols„
well established , codebreaking, evolution of signal and signal processing, butterfly camoflage, mimickry, misinformation. , computer programs
are all readable.can't deceive. No life.
2. cognitive neuro- science , pattern recognition, feedback, loops, optical illusions , emotion, definition , mirror neurons. , fmri,pet, tms. Music as
language, enzymes cutting away useless connections.
3. quantum computing, deception, entaglement, photosynthesis, now proven to work by wave effects. More than photons.
4. psychology, moral game, sex, display social prosthetic, feminism, anxiety, psscho pharmacology.
5. evolutionary strategy, game, niche specific to input. Niche filling, observer interaction in prisoner dilemma and ultimatum game,
6. Power, financial , intellectual physical, political, trust, reputation, different cultures, values, awe, transaction, history, friction of transactions and
intial value of culture, and genetics.
7.Human intelligence., ( limited resource, ) algorithm for smell. Limited resouce, transaction based gender differences, racial . origins.
8. genetics. Code bio fabrication, stem cells. bounded , junk,
9. energy, physics, astro biology, elements of life, replication advantage, energy level competition
10. mathematics, algebraic topology, category theory, li groups code theory, derivation of the power laws pareto and zipfs ( autonomous agents
only? )
II. finance and money, currency, history , antiquated .
EFTA00753978
12, alternative medcine,
placebo , chi belief, acupuncture, shamanism
13, cancer, signal proscessing, membrane computing,
14 pltilosiphy - senecas shortness of life
computing and artificial intelliegence„ education vs skill building.
15 search for new explorers, frontierman, in the sciences. Genius program in conjunction with other foundations
16 Edge master classes.
nsa codebreaking prop trading, foundation chronicales. Pardon, legal, phulantropic advisors, [- harper
The plan is to put this, on the jeffreyepstein.org site, as various categories, and the one line
descriptions. Then, there will be a submission form, limited to 250 words, they also have to
attach a small CV, affiliation, email, etc. A note will state that "due to the number of
submissions, we will not necessarily answer submissions." This will go over well with the
academic community, and you will get to see a lot of what is out there in consequence. We will
have the submissions sent to specific emails on topic, and you can choose to go through them
at your leisure.
In any case, please tell me if I am way off base in what you want to support. Again, this is not
at all complete, and feel free to change wording, add things, remove things, etc.
I know this is YOUR interests, but I would be happy to suggest some good areas to augment
these topics.... your call.
Cognitive Neuroscience:
Specific attention will be given to robust original research proposals in the following areas:
1. Mirror Neurons
2. Pattern Recognition
3. Musical Imagery
4. Music as Language
5. Neural Feedback Loops
6. Neural Correlates of Visual or other Sensory Illusions
7. Functional Magnetic Resonance Imaging
8. Positron Emission Tomography
9. Transcranial Magnetic Stimulation
Quantum Computing
Specific attention will be given to robust original research proposals in the following areas:
EFTA00753979
1. Quantum Information Theory
2. Massive Entanglement and Decoherence
3. Stability-Decoherence Problem
4. Quantum Parallelism
5. Quantum Computing Photosynthesis
Computers
Specific attention will be given to robust original research proposals in the following areas:
1. Membrane Computing as it applies to New Computational Models based on Cellular
Membranes or other Biological Systems.
2. Evolution of Signal and Signal Processing
3. Wavelet and Coding Theory as it Relates to Data and Computation
Astrobiology
Specific attention will be given to robust original research proposals in the following areas*:
1. New Forms of Synthetic Life
2. Origin of Life
3. Evidence of pre-biotic life
4. Non-carbon based forms of Life
5. Extremophiles
Please note that submissions about extraterrestrial UFOs, aliens, encounters, alien pregnancies,
crop circles, and other such nonsense, will not be entertained.
EFTA00753980
Artificial Intelligence
I am working on this one....
Molecular Biology
Specific attention will be given to robust original research proposals in the following areas:
1. Junk DNA
2. Biotechnology
3. Gene fabrication
4. Membrane Computing as it applies to New Computational Models based on Cellular
Membranes or other Biological Systems.
Theoretical Mathematics
Specific attention will be given to robust original research proposals in the following areas:
1. Algebraic topology
2. Category Theory, especially as it relates to computer programming language semantics
3. Lie Groups and Lie Algebra in Coding Theory
4. The Derivation or Origin of the behavior of Pareto, Zipf, and other Power Laws, and Why
Power Laws appear to apply broadly in the Hard and Social Sciences.
5. Prisoner's Dilemma and Iterated Prisoner's Dilemma, and its Relation to Real-Life
Examples.
6. Ultimatum Game and its Relation to Social Behavior
Encryption and De-Encryption Transformation
Specific attention will be given to robust original research proposals in the following areas:
EFTA00753981
1. Improved Random Number Generators
2. Application of Elliptical Curve Cryptography
3. Public-Key Cryptography
4. Code Breaking
5. Viruses
Medical
Specific attention will be given to robust original research proposals in the following areas:
1. Stem Cell Research
2. New Approaches in Cancer Research
3. Placebo Effect
4. Psychopharmocology
Scientific Pioneers and Geniuses
These individuals must display an exceptional creativity and inventiveness in his or her way of
work, offering a decidedly new and scientifically verifiable way of thinking, imagining, or
doing. Criteria may be imagining and building something entirely new; Advancing a well-
defined field in an unexpected way; or combining previously separate endeavors with
surprising and original verifiable results.
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
EFTA00753982
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments.
EFTA00753983
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Email Addresses
Document Details
| Filename | EFTA00753978.pdf |
| File Size | 329.8 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 8,456 characters |
| Indexed | 2026-02-12T13:59:11.092191 |