Back to Results

EFTA02394415.pdf

Source: DOJ_DS11  •  email/external  •  Size: 153.4 KB  •  OCR Confidence: 85.0%
View Original PDF

Extracted Text (OCR)

From: Peter Thiel Sent: Monday, April 11, 2016 6:45 PM To: Jeffrey E. Subject: Re: FW: Jeff -- much longer discussion, but not sure I even made my questions clear= (1). I don't question that there is a line of evolutionary thinking under w=ich deception is highly adaptive (and in this sense, it is quite compatibl= with the findings of science). I meant it more as a question of the soci=logy of science: If there is a lot of deception in science, then there ar= a lot of fake scientists trying to get government grant money and thereby=replace the real scientists. I think this is a pretty big phenomenon and =eriously underestimated. (2). The related question of whether the amount of deception goes up or dow= over time is not about evolutionary biology (since I assume our evolution=ry nature doesn't change that quickly), but more about politics and techno=ogy. Thus, if there are better ways of detecting deception, then there ma= be less taking place (the cost/benefit calculus just shifts). And perhap= conversely, if there is a stronger government, then perhaps it will be ab=e to get away with more deception (think fascist/communist propaganda, or =rwell's 1984) and will find it easier to pretend that it is solving proble=s than actually to solve problems. --Peter From: Peter Thiel Sent: Monday, April 11, 2016 10:31 AM Subject: FW: To.' ( ) From: Jeffrey E. [mailto:jeevacation@gmail.com) Sent: Monday, April 11, 2016 3:39 AM To: Peter Thiel alimisISISINIMNImp> Subject: briefly, trivers and I share the same belief in the major role of decept=on. a tool to protect or conquer free energy.. in essence if the =redator can read your algorithm, you are easy food . so deception is the=first line of defense as it usually the cheapest. if a prey knows its o=n algorithm it is open to interrogation. so nature hides it from the" =elf". Deceptive self confidence is also a winning game strategy. A=ts engage in the practise of mimetic. camouflage. , false direction. et=. To some extent, so do most viruses. ie since HIV clearly masquerades=itself as a unit of self. your question re is deception increasing, - =es as fast as methods of detection, note I assume you are awake please note EFTA_R1_01423784 EFTA02394415 The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com<mailto:jeevacation@gmai=.com>, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved <?xml version=.0" encoding=TF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version=.0"> <dict> <key>date-last-viewed</key> <integer>0</integer> <key>date-received</key> <integer>1460400291</integer> <key>flags</key> <integer>8590195717</integer> <key>gmail-label-ids</key> <array> <integer>18</integer> <integer>5</integer> </array> <key>remote-id</key> <string>603567</string> </dict> </plist> 2 EFTA_R1_01423785 EFTA02394416

Document Preview

Document Details

Filename EFTA02394415.pdf
File Size 153.4 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,409 characters
Indexed 2026-02-12T16:06:30.592179

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files