News Feed Item

The Ultimate Decoy: Scripps Research Institute Scientists Find Protein that Misdirects Immune System

LA JOLLA, Calif., Feb. 6, 2014 /PRNewswire-USNewswire/ -- A team led by scientists at The Scripps Research Institute (TSRI) has discovered an unusual bacterial protein that attaches to virtually any antibody and prevents it from binding to its target. Protein M, as it is called, probably helps some bacteria evade the immune response and establish long-term infections.

If follow-up studies confirm Protein M's ability to defeat the antibody response, it is likely to become a target of new antibacterial therapies. The protein's unique ability to bind generally to antibodies also should make it a valuable tool for research and drug development.

"What Protein M does to antibodies represents a very clever trick of evolution," said Richard A. Lerner, MD, Lita Annenberg Hazen Professor of Immunochemistry and Institute Professor at TSRI who led the research.

The new findings, which were achieved through collaboration among several laboratories at TSRI and elsewhere, are described in the February 7, 2014 issue of the journal Science.

Unexpected Discovery

The unexpected discovery originated from an effort to understand the origin of multiple myeloma, a B-cell carcinoma. Clonal B-cell proliferation, as well as lymphomas and myelomas, can result from chronic infections by organisms such as Escherichia coli (E. coli), Helicobacter pylori (H. pylori) and hepatitis C virus.

To better understand this process, the team investigated mycoplasma, a parasite that infects people chronically and is largely confined to the surface of cells. In a search for factors associated with long-term mycoplasma infection, Rajesh Grover, PhD, a senior staff scientist in the Lerner laboratory, tested samples of antibodies from multiple myeloma patients' blood against a variety of mycoplasma species. One of the proteins recognized by the antibodies was from Mycoplasma genitalium, which causes sexually transmitted infections in humans.

To the scientists' surprise, every antibody sample tested showed reactivity to this protein. But further tests made clear that these antibody reactions were not in response to mass infection with M. genitalium. Instead, the scientists found, the mysterious M. genitalium protein appeared to have evolved simply to bind to any antibody it encounters.

That presents a potentially major problem for the immune system. The antibody response is meant to combat invading pathogens with precisely targeted attacks, each selected from an enormous repertoire of hundreds of millions of distinct antibodies. In effect, the system is designed not to bind universally to any one target. If it did, then such a target could act as a universal decoy, potentially nullifying the entire antibody response.

The current research suggested that M. genitalium has evolved such a decoy. "It binds to every antibody generically—capable of hijacking the entire diversity of antibody repertoire—but at the same time it blocks the specific interaction between that antibody and its intended biomolecular target," said Grover.

'Protein M'

The team decided to call it "Protein M."

To better how understand Protein M works, Xueyong Zhu, PhD, a staff scientist in the laboratory of Ian Wilson, DPhil, Hansen Professor of Structural Biology and chair of the Department of Integrative Structural and Computational Biology at TSRI, and colleagues took a structural biology approach. Using X-ray crystallography and other techniques, including electron microscopy in the TSRI lab of Assistant Professor Andrew Ward, PhD, the team determined the protein's 3D atomic structure while the protein was bound to various human antibodies.

Compared to thousands of known structures in the Protein Data Bank, the worldwide structure database, Protein M appeared to be unique.

The data also revealed that Protein M binds to a small, unchanging—"conserved"—region at the outer tip of every antibody's antigen-binding arm. "It likely extends the other end of itself, like a tail, over the antibody's main antigen-binding region," Zhu said.

The team is now studying Protein M's function during M. genitalium infections. It seems likely that the oddball protein evolved to help M. genitalium cope with the immune response despite having one of the smallest bacterial genomes in nature. "It appears to represent an elegant evolutionary solution to the special problem that mycoplasma have in evading the adaptive immune system," said Grover. "The smallest parasitic bacteria on planet earth seems to have evolved the most sophisticated invading molecular machine."

Unusual—and Unusually Useful

If Protein M is confirmed as a universal decoy for antibodies, it will become a target for new drugs, which could make it easier to treat chronic, sometimes silent infections by M. genitalium and by any other microbes that have evolved a similar antibody-thwarting defense. Chronic infections can lead to a host of other problems, including inflammatory diseases and cancers.

In principle, Protein M also could be engineered to target specific groups of B cells—immune cells that produce antibodies and express them on their surfaces. Thus, Protein M could deliver cell-killing toxins to cancerous B cells but not healthy ones, for example to treat certain lymphomas.

In the era of antibody-based drugs, the most immediate use of Protein M is likely to be as a tool for grabbing antibodies in test tubes and cell cultures, useful for the preparation of highly pure antibody for research and drug manufacturing. Other generic antibody-binding proteins have been put to use in this way, but so far it appears that none does the job quite as well as Protein M. "It may be the most useful antibody purification device ever found," said Lerner, who is already in talks with industry to commercialize the protein.

In addition to Lerner, Wilson, Grover and Zhu, authors of the study, "A Structurally Unique Human Mycoplasma Protein that Generically Blocks Antigen-Antibody Union," were TSRI's Travis Nieusma, Teresa Jones, Isabel Boreo, Amanda S. MacLeod, Adam Mark, Sherry Niessen, Helen J. Kim, Leopold Kong, Vaughn V. Smider, Daniel R. Salomon and Andrew B. Ward; Nacyra Assad-Garcia, Keehwan Kwon and John I. Glass of the J Craig Venter Research Institute in Rockville, MD; Marta Chesi of the Mayo Clinic Arizona; Diane F. Jelinek and Robert A. Kyle of the Mayo Clinic College of Medicine in Rochester, MN; and Richard B. Pyles of the University of Texas Medical Branch, Galveston, TX.

The study was funded in part by the National Institutes of Health (RO1 AI042266, R21 AI098057, R01 AG020686, K08 AR063729, RR017573, U19 AI06360).

SOURCE The Scripps Research Institute

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...