Click here to close now.


News Feed Item

The Ultimate Decoy: Scripps Research Institute Scientists Find Protein that Misdirects Immune System

LA JOLLA, Calif., Feb. 6, 2014 /PRNewswire-USNewswire/ -- A team led by scientists at The Scripps Research Institute (TSRI) has discovered an unusual bacterial protein that attaches to virtually any antibody and prevents it from binding to its target. Protein M, as it is called, probably helps some bacteria evade the immune response and establish long-term infections.

If follow-up studies confirm Protein M's ability to defeat the antibody response, it is likely to become a target of new antibacterial therapies. The protein's unique ability to bind generally to antibodies also should make it a valuable tool for research and drug development.

"What Protein M does to antibodies represents a very clever trick of evolution," said Richard A. Lerner, MD, Lita Annenberg Hazen Professor of Immunochemistry and Institute Professor at TSRI who led the research.

The new findings, which were achieved through collaboration among several laboratories at TSRI and elsewhere, are described in the February 7, 2014 issue of the journal Science.

Unexpected Discovery

The unexpected discovery originated from an effort to understand the origin of multiple myeloma, a B-cell carcinoma. Clonal B-cell proliferation, as well as lymphomas and myelomas, can result from chronic infections by organisms such as Escherichia coli (E. coli), Helicobacter pylori (H. pylori) and hepatitis C virus.

To better understand this process, the team investigated mycoplasma, a parasite that infects people chronically and is largely confined to the surface of cells. In a search for factors associated with long-term mycoplasma infection, Rajesh Grover, PhD, a senior staff scientist in the Lerner laboratory, tested samples of antibodies from multiple myeloma patients' blood against a variety of mycoplasma species. One of the proteins recognized by the antibodies was from Mycoplasma genitalium, which causes sexually transmitted infections in humans.

To the scientists' surprise, every antibody sample tested showed reactivity to this protein. But further tests made clear that these antibody reactions were not in response to mass infection with M. genitalium. Instead, the scientists found, the mysterious M. genitalium protein appeared to have evolved simply to bind to any antibody it encounters.

That presents a potentially major problem for the immune system. The antibody response is meant to combat invading pathogens with precisely targeted attacks, each selected from an enormous repertoire of hundreds of millions of distinct antibodies. In effect, the system is designed not to bind universally to any one target. If it did, then such a target could act as a universal decoy, potentially nullifying the entire antibody response.

The current research suggested that M. genitalium has evolved such a decoy. "It binds to every antibody generically—capable of hijacking the entire diversity of antibody repertoire—but at the same time it blocks the specific interaction between that antibody and its intended biomolecular target," said Grover.

'Protein M'

The team decided to call it "Protein M."

To better how understand Protein M works, Xueyong Zhu, PhD, a staff scientist in the laboratory of Ian Wilson, DPhil, Hansen Professor of Structural Biology and chair of the Department of Integrative Structural and Computational Biology at TSRI, and colleagues took a structural biology approach. Using X-ray crystallography and other techniques, including electron microscopy in the TSRI lab of Assistant Professor Andrew Ward, PhD, the team determined the protein's 3D atomic structure while the protein was bound to various human antibodies.

Compared to thousands of known structures in the Protein Data Bank, the worldwide structure database, Protein M appeared to be unique.

The data also revealed that Protein M binds to a small, unchanging—"conserved"—region at the outer tip of every antibody's antigen-binding arm. "It likely extends the other end of itself, like a tail, over the antibody's main antigen-binding region," Zhu said.

The team is now studying Protein M's function during M. genitalium infections. It seems likely that the oddball protein evolved to help M. genitalium cope with the immune response despite having one of the smallest bacterial genomes in nature. "It appears to represent an elegant evolutionary solution to the special problem that mycoplasma have in evading the adaptive immune system," said Grover. "The smallest parasitic bacteria on planet earth seems to have evolved the most sophisticated invading molecular machine."

Unusual—and Unusually Useful

If Protein M is confirmed as a universal decoy for antibodies, it will become a target for new drugs, which could make it easier to treat chronic, sometimes silent infections by M. genitalium and by any other microbes that have evolved a similar antibody-thwarting defense. Chronic infections can lead to a host of other problems, including inflammatory diseases and cancers.

In principle, Protein M also could be engineered to target specific groups of B cells—immune cells that produce antibodies and express them on their surfaces. Thus, Protein M could deliver cell-killing toxins to cancerous B cells but not healthy ones, for example to treat certain lymphomas.

In the era of antibody-based drugs, the most immediate use of Protein M is likely to be as a tool for grabbing antibodies in test tubes and cell cultures, useful for the preparation of highly pure antibody for research and drug manufacturing. Other generic antibody-binding proteins have been put to use in this way, but so far it appears that none does the job quite as well as Protein M. "It may be the most useful antibody purification device ever found," said Lerner, who is already in talks with industry to commercialize the protein.

In addition to Lerner, Wilson, Grover and Zhu, authors of the study, "A Structurally Unique Human Mycoplasma Protein that Generically Blocks Antigen-Antibody Union," were TSRI's Travis Nieusma, Teresa Jones, Isabel Boreo, Amanda S. MacLeod, Adam Mark, Sherry Niessen, Helen J. Kim, Leopold Kong, Vaughn V. Smider, Daniel R. Salomon and Andrew B. Ward; Nacyra Assad-Garcia, Keehwan Kwon and John I. Glass of the J Craig Venter Research Institute in Rockville, MD; Marta Chesi of the Mayo Clinic Arizona; Diane F. Jelinek and Robert A. Kyle of the Mayo Clinic College of Medicine in Rochester, MN; and Richard B. Pyles of the University of Texas Medical Branch, Galveston, TX.

The study was funded in part by the National Institutes of Health (RO1 AI042266, R21 AI098057, R01 AG020686, K08 AR063729, RR017573, U19 AI06360).

SOURCE The Scripps Research Institute

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Y...
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...