PreprintPDF Available

A Roadmap to Cure Cancer: Combining CRISPR genome editing with cancer network editing

Authors:
  • Oxford Advanced Research Foundation
Preprints and early-stage research may not have been peer reviewed yet.

Abstract and Figures

Genome editing technology(1-6) combined with Werner’s network theory of cancer(7) opens up a new pathway to cure cancer not by surgery, radiation, drugs or immunotherapy but by genome editing of cancer networks. There exists a precise step-by-step protocol to cure cancer. The cancer cells genome is digitized. Then it is translated into the formal CAD-genome. The cancer networks in the CAD-genome are analyzed using cancer-CAD software to find all cancer networks. The cancer networks are then edited out and replaced, transforming the cancer network nodes into cancer-free network nodes. Next transformed cancer-free nodes are synthesized into natural molecular DNA nodes. Using CRISPR-like genome editing, the molecular cancer-free DNA nodes replace the molecular DNA cancer network nodes. The result is a cancer free genome. Using viral vectors it is possible to target the cancer cells in the whole organism. The cancer cells have been transformed into cancer free cells. The cancer is cured not with external methods such as surgery, radiation, drugs and immunotherapy, but with internal DNA editing of cancer networks within the cancer cells. Additionally, the cancer cure protocol is adaptable to immunotherapy. Combine cancer network editing in coordination with T-cell editing to force cancer cells to emit unique signals that their co- engineered T-cells can recognize. Under this method transformed cancer cells cooperate with co-adapted T-cells to insure the cancer cells’ self-destruction.
Content may be subject to copyright.
!"#$"%&'()*+,(((-.#/#01#"(*,2(3,*45((66667!89(:7(;7<<89:=6666(
©(8"%/(>#"&#"(3,*4+(?@@("%AB'C("#C#"D#E+( ( ( *(
(
A"Roadmap"to"Cure"Cancer:""
Combining"CRISPR"genome"editing"with"cancer"network"editing""
(
."+(8"%/(>#"&#"2(FG=(
7HIJ"E(?EDK&/#E(L#C#K"/B(FJM&EK'%J&(
B''$CNOOPPP+JK"I+J"A(
#"%/+P#"&#"QJK"I+J"A(
(
!"#$%&'$(
!"#$%"&"'()(#*&)"+,#$-$*./0123&+$%4(#"'&5(),&6"7#"789&#")5$7:&),"$7.&$;&+<#+"7/=3&$>"#9&?>&<&#"5&><),5<.&)$&
+?7"&+<#+"7&#$)&4.&9?7*"7.@&7<'(<)($#@&'7?*9&$7&(%%?#$),"7<>.&4?)&4.&*"#$%"&"'()(#*&$;&+<#+"7&#")5$7:9A&&B,"7"&
"C(9)9&<&>7"+(9"&9)">14.19)">&>7$)$+$-&)$&+?7"&+<#+"7A&B,"&+<#+"7&+"--9&*"#$%"&(9&'(*()(D"'A&&B,"#&()&(9&)7<#9-<)"'&(#)$&
),"&;$7%<-&EFG1*"#$%"A&B,"&+<#+"7&#")5$7:9&(#&),"&EFG1*"#$%"&<7"&<#<-.D"'&?9(#*&+<#+"71EFG&9$;)5<7"&)$&;(#'&<--&
+<#+"7&#")5$7:9A&B,"&+<#+"7&#")5$7:9&<7"&),"#&"'()"'&$?)&<#'&7">-<+"'@&)7<#9;$7%(#*&),"&+<#+"7&#")5$7:&#$'"9&(#)$&
+<#+"71;7""&#")5$7:&#$'"9A&&H"C)&)7<#9;$7%"'&+<#+"71;7""&#$'"9&<7"&9.#),"9(D"'&(#)$&#<)?7<-&%$-"+?-<7&GHF&#$'"9A&&
I9(#*&EJKLMJ1-(:"&*"#$%"&"'()(#*@&),"&%$-"+?-<7&+<#+"71;7""&GHF&#$'"9&7">-<+"&),"&%$-"+?-<7&GHF&+<#+"7&#")5$7:&
#$'"9A&B,"&7"9?-)&(9&<&+<#+"7&;7""&*"#$%"A&I9(#*&N(7<-&N"+)$79&()&(9&>$99(4-"&)$&)<7*")&),"&+<#+"7&+"--9&(#&),"&5,$-"&
$7*<#(9%A&&B,"&+<#+"7&+"--9&,<N"&4""#&)7<#9;$7%"'&(#)$&+<#+"7&;7""&+"--9A(B,"&+<#+"7&(9&+?7"'&#$)&5(),&"C)"7#<-&
%"),$'9&9?+,&<9&9?7*"7.@&7<'(<)($#@&'7?*9&<#'&(%%?#$),"7<>.@&4?)&5(),&(#)"7#<-&GHF&"'()(#*&$;&+<#+"7&#")5$7:9&
5(),(#&),"&+<#+"7&+"--9A&F''()($#<--.@&),"&+<#+"7&+?7"&>7$)$+$-&(9&<'<>)<4-"&)$&(%%?#$),"7<>.A&&E$%4(#"&+<#+"7&
#")5$7:&"'()(#*&(#&+$$7'(#<)($#&5(),&B1+"--&"'()(#*&)$&;$7+"&+<#+"7&+"--9&)$&"%()&?#(O?"&9(*#<-9&),<)&),"(7&+$1
"#*(#""7"'&B1+"--9&+<#&7"+$*#(D"A&I#'"7&),(9&%"),$'&)7<#9;$7%"'&+<#+"7&+"--9&+$$>"7<)"&5(),&+$1<'<>)"'&B1+"--9&)$&
(#9?7"&),"&+<#+"7&+"--98&9"-;1'"9)7?+)($#A&&
&
)*$%+,-'$.+*((
:B"##(1%JR'#/B&J@JA%/K@(K&E(/J0$M'K'%J&K@(KEDK&/#C(
'JA#'B#"(J$#&(K("#DJ@M'%J&K"S(&#P($K'BPKS(IJ"(/M"%&A(
/K&/#"+((:B#(I%"C'(KEDK&/#(%C(K(&#P(I"K0#PJ"T(IJ"(
M&E#"C'K&E%&A(/K&/#"2('B#(&#'PJ"T('B#J"S(JI(
/K&/#"/=3+(:B#(C#/J&E(%C(@%D#(A#&J0#(#E%'%&A(MC%&A(
;LU=!LR;KC('#/B&J@JA%#C/0123+(:B#('B%"E(%C(/K&/#"(
;J0$M'#"(?%E#E(.#C%A&(-/K&/#"R;?.5(CJI'PK"#('J(#E%'2(
E#C%A&2(0JE#@2(C%0M@K'#2(K&E(K&K@SV#(/K&/#"C(K&E('B#%"(
/K&/#"(&#'PJ"TC+((
?("JKE0K$(%C($"#C#&'#E('BK'(K/B%#D#C('B#(AJK@(JI(
/M"%&A(/K&/#"+(:J(%0$@#0#&'('B#("JKE0K$(K($"#/%C#(
C'#$R1SRC'#$(0#'KR$"J'J/J@('J(/M"#(/K&/#"C(%C(
E#C/"%1#E+((U'(M&%I%#C(E%A%'K@(/K&/#"R;?.(#E%'%&A(P%'B(
@%D#(;LU=!L(A#&J0#(#E%'%&A+(((
/&*'0%(1&%&,.23#((
:B#(&#'PJ"T('B#J"S(JI(/K&/#"(/BK@@#&A#C('B#(EJ0%&K&'(
A#&#R/#&'#"#E($K"KE%A0(JI(/K&/#"+((:B#(A#&#R/#&'#"#E(
$K"KE%A0(C'K'#C(/K&/#"(%C(M&/J&'"J@@#E(/#@@(
$"J@%I#"K'%J&-P5+((U&(/J&'"KC'2('B#(&#'PJ"T($K"KE%A0(JI(
/K&/#"(C'K'#C(/K&/#"(%C(K(B%AB@S(/J&'"J@@#E($"J/#CC2(J&#(
/J&'"J@@#E(1S(E#D#@J$0#&'K@(&#'PJ"TC2('B#(CK0#(
&#'PJ"TC('BK'(/J&'"J@(#01"SJ@JA%/K@(E#D#@J$0#&'+(
:B#(&#'PJ"T('B#J"S(JI(/K&/#"(%C(K(IM&EK0#&'K@(CB%I'(%&(
JM"(M&E#"C'K&E%&A(JI(BJP(/K&/#"(PJ"TC(K&E(BJP(%'(
/K&(1#(/J&'"J@@#E2(C'K"'#E2('"K&CIJ"0#E(K&E(C'J$$#E-=@&
Q10R5+((
4.3.$#(+5()33-*+$60%&17((
:B#(IJM&EK'%J&K@($"J1@#0(%C('BK'(%00M&J'B#"K$S(
"#C'C(J&('B#(A#&#R/#&'#"#E(D%#P(JI(/K&/#"+((
U00M&J'B#"K$S(%C(WMC'('BK'2(K('B#"K$S+((U'(%C(&J'(K(&#P(
$K"KE%A0(IJ"(M&E#"C'K&E%&A(/K&/#"+(U00M&J'B#"K$S(
KCCM0#C('BK'(/K&/#"(/#@@C($"#C#&'(M&%XM#($"J'#%&C(J&(
'B#%"(CM"IK/#+((?($"J0%C%&A(K$$"JK/B(%C('J(K$$@S(
;LU=!LRC'S@#(A#&J0#(#E%'%&A('J(:R/#@@C(CJ('BK'('B#S(
/K&("#/JA&%V#('B#C#(/K&/#"(CM"IK/#(0K"T#"C(K&E(
E#C'"JS('B#(/K&/#"(/#@@C+((YJP#D#"2(%00M&J'B#"K$S(
BKC(C%A&%I%/K&'(E%II%/M@'%#C(P%'B(C#D#"#2(#D#&(E#KE@S(
C%E#(#II#/'C(%I('B#(:R/#@@C(K''K/T(0J"#('BK&(WMC'(/K&/#"(
/#@@C+(?&E(%'(%C(M&PJ"TK1@#(%I('B#S(EJ&Z'(E#C'"JS(#D#"S(
/K&/#"(/#@@+(7'B#"P%C#('B#(/K&/#"(/J0#C(1K/T(IM@@(IJ"/#+((((
)*$0%*&8(90%#-#(0:$0%*&8('&*'0%($60%&1.0#(
U00M&J'B#"K$S(%C(K&("C)"7#<-&<>>7$<+,+(U'(EJ#C(&J'(
K''K/T('B#("JJ'(/KMC#(JI(/K&/#"+(U'C(K''K/TC("#@S(J&('B#(
#H'#"&K@(C%A&K@C(/K&/#"(/#@@C(K&E(&J"0K@(/#@@C($"#C#&'+(((
U&(/J&'"KC'('J(#H'#"&K@(K$$"JK/B#C(JI(%00M&J'B#"K$S2(
CM"A#"S2(/B#0J'B#"K$S2("KE%K'%J&('B#"K$S2('B#(
&#'PJ"T($K"KE%A0(JI(/K&/#"(%C(K&((#)"7#<-&<>>7$<+,+((
(
8"%/(>#"&#"(( (((((((((((((((((((?(LJKE0K$('J(;M"#(;K&/#"((
©(8"%/(>#"&#"(3,*4+(?@@("%AB'C("#C#"D#E+( ( ( 3(
(
:B#(/K&/#"(&#'PJ"T($K"KE%A0(A%D#C(K//#CC('J('B#(
%&'#"&K@(/J&'"J@(CSC'#0(JI(/K&/#"(/#@@C+((:B#($"J'J/J@('J(
/M"#(/K&/#"(E#C/"%1#E(B#"#(%C(K&(%&'#"&K@(K$$"JK/B+((U'(
E%"#/'@S('"K&CIJ"0C('B#(/K&/#"(&#'PJ"TC('BK'(E"%D#(
/K&/#"C+((
;0$<+%=#>(*+$(20*0#>('+*$%+8('&*'0%((
:B#("JKE0K$(K&E(0#'KR$"J'J/J@(K"#(IJM&E#E(J&(K(&#P(
$K"KE%A0(JI(BJP(#01"SJC(E#D#@J$(K&E(BJP(/K&/#"(
PJ"TC+([&E#"('B%C(&#P(PKS(JI(M&E#"C'K&E%&A(/K&/#"2(
E#D#@J$0#&'K@(&#'PJ"TC(K&E(&J'(A#&#C(/J&'"J@(/K&/#"(
/#@@C-=@&001025+((:B%C(&#P('B#J"#'%/K@(I"K0#PJ"T(J$#&C(
K(&#P($K'BPKS(IJ"(M&E#"C'K&E%&A(K&E(/M"%&A(/K&/#"+(
:BMC2(;LU=!L(A#&J0#(#E%'%&A('#/B&J@JA%#C(K&E(/K&/#"R
;?.(CJI'PK"#(K"#('#/B&J@JA%#C('BK'2(PB#&(/J01%&#E(
P%'B('B#(/K&/#"(&#'PJ"T($K"KE%A0-=52(0KT#(/M"%&A(
/K&/#"(K($"K/'%/K@($JCC%1%@%'S+(((>#(K"#(K'('B#(EJJ"C'#$(
JI(I%&E%&A(K(/M"#(IJ"(/K&/#"+((
(
(
(
?.2-%0(@(!('&*'0%(*0$<+%=(&*,($-3+%(.*(/&*'0%(/!A(
(
(
B60(2+&8(.#($+('-%0('&*'0%("7('+3".*.*2('&*'0%C
/!A(#+5$<&%0(0,.$.*2(<.$6(8.90(20*+30(0,.$.*2D((
:B"JMAB("K$%E("#/#&'(E#D#@J$0#&'C(%&(1%J'#/B&J@JAS(
'B%C(AJK@(BKC(1#/J0#($JCC%1@#+((
E+&,3&1($+('-%0('&*'0%N(((
U+ ;K&/#"R;?.(CJI'PK"#('J(K&K@SV#2(C#K"/B2(#E%'2(
'"K&CIJ"0(K&E(E#C%A&(/K&/#"(&#'PJ"TC((
UU+ F%&E('B#('"K&C@K'%J&("#@K'%J&(1#'P##&('B#(/K&/#"(
;?.(&#'PJ"T(/JE#(K&E('B#(&K'M"K@(/K&/#"(&#'PJ"T(
/JE#(((
UUU+ =S&'B#C%V#(0J@#/M@K"(&K'M"K@(.9?(&#'PJ"T(@%&TC(
I"J0(E%A%'K@(&K'M"K@(.9?(&#'PJ"T(@%&TC((
U)+ 8E%'('B#(A#&J0#C(JI(/K&/#"(/#@@C(1S(MC%&A(
;LU=!8LR@%T#(A#&J0#(#E%'%&A('#/B&J@JA%#C('J(
"#$@K/#('B#(/K&/#"JMC(&#'PJ"T(@%&TC(P%'B('B#(
CS&'B#C%V#E('"K&CIJ"0#E(&J&/K&/#"JMC(&K'M"K@(
&#'PJ"T(@%&TC((((
(
B60(E+&,3&1(.#($0'6*+8+2.'&887(50&#."80(
>%'B(J&@S(J&#(C'#$('J(AJ2(K@@('B#(J'B#"(C'#$C(%&('B#(
LJKE0K$('J(/M"#(/K&/#"(BKD#(1##&(K//J0$@%CB#E+(
:B#C#(%&/@ME#('B#(#H'"#0#@S('%0#2("#CJM"/#(K&E(/JC'(
%&'#&C%D#(1%J@JA%/K@(P#'(@K1(PJ"T+((:BMC2('B#("#/#&'@S(
E%C/JD#"#E(K&E("K$%E@S(E#D#@J$%&A(;LU=!LR@%T#(
'#/B&J@JA%#C(0KT#C(A#&J0#(#E%'%&A(%&(@%D#(/#@@C(K(
"#K@%'S-01S@&T@&2@&0=5+(<J"#JD#"2('B#(/K&/#"R;?.(
CJI'PK"#('J(#E%'(/K&/#"(&#'PJ"TC(%C(K@CJ(%&($@K/#+(
Y#&/#2('B#(0JC'(E%II%/M@'('#/B&J@JA%/K@(KEDK&/#C(
&##E#E('J(/M"#(/K&/#"(1S(#E%'%&A(A#&J0#C(BKD#(
K@"#KES(1##&(CBJP&('J(1#(K($"K/'%/K@("#K@%'S+((
(
!(30$&C1%+$+'+8($+('-%0('&*'0%("7(20*+30(0,.$.*2(
(
8"%/(>#"&#"(( (((((((((((((((((((?(LJKE0K$('J(;M"#(;K&/#"((
©(8"%/(>#"&#"(3,*4+(?@@("%AB'C("#C#"D#E+( ( ( \(
(
(:B#(IJ@@JP%&A(%C(K($"#/%C#(0#'BJE2(K(0#'KR$"J'J/J@2('J(
'"K&CIJ"0(/K&/#"(/#@@C(1S(/K&/#"(&#'PJ"T(#E%'%&A(-C##(
F%A35N(
0A Sequence&),"&%$-"+?-<7&*"#$%"&/%H!3&$;&),"&
+<#+"7&+"--&&
RA Translate&),"&'(*()<-&#<)?7<-&GHF&+$'"&/'H!3&
(#)$&'(*()<-&<7)(;(+(<-&GHF&+$'"&/'F!3&$;&),"&
E<#+"71EFG&9$;)5<7"&&
SA Analyze,1simulate,1search1and1edit&),"&
<7)(;(+(<-&*"#$%"&#")5$7:&&
<A Find&),"&+<#+"7&+<?9(#*&#")5$7:&5(),&
()9&+<#+"7&-(#:9&/'F>3&
4A Edit&),"&+<#+"7&#")5$7:&-(#:9&)$&
)7<#9;$7%&),"&+<#+"7&#")5$7:&(#&'F!&
(#)$&<&+<#+"7&;7""&#")5$7:&/'F!U3&&
+A Link1Switching:1J">-<+"&#")5$7:&
+<#+"7&-(#:1#$'"9&/>F>3&5(),&
#$#+<#+"7$?9&-(#:9&/'F>U3&
'A Result&),"&<7)(;(+(<-&+<#+"7$?9&*"#$%"&
'F!&,<9&4""#&)7<#9;$7%"'&(#)$&<&
#$#+<#+"7$?9&*"#$%"&'F!U&&
VA Reverse1translate&),"&)7<#9;$7%"'&-(#:1#$'"9&
'F>U&57())"#&(#&<7)(;(+(<-&GHF&+$'"&(#)$&#<)?7<-&
'(*()<-&GHF&+$'"&'H>U&&
TA Synthesize&),"&%$'(;("'&#")5$7:&-(#:&'H>U&
(#)$&%$-"+?-<7&GHF&/%H>U3&
2A Use1CRISPR&)"+,#$-$*.&)$&edit&),"&%$-"+?-<7&
cancerous1genomes1%H!&$;&),"&+<#+"7&+"--9&
<#'&replace&),"&cancer1links1%H>&with&),"&
%$'(;("'&noncancerous1links&%H>U&&
=A ResultW&&Cancer1free1cells&5(),&+<#+"7&;7""&
*"#$%"9&%H!U&(#&<--&"'()"'&;$7%"7&+<#+"7&+"--9A&&&
PA B,"&cancer1is1cured&#$)&5(),&"C)"7#<-&%"),$'9&
9?+,&<9&9?7*"7.@&7<'(<)($#@&'7?*9&<#'&
(%%?#$),"7<>.@&4?)&5(),&(#)"7#<-&GHF&"'()(#*&
$;&+<#+"7&#")5$7:9&(#&+<#+"7&+"--9A&&&
(
(
(
?.2-%0(F(!(30$&C1%+$+'+8(5+%('-%.*2('&*'0%("7(0,.$.*2('&*'0%(*0$<+%=#(
(
U&(#$01(@('B#(0J@#/M@K"(&K'M"K@(A#&J0#(-09]5(%C(
C#XM#&/#E('J(S%#@E('B#(/J""#C$J&E%&A(E%A%'K@(&K'M"K@(
A#&J0#(-E9]5+((U&(#$01(F('B#(E%A%'K@(A#&J0#(%C('B#&(
'"K&C@K'#E(%&'J(K(E%A%'K@(K"'%I%/%K@(A#&J0#(-E?]5(MC%&A(
K&(K1C'"K/'(;?.(&#'PJ"T("#$"#C#&'K'%J&(#&/JE#E(%&(
K"'%I%/%K@(.9?(/JE#+((U&(#$01(G('B#(A@J1K@(&#'PJ"T(%C(
K&K@SV#E(MC%&A(K(A"K$B%/K@(%&'#"IK/#('JA#'B#"(P%'B(
K@AJ"%'B0C('BK'(C#K"/B('B#(E#D#@J$0#&'K@(&#'PJ"T(%&(
(
8"%/(>#"&#"(( (((((((((((((((((((?(LJKE0K$('J(;M"#(;K&/#"((
©(8"%/(>#"&#"(3,*4+(?@@("%AB'C("#C#"D#E+( ( ( ^(
(
'B#(K"'%I%/%K@(A#&J0#(E?]('J(I%&E(K@@(#H%C'%&A(/K&/#"(
&#'PJ"TC+((?&S(&#'PJ"T(%C(0KE#(JI(@%&TC(1#'P##&(
&JE#C+(7&/#(K(/K&/#"JMC(@%&T(-E?$5(%&(K(/K&/#"(
&#'PJ"T(%C(IJM&E2(%'(%C(#E%'#E(K&E('"K&CIJ"0#E(%&'J(K(
&J&/K&/#"JMC(@%&T(-E?$65+((:B%C("#D#"C#C('B#(/K&/#"R
/KMC%&A(&#'PJ"T(%&'J(K(&J&/K&/#"JMC(&#'PJ"T+(((U&(
#$01(H('B#(E%A%'K@(#&/JE%&A(JI('B#(&JP(&J&/K&/#"JMC(
@%&TCR&JE#C(E?$6(JI('B#('"K&CIJ"0#E(&J&/K&/#"JMC(
&#'PJ"T(K"#("#D#"C#R'"K&C@K'#E(I"J0(E%A%'K@(K"'%I%/%K@(
&#'PJ"T(/JE#(%&'J('B#(E%A%'K@(&K'M"K@(/JE#(E9$6+((U&(
#$01(I('B%C(E%A%'K@(&K'M"K@(.9?(#&/JE%&A(%C(CS&'B#C%V#E(
%&'J(0J@#/M@K"(&K'M"K@(.9?(-09$65+((>#(&JP(BKD#('B#(
CS&'B#C%V#E(0J@#/M@K"(&K'M"K@(.9?(0J@#/M@#C('BK'(
#&/JE#('B#(/K&/#"(I"##(&#'PJ"T(@%&TR&JE#C+((J$01(K2(
'B#(;LU=!L(CSC'#0(%C(MC#E('J(#E%'('B#(/K&/#"JMC(
0J@#/M@K"(&K'M"K@(A#&J0#(09]+((U&('B%C(#E%'(
$"J/#EM"#('B#(/K&/#"JMC(09$(@%&TR&JE#C(K"#("#$@K/#E(
1S('B#%"(/J""#C$J&E%&A(&J&/K&/#"JMC(/JM&'#"$K"'C(
09$6+((:B%C($"J/#EM"#('"K&CIJ"0C('B#(/K&/#"JMC(
&#'PJ"T(%&('B#(0J@#/M@K"(&K'M"K@(A#&J0#(09](%&'J(K(
/K&/#"(I"##(&#'PJ"T+((((
UI('B#(0#'KR$"J'J/J@(%C("#$#K'#E@S(K$$@%#E('J("#$@K/#(K@@(
/K&/#"JMC(&#'PJ"TC(P%'B(&J&/K&/#"JMC(J&#C2('B#&('B#(
/K&/#"JMC(A#&J0#(09]((%C('"K&CIJ"0#E(%&'J(K(/K&/#"(
I"##(A#&J0#(-09]65+((:B#("#CM@'(%C('BK'('B#(#E%'#E(
/K&/#"(/#@@C(K"#(&J(@J&A#"(/K&/#"JMC+(((
7&/#(K(8."%&%7(+5(*&$-%&8('&*'0%(*0$<+%=#(BKC(1##&(
IJ"0#E('B#(K1JD#(%&E%"#/'(C#K"/B(JI(/K&/#"(&#'PJ"TC(
1S(PKS(JI(K"'%I%/%K@(.9?(/K&(1#(CT%$$#E+(:B#&(P#(/K&(
E%"#/'@S(C#K"/B(K&E(#E%'('B#(&K'M"K@(/K&/#"(&#'PJ"T(
MC%&A('B#(K@"#KES(#H%C'%&A(;LU=!LR'S$#666(
'#/B&J@JAS-01S@&T@&2@&0=5+(:B#(#E%'%&A(/K&(#%'B#"(E#@#'#(
'B#(/K&/#"(&#'PJ"T(J"("#D#"C#('B#(E#@#'#"%JMC(
0M'K'%J&('BK'("#CM@'#E(%&('B#(/K&/#"(&#'PJ"T+((
/&*'0%C/!A(J+5$<&%0((
;J0$M'#"(?%E#E(.#C%A&(-;?.5(CJI'PK"#(/K@@#E(;K&/#"R
;?.('BK'(#&K1@#C(MC('J(K&K@SV#2(E#C%A&(/K&/#"(
&#'PJ"TC(K&E(0JE#@2(C%0M@K'#('M0J"(E#D#@J$0#&'(J&(
'B#(/J0$M'#"+(:BMC2(;K&/#"R;?.(/K&(1#(MC#E('J(E#C%A&(
K&S(/K&/#"(&#'PJ"T(K&E(#&/JE#(%'(%&(.9?+(:B#(/K&/#"C(
/K&('B#&(1#(C%0M@K'#E(P%'B%&(D%"'MK@(C$K/#R'%0#(-/#@@(
$BSC%/C(%&'#A"K'#E(P%'B("#AM@K'J"S(&#'PJ"TC5(1S(
A"JP%&A('B#0(C'K"'%&A(I"J0(K(C%&A@#(/K&/#"(/#@@+(((
;K&/#"R;?.(%C($K"'(JI(K(@K"A#"(/J0$M'K'%J&K@(
I"K0#PJ"T('BK'(KM'J0K'%/K@@S(A#&#"K'#C('B#(K"'%I%/%K@(
E%A%'K@(.9?2(%&("#K@('%0#2(KC('B#(/K&/#"(&#'PJ"T(%C(
1#%&A(#E%'#E(J"(E#C%A&#E+(:B#(;?.(#&/JE%&A(JI('B#(
.9?(%C(K"'%I%/%K@(%&('B#(C#&C#('BK'(%'(%C(&J'('B#(CK0#(
#&/JE%&A(KC('B#(&K'M"K@(#&/JE%&A(JI(/K&/#"(&#'PJ"TC(
%&(&K'M"K@(.9?(%&(@%D#(/K&/#"(/#@@C+((:B#(I%&K@(C'#$(
&##E#E('J(/J0$@#'#('B#(C'#$C(%&('B#("JKE0K$(%C('J(
E#/%$B#"('B#(B%AB#"(@#D#@2(&K'M"K@(/K&/#"(&#'PJ"T(/JE#(
%&(A#&J0#C+(((
History of genome codes
Watson and Crick decoded the alphabet of DNA(18, 19),
Nirenberg and Khorana deciphered the genetic triplet
code for proteins(20, 21), still others like Davidson and
Carroll decoded protein based, gene regulatory networks
(GRNs)(22-25), Werner showed GRNs cannot generate
complex embryological development and hence are not
the only source of control of cancer(16, 26). The next
step is to decode the higher-level network control code of
cancer and, more generally, of multicellular life residing
in the so-called non-coding DNA in genomes(9, 13, 14,
16).
;0$<+%=(#0&%'6(&*,(0,.$(%018&'0(,%-2#L(Y#&/#(),"&
;?)?7"&$;&+<#+"7&'(<*#$9(9&<#'&),"7<>.&5(--&4"&<&>7"+(9"&
#")5$7:&4<9"'&9"<7+,&<#'&"'()(#*&>7$+"99(K&K@JAJMC('J(
'BJC#(K@"#KES(1#%&A(E#D#@J$#E(K&E(MC#E('JEKS(%&('B#(
0JC'(KEDK&/#E(K&'%D%"K@(K&E(K&'%1%J'%/(;LU=!L(
"#C#K"/B-2@&R=1SS5+(?&E(WMC'(@%T#('B#(K&'%1%J'%/(;LU=!L(
K$$"JK/B('B%C(&#P(&#'PJ"T(9"<7+,&<#'&"'()&<>>7$<+,(
'J(/K&/#"(E%KA&JC%C(K&E('B#"K$S(%C(K(E%C"M$'%D#(
"#DJ@M'%J&K"S('#/B&J@JAS+((
(
A08.90%7L((:B#(K1JD#($"J'J/J@(/BK&A#C(K(C%&A@#(/K&/#"(
/#@@(%&'J(K(&J&R/K&/#"JMC(/#@@+(:J(/M"#(K($K'%#&'(JI(K(
/K&/#"(/J&'"J@@#E(1S(K(/K&/#"(&#'PJ"T2(#K/B(/#@@(JI('B#(
$K'%#&'ZC(1JES(0MC'(1#(#E%'#E+(Y#&/#2(/J0#C('B#(
$"J1@#0(JI(E#@%D#"S+((L#/#&'(KEDK&/#C($#"0%'(%&(D%DJ(
P%E#(A#&J0#(#E%'%&A(JI(#&'%"#(J"AK&%C0C(MC%&A(D%"K@(
D#/'J"C(/J&'K%&%&A(;LU=!L(#E%'%&A(/JE#+((U'($J'#&'%K@@S(
'"K&CIJ"0C(K@@(/#@@C(JI(K(0M@'%/#@@M@K"(CSC'#0('BK'(
/J&'K%&('B#(;LU=!L('K"A#'(C#XM#&/#+((>B%@#('B#('K"A#'C(
BKD#(1##&(A#&#C2('B#(0#'BJE(/K&(1#(KEK$'#E('J('K"A#'(
/K&/#"(&#'PJ"TC(KC(P#@@+(:B%C(PJM@E(JII#"(J&#(CJ@M'%J&(
'J('B#(E#@%D#"S($"J1@#0666/%'#666+((
(
!(1%+$+'+8(5+%('++10%&$.90(67"%.,(*0$<+%=C
.33-*+$60%&17((
:B#(/"%'%XM#(JI(%00M&J'B#"K$S(A%D#&(K1JD#(0KS(1#(
/%"/M0D#&'#E(1S('B#(IJ@@JP%&A(0#'BJEN(7&#(/K&(
%&'#A"K'#(/K&/#"(&#'PJ"T(#E%'%&A(P%'B(:R/#@@(#E%'%&A+((
:B#(/K&/#"R/M"#($"J'J/J@(-C##(1#@JP5(/K&(1#(KEK$'#E(
CM/B('BK'(%&C'#KE(JI('"K&CIJ"0%&A('B#(/K&/#"('B#(
&#'PJ"T2((K&(A#&#(K/'%DK'%J&(@%&T(%C(%&C#"'#E(%&'J('B#(
/K&/#"(&#'PJ"T(CM/B('BK'(%'($"JEM/#C(K(M&%XM#(
#H'#"&K@(C%A&K@('J(:R/#@@C('J(%&E%/K'#('B#(/#@@(%C(K(/K&/#"(
/#@@+((U&(/JJ$#"K'%J&(:R/#@@C(/K&(1#(#E%'#E('J(J&@S(K''K/T(
'B#(/#@@C('BK'(#0%'('B#(M&%XM#(/K&/#"(C%A&K@+(((
(
8"%/(>#"&#"(( (((((((((((((((((((?(LJKE0K$('J(;M"#(;K&/#"((
©(8"%/(>#"&#"(3,*4+(?@@("%AB'C("#C#"D#E+( ( ( _(
(
;J01%&%&A(1J'B(#@%0%&K'%D#(/K&/#"R&#'PJ"T(#E%'%&A(
P%'B(/JJ$#"K'%D#(&#'PJ"TR%00M&J'B#"K$S(PJM@E(
K@@JP(E%"#/'#E(:R/#@@(E#C'"M/'%J&(JI(K@@(/#@@C(0%CC#E(1S(
'B#(#@%0%&K'%D#(/K&/#"(&#'PJ"T(#E%'%&A+((FM"'B#"0J"#2(
'B#"#(0KS(1#(/K&/#"(&#'PJ"TC('BK'(K"#(E%II%/M@'('J(
#@%0%&K'#(EM#('J('B#%"(/J0$@#H%'S+(U&(CM/B(/KC#C(
/JJ$#"K'%D#(&#'PJ"TR%00M&J'B#"K$S(0%AB'(1#(K&(
#KC%#"(K$$"JK/B(C%&/#(%'(%&DJ@D#C(%&/@ME%&A(K(M&%XM#(:R
/#@@("#/JA&%VK1@#(C%A&K@(%&'J('B#(/K&/#"(&#'PJ"T(@JJ$(
"K'B#"('BK&(PBK'(0KS(%&DJ@D#(0M@'%$@#(&#'PJ"T(#E%'C+((
(
E050%0*'0#((
(
*+(`+(=+(aJC@#S&")&<-A2(;LU=!L(A#"0@%&#(#&A%&##"%&ARR
'B#(/J00M&%'S(C$#KTC+(H<)&X($)"+,#$-(GG2(^4bR^bc(
-3,*_5+(
3+(.+(aM"C'#%&&")&<-A2(9#P(;LU=!LR;KC(CSC'#0C(I"J0(
M&/M@'%DK'#E(0%/"J1#C+(H<)?7"2((-3,*c5+(
\+(<+(G+(YJ/BC'"KCC#"2(.+(>+(:KS@J"2(d+(8+(`J"&I#@E2(8+(
9JAK@#C2(d+(?+(.JME&K2(.9?(:K"A#'%&A(1S(K(<%&%0K@(
;LU=!L(L9?R]M%E#E(;KC/KE#+(Y$-&E"--(KG2(b^,Rb_*(
-3,*c5+(
^+(F+(d%K&A&")&<-A2(='"M/'M"#C(JI(K(;LU=!LR;KCe(LR@JJ$(
/J0$@#H($"%0#E(IJ"(.9?(/@#KDKA#+(L+("#+"(GI@2(
bc4Rb4*(-3,*c5+(
_+(=+(Y+(='#"&1#"A2(d+(?+(.JME&K2(8H$K&E%&A('B#(
a%J@JA%C'fC(:JJ@T%'(P%'B(;LU=!LR;KCe+(Y$-&E"--(IM2(
_cbR_4^(-3,*_5+(
c+()+(=%&AB2(.+(a"KEE%/T2(!+(`+(.BK"2(8H$@J"%&A('B#(
$J'#&'%K@(JI(A#&J0#(#E%'%&A(;LU=!LR;KCe(
'#/B&J@JAS+(!"#"(INN2(*R*b(-3,*45+(
4+(8+(>#"&#"2(;K&/#"(9#'PJ"TCN(?(A#&#"K@('B#J"#'%/K@(
K&E(/J0$M'K'%J&K@(I"K0#PJ"T(IJ"(M&E#"C'K&E%&A(
/K&/#"+(<7Z(NW000[ATP2TN0&\O14($AYH](
6$$1LOO&%:.9D+%2O&"#O@@@PDIMKI2((-3,**15+(
b+(.+(YK&KBK&2(L+(?+(>#%&1#"A2(:B#(BK@@0K"TC(JI(
/K&/#"+(E"--(@PP2(_4R4,(-3,,,5+(
e+(8+(>#"&#"2(K#&9(-(+$(0M@'%/#@@M@K"(CSC'#0C(1%J@JAS(
K&E(0%&%0K@(A#&J0#C+(GGB(M2(**3*R**34(-3,,\5+(
*,+(8+(>#"&#"2(7&(!"JA"K0C(K&E(]#&J0#C+(
<7Z(NW000[ATR2TN0&\O14($A^B](
6$$1LOO&%:.9D+%2O&"#O@@@PDIFKI2((-3,**K5+(
**+(8+(>#"&#"2(='#0(;#@@(9#'PJ"TC+(<7Z(NW02[=A[VT[R&
\O14($A^B]&6$$1LOO&%:.9D+%2O&"#O@KPQDPHIPF(
-3,*c5+(
*3+(8+(>#"&#"2(='#0(;#@@CN(:B#(]JJE2('B#(aKE(K&E('B#(
[A@S+(<7Z(NW02[PA[[QS[N0&\O14($AB^]&
6$$1LOO&%:.9D+%2O&"#O@KPMDPPNGP(-3,*c5+(
*\+(8+(>#"&#"2(]#&J0#(C#0K&'%/C2(%&(C%@%/J(
0M@'%/#@@M@K"(CSC'#0C(K&E('B#(/#&'"K@(EJA0K+(_`XL&
a"))"79(IQN2(*44eR*4b3(-3,,_5+(
*^+(8+(>#"&#"2(YJP(/#&'"K@(%C('B#(A#&J0#g(L+("#+"(G@Q2(
4_\R4_^(-3,,45+(
*_+(8+(>#"&#"2(8DJ@M'%J&K"S(#01"SJC+(H<)?7"A(HKP2(\_R
\_(-3,,e5+(
*c+(8+(>#"&#"2(;J01%&K'J"%K@(G%0%'C(JI(:"K&C/"%$'%J&(
FK/'J"C(K&E(]#&#(L#AM@K'J"S(9#'PJ"TC(%&(
.#D#@J$0#&'(K&E(8DJ@M'%J&+&<7Z(NW0T[PA[STS0&\O1
4($AYH]&6$$1LOO&%:.9D+%2O&"#O@IPMDPGIG@2((
-3,*_5+(
*4+(`+(`K&&K&&")&<-A2(7&#(C'#$(#&A%&##"%&A(JI('B#(C0K@@R
CM1M&%'("%1JCJ0K@(L9?(MC%&A(;LU=!LO;KCe+(L+(&J">(
K2(\,4*^(-3,*c5+(
*b+(d+(.+(>K'CJ&2(F+(Y+(;"%/T2(:B#(C'"M/'M"#(JI(.9?+(E$-'&
L>7(#*&b<74&L.%>&c?<#)&X($-(@M2(*3\R*\*(-*e_\5+(
*e+(d+(.+(>K'CJ&2(F+(Y+(;"%/T2(<J@#/M@K"(C'"M/'M"#(JI(
&M/@#%/(K/%ECh(K(C'"M/'M"#(IJ"(E#JHS"%1JC#(&M/@#%/(
K/%E+(H<)?7"(@Q@2(4\4R4\b(-*e_\5+(
3,+(<+(>+(9%"#&1#"A2(d+(Y+(<K''BK#%2(:B#(E#$#&E#&/#(JI(
/#@@RI"##($"J'#%&(CS&'B#C%C(%&(8+(/J@%(M$J&(&K'M"K@@S(
J//M""%&A(J"(CS&'B#'%/($J@S"%1J&M/@#J'%E#C+(
M7$+""'(#*9&$;&),"&H<)($#<-&F+<'"%.&$;&L+("#+"9(HQ2(
*_bbR*c,3(-*ec*5+(
3*+(Y+(]+(`BJ"K&K2(:J'K@(CS&'B#C%C(JI(K(A#&#+(L+("#+"(
FPG2(c*^Rc3_(-*e4e5+(
33+(L+(d+(a"%''#&2(8+(Y+(.KD%ECJ&2(L#$#'%'%D#(K&E(&J&R
"#$#'%'%D#(.9?(C#XM#&/#C(K&E(K(C$#/M@K'%J&(J&('B#(
J"%A%&C(JI(#DJ@M'%J&K"S(&JD#@'S+(c&J"N&X($-(HK2(***R
*\b(-*e4*5+(
3\+(8+(Y+(.KD%ECJ&&")&<-A2(?(A#&J0%/("#AM@K'J"S(&#'PJ"T(
IJ"(E#D#@J$0#&'+(L+("#+"(FNI2(*cceR*c4b(-3,,35+(
3^+(8+(Y+(.KD%ECJ&2(B,"&J"*?-<)$7.&!"#$%"W&!"#"&
J"*?-<)$7.&H")5$7:9&K#&G"N"-$>%"#)&F#'&`N$-?)($#+((
-?/KE#0%/(!"#CC2(3,,c5+(
3_+(=+(a+(;K""J@@2(8DJ@M'%J&(K'('PJ(@#D#@CN(J&(A#&#C(K&E(
IJ"0+(Ma$L&X($-(G2(#3^_(-3,,_5+(
3c+(8+(>#"&#"2(>BK'(:"K&C/"%$'%J&(FK/'J"C(;K&f'(.JN(
7&('B#(;J01%&K'J"%K@(G%0%'C(JI(]#&#(L#AM@K'J"S(
9#'PJ"TC+&<7Z(NW0S0RATT2T&\O14($AYH](
6$$1LOO&%:.9D+%2O&"#O@G@FDIIKI2((-3,*\5+(
34+(;+(G+(a#%C#@2(?+(?+(]J0KK2(L+(aK""K&AJM2(?(;LU=!L(
E#C%A&(IJ"(&#H'RA#&#"K'%J&(K&'%0%/"J1%K@C+(!"#$%"&
X($-(@I2(_*c(-3,*^5+(
3b+(.+(a%TK"E&")&<-A2(8H$@J%'%&A(;LU=!LR;KC(&M/@#KC#C('J(
$"JEM/#(C#XM#&/#RC$#/%I%/(K&'%0%/"J1%K@C+(H<)&
X($)"+,#$-(GF2(**^cR**_,(-3,*^5+(
3e+(L+(d+(;%'J"%T2(<+(<%0##2(:+(`+(GM2(=#XM#&/#RC$#/%I%/(
K&'%0%/"J1%K@C(MC%&A(#II%/%#&'@S(E#@%D#"#E(L9?R
AM%E#E(&M/@#KC#C+(H<)&X($)"+,#$-(GF2(**^*R**^_(
-3,*^5+(
\,+(?+(?+(]J0KK&")&<-A2(!"JA"K00K1@#("#0JDK@(JI(
1K/'#"%K@(C'"K%&C(1S(MC#(JI(A#&J0#R'K"A#'%&A(
;LU=!LR;KC(CSC'#0C+(YX($(I2(#,,e3bR,,e*\(
-3,*^5+(
\*+(<+(G+(GMJ2(L+(:+(G##&KS2(;+(G+(a#%C#@2(;M""#&'(K&E(
IM'M"#($"JC$#/'C(IJ"(;LU=!LR1KC#E('JJ@C(%&(
1K/'#"%K+(X($)"+,#$-&X($"#*(@@G2(e\,Re^\(-3,*c5+(
\3+(<+(<%0##2(L+(d+(;%'J"%T2(:+(`+(GM2(<%/"J1%J0#(
'B#"K$#M'%/C(R(?EDK&/#C(K&E(/BK@@#&A#C+(F'N&G7?*&
G"-(N&J"N(@PI2(^^R_^(-3,*c5+(
\\+(?+(?+(!"%/#2(:+(L+(=K0$CJ&2(Y+(`+(LK'&#"2(?+(]"KTJM%2(
.+(=+(>#%CC2(;KCeR0#E%K'#E('K"A#'%&A(JI(D%"K@(L9?(%&(
#MTK"SJ'%/(/#@@C+(M7$+&H<)-&F+<'&L+(&I&L&F(@@F2(
c*c^Rc*ce(-3,*_5+(
(
(
((
... In short it allows a person with less than a high school education to edit genomes of any animal or plant. Indeed, high school students are now using this technology to do experiments that previously research scientists could only dream about [6,15,4,8] 2 CRISPR for curing cancer and for creating a cancer bomb My research has focused on the wonderful potential of applying CRISPR-like genome network editing to cure cancer [23,22,25,26,24]. It is based on the new cancer network paradigm [20] which goes to the core of how cancer cells are controlled. ...
Preprint
Full-text available
While CRISPR-Cas genome editing technology has been heralded as a great advancement for science, human health, bioengineering and medicine, there is a potential dark side of CRISPR genome editing that may be a greater danger to humanity than nuclear weapons. We present some of the more obvious potential military and bioterrorism applications of CRISPR and related genome editing technology. CRISPR weapons have significant advantages over conventional nuclear weapons. The balance of power based on mutual assured destruction cannot be maintained once CRISPR weapons enter the international arena. Disturbingly, because of the easy entrance to the technology, it opens the door for small organizations and countries to enter the international arms arena. The simplicity and ease of development of such weapons makes it essential that CRISPR genome editing technology be carefully applied and regulated.
... Genome editing technology (1)(2)(3)(4)(5)(6) combined with Werner's network theory of cancer (7) opens up a new pathway to cure cancer by induced cancer cell suicide. We adapt the Cancer Cure Protocol (8)(9)(10)(11)(12)(13) to design a different protocol that stops cancer by inserting into or modifying links in the cancer network that activate the cell death (apoptosis) pathway. The edit to stop cancer growth depends on the architecture of the cancer network. ...
Preprint
Full-text available
Genome editing technology(1-6) combined with Werner's network theory of cancer(7) opens up a new pathway to cure cancer by induced cancer cell suicide. We adapt the Cancer Cure Protocol(8-13) to design a different protocol that stops cancer by inserting into or modifying links in the cancer network that activate the cell death (apoptosis) pathway. The edit to stop cancer growth depends on the architecture of the cancer network. Different network link transformations have different effects depending on the cancer network link architecture. The ability to visualize the cancer network and simulate the dynamic effects of network edits in virtual space-time helps tremendously in understanding how the cancer cell is controlled and how to stop its proliferation. In cancer-CAD software, aspects of these edits can be automated with algorithms that suggest therapeutic network link edits automatically. The user can choose between various possible network edits by observing their effects on tumor growth in the simulation. Once an optimal network transformation is found, the edits can be synthesized and implemented in live cancer cells using CRISPR or analogous molecular genome editing technologies.
... Any cancer can be halted by changing the cancer network back into a healthy non-cancerous one [39] 4 . Thus network transformations cause cancer and can also stop cancer. ...
Preprint
Full-text available
A synthetic living cell has been created with a designed genome and booted up to start di- viding. Scientists have designed a genome on the computer then generated the molecular DNA and inserted it into a cell replacing its own previous genome. They then jump-started it with a spark and it began to divide. The technology uses a bacterial genome and a bac- terial cell. Bacteria are single celled organisms. We, however, are multicellular creatures. A method is presented to design and synthesize multicellular life. Through rapid recent developments in biotechnology this method has become a pragmatically and technologi- cally feasible. A step-by-step roadmap is presented to create synthetic multicellular life. Except for one, all the steps in the roadmap have been technologically realized. The steps that require wet-lab work been been achieved. The one remaining step requires intense software and hardware research. Application of the technology: Network designed het- erosis (hybrid vigor) for food production. Tissue regeneration using designed stem cell networks. A meta-protocol is presented for curing cancer by editing cancer networks us- ing multicellular-CAD software in combination with CRISPR-like genome editing. This opens a path to cure cancer without surgery, drugs or radiation by digital and molec- ular genome editing using multicellular-CAD software together with CRISPR-Cas style genome editing. Unfortunately, ignorant use of CRISPR could also create cancers. New regulations of are called for
Preprint
Full-text available
All diploid sexual organisms have two distinct haploid genomes, one from each parent. There is the male derived haploid genome and the female derived haploid genome. Each genome contains a distinct developmental control network that directs the development of the embryo to an adult. Run separately, independent of the influence of the other network, the each haploid genome produces a morphologically different organism. The interrelationship of the male and female haploid genome networks is governed by an interaction protocol that determines which parental network is in control in any given cell at any given point in development. The protocol consists of two interacting half-protocols, one for each parental hap-loid genome. The full interaction protocol is itself a higher-level, meta-network, or internetwork between the two lower-level, parental developmental control networks. Computer simulations show that if the interaction protocol is random then there is a loss of bilateral symmetry in the generated organism. Therefore, for all bilaterally symmetric organisms, the interaction protocol between the two parental genomes cannot be random. This implies that a nonrandom ur-protocol must have evolved with the first diploid bilaterians in the Precambrian more than 570 million years ago. Nonrandom protocols partition the embryo and adult into dynamic sections that are variably controlled by one or the other parental haploid genome network. Developmental networks and their meta-network protocols provide fundamentally new insights into embryonic and post-embryonic development, developmental pathologies, animal and plant hybrids, heterosis, and evolutionary dynamics.
Preprint
Full-text available
The great and unresolved challenge of cancer immunotherapy is the possibility of severe, life threatening side effects. A new coordinated set of protocols creates a communication system between cancer cells and oncolytic viruses that avoids such immunotherapeutic side effects. A meta-protocol or method coordinates two protocols, a protocol for cancer network signal editing and a protocol for virus receptor editing. This meta-protocol integrates the two protocols to insure signal-receptor matching of cancer cell signals and virus receptors. Together coordinated protocols produce an engineered cooperative cell-to-virus communication system between designed oncolytic viruses and edited cancer cells. The result is that edited cancer cells emit unique "kill me!" signals to designed oncolytic virus receivers which then kill the cancer cells. Side effects are eliminated because the "kill me!" signal is unique to cancer cells and the designed oncolytic viruses have receptors that only react to this unique cancer signal while ignoring all other cells. The combination of the three protocols is called the Viral Black Widow Protocol (VBWP). It is a shotgun marriage between oncolytic viruses and cancer cells after which the oncolytic viruses destroy their partner cancer cells. Using cancer-CAD-CRISPR network editing, a gene activation link is inserted into the cancer network such that the cancer cell expresses a unique external signal recognized by the co-designed receptors of oncolytic viruses. The unique signal indicates the cell is a cancer cell. In coordination, oncolytic viruses are edited to only attack the cells that emit the unique cancer signal. Moreover, since the Viral Black Widow Protocol and the T-cell Black Widow Protocol(1) can be co-designed to respond to the same unique cancer signal, the two therapies can be used in combination. This synergy of viral and T-cell Black Widow protocols enables a powerful immunotherapy for cancer eradication.
Preprint
Full-text available
One of the main problems with immunotherapy of cancer is the possibility of severe life threatening side effects. Under a new paradigm (the Cancer Network Paradigm) of how cancer works side effects can be avoided by two coordinated protocols that combine cancer network editing with T-cell network editing. A third meta-protocol integrates the two protocols. Together these protocols produce an engineered cooperative multi-cellular communication system between designed T-cells and edited cancer cells. The result is that edited cancer cells emit unique “kill me!” signals to obliging T-cells. Side effects are eliminated because the “kill me!” signal is unique to cancer cells and the designed T-cells only react to this one unique signal ignoring all other cells. The combination of the three protocols is called the Black Widow Immunotherapy Protocol (BWIP) or simply the Black Widow Protocol. The result of the coordinated protocols is a marriage between T-cells and cancer cells after which the T-cells destroy their partner cancer cells. Using cancer network editing, a gene activation link is inserted into the cancer network such that it produces a unique external signal to T-cells to indicate the cell is a cancer cell. In coordination, T-cells are edited to only attack the cells that emit the unique cancer signal. Black Widow coordinated cancer network immunotherapy forces cancer cells to emit unique signals that their co-engineered T-cells can recognize. Under this method transformed cancer cells cooperate with co-adapted T-cells to insure the cancer cells’ destruction. Unlike normal T-cell immunotherapy, there should be no side effects since co-engineered T-cells only kill co-edited cancer cells leaving all other cells alone. The Black Widow Protocol can be transformed to co-edited cancer cells and oncolytic viruses creating Viral Black Widow Protocols.
Article
Full-text available
Bacteria are indispensable for the study of fundamental molecular biology processes due to their relatively simple gene and genome architecture. The ability to engineer bacterial chromosomes is quintessential for understanding gene functions. Here we demonstrate the engineering of the small-ribosomal subunit (16S) RNA of Mycoplasma mycoides, by combining the CRISPR/Cas9 system and the yeast recombination machinery. We cloned the entire genome of M. mycoides in yeast and used constitutively expressed Cas9 together with in vitro transcribed guide-RNAs to introduce engineered 16S rRNA genes. By testing the function of the engineered 16S rRNA genes through genome transplantation, we observed surprising resilience of this gene to addition of genetic elements or helix substitutions with phylogenetically-distant bacteria. While this system could be further used to study the function of the 16S rRNA, one could envision the “simple” M. mycoides genome being used in this setting to study other genetic structures and functions to answer fundamental questions of life.
Article
Full-text available
Cancer stem cells are controlled by developmental networks that are often topologically indistinguishable from normal, healthy stem cells. The question is why cancer stem cells can be both phenotypically distinct and have morphological effects so different from normal stem cells. The difference between cancer stem cells and normal stem cells lies not in differences their network architecture, but rather in the spatial-temporal locality of their activation in the genome and the resulting expression in the body. The metastatic potential cancer stem cells is not based primarily on their network divergence from normal stem cells, but on non-network based genetic changes that enable the evolution of gene-based phenotypic properties of the cell that permit its escape and travel to other parts of the body. Stem cell network theory allows the precise prediction of stem cell behavioral dynamics and a mathematical description of stem cell proliferation for both normal and cancer stem cells. It indicates that the best therapeutic approach is to tackle the highest order stem cells first, otherwise spontaneous remission of so called cured cancers will always be a danger. Stem cell networks point to a pathway to new methods to diagnose and cure not only stem cell cancers but cancers generally.
Article
Full-text available
We present a general computational theory of stem cell networks and their developmental dynamics. Stem cell networks are special cases of developmental control networks. Our theory generates a natural classification of all possible stem cell networks based on their network architecture. Each stem cell network has a unique topology and semantics and developmental dynamics that result in distinct phenotypes. We show that the ideal growth dynamics of multicellular systems generated by stem cell networks have mathematical properties related to the coefficients of Pascal's Triangle. The relationship to cancer stem cells and their control networks is indicated. The theory lays the foundation for a new research paradigm for understanding and investigating stem cells. The theory of stem cell networks implies that new methods for generating and controlling stem cells will become possible.
Article
Full-text available
Development of the body plan is controlled by large networks of regulatory genes. A gene regulatory network that controls the specification of endoderm and mesoderm in the sea urchin embryo is summarized here. The network was derived from large-scale perturbation analyses, in combination with computational methodologies, genomic data, cis-regulatory analysis, and molecular embryology. The network contains over 40 genes at present, and each node can be directly verified at the DNA sequence level by cis-regulatory analysis. Its architecture reveals specific and general aspects of development, such as how given cells generate their ordained fates in the embryo and why the process moves inexorably forward in developmental time.
Article
Full-text available
CRISPR Cas9 molecular scissors The CRISPR-associated (Cas) protein Cas9 is a molecular scissor for cutting DNA. The first step in the cutting reaction is the RNA-guided unwinding of the DNA double helix. Jiang et al. determined the structures of Cas9 bound to DNA unwound by the targeting RNA (see the Perspective by Chen and Bailey). Cas9 bends the DNA to allow guide RNA infiltration into the double helix. The two separated DNA strands, one bound to RNA, are subsequently positioned in the dual active sites of the protein for cutting. Science , this issue p. 867 ; see also p. 811
Article
CRISPR-Cas systems provide microbes with adaptive immunity by employing short sequences, termed spacers, that guide Cas proteins to cleave foreign DNA(1,2). Class 2 CRISPR-Cas systems are streamlined versions in which a single Cas protein bound to RNA recognizes and cleaves targeted sequences(3,4). The programmable nature of these minimal systems has enabled their repurposing as a versatile technology that is broadly revolutionizing biological and clinical research(5). However, current CRISPR-Cas technologies are based solely on systems from isolated bacteria, leaving untapped the vast majority of enzymes from organisms that have not been cultured. Metagenomics, the sequencing of DNA extracted from natural microbial communities, provides access to the genetic material of a huge array of uncultivated organisms(6,7). Here, using genome-resolved metagenomics, we identified novel CRISPR-Cas systems, including the first reported Cas9 in the archaeal domain of life. This divergent Cas9 protein was found in little-studied nanoarchaea as part of an active CRISPR-Cas system. In bacteria, we discovered two previously unknown systems, CRISPR-CasX and CRISPR-CasY, which are among the most compact systems yet identified. Notably, all required functional components were identified by metagenomics, enabling validation of robust in vivo RNA-guided DNA interference activity in E. coli. Interrogation of environmental microbial communities combined with in vivo experiments allows access to an unprecedented diversity of genomes whose content will expand the repertoire of microbe-based biotechnologies.
Article
CRISPR-Cas9 is an RNA-mediated adaptive immune system that protects bacteria and archaea from viruses or plasmids. Herein we discuss the recent development of CRISPR-Cas9 into a key technology for genome editing, targeting, and regulation in a wide range of organisms and cell types. It requires a custom designed single guide-RNA (sgRNA), a Cas9 endonuclease, and PAM sequences in the target region. The sgRNA-Cas9 complex binds to its target and creates a double-strand break (DSB) that can be repaired by non-homologous end joining (NHEJ) or by the homology-directed repair (HDR) pathway, modifying or permanently replacing the genomic target sequence. Additionally, we highlight recent advances in the repurposing of CRISPR-Cas9 for repression, activation, and loci imaging. In this review, we underline the current progress and the future potential of the CRISPR-Cas9 system towards biomedical, therapeutic, industrial, and biotechnological applications.
Article
Bacteria employ surveillance complexes guided by CRISPR (clustered, regularly interspaced, short palindromic repeats) RNAs (crRNAs) to target foreign nucleic acids for destruction. Although most type I and type III CRISPR systems require four or more distinct proteins to form multi-subunit surveillance complexes, the type I-C systems use just three proteins to achieve crRNA maturation and double-stranded DNA target recognition. We show that each protein plays multiple functional and structural roles: Cas5c cleaves pre-crRNAs and recruits Cas7 to position the RNA guide for DNA binding and unwinding by Cas8c. Cryoelectron microscopy reconstructions of free and DNA-bound forms of the Cascade/I-C surveillance complex reveal conformational changes that enable R-loop formation with distinct positioning of each DNA strand. This streamlined type I-C system explains how CRISPR pathways can evolve compact structures that retain full functionality as RNA-guided DNA capture platforms.
Article
The microbial community that lives on and in the human body exerts a major impact on human health, from metabolism to immunity. In order to leverage the close associations between microbes and their host, development of therapeutics targeting the microbiota has surged in recent years. Here, we discuss current additive and subtractive strategies to manipulate the microbiota, focusing on bacteria engineered to produce therapeutic payloads, consortia of natural organisms and selective antimicrobials. Further, we present challenges faced by the community in the development of microbiome therapeutics, including designing microbial therapies that are adapted for specific geographies in the body, stable colonization with microbial therapies, discovery of clinically relevant biosensors, robustness of engineered synthetic gene circuits and addressing safety and biocontainment concerns. Moving forward, collaboration between basic and applied researchers and clinicians to address these challenges will poise the field to herald an age of next-generation, cellular therapies that draw on novel findings in basic research to inform directed augmentation of the human microbiota.
Article
The genomic program for development operates primarily by the regulated expression of genes encoding transcription factors and components of cell signaling pathways. This program is executed by cis-regulatory DNAs (e.g., enhancers and silencers) that control gene expression. The regulatory inputs and functional outputs of developmental control genes constitute network-like architectures. In this PNAS Special Feature are assembled papers on developmental gene regulatory networks governing the formation of various tissues and organs in nematodes, flies, sea urchins, frogs, and mammals. Here, we survey salient points of these networks, by using as reference those governing specification of the endomesoderm in sea urchin embryos and dorsal-ventral patterning in the Drosophila embryo.