Cutting cancer rates: Data, models and a happy ending?

How surgery might be making cancer prognoses worse

In theory, the definitive treatment for early stage cancer patients should be surgical resection. Just get in there and cut the tumour out. If the lump is small and well-constrained, then surgical removal is all that should be needed. Unfortunately, this isn’t usually what happens.

Even when the tumour is nice and small and easily got at, patients mostly have to go through the rigours of chemotherapy and/or radiotherapy and all the traumas that these treatments entail. Why? Because for many types of cancer, surgery is often followed by relapse – the disease pops up again, usually somewhere else in the body, even though all traces of it appear to have been removed.

In breast cancer, for example, the pattern of relapse is very clear. When looking at patient data we can see there’s a peak of relapse in the first two to four years, then there’s a lull and then a smaller wave of relapses much later on.

This bimodal relapse pattern occurs not just in breast cancer, but prostate, lung, pancreatic, melanoma and osteosarcoma. And in case any of you data nerds were wondering, this bimodal pattern seems to be pretty robust across different data sets, and appears to be independent of disease stage or other prognostic factors.

All of which begs the question of why cancers should behave this way. The standard model of cancer has assumed that there’s an exponential growth pattern when tumours are small, but then this rate of growth slows as they get bigger – technically, it’s a damped exponential.

If we can treat cancers by cutting them out, why do we need chemotherapy?

So, for a long time the working hypothesis is that even when tumours are small there are already microscopic pockets of disease hiding in the body, and when the primary tumour is cut out these microscopic metastases carry on growing. As they are very small the model says they should be growing very fast, so then you need to whack them with chemotherapy – which is basically a poison targeted at rapidly growing cells. Hence the need to follow surgery with chemo…

However, the problem is that this model suggests that relapse should be related to disease staging. The bigger your tumour, the longer it’s been around, the longer the micrometastases have been growing; hence the faster the relapse. But that’s not what the data says. The data says that it’s the surgical intervention that’s acting as the trigger mechanism.

A number of researchers and doctors (including Michael Retsky, Romano Demicheli, Michael Baum, William Hrushesky, Isaac Gukas and others) across the globe puzzled over this discrepancy when it first became apparent in the 1990s. They worked together to figure out what was going on and to try and tease out a better model of cancer growth. A model which could be used not just to explain the data but, more importantly, to see what could be done in terms of changing therapies.

And this is the key point, this isn’t just an arcane data science or computer modelling issue, it’s not about understanding the molecular biology of cancer, it’s about making a significant impact on treatment. Because it’s not the primary tumour that kills most patients, it’s metastatic disease spreading through the body.

Surgery might not be the answer in every single case

In time a new model has been developed, and rather than tumour dynamics being described by a damped exponential equation, it turned out to be intermittent and dynamically non-random. And in the case of breast cancer, most relapses are the result of a sudden spurt of metastatic growth that is triggered by the surgery itself. In other words, the treatment that should be most curative is kicking off a process that leads to cancer relapse within four years.

Now, funnily enough, this isn’t necessarily a new finding. It turns out that historically doctors in ancient Greece and Rome had also noticed that surgery to remove breast cancers could make things much worse. It also fits in with folk wisdom in certain parts of the world – for example in Africa many women presenting with cancer do not go to conventional oncologists because they fear that surgery would “provoke” the disease.

So, why should surgery have this effect? It turns out that there are probably multiple effects at work. Firstly, surgery itself causes a massive release of chemicals into the bloodstream that signals to the body that there’s been tissue damage and that it needs to repair itself.

This repair includes the sprouting of new blood vessels (a process called angiogenesis) at the site of the wound. Unfortunately, these same factors in the blood also help tiny pockets of cancer cells sprout the blood supply they need to get the nutrients and oxygen to grow.

At the same time the surgery induces a drop in the immune system – so where tiny cancers have been kept in check by the immune system, they are suddenly let off the leash as the body recovers from surgery. The surgery itself may also release tumour cells into the bloodstream, cells that can circulate and find a welcoming home somewhere else in the body.

Other stories you might like

  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading
  • Supreme Court urged to halt 'unconstitutional' Texas content-no-moderation law
    Everyone's entitled to a viewpoint but what's your viewpoint on what exactly is and isn't a viewpoint?

    A coalition of advocacy groups on Tuesday asked the US Supreme Court to block Texas' social media law HB 20 after the US Fifth Circuit Court of Appeals last week lifted a preliminary injunction that had kept it from taking effect.

    The Lone Star State law, which forbids large social media platforms from moderating content that's "lawful-but-awful," as advocacy group the Center for Democracy and Technology puts it, was approved last September by Governor Greg Abbott (R). It was immediately challenged in court and the judge hearing the case imposed a preliminary injunction, preventing the legislation from being enforced, on the basis that the trade groups opposing it – NetChoice and CCIA – were likely to prevail.

    But that injunction was lifted on appeal. That case continues to be litigated, but thanks to the Fifth Circuit, HB 20 can be enforced even as its constitutionality remains in dispute.

    Continue reading
  • How these crooks backdoor online shops and siphon victims' credit card info
    FBI and co blow lid off latest PHP tampering scam

    The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.

    It's an age-old problem: someone breaks into your online store and alters the code so that as your customers enter their info, copies of their data is siphoned to fraudsters to exploit. The Feds this week have detailed one such effort that reared its head lately.

    As early as September 2020, we're told, miscreants compromised at least one American company's vulnerable website from three IP addresses: 80[.]249.207.19, 80[.]82.64.211 and 80[.]249.206.197. The intruders modified the web script TempOrders.php in an attempt to inject malicious code into the checkout.php page.

    Continue reading

Biting the hand that feeds IT © 1998–2022