Sunday, December 16, 2018

Morning Report





I don't know if they still call it that or not - but back in the day when I was an intern Morning Report was a meeting of all of the admitting residents with the attendings or Chief of Internal Medicine.  The goal was to review the admissions from the previous night, the initial management, and the scientific and clinical basis for that management. Depending on where you trained, the relationship between house staff and attendings could be affiliative or adversarial. In affiliative settings, the attendings would guide the residents in terms of management and the most current research that applied to the condition. In the adversarial settings, the attendings would ask an endless series of questions until the resident presenting the case either fell silent or excelled.  It was extremely difficult to excel because the questions were often of the "guess what I am thinking" nature. The residents who I worked with were all hell bent on excelling.  After admitting 10 or 20 patients they would head to the library and try to pull the latest relevant research.  They may have only slept 30 minutes the night before but they were ready to match wits with the attendings in the morning.

Part of that process was discussing the relevant literature and references.  In those days there were often copies of the relevant research and beyond that seminar and research projects that focused on patient care. I still remember having to give seminars on gram negative bacterial meningitis and anaphylaxis.  One of my first patients had adenocarcinoma of unknown origin in his humerus and the attending wanted to know what I had read about it two days later.  I had a list of 20 references. All of that reading and research required going to a library and pulling the articles in those days.  There was no online access.  But even when there was - the process among attendings, residents, and medical students has not substantially changed.

I was more than a little shocked to hear that process referred to as "intuition based medicine" in a recent opinion piece in the New England Journal of Medicine (1).  In this article the authors seem to suggest that there was no evidence based medicine at all.  We were all just randomly moving about and hoping to accumulate enough relevant clinical experience over the years so that we could make intuitive decisions about patient care.  I have been critical of these weekly opinion pieces in the NEJM for some time, but this one seems to strike an all time low. Not only were the decisions 35 years ago based on the available research, but there were often clinical trials being conducted on active hospital services - something that rarely happens today now that most medicine is under corporate control.

Part of the author's premise here is that evidence-based medicine (EBM) was some kind of an advance over intuition-based medicine and now it is clear that it is not all that it is cracked up to be. That premise is clearly wrong because there was never any intuition based medicine before what they demarcate as the EBM period. Secondly, anyone trained in medicine in the last 40 years knew what the problems with EBM were from the outset - there would never be enough clinical trials of adequate size to include the real patients that people were seeing.  I didn't have to wait to read all of the negative Cochrane Collaboration studies saying this in their conclusions.  I knew this because of my training, especially training in how to research problems relevant to my patients. EBM was always a buzzword that seemed to indicate some hallowed process that the average physician was ignorant of.  That is only true if you completely devalue the training of physicians before the glory days of EBM.

The authors suggest that interpersonal medicine is what is now needed. In other words the relationship between the physician and patient (and caregivers) and their social context is relevant.  Specifically the influence the physician has on these folks.  Interpersonal medicine "requires recognition and codification of the skills that enable clinicians to effect change in their patients, and tools for realizing those skills systematically." They see it as the next phase in "expanding the knowledge base in patient care" extending EBM rather than rejecting it.  The focus  will be on social and behavioral aspects of care rather than just the biophysical. The obvious connection to biopsychosocial models will not be lost on psychiatrists.  That is straight out of both interpersonal psychotherapy (Sullivan, Klerman, Weissman, Rounsaville, Chevron) and the model itself by Engel.  Are the authors really suggesting that this was also not a focus in the past?

Every history and physical form or dictation that I ever had to complete contained a family history section and a social history section.  That was true if the patient was a medical-surgical patient or a psychiatric patient.  Suggesting that the interpersonal, social, and behavioral aspects of patient care have been omitted is revisionism that is as serious as the idea of intuition based medicine existing before EBM.

I don't understand why the authors just can't face the facts and acknowledge the serious problems with EBM and the reasons why it has not lived up to the hype.  There needs to be a physician there to figure out what it means and be an active intermediary to protect the patient against the shortfalls of both the treatment and the data. As far as interpersonal medicine goes that has been around as long as I have been practicing as well.  Patients do better with a primary care physician and seeing a physician who knows them and cares for them over time. They are more likely to take that physician's advice.  Contrary to managed care propaganda (from about the same era as EBM) current health care systems fragment care, make it unaffordable, and waste a huge amount of physician time taking them away from relationships with patients.

Their solution is that physicians can be taught to communicate with patients and then measured on patient outcomes.  This is basically a managed care process applied to less tangible outcomes than whether a particular medication is started. In other words, it is soft data that it is easier to blame physicians for.  In this section they mention that one of the author's works for Press Ganey - a company that markets communication modules to health care providers. I was actually the recipient of such a module that was intended to teach me how to introduce myself to patients. The last time I took that course was in an introductory course to patient interviewing in 1978.  I would not have passed the oral boards in psychiatry in 1988 if I did not know how to introduce myself to a patient.  And yet here I was in the 21st century taking a mandatory course on how to introduce myself after I have done it tens of thousands of times.  I guess I have passed the first step toward the new world of interpersonal medicine.  I have boldly stepped beyond evidence based medicine.   

I hope there is a lot of eye rolling and gasping going on as physicians read this opinion piece.  But I am also concerned that there is not. Do younger generations of physicians just accept this fiction as fact?  Do they really think that senior physicians are that clueless?  Are they all accepting a corporate model where what you learn in medical school is meaningless compared to a watered down corporate approach that contains a tiny fraction of what you know about the subject?

It is probably easier to accept all of this revisionist history if you never had to sit across from a dead serious attending at 7AM, present ten cases and the associated literature and then get quizzed on all of that during the next three hours of rounding on patients.
 



George Dawson, MD, DFAPA


References:

1: Chang S, Lee TH. Beyond Evidence-Based Medicine. N Engl J Med. 2018 Nov 22;379(21):
1983-1985. doi: 10.1056/NEJMp1806984. PubMed PMID: 30462934.


Graphic Credit:

That is the ghost of Milwaukee County General Hospital one of the teaching affiliates of the Medical College of Wisconsin.  It was apparently renamed Doyne Hospital long after I attended  medical school there.  It was demolished in 2001.  I shot this with 35mm Ektachrome walking to medical school one day. The medical school was on the other side of this massive hospital.






Sunday, December 9, 2018

What Isn't Available In Multimillion Dollar EHRs? Decision Support from 1994


Physician Decision Support Software from the 20th Century




I used to teach a class in medical informatics. My emphasis was not mistaking a physical illness for a psychiatric one and also not missing any medical comorbidity in identified psychiatric patients.  The class was all about decision-making, heuristics, and recognition of biases that cause errors in medical decisions. Bayesian analysis and inductive reasoning was a big part of course. About that time, software packages were also available to assist in diagnostic decisions. Some of them had detailed weighting estimates to show the relative importance of diagnostic features.  It was possible to enter a set of diagnostic features and get a listing of probable diagnoses for further exploration. I printed out some examples for class discussions and we also reviewed research papers and look at the issue of pattern recognition by different medical specialists.

The available software packages of the day were reviewed in the New England Journal of Medicine (1).  In that review, 10 experts came up with 15 cases as written summaries and then those cases were cross checked for validity and pared down to 105 cases.  The four software programs (QMR, Iliad, Dxplain, and Meditel) were compared in their abilities to suggest the correct diagnosis. Two of programs used Bayesian algorithms and two used non-Bayesian algorithms. The authors point out that probability estimates varied based on literature clinical data used to establish probabilities. In the test, the developers of each program were used to enter the diagnostic language and the compared outcomes were the list of diagnoses produced by each program. The diagnoses were rank ordered according likelihood.

The metrics used to compare the programs was correct diagnosis, comprehensiveness (in terms of the differential diagnosis list generated), rank, and relevance.  Only 0.73-0.91 of the programs had all of the cited diagnoses in the knowledge base. Of the programs 0.52 - 0.71 made the correct diagnosis across all 105 cases and 0.71-0.89 made the correct diagnosis across 63 cases.  The 63 case list was used because those diagnoses were listed in all 4 knowledge bases.  The authors concluded the lists generated had low sensitivity and specificity but that unique diagnoses were suggested that the experts agreed may be important. They concluded that the performance of these programs in clinical settings being used by physicians was a necessary next step. They speculated that physicians may use these programs beyond generating diagnoses but also looking at specific findings and how that might affect the differential diagnosis.

A study (2) came out five years later that was a direct head-to-head comparison of two different physicians using QMR software to assess 154 internal medicine admissions where there was no known diagnosis.  In this study physician A obtained the correct diagnosis in 62 (40%) cases and physician B was correct in 56 (36%) of the cases. That difference was not statistically significant. Only 137 cases had the diagnosis listed in the QMR knowledge base. Correcting for that difference, correct diagnoses increased to 45% for physician A and 41% for physician B. The authors concluded that a correct diagnosis Listed in the top five diagnoses 36 to 40% of the time was not accurate enough for a clinical setting, but they suggested that expanding the knowledge base would probably improve that rate.

Since then the preferred description of this software has become differential diagnosis generators (DDX) (3.4). A paper from 2012, looked at a total of 23 of these programs but eventually included only 4 for in their analysis. The programs were tested on ten consecutive diagnosis-focused cases chosen from from 2010 editions of the Case Records of the New England Journal of Medicine (NEJM) and the Medical Knowledge Self Assessment Program (MKSAP), version 14, of the American College of Physicians. A 0-5 scoring system was developed that encompassed the range of 1= diagnosis suggested on the first screen or first 20 suggestions to 5= no suggestions close to the target diagnosis. The scoring range was 0-50. Two of the programs exactly matched the diagnosis 9 and 10 times respectively. These same two programs DxPlain and Isabel had identical mean scores of 3.45 and were described as performing well. There was a question of integration with EHRs but the authors thought that these programs would be useful for education and decision support. They mention a program in development that automatically incorporates available EHR data and generates a list of diagnoses even without clinician input.

The most recent paper (4) looked at a a systemic review and meta-analysis of differential diagnosis (DDX) generators. In the introductory section of this paper the authors quote a 15% figure for the rates of diagnostic errors in most areas of medicine. A larger problem is that 30-50% of patients seeking primary care or specialty consultation do not get an explanation for their presenting symptoms. They looked at the ability to generate correct lists of diagnosis, whether the programs were as good as clinicians, whether the programs could improved the clinicians list of differential diagnoses, and the practical aspects of using DDX generators in clinical practice. The inclusion criteria resulted in 36 articles comparing 11 DDX programs (see Table 2.)  The original paper contains a Forest Plot of the results of the DDX generators showing variable (but in some cases high) accuracy but also a high degree of heterogeneity across studies.  The authors conclude that there is insufficient evidence to recommend DDX generators based on the variable quality and results noted in this study.  But I wonder if that is really true.  Some of the DDX generators did much better than others and one of them (Isabel) refers to this study in their own advertising literature.

My main point in this post is to illustrate that these DDX generators have been around for nearly 30 years and the majority of very expensive electronic health record (EHR) installations have none.  The ones that do are often in systems where they are actively being studied by physicians in that group or one has been added and the integration in the system is questionable.  In other words, do all of the clinical features import into the DDX generator so that the responsible clinician can look at the list without making that decision.  At least one paper in this literature suggests that eliminates the bias of deciding on whether to not to make the decision to use diagnostic assistance.  In discussion of physician workflow, it would seem that would be an ideal situation unless the software stopped the workflow like practically all drug interaction checking software.

The drug interaction software may be a good place to start. Some of these program and much more intelligent than others. In the one I am currently using trazodone x any serotonergic medication is a hard stop and I have to produce a flurry of mouse clicks to move on.  More intelligent programs do not stop the workflow for this interaction of SSRI x bupropion interactions.  There is also the question of where artificial intelligence (AI) fits in.  There is a steady stream of headlines about how AI can make medical diagnoses better than physicians and yet there is no AI implementation in EHRs designed to assist physicians.  What would AI have to say about the above drug interactions? Would it still stop my work process and cause me to check a number of exception boxes? Would it be able to produce an aggregate score of all such prescriptions in an EHR and provide a probability statement for a specific clinical population?  The quality of clinical decisions could only improve with that information. 

And there is the issue of what psychiatrists would use a DDX generator for?  The current crop has a definite internal medicine bias.  Psychiatrists and neurologists need an entirely different diagnostic landscape mapped out.  The intersection of psychiatric syndromes, toxidromes and primary neurological disorders needs to be added and expanded upon. As an experiment, I am currently experimenting with the Isabel package and need to figure out the best way to use it.  My experimental paradigm is a patient recently started on lithium who develops an elevated creatinine, but was also started on cephalexin a few days after the lithium was started.  Entering all of those features seems to produce a random list of diagnoses and the question of whether an increasing creatinine is due to lithium or cephalexin.  It appears that the way the diagnostic features are entered may affect the outcome.

Decision support is supposed to be a feature of the modern electronic health record (EHR). The reality is the only decision support is a drug interaction feature that varies greatly in quality from system to system. Both the drug interaction software and DDX generators are very inexpensive options for clinicians.  EHRs don't seem to get 1990s software right.  And it does lead to the question: "Why are EHRs so expensive and why do they lack appropriate technical support for physicians?" 

Probably because they were really not built for physicians.



George Dawson, MD, DFAPA


References:

1: Berner ES, Webster GD, Shugerman AA, Jackson JR, Algina J, Baker AL, Ball EV, Cobbs CG, Dennis VW, Frenkel EP, et al. Performance of four computer-based diagnostic systems. N Engl J Med. 1994 Jun 23;330(25):1792-6. PubMed PMID:8190157.

2: Lemaire JB, Schaefer JP, Martin LA, Faris P, Ainslie MD, Hull RD. Effectiveness of the Quick Medical Reference as a diagnostic tool. CMAJ. 1999 Sep 21;161(6):725-8. PubMed PMID: 10513280.

3: Bond WF, Schwartz LM, Weaver KR, Levick D, Giuliano M, Graber ML. Differential diagnosis generators: an evaluation of currently available computer programs. J Gen Intern Med. 2012 Feb;27(2):213-9. doi: 10.1007/s11606-011-1804-8. Review. PubMed PMID: 21789717.

4: Riches N, Panagioti M, Alam R, Cheraghi-Sohi S, Campbell S, Esmail A, Bower P.The Effectiveness of Electronic Differential Diagnoses (DDX) Generators: A Systematic Review and Meta-Analysis. PLoS One. 2016 Mar 8;11(3):e0148991. doi: 10.1371/journal.pone.0148991. eCollection 2016. Review. PubMed PMID: 26954234.




Monday, November 19, 2018

Exploits on the Internet





I received the above at my work email address last week.....

I have always been unimpressed with the idea of computer hackers for a number of reasons, the most obvious ones are contained in the above email.  Apart from the obvious extortion, their ability reach out and ruin the day for anybody through any number of mechanisms is a major problem.  I was concerned to some degree about the threat based on me watching porn videos because it would be fairly easy to make it appear that I did it using any split screen video app.  Some online research revealed that there is a hack for Mac cameras.  It might be easy to get a video of me on the computer and then pair it with any pornography video.  

My dealing with identity thieves illustrated how easy it is for criminals to remain anonymous in our society while average citizens deal with their mischief.  I was called at work by a very aggressive person working for a collection company who claimed that I owed them $10,000.  Investigation showed that an identity thief opened a fake credit card based on my Social Security Number and ran up the charges.  I filed a police report and was advised by the local police that it was unlikely that anything would happen, but that the report was necessary in order to file an affidavit with the credit card company to avoid paying the charges.  I was eventually able to track the thief to a Florida address and called the local Sheriff to investigate.  I was told that the Sheriff would not look into it because "anybody could have used that mailbox and it would be an invasion of privacy." It became clear that identity theft was just the cost of doing business for credit card companies and credit reporting agencies - regardless of the cost and time to the consumer.

The source of my of the hacking exploitation is infuriating and that of course is poor computer security.  What is never really made explicit is the reason for the lack of security. It was certainly never really designed in.  Apple claims that it is and they have a detailed explanation about this in their literature.  On the other hand Microsoft operating systems dominate the individual and corporate PC worlds.  If you are going where the money is - it will probably involve a Microsoft OS.  It seems that every Microsoft upgrade involves a raft of new security problems and when they have a stable OS - it gets upgraded and the old stable version gets unsupported anyway.  I suppose you can't make a lot of money on a product that you never upgrade. A lot of the security problems rest with the software manufacturers.

There is the software security industry.  Large companies that make antiviruses, firewalls, malware detectors, and pass word managers.  A dizzying array of free and in some cases fairly expensive software with the guarantee that none of it is foolproof - it might not work at all.  As an example, I was looking at the new collection of password managers for keylogger protection.  The above note describes a keylogger and that is software that records your keystrokes and sends them back to the hacker so that they can discover your passwords and account numbers/logins and steal from you.  Keyloggers can also take screen shots to get similar information. The password managers may or may not protect you against that.

The average computer user seems to pay a premium price for a computer with not very good security and an additional price for software that may or may not add much security.

By default we are left with a semblance of security at our own hands.  The common advice is to not open any email from an unknown source.  Email is a common way that malware and viruses are introduced to computers in large systems with extreme results.  It may allow hacker access to information or in the extreme case hijack the entire system until a ransom is paid to unlock it.  In the case of the message sent to me - I am sitting behind a corporate firewall  that seems to intercept even benign messages and send me a report so that I can decide which one should be deleted and which should be released.  This message sailed right through! 

All of the lack of reasonable security results in the possibility of scaling the criminal enterprise.  Now instead of blackmailing a person who may be engaged in some activity that they don't want anyone to know about - the enterprising Internet criminal can send out thousands or tens of thousands of these messages - just playing the odds. The impact on the other 90% is completely ignored.   

All of the security fixes so far ignore the basic problem of who is basically creating all of this chaos. I did an PubMed search on hacker(s) and came up with 90 references dating back to 1986.  None of them were what I would consider to be scientific papers. Most were opinion pieces either warning about threats or advice on how to secure your data or network against threats. Many were from non-mainstream journals.  

I am also a member of the IEEE and when I check their web site, there are 240,000,000 references to hackersHackers psychology as a search term results in 4.182 million references.  Going to the IEEExplore digital library results in 10 hits - 4 from journals and magazines and 6 from conferences.   The professional literature available to me does not seem to be much of an improvement over what is available in the popular press.  In the popular press there are some articles speculating on who the hackers are and what their various motivations are.  For example, an article discusses how some teenage boys become obsessed with hacking and with time and a singular focus can hack like anyone.  There are stories of American teenagers hacking the American government including military institutions and Russian teenagers being praised by Putin for stealing money from American bank accounts.  An article suggests that these teenagers eventually grow out of it when they recognize it is wrong.  One story suggests that the hacking obsessed teens are on the Autism Spectrum - they have Asperger's syndrome.  There are appeals to come up with a multidisciplinary approach to studying hackers and why the social sciences are important in the effort.  There is a suggestion that some of these programs are out there in the security industry and law enforcement - but nothing very compelling.   

Hackers have a large footprint in popular media.  The average television program suggests that a good hacker has instant access to whatever information they need.  That can range from any video feed to any blueprint to any financial information in any city.  That is an obvious stretch, but that is the way things are portrayed.  A study of how many media portrayals are of white hat versus black hat hackers (the old western terminology applies) might be interesting.  My impression is that most are white hat by a large margin.  And then there are the hacker antiheroes, most notably Eliott Alderson of Mr. Robot and his sister Darlene.  Nothing in the media portrayals to suggest that cybercrime in the US costs an estimated $350-500 billion annually.

I sincerely hope that there is a vast network of concerned cybersecurity experts, that are acting rationally on these threats.  I confess that I am not very confident that there is. The idea that a private contractor can access top secret government files and send them around the Internet suggests to me that even our top intelligence agencies may not know much more about protecting their systems than I do. 

Coming back to the graphic, my overriding concern is that there are tens of thousands of people out there like the person that sent this email.  They can get close to many more people than they could walking up to them and holding them up on the street, but that doesn't mean they are any less sociopathic.  The dominant dynamic is that they will verbally, emotionally, or physically intimidate  you to get what they want.  That tone is clearly there in this email.  I think network providers and the hardware and software providers can do a lot more.  The most compelling evidence there is the disappearance of pornographic email spam from the early part of the century. At first it was up to the individual user to set up filters to get rid of it and then mysteriously one day - the inbox was free of pornography for good.  They should be able to do the same thing with emails like the example here.

For now every user must stay diligent and do what they can to protect themselves.  A home network specialist that can be consulted about the latest gear and standards helps.  Common sense helps.  At the bottom rung is the idea that not all emails need to be opened or responded to no matter how obnoxious they are.   


George Dawson, MD, DFAPA


Supplementary:

Despite the confusing landscape my experience here highlights a couple of points.

1.  It is critical to change your password/login if a business you access on the Internet gets hacked.  In this case the hacker was able to purchase a 2013 password from an Internet site I frequented on the Dark Web and use it in the first line of the email. That password was available because the company I locked into was hacked exposing the personal information of tens of thousands of users.  This highlights the need for changing passwords immediately when there is a report that an online site has been hacked.

2.  In one of the papers I read about password changes - it turns out that frequent password changes required by many companies result in less secure passwords because employees are annoyed by the changes and the suggested complexity of the passwords. The authors of that paper suggested that frequent changes were unnecessary.


Supplementary:

I am very interested in any scientific research on the psychology of hacking and cybercriminals.  Please post any good references that you have. 



References:

1: Hutson M. Hackers easily fool artificial intelligences. Science. 2018 Jul20;361(6399):215. doi: 10.1126/science.361.6399.215. PubMed PMID: 30026208.

2: Waldrop MM. How to hack the hackers: The human side of cybercrime. Nature. 2016 May 12;533(7602):164-7. doi: 10.1038/533164a. PubMed PMID: 27172030.

3:  Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, National Research Council; Clark D, Berson T, Lin HS, editors. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington (DC): National Academies Press (US); 2014 Jun 16. PubMed PMID: 25057698.

Monday, November 12, 2018

Unsane - It Sure Is






I watch TV while working out - usually Amazon, Netflix, or HBO.  It is all on the Amazon Fire interface.  Today I saw Unsane advertised and despite my aversion to the ongoing One Flew Over The Cuckoo's Nest portrayals of psychiatry - I decided to watch it on the strength of Claire Foy as the leading actor.  Could the actor save the predictable portrayal?  I was skeptical but forged ahead anyway.  The film was a Steven Soderbergh film and I later learned that he shot it on an iPhone 7 Plus.

In the introductory section we learn that the main character Sawyer Valentini (Claire Foy) has moved from Boston to Pennsylvania.  She is a financial analyst in a bank and does financial analysis and reports.  We see her in a contentious phone call with a client in the opening scene.  He coworker expresses some concern and another coworker looks and rolls his eyes.  She meets with her boss and the conversation has overtones of sexual harassment.  Later there is a computer dating scenario where she ends up at her apartment with the date and starts to react like he is assaulting her.  She ends up taking some medication out of a medicine cabinet.  Later we see her Google "Support groups for stalking victims".  She drives out to a psychiatric facility for an initial appointment and that is where the drama begins.  I am going to list the problems point-by-point.

1.  She meets with the intake staff person and describes her concerns about being stalked as well as the residual "neurosis" (her term) of being in an new city and having a tendency to see her stalker everywhere. At one point she alludes to feeling depressed at times and thinking about whether there is any point in going on.  The staff person asks her if she has ever had suicidal ideation and she goes into a detailed discussion of Therapeutic Index and how she would be experimenting with that if she was going to attempt suicide (translation - overdosing).  The therapist leaves and has her complete routine paperwork.

2.  She completes the "routine paperwork" that is also described as "boilerplate" and learns that in doing so she has voluntarily committed herself for 24 hours.  In other words she was tricked into being hospitalized and that trick was apparently irreversible.

3.  While voicing strong objections she is asked by a nurse to disrobe, be searched, and change into hospital clothing.  The nurse's tone is threatening and she complies.

4.  She is taken to a psychiatric ward of about 10 people.  It is a combination of men and women and they are all locked into a room with no supervision all night long.  She is threatened by the other patients, gets into a physical confrontation with two of them and is eventually sedated in the same 10 bed ward in full view of the other patients with no safety monitoring.  She is subsequently restrained in the same manner in full view of all of the male and female patients and not protected.

5.  She finally sees the psychiatrist the next day.  He does the world's most cursory evaluation - largely reading chart notes in between phone calls.  It lasts about 5 minutes. She makes a compelling argument to be released. He informs her that she needs to stay another 7 days based on her assaults on another patient and staff. At no point in the interview does he ask her any direct questions about depression, suicidal thinking, or the details of the incidents of aggression.

6.  She befriends another patient who has smuggled in a cell phone and convinces him to let her use it.  We learn that the patient with the cell phone is really an undercover reporter investigating the hospital.  She calls her mother who comes to the facility and demands that they release Sawyer. The psychiatrist refers her to an administrator. The administrator gives her an irrelevant sales pitch on all of the good work that is done there and passive-aggressively acknowledges that it is her mother's prerogative to contact an attorney in order to get her daughter freed. 

From a creative and artistic standpoint - it was apparent to me from the outset that Sawyer's reality testing was not impaired.  Hypervigilance is not psychosis. So when she recognized her stalker on the nursing staff passing out medications it was not a surprise.

Spoiler alert right here - if you really wanted to be surprised see another film.  If you don't want to know the ending to this predictable one stop reading right here.

A series of implausible scenes unfold that depend both on the stalker as nursing staff and Sawyer's transformation to homicidality bent on killing the stalker/staff person. The stalker gives Sawyer a "megadose" of methylphenidate a stimulant a - controlled substance. Special effects at that moment seem to indicate she has some kind of psychedelic experience from the drug.  The stalker is warned by the nurse that he has to be more cautious of "we could lose our jobs." The stalker ends up killing two patients and torturing one of them with cardioversion paddles - right out of the old action series 24.  Some reviews of the film think this was an electroconvulsive therapy device - more proof that old Hollywood stereotypes about psychiatry don't ever go away.

The stalker traps Sawyer in an isolated seclusion room and in an excruciatingly long exchange, she tricks him and ends up stabbing him in the neck.  Like most films of this genre, he survives and recaptures her outside of the hospital and kidnaps her.  During the kidnap sequence we learn that he killed her mother and the hospital staff person who he has been impersonating.  Sawyer gets another chance to kill him and apparently does in the most gruesome manner  possible.

We flash forward 6 months and see Sawyer eating at a restaurant with a friend.  She looks out into the room and see the profile of a man who appears to be the stalker. She hears him saying things the stalker would say.  She grabs a steak knife and approaches him from behind.............. 

All of the points above are what a psychiatrist would consider to be highly problematic.  By that I mean they would all merit investigation by the appropriate authorities,  legal penalties, and disciplinary action against licensed health professionals. If I was prone to discuss malpractice - the incidents could also lead to that type of civil litigation.  Anyone experiencing a fraction of what Sawyer experienced in this psychiatric hospital should contact the responsible officials or an attorney about what could be done.  In my experience health officials are quite eager to do exhaustive investigations of these complaints both in the case of licensed health care professionals and institutions.  In the film it took a dead body on the premises to get any action from the police.  In real life, a call from Sawyer's mother would be enough to get action in any state that I have practiced in.

The commitment law in Pennsylvania did not seem to be adequately portrayed.  The statute says that any interested party can initiate commitment based on an imminent dangerousness standard.  That was certainly not present in the film.  At no point was Sawyer suicidal and the brief scraps that she was in would not have required physical restraint or forced medication in any setting that I ever worked in.  The maximum period of confinement in the state of Pennsylvania without a court order is 5 days and in this case Sawyer was detained 1 day initially and then another week.  That is a violation of the law.  In the state where I work, the longest period of time that a person can be help without a court order signed by a judge is 72 hours. In cases where it appeared a high risk person would be released, attorneys have always advised me that the person needs to be released according to the law - no matter what the possible adverse outcome.   

There are some continuity problems with the film.  How is it that her stalker would happen to know that she would be inappropriately admitted to a psychiatric hospital and be able to identify and kill a prospective employee in order to work there?  Wouldn't it be much easier to get close to her in real life rather than inside an institution?  And what about Sawyer?  She has insight into the fact that she is hypervigilant and needs to avoid the stalker. Is there a better film just exploring that theme and what happens to people in these situations plus or minus the real stalker?

In the past, my standard for films has been recognizing that they are entertainment and not really about psychiatry.  This film fails at both levels.  I suppose at some point all actors might be interested in doing a horror movie - but the psychiatric hospital as horror genre is as tiresome as it gets.  How many times can you show a gun toting Dr. Sam Loomis battling evil incarnate as a former asylum patient?   How many times can you show hospital staff that are sadistic, abusive, or grossly incompetent? Apparently there is no limit. The idea that a film like this should just be brushed off as fiction minimizes the fact that One Flew Over the Cuckoo's Nest seems to have stigmatized the most effective treatment in psychiatry for two generations.

The psychiatric hospital that Soderberg is reaching for is the spooky old asylum of the late 19th and early 20th century.  What made that asylum spooky was that people were freaked out about severe mental illness.  They did not know what it was and they did not have a name for the symptoms or disorders. They knew that some of their relatives went to these places and never came back. They lived the rest of their lives there.  They were warehoused and never got better.  That was the real scary part.  Most if not all of those places are shut down and have been for a long time.

The real horror story these days is trying to get into a mental hospital when it is needed.  Contrary to Sawyer's experience in the film, nobody is trying to recruit people into hospitals.  They are rationing the beds and turning people away.  All of the beds are typically full.  The emergency department psychiatric staff will do whatever they can to discharge.  A lot of people end up waiting a day or two and just give up and go home.  In some cases if people with mental problems are brought in by the police, the choice is admission to the hospital or jail.  Jail is the most likely outcome.

Jail is the real scary place these days and it has been for at least 20 years.  That is where a diverted patient needs to worry about incompetent or nonexistent treatment, physical assaults, and encounters with the evil people that Hollywood typically, uses to populate psychiatric hospitals.

The real evil out there today - is the system of non care that exists.  That is what people feared - developing a mental illness for which there was no treatment and being sent away for a lifetime. 

That is what Hollywood needs to understand.

That and a ton about modern psychiatric treatment.


George Dawson,  MD, DFAPA





Graphic Credit:  Inked Pixels.  A ghostly figure casts a long shadow down the middle of a dimly lit passage of a dilapidated mental asylum.  Downloaded from Shutterstock per their standard licensing agreement on 11/12/2018.