From impartial expert to adversary in the wake of Ake.

نویسنده

  • S Rachlin
چکیده

In deciding Ake v. Oklahoma, the Supreme Court held that, when defendants demonstrate that their sanity is likely to be a significant factor at trial, the State must assure them access to a competent psychiatrist who will not only examine them but also render other assistance to the defense. There have been 28 known subsequent decisions in which appellate courts have ruled on the validity of Ake-based claims; in only four did the defendant prevail. The case nonetheless raises issues relative to the proper role of the psychiatric expert. The Supreme Court's decisions, although not introducing a new ethical topic, appear to be favoring a more adversarial posture, at least within certain parameters. I suggest that impartiality, independence, and advocacy need not be mutually exclusive concepts and that some of our traditional beliefs about what part we should play in criminal law may have to be modified and expanded.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In the wake of Ake: the ethics of expert testimony in an advocate's world.

The decision of the U.S. Supreme Court in Ake v. Oklahoma redefined the role of psychiatrists as experts in criminal cases. In addition to the expert's serving as evaluator and witness, the Court stressed the importance of the defense having a psychiatrist available to act as a consultant in the preparation and presentation of its case. This broader conception of the expert's role has raised et...

متن کامل

Authenticated Key Exchange under Bad Randomness

We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks.We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomn...

متن کامل

Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model

Design a Secure Authenticated Key Exchange (AKE) protocol is a wide research area. Many works have been done in this field and remain few open problems. Design an AKE-secure without NAXOS approach is remaining as an open problem. NAXOS approach [18] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approa...

متن کامل

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA

In this paper, we prove the security of the RSA-AKE protocol [9] in the random oracle model. The proof states that the RSA-AKE protocol is secure against an adversary who gets the client’s stored secret or the server’s RSA private key. To our best knowledge, the RSA-AKE protocol is the most efficient among their kinds (i.e., RSA and password based AKE protocols). The other security properties a...

متن کامل

Notes on weaknesses in a leakage-resilient authenticated key transport protocol

Tang et al., [1] have showed weaknesses in a leakage-resilient authenticated key transport (so-called RSA-AKE) protocol [2] and then proposed an enhanced protocol. The objective of this paper is two-fold. First, we clarify some ambiguities that may cause misunderstandings on the RSA-AKE protocol by [1]. Second, we show that Tang’s protocol is insecure against a weaker adversary who gets the cli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • The Bulletin of the American Academy of Psychiatry and the Law

دوره 16 1  شماره 

صفحات  -

تاریخ انتشار 1988