Recent orders

Midterm Paper on Flame

Midterm Paper on Flame

Author’s Name

Institutional Affiliation

Midterm Paper on Flame

Abstract

This midterm paper focuses on addressing Flame as the selected significant cybersecurity event that has happened in the last 10 years. Flame was malicious software used for hacking classified information that occurred in 2012, causing substantial damage to intelligence in the Middle East. This paper examines the causes of Flame as an advanced cybersecurity incident, along with related threats. Furthermore, it delves into the vulnerabilities exploited by perpetrators, besides offering an account of its outcomes. The paper also considers changes to cybersecurity policy because of this malware attack.

Overview of the Cybersecurity Event

In 2012, hackers purportedly working with the United States National Security Agency partnering with the Israeli government developed and disseminated a nation-state-sponsored malicious hacker software called Flame, Skywiper, or Flamer(Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). This modular computer malware was advanced spyware intended to conduct cyber-espionage in Middle Eastern nations. The primary target was Iran as the attackers were interested in the intelligence surrounding the country’s nuclear program (Nakashima, Miller, & Tate, 2012). Eisenstadt (2016) and Knapp and Langill (2014) affirm that the motive was espionage by stating that while Flame was possibly a more sophisticated derivative of Stuxnet (a 2010 malicious computer worm intended for sabotaging and destroying computer systems), its intention was cyber-espionage and network reconnaissance.

Flame was discovered by security researchers from Kaspersky’s Lab, National Computer Emergency Response Team of Iranian MAHER Center, and Cryptography and System Security Lab at Budapest University of Technology and Economics (Gostev, 2012; Hoffman, 2012; MAHER Center, 2012). All these researchers agree that Flame was the most advanced, complex, and sophisticated malware strain ever developed. Flame targeted computers that were running on Windows OS, whereby it infected specific computers in homes, universities, and government institutions and agencies mainly Middle Eastern countries (Holt, Bossler, & Seigfried-Spellar, 2017). This spyware worked as a cyber-espionage tool that granted backdoor access to files in any system connected to these computers, which enabled the remote recording of network traffic, video conversations, and audio files, data theft, and capturing of keystrokes (Gostev, 2012; Zetter, 2012). Skywiper’s complexity and utility also allowed it to activate Bluetooth functions of infected computers to allow the logging of data from nearby Bluetooth-enabled mobile devices. Also, this malware could easily be rubbed from the infected systems when it became public to eliminate evidence of any infections (Holt, Bossler, & Seigfried-Spellar, 2017).

Causes of the Cybersecurity Event

Flame was not caused by an accidental result but rather by two specific causes: the failure to maintain adequate controls and an active cyber-attack.

Inadequate Security Controls

The Middle Eastern counties whose computer systems were targeted and infected failed to implement and maintain sufficient, state-of-the-art controls on their systems. Experts from Kaspersky Lab, who discovered Flame, established capability and technical gaps between the U.S. arsenal and the tools utilized by other nation-state groups (Cimpanu, 2019). These gaps are an indication that the controls deployed by the Middle Eastern nations for detecting potential cyber-attacks and cyber threats were inadequate. Also, Knapp and Langill (2014) acknowledge that Skywiper/Flame had remained active for years before being discovered. During this time, it was being used in mining sensitive data and returning such data to contemporary and sophisticated command-and-control (C2) infrastructure with 80 domain names. Also, it utilized servers that shifted between multiple locations in Germany, Hong Kong, Latvia, Malaysia, Poland, Switzerland, the U.K., and Turkey (Knapp & Langill, 2014).

Before its discovery, Skywiper existed in multiple modules that include Flame, Gadget, Frog, Munch, Suicide, Telemetry and Gator, Weasel and Jimmy, and Viper. As Knapp and Langill (2015) suggest, each of these modules had its capabilities that remained undetected until 2012, when the Skywiper module was discovered. For instance, Flame could handle routine AutoRun infections. Gadget updated automatically, allowing malware to evolve and accept novel payloads and modules. Frog exploited payloads for password theft, Munch exploited payloads able to capture network traffic, and Viper exploited payloads capable of capturing screenshots. Suicide possessed self-determination capabilities, Telemetry and Gator handled command-and-control routines, and Weasel and Jimmy dealt with file and disk parsing (Knapp & Langill, 2014; Knapp & Langill, 2015; Rubenstein, 2014). While Skywiper combined all these capabilities to execute espionage, these security controls and systems of Middle Eastern countries never detected any of them. This provides evidence that the inadequacy of cybersecurity controls of these countries was one principal cause of Flame.

An Active Cyber-Attack

The second major cause of Flame was an active spyware attack by hackers allegedly working collaboratively with the United States and Israeli governments (Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). The active attack was aimed at conducting cyber-espionage, mine data, and gather or steal intelligence about the Iranian nuclear program (Nakashima, Miller, & Tate, 2012). So, Flame was a malicious program planted in target machines to perform cyber-reconnaissance, siphon system information, hijack administrative accounts, grant high-level privileges to the hackers, and physically attack the target systems (Gostev, 2012; Zetter, 2012). So, besides espionage and network reconnaissance intents, physical attacks on targeted systems was also a motive behind this malware. The fact that Flame was a dynamic, smart, and sophisticated attack toolkit development by governments (Bahtiyar, 2016) means that its other cause was an active attack by governments against other governments. Flame’s modular and dynamic nature means that it can evolve into weaponized malware for use in executing more aggressive future cyber-attacks, hence necessitating advanced defense mechanisms for cyber-space protection (Bahtiyar, 2016; Knapp & Langill, 2015).

The Associated Threats

Flame related to three major threats. The first was a national security threat. The NSA and Israeli governments collaborated in using Flame to conduct cyber-espionage against Iran and other Middle Eastern countries, collect intelligence about Iranian nuclear efforts, and organize a cyber-sabotage campaign against the nuclear program (Nakashima, Miller, & Tate, 2012). This potentially raised national security concerns as the targeted nations could act in retaliation against the cyber-espionage. Cyber-reconnaissance tends to trigger national security threats, especially when sensationalized by the media (Rubenstein, 2014).

The second was the cyber warfare threat. Cyber-espionage conducted using Flame stimulated enmity between the involved parties, which could culminate in cyber warfare intents in the long run. Also, Bahtiyar (2016) and Knapp and Langill (2015) submit that the modular nature of Flame means that it can advance into weaponized malware that can be used in contemporary cyber warfare. For these reasons, politicians have been directing public policy towards combating cyber-espionage to inhibit the perceived cyber-war threat that remains high following the Flame-based attack (Rubenstein, 2014).

The last threat is that of unwanted cyber-surveillance. Flame’s architecture allowed it to be wiped from the infected systems, hence eliminating proof of any infections (Holt, Bossler, & Seigfried-Spellar, 2017). What this means is that the malware could be used to perform unwarranted cyber-surveillance without anyone noticing. This threat can become rampant in the future if such malware versions are deployed in spying stealthily on actors involved in classified government, military, and intelligence developments in different countries, which also has the potential of exacerbating the cyber warfare threat.

The Vulnerabilities Exploited

The hackers using Flame to conducted cyber-espionage exploited four vulnerabilities. The first includes the technical vulnerability of targeted systems that were because of inadequate security controls. Also, technical vulnerabilities emanated from the fact that the computer technology of targeted countries depended largely on foreign-made hardware and software, which made it virtually defenseless, hence exposing it to extreme vulnerabilities (Loiko, 2012). The second involved cryptography vulnerabilities where Flame used zero-day exploits of Windows operating system similar to those exploited by Stuxnet (Bahtiyar, 2016; Goyal et al., 2012; Knapp & Langill, 2014). This allowed Flame architects to exploit weaknesses in terminal server products of Microsoft and inadequate key-management decisions by the firm’s engineers to generate cryptographic seals that falsely certified Flame as a Microsoft product (Fillinger, 2013; Goodin, 2012). Thirdly, Flame exploited AutoRun vulnerabilities similar to Stuxnet to infect the USB sticks of targeted machines. Finally, it exploited print spooler vulnerability similar to Stuxnet, which allowed it to spread to computers rapidly on local networks (Zetter, 2012).

The Outcomes of the Cybersecurity Event

The principal impact of Flame was that it led to the loss of intelligence and highly classified information that was stolen remotely from Iran and other Middle Eastern countries. Another impact was that its discovery exposed governments’ engagements in sponsoring the development of sophisticated malware that can target industries such as the energy industry. The last impact was that Flame sensitized software architects and engineers from companies such as Microsoft to adopt more proactive design security measures to ensure the security of their update and certificate generation mechanisms (Goodin, 2012).

Changes to Cybersecurity Policy Due to the Event

After the Flame attack, no significant changes have been made in cybersecurity management and policy. The only change is the shift in cybersecurity policy on cyber warfare and cyber-espionage. Specifically, Flame sensitized and awakened cybersecurity policymakers to refocus their attention on combating cyber-espionage to curb cyber-warfare emergence (Rubenstein, 2014). Being wary that Flame and similar malware and spyware can be weaponized, these policymakers are pushing for policies that limit domestic and overseas cyber-espionage activities. Policy experts in intelligence in some countries are also considering outsourcing intelligence services to streamline their cybersecurity management functions.

Conclusion

Following the Flame occurrence, three lessons can be learned. Firstly, governments can be behind the development and deployment of sophisticated malware for cyber-espionage, network reconnaissance, and cyber-based intelligence theft. Secondly, not all software updates and OS upgrades are genuine as some could be high-tech spyware like Flame disguised in software updates. Companies like Microsoft should take this lesson seriously. Lastly, companies, institutions, and countries need to always keep their C2 infrastructure up-to-date to increase the chances of detecting when similar malware is trying to infect their systems. Concisely, Flame sensitizes governments to be proactive and tech-savvy in securing their intelligence, classified data files, and confidential government information from theft by other governments.

References

Bahtiyar, Ş. (2016). Anatomy of targeted attacks with smart malware. Security and Communication Networks, 9(18), 6215-6226.

Cimpanu, C. (December 12, 2019). A decade of hacking: The most notable cyber-security events of the 2010s. ZDNet: CBS Interactive. Retrieved March 06, 2020, from https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/.

Eisenstadt, M. (2016). Iran’s lengthening cyber shadow. Policy Paper No. 34. Washington Institute for Near East Policy.

Fillinger, M. J. (2013). Reconstructing the cryptanalytic attack behind the Flame malware (Doctoral dissertation, University of Amsterdam).

Goodin, D. (June 04, 2012). “Flame” malware was signed by rogue Microsoft certificate. Wired Media Group. Retrieved March 06, 2020, fromhttps://arstechnica.com/information-technology/2012/06/flame-malware-was-signed-by-rogue-microsoft-certificate/.

Gostev, A. (May 28, 2012). The Flame: Questions and answers. AO Kaspersky Lab. Retrieved March 5, 2020, from https://securelist.com/the-flame-questions-and-answers/34344/.

Goyal, R., Sharma, S., Bevinakoppa, S., & Watters, P. (2012). Obfuscation of Stuxnet and Flame malware. Latest Trends in Applied Informatics and Computing, 150, 154.

Hoffman, V. C. (May 30, 2012). Meet Flame, the Ebola virus of malware. CIO: IDG Communications, Inc. Retrieved March 5, 2020, from https://www.cio.com/article/2371366/meet-flame–the-ebola-virus-of-malware.html.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, 2 Ed. Syngress.

Knapp, E. D., & Langill, J. T. (2015). Hacking industrial control systems. In Industrial Network Security, 171–207. Doi:10.1016/b978-0-12-420114-9.00007-1.

Loiko, S. L. (May 31, 2012). Russia computer experts who detected Flame malware issue warning. The Los Angeles Times. Retrieved March 06, 2020, from https://www.latimes.com/world/la-fg-russia-flame-cyberwar-20120531-story.html.

MAHER Center. (May 30, 2012). Identification of a new targeted cyber-attack. Iran Computer Emergency Response Team. Retrieved March 5, 2020, from https://www.webcitation.org/682bfkhaU?url=http://www.certcc.ir/index.php?name=news&file=article&sid=1894&newlang=eng.

Nakashima, E., Miller, G., & Tate, J. (June 19, 2012). U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. The Washington Post. Retrieved March 06, 2020, from https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html.

Rubenstein, D. (2014). Nation state cyber espionage and its impacts. Washington University in St. Louis.

Zetter, K. (May 28, 2012). Meet “Flame” the massive spy malware infiltrating Iranian computers. Wired. Retrieved March 5, 2020, from https://www.wired.com/2012/05/flame/.

Model Individual Winning Business Proposal for the Homeland Plastics Case

Model Individual Winning Business Proposal for the Homeland Plastics Case

Author’s Name

Institutional Affiliation

Model Individual Winning Business Proposal for the Homeland Plastics Case

To: Project Manager Date: April 27, 2012

From: [Student Name],

Re: Proposal; Homeland Plastics should suspend its operations in Ramina

Background. As a result of the concerns raised in regard to environmental issues relating to Homeland Plastics, it is essential to appreciate that it is a universally accepted foundational concept of business that the primary principle of Homeland Plastics is to maximize profits. Although, there is nothing erroneous with profits maximization, the unceasing pressure for maximum profits may create several ethical problems for Homeland Plastics’ operations in Ramina.

Proposal. Taking into consideration the ethical issues, I suggest that Homeland Plastics suspend operations until it complies with the water emissions guidelines established by Finland’s Ministry of the Environment (MEF). On the other hand, the alternative would be to relocate to Vyborg, where the established water emissions guidelines are less stringent. However, taking into consideration the cost of doing business between the two locations, I hereby propose that Homeland Plastics relocates to Vyborg.

Reasoning. I hereby suggest that, in the best interest of Homeland Plastics, it would be more appropriate to comply with water emissions guidelines established in Ramina. This would however, bring about the issue of business ethics. Business ethics may be largely extraneous for the majority of managers, since it fails to offer any convenient advice. On the other hand, as a chemical engineer, I am of the opinion that moral philosophy, has a propensity to value altruism, the concept that an individual ought to do good, since it is appropriate, or will be of advantage to others, but not since the individual will profit from it. Homeland Plastics is duty bound to protect the environment it operates in, but on the contrary, business ethics may conflict with profit maximization. From a business ethics perspective, externalities permit companies such as Homeland Plastics to contaminate environmental habitat or result in human heath concerns. It ought to be comprehensible that if an externality causes harm to the environment or harms a person, then that externality is an obvious infringement of ethics. However, a number of senior managers in Homeland Plastics may not appreciate the ethical repercussions of the externalities and ecological damage. While all stakeholders in this issue realize Homeland Plastics is rather of a black box in this proposal, the consequence is still an awkward blurring of the confines between the profit maximization, and the quest of self-interest. For instance, the confines between altruism and self-interest, interests and ethics, economic realities and ethical demands, financial and moral costs, and ethical imperatives and profit motives are not readily distinct at Homeland Plastic’s case.

On the other hand, Homeland Plastics’ senior management is bound by fiduciary responsibility.  Fiduciary responsibility in this regard applies to the responsibilities of Homeland Plastics corporate directors to implement the best interests of the company. If the directors of Homeland Plastics construe this mandate narrowly, then there would be a short-range focus on profits that would ultimately harm both the business and society. The unevenness arises from the reality that profit maximization is obliquely justified. It is constructive to note that this predicament is one that business ethics would share with legal principles.

The best next steps: It is essential to note that, the concern with competitive markets that Homeland Plastics engages in, and the market-clearing prices, is not merely an abstract, philosophical hypothesis concerning what may justify the drive for profit-maximization. The whole legal structure of Homeland Plastics, in conjunction with the pertinent regulatory environment, should be organized in a way that would promote competition, as well as the exact category of competition that is liable to produce market-clearing prices.

Mock Counseling Session

Mock Counseling Session

John Doe

University of Central Florida

Abstract

Professional counseling can be very beneficial to one’s health and well-being. Counseling is used to help clients with change, prevention, or life enhancement. Unfortunately, many people are unaware of the potential benefits and complexity of true counseling. There are many theories and methods which are used to treat clients and regardless of the counselors preferred method they must be trained sufficiently at conducting counseling sessions and interviews. A mock clinical diagnostic interview was conducted with a mock-client and many important skill sets learned through the course were utilized. The counseling session is guided by both non-verbal communication and verbal communication. Active listening and understanding of the clients presenting issues guided the mock session.

The cosmic amount of different theoretical orientations and techniques used by psychotherapists can be overwhelming. The styles are constantly changing as new findings come out. Even psychodynamic theory, which is one of the oldest known theories and links back to Sigmund Freud, has been altered in certain cases to a more contemporary method which is “less dogmatic, more flexible and integrative, supported by evidence, more pragmatic, highly attentive to relational needs, less hierarchical and applicable to a wide range of clinical problems with vulnerable populations” (Bliss & Rasmussen, 2013). The varieties of techniques are ideal for certain situations and a counselor must pick and choose depending on their clients’ needs. Cognitive-behavioral therapy, behavioral theory, humanistic theory, existential theory, and eclecticism theory are just some examples of different styles employed in psychotherapy and are certainly dissimilar to each other.

Counseling has an impressive length of history and can be traced back to the Enlightenment period. Counseling is not necessarily a hard science in a sense because the lack of one specific guideline. According to the American Counseling Association, professional counseling is “the application of mental health, psychological and human development principles through cognitive, affective, behavioral and systematic intervention strategies, which address wellness, personal growth, and career development, as well as pathology” (Kaplan, Tarvydas, & Gladding, 2014). Counseling has many different specialties each suited for different scenarios. However, a common goal of all counseling is to help the client with change, prevention, or life enhancement (Hackney & Cormier, 2013). Unfortunately, many people that could benefit from counseling fail to give it a try due to cultural reasons, bias reasons, or simply are intimidated by the whole process. Some individuals might fear that seeking counseling would damage their family’s reputation due to strong stigma by close others, which might result in the individuals’ development of negative attitudes toward seeking professional help and a lack of willingness to seek counseling (Choi & Miller, 2014).

A mock clinical diagnostic interview was conducted to practice using the skills learned for counseling throughout the course. The interviewing process takes hundreds of times to fully master it and this was my initial interview. Probing is important in the clinical diagnostic interview and when a client states something with an imperative meaning the investigation should be made to further dissect the potential problems. Base lines of questions have been set forth to ask the client but are not meant to be strictly followed but rather as a dedicated guideline. Inferences based on what the client articulates should be given in detail by the client and redundancy should be avoided in the interview.

The counseling intake interview I would be performing is a very important process. “Intake interviews, as part of the assessment phase of counseling, gather information about the client’s reasons for seeking counseling, current and past functioning, social history and interpersonal style, and goals for counseling” (Mears, 2009). First impressions are vital while trying to establish a relationship with the client. If the client feels too uncomfortable with the therapist for any reason proper treatment may not be available or the client could even choose not to continue the counseling process. In this primary interview conducting a good starting rapport with the client will be the main goal along with deciding which psychotherapy technique to use in future sessions. With further counseling down the road and a stronger relationship with the client I could then begin defining the presenting problem, identifying and setting goals, choosing and initiation interventions, and planning termination and follow-up.

Before the mock interview I prepared myself emotionally and physically. Physically, I made sure I was well groomed and would be taken seriously by the client while at the same time seem approachable and not make the client feel awkward. The goal is to make the client feel comfortable enough to open up and even something so subtle such as counselor appearance can have an effect on the mood. I also made sure the mock office was a comfortable setting and ensured there wasn’t going to be any furniture between us which could produce a psychological barrier. As for my psychological preparation, I recited the questions to be asked beforehand so it would be one fluid motion when the time arrived. I also prepared probing questions and studied some Rogerian examples as a refresher to person-centered therapy.

As my mock client walked in I stood up and greeted her. We sat down adjacent to each other and began the mock session. The communication within a counseling session is both verbal and non-verbal. I made sure to sit with an open, relaxed posture as to convey comfort with the process. I would be using the head nod at certain times to show acceptance and understanding of what the client has to say. I also was mindful of my facial expressions because it has been found that “long-held belief that counsellors must engage their clients in a meaningful and demonstrable manner as indicated by their non-verbal behavior appears to generalize to their facial expressions also” (Sharpley, Jeffrey, & Mcmah, 2006). Since the client is at the interview to express her thoughts verbally, I knew when to remain silent and when to speak. One of the most important things a counselor does is listen. The self-improvement of a client is seeking is actually within themselves and the therapist is there to help make that happen. Silence is powerful and encourages many positive effects.

Before this counseling intake interview began I dwelled into as much information on the client as possible and read all paperwork given on the client. Since the purpose of the intake interview is to gather information necessary for the evaluation and treatment of the client I made sure to take notes as we began. I was really interested to know as much as I could about the client so I had her clarify what she is like as a person and important figures within her life. I made sure to have her tell me any current complaints and any history of psychiatric problems as well. She expressed that she has a certain degree anxiety to me. Anxiety is not uncommon for her age, “mental disorders appear to be on the rise among college students and are having a significant effect on their attrition, with anxiety identified as one of the most common presenting issues” (Lindsey, 2014). The anxiety even affects some aspects of her life while lowering self-confidence and having somewhat of a negative impact on everyday things such as driving, working, and sometimes shopping. There were no visible medical complications except a lack of sleep at times due to the anxiety. This lack of sleep was very uncommon so it was not too worrisome. If there had been much sleep disturbance it could be linked to a more serious psychiatric problem as “sleep disturbance is significantly linked with an onset of major depressive disorder” (Batterham, Glozier, & Christensen, 2012). The most recent episode had been about a week ago. She said the episode seemed to increase as she gets older but could not decipher the origination or what triggers it.

While interviewing the mock client I used a variety of verbal skills used by professional counselors. I used open-ended questions, closed questions, clarification responses, reflection responses, minimal reinforcers and paraphrases. The main purpose of using these techniques is to “keep the focus on the clients, their stories, and their reactions” (Hackney & Cormier, 2013). As the interview went on she distressed a traumatic experience with an American Staffordshire Terrier when she was young, which could actually be the source of her anxiety. I then used an open-ended question to probe further into this problem. After further details I determined that this was an important life event that affects her even today so made note to follow up on this subject later on in future counseling sessions because a main goal during the intake interview is to lay the foundation for future interactions. Confronting a client too early in an emerging relationship could have devastating effects. I recited a summary statement of the traumatic event and story she told me to let her know I was actively listening.

After we had been in the interview for some time, I noticed she had resentment towards her father’s work schedule. I used a technique call the interpretation response for this and introduced a counselor-initiated interpretation. This response is used to assign meaning to a feeling that the client is having. The meaning of the feeling can then be moved in a different direction. I tried to use the information given as a question and had the client interpret the meaning. When the client interprets the meaning the therapist can either accept or modify what they have to say.

By the end of the counseling session I had probed more into the anxiety disorder the client had been describing. I suggested that there are many coping strategies that may help with the anxiety including perspective taking, communication strategies, anxiety relief tactics, diversions, self-reflection and self-help, and reviewing possible scenarios (Mortensen, 2014). I gave her the information on potential coping strategies and she agreed to come back for further testing to determine exactly what would be right for her.

In conclusion the mock clinical diagnostic interview conducted was excellent overall and helped clarify many details I was unsure of before I began. Learning about how beneficial counseling can be has given me a deep respect towards psychologists. The Professional Counselor, A Process Guide to Helping by Harold L. Hackney and Sherry Cormier really helped guide me through this mock-interview and this course as a whole. Being a counselor requires someone very knowledgeable and patient and this firsthand experience helped me appreciate the study that much more.

References

Batterham, P. J., Glozier, N., & Christensen, H. (2012). Sleep disturbance, personality and the onset of depression and anxiety: Prospective cohort study. Australian & New Zealand Journal Of Psychiatry, 46(11), 1089-1098. doi:10.1177/0004867412457997

Bliss, S., & Rasmussen, B. (2013). Reflections on contemporary psychodynamic theory in clinical social work. Journal Of Social Work Practice, 27(3), 211-215. doi:10.1080/02650533.2013.818938

Choi, N., & Miller, M. J. (2014). AAPI college students’ willingness to seek counseling: The role of culture, stigma, and attitudes. Journal Of Counseling Psychology, 61(3), 340-351. doi:10.1037/cou0000027

Hackney, H., & Cormier, L. (2013). The Professional Counselor: A Process Guide to Helping. (7th ed.) Boston: Pearson.

Kaplan, D. M., Tarvydas, V. M., & Gladding, S. T. (2014). 20/20: A Vision for the Future of Counseling: The New Consensus Definition of Counseling. Journal Of Counseling & Development, 92(3), 366-372. doi:10.1002/j.1556-6676.2014.00164.x

Lindsey, C. (2014). Trait Anxiety in College Students: The Role of the Approval Seeking Schema and Separation Individuation. College Student Journal, 48(3), 407-418.

Mears, G. (2009). Conducting an intake interview. In I. Marini, M. A. Stebnicki (Eds.) , The professional counselor’s desk reference (pp. 127-134). New York, NY, US: Springer Publishing Co.

Mortensen, R. (2014). Anxiety, work, and coping. The Psychologist-Manager Journal, 17(3), 178-181. doi:10.1037/mgr0000020

Sharpley, C. F., Jeffrey, A. M., & Mcmah, T. (2006). Counsellor facial expression and client-perceived rapport. Counselling Psychology Quarterly, 19(4), 343-356. doi:10.1080/09515070601058706

APPENDIX, TRANSCRIPT:

Therapist: Could you tell me about your childhood. What was it like growing up?

Client: Umm, I had a pretty solid upbringing. My parents stayed together and took good care of my sister and me. We moved a few different states because of my dad’s job and ended up in Florida.

Therapist: Oh?

Client: I didn’t get to keep friends for very long because of the constant moving.

Therapist: I understand that you had to move a lot as a child because of your father’s job and earlier you stated that you weren’t looking forward to seeing him during the holidays. Do you think you resent him because of the constant moving?

Client: I’m sure that has a lot to do with it. I just feel like he never made time for us.

Therapist: So you feel hurt by the fact that he was always working.

Client: Kinda, I know he loves us but I think he could have tried to spend more time with us.

Therapist: That must be very difficult for you. Is this something that you would like to address more during the course of therapy?

Client: Thanks, sure.

Therapist: Can you tell me about your relationship with your mother? What is she like as a person, and what was she like as a parent?

Client: I’m very close with my mom and in terms of the type of mother she was, she was always caring and like catering to others. Do you know what I’m talking about?

Therapist: So your mom is attentive?

Client: Yes, always putting the needs of others and the people she cares about before her own.

Therapist: Now I’d like you to describe a specific encounter with your mother, something that stands out. It can be an incident that’s typical of your relationship, really meaningful, really good, really bad, whatever comes to mind.

Client: I remember I ran off and got lost at a mall once when I was young and she searched frantically and found me despite how many people there were. I was scared and was crying and she came and comforted me.

Therapist: That must have been a chaotic time for you. Is this one of the reasons why you say she is so caring?