Such cooperation creates a new vulnerability, and such cooperating aggregations may be invaded by ``cheaters'', which insert themselves between cooperating individuals, and steal the CPUs as they pass from individual to individual.