As a result of all these interwoven variables, it is very difficult to say that a particular group, in all branches, at all times, affects all members in a particular way. Nevertheless, trained social workers and therapists know a dangerous cultic group environment when they encounter it—and so treat former members in various degrees of These helping professionals know it is the intense psychosocial dynamic of these high-demand/high-control cultic groups and their charismatic (and often narcissistic) leaders that are at the core of their clients’ sense of abuse and trauma.
– Source: Russell H. Bradshaw: What is a cult? Definitional Preface , ICSA Today, Vol. 6, No. 3, 2015, 8-9
There are some subtle overlaps, however, since basic knowledge about computer security is also common within the programmer subculture of hackers. For example, Ken Thompson noted during his 1983 Turing Award lecture that it is possible to add code to the UNIX "login" command that would accept either the intended encrypted password or a particular known password, allowing a back door into the system with the latter password. He named his invention the " Trojan horse ". Furthermore, Thompson argued, the C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. However, Thompson disassociated himself strictly from the computer security hackers: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang , the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts."