We start from a set of users communicating over a Gaussian multiple access wire-tap channel with confidential messages, where users attempt to transmit private messages to a legitimate receiver in the presence of an eavesdropper. While prior work focused on the case where the users were cooperative, we assume that...