Idea for tamper-resistant PC hardware

2001-01-12 Thread drevil


Here's something I would like to see: a harddrive that is
tamper-resistant.  The threat model is a server is deployed in an
untrusted machineroom, and recovery of plaintext from the system is
unacceptable.  One obvious attack, involving an encrypted hard drive,
is for the attackers to have a "power failure" and then remove the
encrypted hard drive from the server, and reinstall it in an
"instrumented" server which can recover key data.  I want to defeat
that attack.

One obvious way to do that would be to have a bunch of thermite, or
explosives, or whatever that trigger when the thing is tampered with.
That's fine, but as a general rule, if the solution to the problem
requires explosives, I would rather try to find a different problem.

So here's another solution.  The hard drive itself is encrypted, and
the encryption/decryption hardware is part of the hard drive chips,
and all are mounted within a tamper-resistant enclosure.  Also mounted
in this enclosure is a little battery which will last for the lifetime
of the harddrive, and a large-enough capacitor.  When the enclosure is
tampered with, the capacitor sends a jolt through the chip that holds
the encryption key.  This jolt is big enough to melt the silicon, so
no key bits could be recovered (this would not require much of a jolt,
I would think).  Then the attacker would have the hard drive, but no
way to decrypt it.  Obviously, it would need sensors to detect
tampering with the case, and tricks liking freezing the thing, using
radiation, whatever.

This allows us to have data be permenantly destroyed, and the hard
drive permenantly deactivated, without doing any crazy stuff involving
pyrotechnics which looks bad in the media.  "The computer exploded,
injuring the thieves" looks much worse than "The thieves tripped a
safety mechanism and were unable to recover any data from the
computer."  It would also allow everyhting to be done in a
normal-looking PC case.

So the total solution would be a computer case with sensors which
trigger the capacitor in the hard drive, and also sensors in the hard
drive enclosure which trigger destruction of the key.

It seems like this wouldn't be such a complicated thing to implement.
Any thoughts on this?




SGBvsLei@aol.com

2001-01-12 Thread Blank Frank

At 08:52 PM 1/11/01 -0500, [EMAIL PROTECTED] wrote:
i saw ur name somewhere on a board,... u were talking about NORTON YOUR
EYES
ONLY,.. i was wondering if u knew where i could get the US version or
if u
could send,... thanx,...

Soliciting to steal software?  We've contacted the BSA and AOL.  Expect
a visit at home sometime soon.  You *do* have licenses for what's on
your hard drive, don't
you?

Chump.






Re: Idea for tamper-resistant PC hardware

2001-01-12 Thread mmotyka

I guess if your critical server is simply some sort of service provider
and the only data requiring security are the operating keys then your
hostile location is OK since rebuilding a system and restoring a few
keys ( which can be hidden just about anywhere ) is easily done.
Otherwise the loss of the data could be costly. 

If your data is static then it would be relatively easy to stash a copy
somewhere. If your data is dynamic then backups are necessary. Backups
can be tracked to their resting place. So their location needs to be (
physically and legally ) secure from the threat(s). Unless you can
readily hand carry the backups to the secure storage area it will need
to be connected in which case you might as well locate your server there
in the first place.





Unable to pay your supplier?

2001-01-12 Thread htlqztvkbj

ATTENTION BUSINESS OWNER/OPERATOR  15

From time to time, most companies experience a cash flow problem.   These problems 
can range from temporary cash crunches with the inability to pay trade creditors and 
suppliers within the granted credit terms to more serious problems including 
bankruptcy and liquidation.

If you own or operate a company with a cash flow problem, we can help.  Brown  
MacMillan is a national consulting company specializing in reducing problem debts for 
companies of all sizes.  Since our inception in 1994, we have helped hundreds of 
companies including small "mom and pops" to large multi-national organizations.  We 
keep our clients out of the legal system so they can concentrate on their business 
enabling a large savings in both time and money.  

We typically reduce our client's accounts payable and other debts to less than 20 
cents on the dollar!  In fact, our settlements rarely go higher than 35 cents on the 
dollar.  Furthermore, we put our clients in a no lose situation.  We always give them 
the opportunity to accept or reject any settlement we negotiate for them.  If they do 
not like the settlement we negotiated, we charge them nothing.  If they accept, our 
fee is based on a small percentage of what we saved them over the original amount 
owed.  Therefore, we don't charge by the hour, never charge a retainer, but only get 
paid when you accept a satisfactory settlement that we have negotiated on your behalf.

If your creditors are constantly calling your company for payment, or have even 
retained a collection agency or attorney, I strongly urge you to fill out the form 
below and fax it back to us.  Just imagine what your cash and working capital 
positions would look like in a few short weeks after an 80% reduction of debt.  You 
have absolutely nothing to lose.

Sincerely,


Brown  MacMillan


Please fill out this form and Fax to 1-775-402-4756. If this line is busy, please try 
faxing to 1-413-845-9314.


Name: _


Company: __


Phone Number: __


Best Time to Call: 












**
Another Internet Ad campaign produced and distributed by:
Global Advertising Systems, Fort Worth, TX 76112. If you would like to be removed from 
our mailing list email [EMAIL PROTECTED] with remove as the subject.
*






This is going to be a GREAT year for you! Take 5 min.

2001-01-12 Thread Financial Freedom


This is going to be a GREAT year for you! Take 5 min.  

Please read all of this! 

EARN $100,000 PER YEAR SENDING E-MAIL!!!

***

You can earn $50,000 or more in the next 90 days sending e-mail, seem
impossible?  Read on for details (no, there is no 'catch')...

---

"AS SEEN ON NATIONAL T.V."

Thank you for your time and Interest.
This is the letter you've been hearing about in the news lately.

Due to the popularity of this letter on the internet, a major
nightly news program recently devoted an entire show to the
investigation of the program, described below, to see if it really
can make people money.

The show also investigated whether or not the program was
legal. Their findings proved once and for all that there are,
absolutely no laws prohibiting the participation in the program.
This has helped to show people that this is a simple, harmless
and fun way to make some extra money at home.

The results of this show have been truly remarkable. Since so
many people are participating now, those involved are doing much
better than ever before. Everyone makes more as
more people try it out. It is very, very exciting to be a part of
this plan. You will understand once you experience it.

"HERE IT IS, BELOW"




   *** Print This Now For Future Reference ***

The following income opportunity is one you may be
interested in taking a look at.  It can be started with VERY
LITTLE investment and the income return is TREMENDOUS!!!



If you would like  to make at least $50,000 in less than 90
days! Please read the enclosed program...THEN READ IT
AGAIN!!!





THIS IS A LEGITIMATE, LEGAL, MONEY MAKING
OPPORTUNITY.   It does not require you to come into
contact with people, do any hard work and best of all, you
never have to leave the house except to get the mail.  If you
believe that someday you'll get that big break that you've
been waiting for, THIS IS IT!  Simply follow the instructions,
and your dreams will come true.  This  e-mail marketing
program works perfectly...100%, EVERY TIME.  E-mail is the
sales tool of the future.  Take advantage of this
non-commercialized method of advertising NOW!!!  The
longer you wait, the more people will be doing business using
e-mail. Get your piece of this program now!

MULTI-LEVEL MARKETING (MLM) has finally gained
respectability.  It is being taught in the Harvard Business
School, both Stanford Research and the Wall Street
Journal have stated that between 50% and 65% of all goods
and services will be sold through multi-level methods by the
late 1990's.  This is a Multi-Billion Dollar industry and of
the 500,000 millionaires in the U.S., 20% (100,000)  made
their fortune in the last few years in MLM.  Moreover,
statistics show 45 people become millionaires everyday
through Multi-Level Marketing.

You may have heard this story before, but over the summer
Donald Trump made an appearance on the David Letterman
Show. Dave asked him what he would do if he lost
everything and had to start over from scratch. Without
hesitating, Trump said he would find a good network
marketing company and get to work.  The audience started
to hoot and boo him. He looked out at the audience and
dead-panned his response - "That's why I'm sitting up here
and you are all sitting out there!"

With network marketing you have two sources of income.
Direct commissions from sales you make yourself and
commissions from sales made by people you introduce to the
business.

Residual income is the secret of the wealthy. It means
investing time or money once and getting paid again and
again and again.  In network marketing, it also means getting
paid for the work of others.

The enclosed information is something I almost let slip
through my fingers.  Fortunately, sometime later I re-read
everything and gave some thought and study to it.

My name is Ellie Gilbert. Two years ago, the
corporation I worked for, the past twelve years, down-sized
and my position was eliminated.  After many unproductive job
interviews, I decided to open my own business.  Over the
past year, I incurred many unforeseen financial problems. I
owed my family, friends and creditors over $40,000..
I just couldn't seem to make ends meet.
I had to refinance and borrow against my home to support
my family and struggling business.
AT THAT MOMENT something significant happened in my life
and I am writing to share the experience in hopes that
this will change your life, FINANCIALLY, FOREVER!!!

In mid December, I received this program via e-mail.  Six
month's prior to receiving this program I had been sending
away for information on various business opportunities. All of
the programs I received, in my opinion, were not 

Re: NONSTOP Crypto Query

2001-01-12 Thread Harmon Seaver

John Young wrote:
 We've been unable to retrieve more than a few words from
 the redacted portions (by use of xerography to reveal text
 below the overwrites), and would appreciate any leads on
 what NONSTOP means. Joel McNamara has been searching
 for NONSTOP info for some time:
 

I happen to admin a Tandem "NonStop" K-200. Not sure how truly
secure they are, but from my experience I'd say it's more security thru
obscurity than anything else, i.e., almost nobody has any knowledge or
experience with the OS, unlike unix and windoze, so info doesn't get
shared around, etc. The OS is Guardian and is extremely primitive. They
don't run C or anything else known to mankind. Well, there is know a
"unix shell" that runs on top of Guardian, with an extremely limited
command set and functionality, which does allow C code to run, but it's
not accessing low-level stuff, no hardware calls, etc. 
 Tandem was/is used mostly in banks and the like. The "nonstop" is a
bit of a joke, really -- yes, the hardware is robust, everything is
hot-swapable, but the software (at least ours) crashes a lot. You could
have a much better and more robust system with a unix cluster. 
And of course, Tandem was a dead horse on the verge of bankruptcy
when it was bought by Compaq, about the same time Compaq bought DEC. So
now they've got Tandem "NonStop" servers which run the DEC Alpha
processors and unix. I'm sure Compaq will kill off the old Tandem line
as soon as they can, just like they are with the DEC Vaxes. Support,
yes, but no further development. 
So the bottom line here is this -- I'd really rather doubt that the
NONSTOP referred to above has anything to do with Tandems. Certainly
they aren't running Tandem stuff on planes and vehicles -- this is heavy
iron -- and if the fedz are depending upon anything as primitive as the
Tandem OS to protect secrets, I pity them. 



-- 
Harmon Seaver, MLIS Systems Librarian
Arrowhead Library SystemVirginia, MN
(218) 741-3840  [EMAIL PROTECTED] 
http://harmon.arrowhead.lib.mn.us





Crypto sci fi: The Talking Kit

2001-01-12 Thread Blank Frank


Mary tried to ignore the sobbing of her sister in the next room.  It
had been two days since They came to her village and she was still in
shock.  Two days is the minimum time to wait, Alex had said, before
Talking.  Alex was the fellow from the Engineers Sans Frontiers who
had given her the Kit.  This was not first time she had to use it, but
it was over a year ago... she tried not to remember.

The ESF had come into her wartorn country, as they always did
whereever they saw the poverty that follows tyranny.  The Engineers,
Mary had heard, got their money from some anonymous group of
California Norte businessmen, from that place they called
Sallay-Vallay, but Mary knew little of such distant things.  They had
the geopolitical immunity of the Red Circle or Docteurs Sans Frontiers
agencies but were more like the Corps of Engineers.

The ESF had come to build (or rather, repair) the roads into the
villages.  This was permitted by the Rulers, it was after all free
help.  They could set up  generators but that was about all that the
Rulers wanted the peasants to have.  There were not enough trusted
police to monitor all the calls if every village had phones, after
all.

Besides the bulldozers, chainsaws, and other machinery for turning
jungle into road, the ESF brought equiptment that let them stay in
touch with their headquarters.  They had some kind of telephones, that
didn't need wires.  But their communications were as controlled as the
peasants.  Armed soldiers loitered around the engineers' base and kept
an ear towards the phone station.  The ESF were guests of the Rulers,
dismissable at their whims.  Much like the Soldiers dismissed
peasants in night raids, only with less permenance.

...


During her regular chores, Mary snuck out to The Place where she had
buried It.  Under the jungle mould was an olive drab case that she
brushed off and lifted out onto the ground.  She unlatched it and took
out the metal box within.  Then she put the waterproof case back under
cover.  She moved away from that site, taking the metal box.

Sitting down, she took a key from around her neck and unlocked it.
Inside was a pocket-sized computer, a solar panel and some batteries,
and a small tin that originally held mints but now had electronics
inside and a pair of buttons and LEDs outside. There were some other
cables in there too.

Mary knew none of these words, indeed she could not read or write.
But Alex had explained to her how to use it, and made her demonstrate
what he had taught until she was confident.

Mary slid the little black stone on the side of the larger, silvery
slab with the shiny window.  It beeped, lit up, then pictures appeared
in the glowing window.  A little blue line at the bottom of the window
was  most of the width of the window, which was good: it
meant she wouldn't need to fill up the little yellow cylinders, which
took a day.  You had to put the cylinders into metal holders in the
back of the blue plate and then leave the plate in the sun for a day.
Blue side up.  And the cylinders had to be pointed the right way, though

there were little pictures near the holders to show you ---the
cylinders had a nipple on one end and were flat on the other.  The
ends had different markings, too, one like the cross worn by the
missionaries who occasionally visited, and one a single line.

It was also possible to make fuel by turning the handle of a little
gadget that Mary had seen, which was good because you didn't have to
wait for the sun, but she didn't have one of those.  One of her
neighbors had a radio that worked with such a handle; turning the
handle for a minute would play about half an hour's worth of music
from the one station that they could hear.  You could see inside this
radio, and there was a coiled spring in there, and it rapidly turned the

shaft of something that actually made the fuel for the cylinders.
Turning the handle coiled the spring, which then turned the
fuel-maker.  How spinning a shaft could make fuel was beyond Mary's
comprehension, but it worked.  The missionaries had been impressed by
Mary's ability to turn fur into fine thread with a spinning shaft, but
you could *see* that; making radio-fuel by spinning was invisible.
That radio had also been a gift from another fellow with the ESR.

The little window now showed a padlock, which told Mary that the box
had checked itself over and was healthy.  She also looked at the sides
of the box, and saw that the wax along its sides was unscratched.  It
wasn't wax exactly, it was wax that hardened into stone, "metal poxxi"
Alex had called it.  It made it very difficult to open the window-box
(except for where you put the cylinders into it), and nearly
impossible to open and put back together without it being evident.
But no one had found the buried case or opened the locked tin or
changed the insides of the window-box.  Alex had explained that she
was trusting the box to protect her secrets, and that if someone
tampered with it it 

Re: Consensus Actions in Cipherspace?

2001-01-12 Thread David Honig

At 06:01 PM 1/12/01 -0500, Ray Dillinger wrote:

Crucial facts about a protocol that does the right thing would be: 

1) DOES NOT create any single priveleged user or machine. 

2) Resistant to denial-of-service attacks and attempts to 
   "stack the vote." (Requires user authentication)

3) No altered versions of the agent ought to be able to gather
   enough information to force an action as long as at least 
   the majority of agents are unaltered.

4) Once a consensus is reached, a majority of the agents acting
   together should be able to take whatever action is found
   even if the dissenters' agents don't cooperate with them.
   (a consensus reassembles a key?  But then that key can't 
   be used again, what's the next key?)


Interesting idea.  Starting with 1 user who can admit (by virtue 
of having 100% of the vote) and then letting the users vote
to add others.  

I don't think reassembling the key is the final stage.  I think
the server could simply use a voting protocol to get (or timeout) 
permission to do proposed actions.  We are assuming that the server
is trusted, right?  

The server could send signed PGP-encrypted email to all members saying: 
"The following script has been proposed to be run by GroupServer for your
Group.. to vote yes or no, sign a yes or no message and encrypt and send it
to GroupServer.  This vote closes in 3 days, and votes are acknowleged
immediately."


Perhaps I'm not clear on what constitutes an action that could
be distributed without relying on a trusted actor (server).  

(Thinking out loud) Maybe the actions require access to a distributed
N-of-M database?   How do you prevent someone from reusing the
reconstructed database?  Or uncooperatives refusing to update their slice
of the DB?  




 






  








Jim on EM

2001-01-12 Thread mmotyka

Jim,

I remember that whole Faraday cage discussion - it was painful.

When it comes to EM you're really off in the tall grass.

Mike





Re: NONSTOP Crypto Query

2001-01-12 Thread Declan McCullagh

David's suggestion makes sense to me. But if NONSTOP is a codeword, it
would be classified at least secret, and manufacturers of such
products would be discouraged by their customers at NSA from labeling
their products with such a name.

-Declan


On Fri, Jan 12, 2001 at 07:47:00PM -0500, David Honig wrote:
 At 12:32 PM 1/12/01 -0500, Tim May wrote:
 
 The Tandem Computers "NONSTOP" was a product line in use by various 
 government agencies for secure (fault-tolerant) computing for a long 
 time. I'd look there for starters.
 
 (I thought this was too speculative, but given Tim's guess..)
 
 I have also thought that NONSTOP refers to fault-tolerant under high-RF
 conditions.   Also useful when flying (etc.) near your own antennas,
 dishes, etc.
 
 A sort of military version of the FCC standard for consumer electronics: 
 doesn't emit bad (informative) radiation, accepts bad radiation without
 interference.
 
 Note that shielding that worked for tempest would also help nonstop;
 and that some of the gear at a testing site (antennas) serves
 both purposes.
 
 (After reading  Harmon Seaver's piece) Since this is the NSA, maybe they
 were testing that high-RF environments didn't cause info leakage -someone
 else tests that the stuff simply works under field conditions.  Maybe the
 thing they wanted not stopped was tempest protection.
 
 
 
 
 
  
 
 
 
 
 
 
   
 
 
 
 
 





Re: NONSTOP Crypto Query

2001-01-12 Thread David Honig

At 10:56 PM 1/12/01 -0500, Declan McCullagh wrote:
David's suggestion makes sense to me. But if NONSTOP is a codeword, it
would be classified at least secret, and manufacturers of such
products would be discouraged by their customers at NSA from labeling
their products with such a name.

-Declan

I agree... this remains a problem with my thesis.  Perhaps it is
from an earlier time, before they randomly chose short words or word-pairs
from lists as opaque labels?  

I just finished Rowlett's _Magic_ and in there, someone
had to point out to the SIS cryptanalysts that you shouldn't refer to what
the ca. WWII Japanese called "Cipher Machine, type A" in English as the
"type A machine".   Thus their arbitrary designators ("red", "purple") were
chosen.


--
The great thing about humans is they can come up with a theory for anything.






 






  








Re: NONSTOP Crypto Query

2001-01-12 Thread Wilfred L. Guerin

-=|[ duuh... ]|=-

"NONSTOP" is moreso a protocol and general criteria for operations. It is
not soley restricted to physical, TEMPEST, hij/abduct, intel, crypto, or
any other specific protection mechanism.

NONSTOP is more a general idea and concept, with implications and
implementations across all interrelated elements which probibly 'shouldn't
stop'...

JYA has an email from me directly with more basic info/'theory'. (he will
review and use whatever content desired thereof)

You note NONSTOP"" with hijack type associated logic... Although these
phrases refer to some unknown ic/dod/etc protocols, it is also quite well
founded in reality... 

NONSTOP protections prevent hijack. End of point. How? Research this.

A previous cp CDR message about a year ago referenced HIJACK/NONSTOP
training at the afb in san-antonio TX... It had TEMPEST shielding protocol
as a parallel course to NONSTOP... 

Any logical speculation as to why?

-- With 'baaah' in mind,

-Wilfred
[EMAIL PROTECTED]


-=|[.]|=-





At 10:54 PM 1/12/2001 -0500, you wrote:
At 10:56 PM 1/12/01 -0500, Declan McCullagh wrote:
David's suggestion makes sense to me. But if NONSTOP is a codeword, it
would be classified at least secret, and manufacturers of such
products would be discouraged by their customers at NSA from labeling
their products with such a name.

-Declan







Re: Consensus Actions in Cipherspace?

2001-01-12 Thread Ray Dillinger



On Fri, 12 Jan 2001, David Honig wrote:

the server could simply use a voting protocol to get (or timeout) 
permission to do proposed actions.  We are assuming that the server
is trusted, right?  

Actually, no.  That creates a single priveleged machine, which is 
also a point of failure, which is also a point of attack, which is 
also subject to subpeonas or outright theft.  Ideally, this is 
something that runs on the distributed machines of the participants.
I think that's the only way to be safe from the "lawsuit attack".


Perhaps I'm not clear on what constitutes an action that could
be distributed without relying on a trusted actor (server).  


For example, consider a robo-moderated mailing list formed by 
cat owners.  They have a "posting protocol" that requires you 
to submit a digital coin worth a dollar or two along with your 
letter.  If enough people click on the "this is spam" button, 
the group agents donate the coin to an animal shelter and you 
can't spend it. Otherwise, you get your coin back when your 
message expires.  

The posting protocols etc. are wrapped in scripts, of course; 
on your end you get a message box that says "Are you willing 
to post a two-dollar bond that says most of the people on the 
list don't think this is spam?"  and yes/no buttons.  The 
subscribers just have another little button on their mail 
reader - So it goes Next message, delete, reply, reply all, 
spam.

I'd really like it if somebody has figured out a way for a 
group to form consensus and act on that consensus as though 
it were a single individual -- capable of participating in 
general protocols.  

But individual solutions to problems like the above would 
be a great start. 

Bear




At 06:01 PM 1/12/01 -0500, Ray Dillinger wrote:

Crucial facts about a protocol that does the right thing would be: 

1) DOES NOT create any single priveleged user or machine. 

2) Resistant to denial-of-service attacks and attempts to 
   "stack the vote." (Requires user authentication)

3) No altered versions of the agent ought to be able to gather
   enough information to force an action as long as at least 
   the majority of agents are unaltered.

4) Once a consensus is reached, a majority of the agents acting
   together should be able to take whatever action is found
   even if the dissenters' agents don't cooperate with them.
   (a consensus reassembles a key?  But then that key can't 
   be used again, what's the next key?)


Interesting idea.  Starting with 1 user who can admit (by virtue 
of having 100% of the vote) and then letting the users vote
to add others.  

I don't think reassembling the key is the final stage.  I think
the server could simply use a voting protocol to get (or timeout) 
permission to do proposed actions.  We are assuming that the server
is trusted, right?  

The server could send signed PGP-encrypted email to all members saying: 
"The following script has been proposed to be run by GroupServer for your
Group.. to vote yes or no, sign a yes or no message and encrypt and send it
to GroupServer.  This vote closes in 3 days, and votes are acknowleged
immediately."


(Thinking out loud) Maybe the actions require access to a distributed
N-of-M database?   How do you prevent someone from reusing the
reconstructed database?  Or uncooperatives refusing to update their slice
of the DB?  




 






  










Re: Consensus Actions in Cipherspace?

2001-01-12 Thread dmolnar



On Sat, 13 Jan 2001, Ray Dillinger wrote:

 list don't think this is spam?"  and yes/no buttons.  The 
 subscribers just have another little button on their mail 
 reader - So it goes Next message, delete, reply, reply all, 
 spam.

Well, the totally trivial and stupid thing is for a list reader to
sign a message saying "I think message X is spam" and send it to the list
server. Actually, he doesn't even have to send the message; he can just
send the signature if the message is in some canonical format. 

The server can verify the signature, verify the user's ID, increment a
counter, and throw away the signature. When the counter passes a
threshold T, -chomp- the server eats the bond. 
The server can even keep the signatures around if it wants to prove to the
luser later that yes, lots of people really did think his message was
spam. 

This has at least two problems

1) Identifies the user who says "I think this is spam." 
Not a good idea in principle, possibly not a good idea in
practice. A potential solution would be a way for a user
to sign a message in such a way that

* no one can determine which individual public key signed 
the message 

* yet anyone can determine that the signer's public key
belongs to a specific set of public keys (chosen by the
signer and fixed at signature time to avoid the problem
with "well, remove one public key and try again!")
in this case, the set of eligible list voters.

There's probably some crypto voting paper which solves a problem
much like this. I'm not up on that. 

2) Keeping an audit trail so the server can prove that the
majority really did think message X was spam. With this proposal
audit trails consist of up to T signatures, where T is the 
threshold used to trigger the spam alert. At like 1K per signature
and many e-mails, this could be sizable. 

-David





Re: Consensus Actions in Cipherspace?

2001-01-12 Thread dmolnar


 
 Well, the totally trivial and stupid thing is for a list reader to
 sign a message saying "I think message X is spam" and send it to the list

Sorry, I re-read your message and noted the requirement to ahve no central
server. How about this:

1) To post a message, sender S takes a 2-dollar coin and then
uses some kind of verifiable secret sharing protocol to split it
into shares.

2) S sends the shares to the group agents. 

3) Each group agent verifies that it has a share consistent with
the other group agents (see Byzantine Agreement for this one).
If any share fails, then something bad happens (what?). The
other problem is what happens if S just submitted a bunch of
garbage; I'm not sure how to deal with this DoS attack. 

4) If a group agent thinks the message is spam, it sends its
share to Engineers Sans Frontiers or whoever. Otherwise it keeps
mum.

Now if enough group agents (1/2, 1/3, whatever) think the message is spam,
enough shares collect at step 4) to reconstruct the 2-dollar coin.
Otherwise not enough shares collect and the coin is never reconstructed.
Presumably S kept a copy and can spend it later. 

No central server now, just needs a verifiable secret sharing scheme.
Pedersen has one, and another is part of the Proactive Security work I
mentioned previously. 

-David