Umbrella

Victim Support Portal

Last updated April 19, 2026 · Direct, verified channel for victims and their representatives

If anyone is in immediate danger right now, contact your local police or emergency services first. In Kazakhstan, call 102 (police) or 111 (children's hotline). In the US, call 911. In the EU, call 116 111 (children) or 112 (general). Reporting to Umbrella X comes after the immediate safety situation is handled.

This portal exists for one specific purpose: to give victims of harmful content — and the parents, guardians, lawyers, advocates, and law enforcement officers acting on their behalf — a direct, verified channel to request that we transmit hash-only metadata to the relevant external reporting database (NCMEC for child sexual abuse material, GIFCT for terrorism content, StopNCII for non-consensual intimate imagery, Polaris Project for human trafficking, or others). One uniform process covers every category: a verification ticket, identity check by our legal team, and only then transmission.

Read this first

We do not monitor.
We do not scan.
We do not report.

This portal is the rare, audited exception

Pick the category that applies to you

The procedure is the same for every category: write to legal@umbrellax.io (PGP-encrypted preferred), tell us which category you are reporting under and which of the four roles you are, attach the verification documents listed for that role below, and wait for our legal team to review. Verification happens within 7 calendar days. If verification succeeds, we file the external report within 48 hours. If we receive no documents within 30 days the ticket auto-closes.

CSAM — Child Sexual Abuse Material

External database: NCMEC CyberTipline (United States, international clearinghouse)

What this covers

Sexually explicit material depicting any person under 18, whether the material is real, AI-generated, drawn, or otherwise synthetic. This includes solicitation messages and sextortion demands directed at minors.

Who can request external reporting (NCMEC)

Documents required (in addition to the role-based documents listed in "Documents required by role" below)

What we send to NCMEC

The actual content is never sent (we have already deleted it). The identity of the victim is not sent unless you specifically ask us to include it; even then we encourage direct communication with NCMEC instead.

NCII — Non-Consensual Intimate Imagery

External database: StopNCII.org UK Revenge Porn Helpline (international)

What this covers

Intimate images or videos of an adult shared without that adult's consent. Includes "revenge porn", voyeur content, sexual deepfakes of real people, and threats to share such material ("sextortion").

Important: StopNCII.org also offers a self-service hash submission: a victim can hash their own intimate images on their own device and submit just the hash to StopNCII, which then distributes the hash to participating platforms (including, when we are live, Umbrella X) so that the image is blocked at upload everywhere. If you have not yet had the image leaked but are at risk, that pre-emptive route is faster and gives you full control. We strongly recommend it.

Who can request external reporting (StopNCII)

Note: there is no "parent or guardian" path here because StopNCII is for adults. A minor depicted in intimate imagery is treated as a CSAM case (above), not an NCII case.

What we send to StopNCII

The identity of the victim is never sent. StopNCII works on hashes only.

Terrorism and violent extremism

External database: GIFCT Global Internet Forum to Counter Terrorism (industry hash database)

What this covers

Content that promotes, glorifies, recruits for, or instructs in terrorism or violent extremism. Includes designated terrorist organisation propaganda, attack-planning material, instructions for weapons of mass impact, and imagery of attacks designed to spread or celebrate them.

Who can request external reporting (GIFCT)

What we send to GIFCT

Mass violence content (live-streamed attacks, manifestos)

External database: GIFCT Christchurch Call protocol

What this covers

Live or recorded video of mass-casualty attacks (mass shootings, vehicle attacks, knife attacks at public gatherings) and the perpetrator's manifesto. The Christchurch Call protocol exists specifically to prevent the viral spread of such content in the hours and days immediately after an event.

Who can request external reporting

For active mass-violence incidents, we will expedite verification to within 24 hours given the time-sensitive nature of preventing viral spread.

Human trafficking

External resource: Polaris Project US National Human Trafficking Hotline · also Stop the Traffik (UK, intelligence-led)

What this covers

Recruitment, transportation, harbouring, or exploitation of persons by force, fraud, or coercion for commercial sex or forced labour. Includes online recruitment ads, communication channels used to coordinate trafficking, and material identifying victims of trafficking.

Who can request external reporting

Note: human trafficking does not have a single global hash database equivalent to NCMEC or GIFCT. We coordinate case-by-case with Polaris Project, Stop the Traffik, or the relevant national hotline. Our role is limited to passing the hash and minimal metadata.

Other categories

External database: case-by-case coordinated with the relevant authority

What this covers

Categories not listed above where you believe an external report is warranted: doxxing campaigns with imminent physical risk, coordinated harassment with a credible threat of violence, illegal goods or services involving immediate harm to identifiable victims, and similar.

Who can request external reporting

Because there is no standard hash database for these categories, our legal team will work with you to identify the appropriate authority (typically the law enforcement agency in the jurisdiction with the strongest connection to the material) and to ensure that the disclosure is the minimum required.

Documents required by role (applies to every category)

Adult survivor or directly affected person

Parent or legal guardian (CSAM only)

Licensed lawyer or victim advocate

Law enforcement officer

Recognised victim-support or anti-trafficking NGO (terrorism, mass violence, trafficking)

How to make a request (the same flow for every category)

  1. Send an email to legal@umbrellax.io with a subject line like External report request — [category] (replace [category] with CSAM, NCII, terrorism, mass violence, trafficking, or other). Encrypt the email using our PGP key (see "Encryption" section below).
  2. In the email, tell us:
    • Which category you are reporting under.
    • Which of the four (or five) roles above you are.
    • If a report has already been filed in Umbrella X, the in-app report ID we sent you.
    • If no report has been filed yet, a description of when and where the material appeared (channel, group, or chat — approximate dates are fine).
    • The country where the victim resides or the country of the law enforcement / NGO case file.
  3. Attach the verification documents appropriate to your role and category. Encrypted PDF, JPEG, or PNG are all fine.
  4. Wait for a response from our legal team. We acknowledge every email within 24 hours and complete the verification review within 7 calendar days. For active mass-violence incidents we expedite to 24 hours; for ongoing law enforcement investigations we expedite to 48 hours.
  5. If verification succeeds, we file the external report within 48 hours, send you a copy of the filing confirmation, and increment the public counter on the canary page. Your identity and personal information are not disclosed in any public counter or transparency log entry.
  6. If verification fails or documents are missing, we explain why and what is needed. You can re-submit at any time.
  7. If we receive no response within 30 days of our initial reply, the verification ticket is closed and no external report is filed. You can re-open the request later by replying to the same thread.

What we send externally, and what we do not

What we send (only after verification, only with your authorisation, only to the database appropriate to the category):

What we never send:

What happens if verification fails

If we determine that the documents provided do not establish your standing to request external reporting on this specific case, we explain what is missing and how to fix it. The verification ticket remains open for 30 days for resubmission.

If we determine that the request is knowingly false — for example, fabricated documents, identity theft, or a coordinated attempt to weaponise an external reporting database against a third party — we close the ticket without filing, ban the originating Umbrella X account permanently, and (where applicable) refer the matter to the Kazakhstan authorities under Article 419 of the Criminal Code (knowingly false denunciation). This protects real victims from the harm caused by false reports clogging the pipelines of NCMEC, GIFCT, StopNCII, Polaris, and similar organisations.

Encryption: PGP key

All emails to legal@umbrellax.io involving victim verification should be encrypted with our PGP public key. This protects your identity and the contents of your message in transit. The key fingerprint and download instructions:

Key ID: [to be published with first quarterly transparency dump]
Fingerprint: [to be published with first quarterly transparency dump]
Download: /legal-key.asc (available after first publication)
Keyserver pool: keys.openpgp.org · keyserver.ubuntu.com · pgp.mit.edu

If you cannot use PGP, send a plain message asking us to initiate a Signal session. We will reply with a Signal handle, and you can then send the documents over Signal end-to-end encrypted. Signal is a third-party service, but it is the most accessible E2E channel available. Do not send unencrypted documents containing personal identification over plain email if you can avoid it.

Privacy of your verification request

We treat verification requests as the most sensitive data we handle. Specifically:

Coordinated victim-support resources

Umbrella X is a messenger; we are not a victim-support organisation. The following organisations specialise in helping victims of the categories above and may also be able to file external reports directly on a victim's behalf, often with more legal support than we can provide:

CSAM

NCII

Terrorism / mass violence

Human trafficking

Working with one of these organisations may be faster and easier than working with us directly, particularly if the material is also present on platforms other than Umbrella X. We are happy to coordinate.

Contact summary

This portal is operated by the legal team of UmbrellaX LLP, a limited liability partnership registered in the Republic of Kazakhstan under business identification number 260440006927, with its registered office at Zheltoqsan St., 1-6, building 3, apt. 13, Oral, West Kazakhstan Region.