OSINT — Crystal Vault Campaign — Authorized Security Research

Strategic Intelligence Assessment

Subject: Mexico Federal Government — Mass Infrastructure Compromise & PII Exposure
Classification CRITICAL
Date of Assessment 26 February 2026
Prepared By Ringmast4r / Crystal Vault OSINT
Campaign Period 15 January – 25 February 2026
0

Campaign Overview and Scope

Executive Summary

Two concurrent OSINT operations against Mexican government, academic, media, and state-level infrastructure discovered a publicly accessible federal API endpoint serving 64 GB of data from 177 agencies without any authentication, including an estimated 186 million+ records with 520,000+ critical PII entries. A parallel .git exposure campaign recovered 17 live credential sets across 6 targets, exposed 37+ developer identities, and recovered nearly 1 GB of production source code from a major public university including student PII databases and payroll data. Additionally, 4,968 Gravatar email hashes were collected from 73 Mexican WordPress websites.

Campaign Statistics

64 GB
Federal Data Mirrored
17
Live Credential Sets
186M+
Estimated Records
177
Federal Agencies Exposed
520K+
Critical PII Records
37+
Developer Identities
7
Git Repos Discovered
4,968
Gravatar Hashes

Operations Summary

OperationTargetMethodResult
Crystal Vault repodatos.atdt.gob.mx Unauthenticated API enumeration + full mirror 64 GB, 177 agencies, 186M+ records, 520K+ PII. STILL LIVE.
Git Exposure 6 Mexican domains Exposed .git/ directory recovery 17 credential sets, 37+ developer IDs, 960 MB source code
Hash Sweep 73 WordPress sites WordPress REST API user enumeration 4,968 Gravatar hashes (1,479 MD5, 3,489 SHA256)
Huntr Scan Mexican domains Automated vulnerability scanning Credential paths, API exposure, tech stack fingerprinting

Targets Compromised

TargetTypeVectorCredentialsData
repodatos.atdt.gob.mxFederal APINo auth requiredN/A64 GB, 177 agencies
uaem.mxUniversity.git exposure2 (MySQL + SMTP)960 MB, 11,605 files
ieeq.mxState Electoral.git exposure4 (PgSQL + 2 MySQL)Git metadata + creds
ss.puebla.gob.mxState Health.git exposure1 (MySQL) + Joomla secretWordPress/Joomla config
elsiglodetorreon.com.mxNewspaper.git exposure8 (MySQL) + SMTP + tokensFull application source
fiscalia.durango.gob.mxState Prosecutor.git exposure0 (wp-config gitignored)Git metadata, internal IP
mvs.comMedia Corp.git exposure013 files, corporate map
1

Recovered Credentials & Authentication Material

17 credential sets, 4 application tokens, and 1 Joomla secret were recovered from exposed .git/ directories on production web servers. All credentials were found in committed source code files (PHP config, .env, application settings). Three external IPs with connectable database services were identified.

UAEM University (uaem.mx) — 2 Credentials

CRED-01: MySQL — Production Student Database
Hostwww.uaem.mx:3306
Userfacdisenousr
PassLXN*j@9nmVmN
Databaseconsfacdiseno
Sourcehtml/constancias-diseno/db/ConexionMySQL.php
ExposesStudent PII: names, emails, student IDs, grades, majors
CRED-02 & CRED-03: SMTP — Google Workspace Email
Hostsmtp.gmail.com:465
User #1[email protected]
Pass #1Cons_facDisenio9102
User #2[email protected]
Pass #2Ventanill4FCQ31
NoteGoogle Workspace SMTP — likely grants full inbox access

IEEQ Electoral Institute (ieeq.mx) — 4 Credentials

CRED-04 to CRED-07: PostgreSQL & MySQL
PgSQL (prod)postgres : Eqaeccasm1500V+- @ 127.0.0.1 / ieeq_site, ieeq_site_admin
PgSQL (dev)postgres : root @ localhost / db_Sergio, db_Web, db_Pagina
MySQL (Azure)web : fb&BN3cse8j_MH5v @ 104.45.237.221 / ieeq_ieeqmx9453639538
MySQL (Comms)CCS : C0munic4ci0n.S0ci4l @ 187.191.76.50 / ieeq

Puebla State Health (ss.puebla.gob.mx) — 1 Credential + Joomla Secret

CRED-08: MySQL + Joomla Secret
MySQLdst_ss : m%e7A_fAMpt9dVbZ @ localhost / dst_ss (prefix: q4gqt_)
Joomla SecretxSGvpdh2s4Oo1c4F
Mail From[email protected]

El Siglo de Torreon (elsiglodetorreon.com.mx) — 8 MySQL + SMTP + Tokens

CRED-09 to CRED-17: Full Database Infrastructure
MySQL (rw)centenariorw : wwZtK7@c1en1 @ localhost / siglo90, durango
MySQL (s22)eT9Server3 : vwDvhNXckAntcWjB6E @ s22 / siglo90
MySQL (s1)eT9Server3 : vwDvhNXckAntcWjB6E @ s1 / Tienda
MySQL (IBM)centenario : wwZgtK7@c1en @ 52.117.172.166 / siglo90
MySQL (boa)centenarioboa : vchtBfOfVaYhyBe@100 @ localhost / siglo90
MySQL (club)centenario : wwZgtK7@c1en @ localhost / siglo90
MySQL (autos)autos : f0$f0r0Qui3roCaf3 @ 127.0.0.1 / autos
MySQL (archive)archive : camaraf0f0r0@ @ localhost / archive
SMTP[email protected] : mel588mo @ correo.elsiglo.mx:587
Application Tokens (El Siglo)
TOKEN_PASSWORDk@VDKgrKRI!z5YVZ76PJpjwB4#rEs0FswcYaGOGmS2HhT8@ce!
TOKEN_TARJETA3ls1glo100|2021-12-07
TOKEN_PASSenb5SWeXtgQmFjdr9wBecnFVjx4QrwMq3zFKPYhvFZ6QXJR7HM...
AdSenseca-pub-5687735147948295 / slot 9692393977

Connectable External IPs

IPPortServiceTarget
104.45.237.2213306MySQL (Azure)ieeq.mx
187.191.76.503306MySQL (Comunicacion Social)ieeq.mx
52.117.172.1663306MySQL (IBM Cloud)elsiglodetorreon.com.mx

Unrecovered Credentials — Known to Exist

TargetFileLikely Contents
uaem.mxhtml/cedulas/.envLaravel app key, DB credentials for professional license system
uaem.mxtitulos-uaem/.envSecrets for degree generation system (app name "Titulos UAEM" leaked)
uaem.mx.bash_historyCLI command history — possible passwords, SSH commands
uaem.mx.ssh/id_rsaSSH private keys
fiscalia.durango.gob.mxwp-config.phpWordPress DB credentials, auth keys/salts for 24 state agencies
Credential Impact Assessment

The 17 recovered credential sets span a state electoral institute (election infrastructure), a state health department, a major university with student PII, and a large newspaper. The IEEQ credentials include Azure-hosted and external MySQL databases with live public IPs — these represent immediate remote access vectors. The UAEM MySQL credentials expose student PII (names, emails, IDs, grades) and the Google Workspace SMTP credentials likely grant full inbox access to automated university email accounts. All credentials were found in committed source code, indicating systemic failure to use environment variables or secrets management across Mexican institutions.

2

Critical Finding: Federal API — 177 Agencies, Zero Authentication

SeverityCRITICAL — Largest single government data exposure identified
Endpointhttps://repodatos.atdt.gob.mx/api_update/ (177 agencies) + /all_data/ (38 agencies) + /s_*/ (11 directories)
AuthenticationNONE REQUIRED — full directory listing enabled, returns JSON
Rate LimitingNONE
Access LoggingNONE APPARENT
Total Data Mirrored64 GB (50.12 GB enumerated + s_* mirrors)
Files1,084+ CSV files across all endpoints
Estimated Records186,000,000+
StatusSTILL LIVE as of 2026-02-25. Actively maintained with new data.
InfrastructureAkamai CDN, Let's Encrypt SSL

Security Failures

  • ! No authentication mechanism of any kind
  • ! Directory listing enabled on all paths (returns JSON array)
  • ! No rate limiting or throttling
  • ! No access logging (apparent)
  • ! PII data served without redaction
  • ! No data classification enforcement
  • ! API actively maintained with new data pushed regularly

Critical PII Datasets

DatasetRecordsSizePII FieldsRisk
Birth Records (SINAC)~60,000,00012.3 GBFull birth registry dataCRITICAL
Death Records~25,000,0006.1 GBFull death registry dataCRITICAL
Education Centers~6,000,0001.7 GBCURP, RFC, names, phone numbersCRITICAL
SAT Taxpayers464,15369 MBRFC (Tax ID) + full names + addresses + phone + emailCRITICAL
HIV/AIDS Treatment~100,00022 MBPersons on antiretroviral treatmentCRITICAL
Crime Incidence (SESNSP)~2,000,000424 MBCrime data by municipalityHIGH
Crime Victims (CEAV/REFEVI)~50,000+Federal victims registryHIGH
Migration (Irregular)~700,000175 MBIrregular migration eventsHIGH
Migration Tramites~1,300,000257 MBMigration processing recordsHIGH
Procurement (COMPRANET)~4,500,000907 MBVendor names, contract values (~$130B USD)HIGH
Sanctioned Officials (SFP)809Full names, agency, sanction detailsHIGH
Notary Registry (INDAABIN)1,396Full names, complete addressesHIGH
Health Sub-datasetsMillions~16 GBChronic diseases, family planning, nutrition, vaccinesHIGH
Gas Prices~85,000,0001.3 GBPrice data by stationLOW
Population Projections (CONAPO)202 MBDemographic projections, marginalization indicesLOW
Poverty Data (CONEVAL)48 MBPoverty and social lag metricsLOW

SAT Taxpayer File Inventory

FileSizeRecordsContent
SAT_1_Donatarias_Aut.csv27 MB10,798Charities — RFC + name + phone + email + address + legal rep
SAT_3_Sentencias.csv45 KB311Tax convictions — individuals with RFC
SAT_4_Nolocalizados.csv4.3 MB39,453Non-located taxpayers — RFC + names
SAT_5_Firmes.csv18 MB177,807Final tax debts — individuals with RFC + full names
SAT_7_Cancelados.csv19 MB120,276Cancelled tax status — RFC + names

Scale Assessment

This is not a misconfigured development endpoint — it is the production data distribution system for the Mexican federal government's transparency program (ATDT — Agencia de Transformacion Digital y Telecomunicaciones), intentionally serving data without authentication. The critical failure is not the API itself but the absence of PII redaction: birth records (60M), death records (25M), education records with CURP/RFC (6M), HIV treatment records (100K), and crime victim registries should never be served without access controls regardless of transparency mandates. The 64 GB mirror represents approximately 186 million records spanning virtually every aspect of Mexican federal governance.

3

Git Exposure Campaign: Source Code & Credential Recovery

Target: UAEM University — Full Compromise Chain

Targetuaem.mx — Universidad Autonoma del Estado de Morelos
Files Recovered11,605 of 15,177 tracked files (76%)
Data Size~960 MB
Credentials2 live (MySQL production DB + SMTP Google Workspace)
DeveloperRafael Fragoso ([email protected]) — GitHub: norgoth / alias GGakko
GitHub Reponorgoth/uaem2023

Recovered material includes: student PII database (SOLICITUD_CONSTANCIAS table: full names, emails, student IDs, grades, majors), payroll data (>$60M MXN per biweekly period, 2019), staff directories (personal.xlsx, personal-2018.xlsx), IT phone directory (ClavesTelefonicasDGTIC.xlsx), payment processing system (html/pagos/), electronic voting system (html/votoelectronico/), professional license system (html/cedulas/ — Laravel, .env not recovered), degree generation system (titulos-uaem/), DB test endpoint (TestConexion.php — publicly accessible), full Apache config with routing rules.

UAEM Payroll Breakdown (2019 Biweekly)

Staff TypePeak Amount (MXN)
Faculty$32,800,000
Trust/Management$18,000,000
Unionized Base$8,200,000
Unionized Eventual$1,500,000
Retirees/Pensioners$900,000
TOTAL PER PERIOD>$60,000,000

Target: Fiscalia Durango — State Prosecutor Infrastructure

Targetfiscalia.durango.gob.mx — Durango State Prosecutor's Office
Data RecoveredGit metadata only (669 KB) — repo contents gitignored
DeveloperAlejandro Paredes (Gitea: Alejandro.paredes, GitLab: devgob)
Internal Git Server10.1.4.194:8085 — Gitea/Gogs instance
Server Hostnamewebdurangonuevo.(none) — no FQDN configured
Server Userroot — deployed as root, no service account

Critical finding: Single WordPress install serving 24 state government agency websites (Fiscalia, DIF, Educacion, Salud, Seguridad Publica, Proteccion Civil, SIPINNA child welfare, and 17 more). Running RevSlider plugin with CVE-2022-0441 (CVSS 9.8 auth bypass) and CVE-2014-9734 (file inclusion). No security plugins installed (no Wordfence, Sucuri, iThemes, 2FA, or backup plugins). wp-config.php confirmed to exist but gitignored — contains unrecovered DB credentials. XML-RPC enabled. Government accounting data exposed: lgcg.php (164 KB), ifiscal.php (96 KB).

Target: Grupo MVS — Corporate Media Conglomerate

Targetmvs.com — Grupo MVS (major Mexican media conglomerate)
Files Recovered13 files (13 MB, 100%)
Repogrupo_mvs_v2_landing on Bitbucket workspace mvsradio
PersonnelAlfredo Gonzalez ([email protected]) — internal DevOps. Noe/Alan Olvera ([email protected]) — freelance dev.
DeploymentDirect git pull to production web root — no CI/CD

Corporate structure fully mapped: MVS Capital, MVS TV, MVS Radio, MVS Educacion, MVS Entretenimiento, MVS Ideas. Restaurant brands: 13 CMR restaurants including Wings, Chili's MX, Red Lobster MX, Olive Garden MX, Sushi Itto. Telecom brands: Dish Mexico, Netbox, FreedomPop MX, Octopus MX, On Internet. Foundations: Fundacion Dish, Fundacion CMR, Fundacion MVS Radio.

All Discovered Git Repositories

PlatformAccountRepositoryTarget Domain
GitHubnorgothuaem2023uaem.mx
GitLabdianguemoliieeqieeq.mx
Internal (Gitea)Alejandro.paredesmw-red-de-sitiosfiscalia.durango.gob.mx (10.1.4.194:8085)
Internalddssecretaria-de-saludss.puebla.gob.mx (git.develop.dst)
GitHubes-trccentenarioelsiglodetorreon.com.mx
GitHubMrBoa-s-Companyapi-app-torapi.elsiglodetorreon.com.mx
Bitbucketmvsradiogrupo_mvs_v2_landingmvs.com
4

Entity Analysis: Personnel & Attack Surface Map

Personnel Identified (37+ Individuals)

NameEmailOrganizationPlatform / Role
Rafael Fragoso[email protected]UAEM UniversityGitHub: norgoth/GGakko — sole developer/admin, root access
Amy Malavar[email protected]UAEMGit contributor
Carlos Clemente[email protected]UAEMGit contributor
Jelsy Uribe[email protected]UAEMGit contributor
Victor Gonzalez[email protected]UAEMGit contributor
Ricardo Morales[email protected]UAEMGit contributor
Alan Martinez[email protected]UAEMGit contributor (Fragoso alt?)
Diana Guerra[email protected]IEEQ ElectoralGitLab: dianguemoli07
Melchor Leal[email protected]IEEQ ElectoralGit contributor
Jorge Lara Mendoza[email protected]IEEQ ElectoralGit contributor
Sergio I. Gutierrez Q.[email protected]IEEQ ElectoralGit contributor
Rene Limon[email protected]Puebla State HealthGit contributor
Alejandro ParedesDurango State GovGitea: Alejandro.paredes / GitLab: devgob — root access
Alfredo Gonzalez[email protected]Grupo MVSBitbucket: agonzalez_ — internal DevOps
Noe/Alan Olvera[email protected]MVS ContractorFrontend developer
Eugenio Ramirez Casanova[email protected]El Siglo de TorreonGitHub: MrBoa — lead developer
+ 21 additional developers identified across all targets (see full credentials file)

Live Attack Surface

HostPortServiceStatusCredentials
repodatos.atdt.gob.mx443Federal data API — 177 agenciesLIVE, NO AUTHN/A
www.uaem.mx3306MySQL (production)LIVERECOVERED
smtp.gmail.com465Google Workspace SMTP (x2 accounts)LIVERECOVERED
104.45.237.2213306MySQL Azure (IEEQ electoral)LIVERECOVERED
187.191.76.503306MySQL (IEEQ comms)LIVERECOVERED
52.117.172.1663306MySQL IBM Cloud (El Siglo)LIVERECOVERED
www.uaem.mx443TestConexion.php — DB test pagePUBLICDumps connection object
fiscalia.durango.gob.mx443WordPress (24 state agencies)LIVEUnrecovered
fiscalia.durango.gob.mx443xmlrpc.php — XML-RPCENABLEDBrute-force vector

Known Vulnerable Software

TargetSoftwareCVECVSSImpact
fiscalia.durango.gob.mxRevSlider (WordPress)CVE-2022-04419.8Authentication bypass — full admin access
fiscalia.durango.gob.mxRevSlider (WordPress)CVE-2014-9734Arbitrary file inclusion
5

Threat Synthesis and National Security Implications

This assessment reveals systemic security failures across Mexican government digital infrastructure at federal, state, and institutional levels. The findings span from the country's entire federal data distribution system (zero authentication on 177 agencies) to individual developer workstations deploying as root with credentials in source code. The scale of PII exposure — 186 million+ records including 60 million birth records, 25 million death records, and HIV treatment data — represents one of the largest government data exposures documented through OSINT methodology.

Primary Threat Vectors

Federal Data Distribution Without Access Controls

The repodatos.atdt.gob.mx API is not a misconfiguration — it is the deliberate architecture of Mexico's transparency data infrastructure. The ATDT (Agencia de Transformacion Digital y Telecomunicaciones) serves data for 177 federal agencies via unauthenticated REST endpoints with directory listing. The failure is in data classification: datasets containing PII (birth/death records with personal identifiers, taxpayer records with RFC, crime victim registries, HIV treatment records) are served alongside legitimately public datasets (gas prices, population projections) with no distinction. Any actor with a curl command can mirror the entire 64 GB dataset. This has been actively maintained through February 2026 with new data being pushed.

Epidemic .git Exposure Across Mexican Web Infrastructure

Six distinct Mexican organizations were found with exposed .git/ directories on production servers, yielding 17 credential sets from committed source code. This is not coincidence — it reflects a systemic pattern: Mexican government and institutional developers deploy via git pull directly to production web roots without CI/CD pipelines, without .htaccess rules blocking .git access, and without secrets management. The practice spans universities (UAEM), state electoral bodies (IEEQ), state health departments (Puebla), state prosecutors (Durango), newspapers (El Siglo de Torreon), and major media corporations (Grupo MVS). Every target was a single developer or very small team, deploying as root, with no code review process.

Election Infrastructure Exposure

The IEEQ (Instituto Electoral del Estado de Queretaro) credentials include production PostgreSQL databases (ieeq_site, ieeq_site_admin) and an Azure-hosted MySQL database at 104.45.237.221 with a public IP and recovered credentials. An additional MySQL instance at 187.191.76.50 serves the "Comunicacion Social" department. Electoral infrastructure exposure carries disproportionate national security risk — even without active exploitation, the existence of recoverable credentials to election databases undermines institutional trust.

24 State Agencies on a Single Compromisable WordPress Instance

The Durango state prosecutor's website (fiscalia.durango.gob.mx) serves 24 state government agencies from a single WordPress installation running RevSlider with a CVSS 9.8 authentication bypass (CVE-2022-0441). The server is deployed as root with no FQDN configured. No security plugins are installed. A single exploit would compromise: the state prosecutor's office, child welfare (SIPINNA), public health, education, public security, civil protection, environmental agency, transportation, tourism, and 15 additional agencies. The wp-config.php file containing database credentials exists on the server but was gitignored — direct access via the web server may still be possible.

Sensitive Health Data Without Protection

The federal API serves approximately 16 GB of health sub-datasets including: birth records (~60M), death records (~25M), chronic disease registries, family planning data, maternal health consultations, child nutrition data, vaccination records, and critically — HIV/AIDS antiretroviral treatment records (~100K records). These datasets are served from repodatos.atdt.gob.mx/s_salud/ and /all_data/secretaria_salud/ without any authentication. HIV treatment records are among the most sensitive categories of personal health data globally.

Strategic Assessment

Mexico's digital government infrastructure exhibits a pattern of "transparency by default" where access controls are treated as optional rather than essential. The combination of an unauthenticated 64 GB federal API, epidemic .git exposure, and single-developer deployment practices creates an attack surface that is trivially exploitable at every level. The most immediate risks are: (1) the 3 externally-connectable MySQL databases with recovered credentials (IEEQ Azure, IEEQ Comms, El Siglo IBM Cloud), (2) the RevSlider CVE-2022-0441 on the Durango prosecutor's 24-agency WordPress, and (3) the ongoing PII exposure of 186M+ records via the federal API. The 4,968 Gravatar hashes collected from 73 WordPress sites provide additional email correlation capability across Mexican media, government, and NGO sectors.

6

Operational Directives: Mitigation & Exploitation

  1. Verify live credential connectivity against the 3 externally-accessible MySQL instances: 104.45.237.221 (IEEQ Azure), 187.191.76.50 (IEEQ Comms), 52.117.172.166 (El Siglo IBM Cloud). Test with recovered credentials. If connectable, document database schemas and record counts without modifying data. These represent the highest-priority immediate access vectors.
  2. Attempt recovery of unrecovered credentials from UAEM: html/cedulas/.env (professional license system), titulos-uaem/.env (degree generation), .bash_history, .ssh/id_rsa. These files are confirmed to exist on the server from git tracking metadata. Direct URL access or alternate path traversal may succeed.
  3. Exploit Durango Fiscalia WordPress via RevSlider CVE-2022-0441 (CVSS 9.8 auth bypass). If successful, compromise yields administrative access to 24 state agency websites, database credentials from wp-config.php, and potentially the internal Gitea server at 10.1.4.194:8085. Secondary vector: XML-RPC brute force against xmlrpc.php.
  4. Continue federal API monitoring at repodatos.atdt.gob.mx. The API is actively maintained with new data pushed regularly. Set up differential monitoring to capture newly added datasets and agencies. Priority monitoring targets: /all_data/secretaria_salud/ (health data updates), /api_update/inm/ (immigration data), /SESNSP/ (crime data).
  5. Crack Gravatar hashes from the 4,968-hash collection (1,479 MD5, 3,489 SHA256). MD5 hashes are particularly vulnerable to rainbow table attacks. Top-priority targets: sinembargo.mx (791 hashes), forbes.com.mx (734), contralinea.com.mx (341 — investigative journalism), government sites cenart.gob.mx (6), quintanaroo.gob.mx (3), campeche.gob.mx (1), michoacan.gob.mx (2). Recovered emails enable cross-platform correlation.
  6. Expand .git sweep to additional Mexican government domains. The 6/6 success rate on probed targets suggests endemic exposure. Priority targets: state government portals (*.gob.mx), municipal websites, state-level health departments, state electoral institutes beyond Queretaro, and state prosecutor offices beyond Durango.
  7. Reverse engineer UAEM systems from recovered source code. 11,605 files (960 MB) provide complete application architecture: payment processing (html/pagos/), electronic voting (html/votoelectronico/), professional licenses (html/cedulas/), degree generation (titulos-uaem/). Map all internal API endpoints, database schemas, and authentication flows.
  8. Archive and structure all recovered data. Current inventory: 64 GB federal API mirror, 960 MB UAEM source code, 13 MB MVS code, 669 KB Fiscalia metadata, Huntr scan database, 4,968 Gravatar hashes across 80+ files, 16 intelligence reports, 313 API endpoint maps, 313 tech stack analyses. Consolidate into searchable database with cross-referencing between credentials, personnel, and organizational affiliations.
  9. Prepare responsible disclosure packages for: CERT-MX ([email protected]) regarding federal API PII exposure; INAI (National Transparency Institute) regarding data classification failures; UAEM IT ([email protected]) regarding .git and credential exposure; IEEQ regarding electoral database exposure; Durango State IT regarding Fiscalia WordPress compromise chain. Document timeline and allow 90 days for remediation before any public disclosure.
  10. Cross-reference SAT taxpayer data with SFP sanctions data. The 809 sanctioned government officials (including former PEMEX CEO Emilio Ricardo Lozoya Austin) can be cross-referenced against 464,153 taxpayer records for financial pattern analysis. The COMPRANET procurement database (2,851,250 contracts, ~$130B USD) provides an additional correlation dimension for identifying potential corruption patterns across sanctioned individuals and federal contracting.
END OF ASSESSMENT

Sources Consulted