'Fancy Bear'

How CrowdStrike placed malware in DNC “hacked” servers

@media(max-width: 600px) {.adace_adsense_5a4b9c806dd7d {display:block !important;}}
@media(min-width: 601px) {.adace_adsense_5a4b9c806dd7d {display:block !important;}}
@media(min-width: 801px) {.adace_adsense_5a4b9c806dd7d {display:block !important;}}
@media(min-width: 961px) {.adace_adsense_5a4b9c806dd7d {display:block !important;}}

(adsbygoogle = window.adsbygoogle || []).push({});

The CIA leak casts doubt on Russian involvement in the DNC/Podesta leaks

The huge leak of information from the CIA just published by Wikileaks gives a fascinating picture of how the CIA goes about its business, though I doubt there is much there which will come as a surprise to most people.
In light of all the swirl of activity around the DNC and Podesta leaks and the various allegations of Russian hacking, two questions however immediately stand out for me.
1. The technology used in the DNC/Podesta leaks is decades old and crude.  Are the Russians really so far behind the CIA?