Smithsonian Channel – The Real Story: Series 2 (2010) The Bourne Identity
English | Documentary | Size: 1.40 GB
Discover the true stories that inspired some of pop culture’s most iconic heroes and villains.
Smithsonian Channel separates fact from fiction in second season of THE REAL STORY. Series takes in-depth look at inspiration for iconic motion pictures The Exorcist, Silence of the Lambs, Casino, The Bourne Identity & The Hunt for Red October.
Often times the best fiction is based on fact. Playing off this theme, Smithsonian Channel presents the second season of its original series, THE REAL STORY. Classic mystery and adventure tales of the twentieth century come alive in this series that examines the true stories behind famous historical events and individuals.
The season looks at the inspiration for one of the most talked about movies ever, The Exorcist. Other episodes look at Silence of the Lambs, Casino, The Bourne Identity and The Hunt for Red October.
A Blink Films Production for Smithsonian Channel and Five in Association with The History Channel
Part 3: The Bourne Identity
See how covert CIA agents, as portrayed in the Bourne Trilogy, operate outside of Hollywood…and often outside the law.
Believe it or not, the covert, violent and deadly world of Jason Bourne is actually grounded in reality. We take an in-depth, behind-the-scenes look at the CIA to see how a super assassin like Matt Damon’s conflicted hero is created. We also probe the intelligence agency’s controversial past operations, involving sinister mind-control experiments and often bizarre assassination plots.
RAPIDGATOR
rapidgator.net/file/c3fb595d3b285d22c150cbfe308c701b/BlackHat_-_Attacking_and_Securing_APIs_Course.part01.rar.html
rapidgator.net/file/1f01a98330e8ee20f12a0d9703a4df9b/BlackHat_-_Attacking_and_Securing_APIs_Course.part02.rar.html
rapidgator.net/file/90ac485b977fc02b44e4e32945eb75fc/BlackHat_-_Attacking_and_Securing_APIs_Course.part03.rar.html
rapidgator.net/file/f81c55774e3dc04b8769eab60a3decf3/BlackHat_-_Attacking_and_Securing_APIs_Course.part04.rar.html
rapidgator.net/file/f28addbac67036fa33a61b2f530a7cd6/BlackHat_-_Attacking_and_Securing_APIs_Course.part05.rar.html
rapidgator.net/file/7878c58b9d49bd176b72b73100f35515/BlackHat_-_Attacking_and_Securing_APIs_Course.part06.rar.html
rapidgator.net/file/c21491aab171037e0c00b7f44be2dc71/BlackHat_-_Attacking_and_Securing_APIs_Course.part07.rar.html
rapidgator.net/file/5f48494fe313776a7d7deb33ce12f6d9/BlackHat_-_Attacking_and_Securing_APIs_Course.part08.rar.html
rapidgator.net/file/d555f18fbc557f0795ded7ac3038815c/BlackHat_-_Attacking_and_Securing_APIs_Course.part09.rar.html
rapidgator.net/file/b4697d775e56f449fe1e1549828800ef/BlackHat_-_Attacking_and_Securing_APIs_Course.part10.rar.html
rapidgator.net/file/4f2aefdebe6c0c2a9f0548bfb1c0f5ad/BlackHat_-_Attacking_and_Securing_APIs_Course.part11.rar.html
rapidgator.net/file/ae8e07f43450662140368757ee2a6974/BlackHat_-_Attacking_and_Securing_APIs_Course.part12.rar.html
rapidgator.net/file/3ce55f7fc9643c0008eeae72d57a6c80/BlackHat_-_Attacking_and_Securing_APIs_Course.part13.rar.html
rapidgator.net/file/8061cc23445c4f6b3c082e8c36e900ef/BlackHat_-_Attacking_and_Securing_APIs_Course.part14.rar.html
rapidgator.net/file/491123bf50131dbbe2738fe867cd67ea/BlackHat_-_Attacking_and_Securing_APIs_Course.part15.rar.html
rapidgator.net/file/55bb226e04b2511a4df42d0650cdd177/BlackHat_-_Attacking_and_Securing_APIs_Course.part16.rar.html
rapidgator.net/file/d45a7d3797f732aade54d440921f7493/BlackHat_-_Attacking_and_Securing_APIs_Course.part17.rar.html
NITROFLARE
nitroflare.com/view/FCB19CF98030DC2/BlackHat_-_Attacking_and_Securing_APIs_Course.part01.rar
nitroflare.com/view/6B00E184ECE93FE/BlackHat_-_Attacking_and_Securing_APIs_Course.part02.rar
nitroflare.com/view/5DF06D5B840E5FA/BlackHat_-_Attacking_and_Securing_APIs_Course.part03.rar
nitroflare.com/view/7E02F09991EFDC4/BlackHat_-_Attacking_and_Securing_APIs_Course.part04.rar
nitroflare.com/view/518A2077F032739/BlackHat_-_Attacking_and_Securing_APIs_Course.part05.rar
nitroflare.com/view/0D118710273C8C9/BlackHat_-_Attacking_and_Securing_APIs_Course.part06.rar
nitroflare.com/view/ED0D03ED1273F8B/BlackHat_-_Attacking_and_Securing_APIs_Course.part07.rar
nitroflare.com/view/2C7190E601AA2C0/BlackHat_-_Attacking_and_Securing_APIs_Course.part08.rar
nitroflare.com/view/1CF87842ACD00FC/BlackHat_-_Attacking_and_Securing_APIs_Course.part09.rar
nitroflare.com/view/35F78ADFD0D8BCE/BlackHat_-_Attacking_and_Securing_APIs_Course.part10.rar
nitroflare.com/view/18C9AD9AAE0D86B/BlackHat_-_Attacking_and_Securing_APIs_Course.part11.rar
nitroflare.com/view/4D0CFBBC3992505/BlackHat_-_Attacking_and_Securing_APIs_Course.part12.rar
nitroflare.com/view/9EEB58DF5CD58A1/BlackHat_-_Attacking_and_Securing_APIs_Course.part13.rar
nitroflare.com/view/AA260F62048AF80/BlackHat_-_Attacking_and_Securing_APIs_Course.part14.rar
nitroflare.com/view/6349966F17A46B6/BlackHat_-_Attacking_and_Securing_APIs_Course.part15.rar
nitroflare.com/view/5BA71F46439A917/BlackHat_-_Attacking_and_Securing_APIs_Course.part16.rar
nitroflare.com/view/B80F524B9850C18/BlackHat_-_Attacking_and_Securing_APIs_Course.part17.rar