The Mind of Bradley Manning

Army Pfc. Bradley Manning is escorted out of a courthouse in Fort Meade, Md. Army Pfc. Bradley Manning is escorted out of a courthouse in Fort Meade, Md. Patrick Semansky/AP

Bradley Manning said he was sorry for hurting the United States during his sentencing hearing at Fort Meade on Wednesday, saying, "I only wanted to help people, not hurt people." But hours of testimony presented earlier by his defense team showed that wasn't Manning's only reason for downloading thousands of classified documents and giving them to WikiLeaks. Manning, they said, felt isolated, and showed signs of mental instability, suffered from gender identity disorder, had a mild type of Asperger's, and showed symptoms of slight fetal alcohol syndrome. Capt. David Moulton, a Navy psychiatrist, said Manning was in a "post-adolescent idealistic phase," which is a line from Clueless.

The goal of the defense testimony, of course, is to evoke sympathy in the military judge, Col. Denise Lind, in order to get a lighter sentence. Some of the testimony seemed more likely to do the trick than others. Nevertheless, it offered a fascinating portrait of who Manning was before his leak. The defense suggested there were three things affecting his mental state that influenced his decision: that he was a naive idealistic kid, that he had biological mental disorders, that he was that he was transgender.

The last produced the most arresting evidence. In an April 24, 2010 email to his supervisor at the time, Master Sgt. Paul Adkins, Manning confessed he was transgender, and that he joined the Army, basically, to "get rid of it." He included this selfie, in which he's dressed as a female with long blonde hair. The subject line was "My Problem." The email said,

This is my problem. I’ve had signs of it for a very long time. It’s caused problems within my family. I thought a career in the military would get rid of it. It’s not something I seek out for attention, and I’ve been trying very, very hard to get rid of it by placing myself in situations where it would be impossible. But, it’s not going away; it’s haunting me more and more as I get older. Now, the consequences of it are dire, at a time when it’s causing me great pain it itself…

I don't know what to do anymore, and the only "help" that seems available is severe punishment and/or getting rid of me.

Adkins had written memos in December 2009, April 2010, and May 2010 about Manning's instability.

Read the full story at TheAtlanticWire.com.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.