Académique Documents
Professionnel Documents
Culture Documents
Anatomy of a Footnote
CHRISTINE SYLVESTER*
Department of Politics and International Relations, Lancaster
University, UK
W
HAT IS A FOOTNOTE? what does it mean in the larger scheme of
a text?
geographical and theoretical limits. Although very interesting work drawing on Michel
Foucault, Jacques Derrida or Jacques Rancière (such as that of Benjamin Muller, Peter
Nyers, Patricia Molloy, Lene Hansen and Roxanne Doty) is not directly discussed, such
work needs to be considered within a conversation that is now rapidly expanding.
A Skinny Skeleton
This footnote establishes the key parameters of the entire piece. It tells us that
the writers are taking one work of scholarship as the basic organizing frame-
work for their article, and it is a paper that Ole Wæver of the University of
Copenhagen presented at the International Studies Association meetings in
Montreal in 2004: ‘Aberystwyth, Paris, Copenhagen: New “Schools” in
Security Theory and Their Origins Between Core and Periphery’ (Wæver,
2004). Readers of the c.a.s.e. article will probably not know that particular
piece, for the elementary reason that it has not been published. Those who
know the cited paper know it, and those who do not must try to scare it up
somewhere or take the writers’ word that the paper cited exists, that it is
good, and that it deserves to be the skeleton holding up the arguments to
come. Taking it on faith that the framework is worthy is easier than trying to
find and assess it oneself; but, in either case, the reader is put on the back foot
and can be forgiven for thinking s/he is encountering a members-only club.
Unpublished work is not necessarily weak. It simply has not yet been
vetted by the scholarly community acting as blind judge. It is therefore
untested work. In this case, it is an untested work embraced nonetheless by a
like-minded group. Its skeleton is to hold a bulky weight for one untried:
most of the critical approaches the writers plan to include and manifest
will be pinned on its brittle bones. It will also be made to bear approaches to
security studies that are in the shadows of presence and in the tombs lying
about. Is it up to these tasks?
The main text of the c.a.s.e. article informs us that the collective is adopting
Wæver’s place-based schema of security studies in Europe. The nerve centers
are the large city of light on the continent, a small Nordic city of seasonal light
and dark, and a remote town on the western shore of Wales. That is to say,
critical security studies in Europe has something to do with academic Paris,
Copenhagen, and Aberystwyth. Both the text and the footnote tell the reader
that the collective is using the Wæverian framework with certain provisos,
bits ‘problematized’ and rendered ‘suggestive’ in order to avoid ‘misleading’
the reader. One proviso has to do with geography. Wæver’s schools, say the
writers, are more decentralized than the place assignments he gives them; in
fact, the collective proposes to think of ‘dispersed locations associated with
Christine Sylvester Anatomy of a Footnote 549
specific individuals and debates much more than unitary schools of thought’
(c.a.s.e. collective, 2006: 444). People, not places, are to count. Debates are
key. Beyond showcasing the work of variously placed security specialists, the
collective wants to ‘show how the dialogue between different scholars has
shaped the conceptual discussion through a set of encounters, producing the
appearance of “schools” talking to each other’ (c.a.s.e. collective, 2006: 444).
Perhaps this is an allusion to the second proviso mentioned in the footnote:
‘theoretical limits’. Dialogue has produced ‘clusters of innovations associated
with the three “schools”’ and ‘cross-fertilization’ (c.a.s.e. collective, 2006:
444–445). Vague dilemmas remain, however, and these require the consider-
ation of ‘new paths . . . for critical approaches to security in Europe’ (c.a.s.e.
collective, 2006: 445). c.a.s.e. is on the case.
Missing Heads
But, a few body parts are missing. Notice that the footnote frames the men-
tion of worrying geographical and theoretical limits with two sentences, one
on each side. The sentence that leads off the footnote mentions categories of
critical security scholarship in Europe that are in some way ‘other’ according
to Wæver: ‘hard-core postmodernists’ and ‘feminists’. The third sentence
presents a list of names, some on their own and some in parenthesis. It is
initially difficult to figure out exactly what the connection is meant to be
between sentence two of the footnote, which mentions the limitations in the
Wæverian framework, sentence one that signals the existence of ‘other
participants’, and sentence three that gives names, starting with ‘Michel
Foucault, Jacques Derrida’ and continuing on (to a few International
Relations [IR] analysts). Are all those named the ‘other participants’? It is
difficult to know at first. We are told at the end of the footnote that work by
those on the list is ‘interesting’ but ‘not directly discussed’.
Is the collective trying to signal its objection to Wæver’s designation of
some as others, or its sense that this designation is not a troubling theoretical
limitation in the framework? In fact, c.a.s.e. is hedging its bets. Those ‘not
directly discussed’ will appear in some ‘conversation that is now rapidly
expanding’. Where that conversation is in time and place is not indicated.
Why that conversation cannot be held here and now, in the article, is unsatis-
factorily resolved: it cannot be now and here, apparently, just because Wæver
excludes some participants then and there. Hardly an impressive display of
critical thinking. The reader can see that Wæver’s labels stuck onto some
heads in security studies are being accepted, with a bit of angst but no
interrogation. The issue in question must be someone else’s discussion to
have. The critical security stomach of Europe must be full.
550 Security Dialogue vol. 38, no. 4, December 2007
Who, then, are these undead ‘other participants’ (placed) outside the dis-
persed locations and debates that have seemingly broadened the inside? In
the fuzzy logic of the footnote, we realize that the scary ones clearly do not
include Michel Foucault, Jacques Derrida, or Jacques Rancière. These are the
lions of critical thinking, men with such unquestionable status that everyone
(surely) knows what they have written and how they are relevant to critical
security studies: no specific citation necessary. If ‘other participants’ have
drawn on these men’s ideas, they may be mentioned by name: Muller, Nyers,
Molloy, Hansen, Doty. As ‘other participants’, despite their fealties, however,
the collective tucks these into a parenthetical space within the footnote. It is a
little entombing box from which they cannot leak, seep, or ooze contami-
nants. Foucault and Derrida take language and grammar very seriously, and
so, one presumes, must the collective that honors them: the box is hardly a
misstep or mistake in the analysis. Neither is this: Wæver’s unpublished
paper gets the only proper citation in the entire footnote. He is ‘Wæver
(2004a)’, which makes him Lord of the Foot. The reader cannot turn to the
bibliography at the end to determine whether work by ‘hard-core postmod-
ernists’ and ‘feminists’ actually deserves the lower status it is given here, the
relegation. Their writing is missing in this footnote. Off with their heads and
off-page they go.
Uneasy with some geographical and theoretical limitations of its chosen
framework, a group of critical scholars turns around and accepts without
comment that framework’s other odd limitations – its unjustified exclusions
and overwrought labels. If so-called mainstream security scholars pulled a
similar move, if they hinted that critical security studies scholarship was less
relevant or should be discussed somewhere else, we can imagine the
responses. So, why does c.a.s.e. cut out some of its own body parts? Can
the collective really say there is a significant difference between the people
gathered and cited within the article and those surgically removed as ‘other’?
Is there significant difference between a non-critical mainstream making
excisions and a collective doing likewise? I have no insider knowledge of
what c.a.s.e.’s rejection/deflection/excision thing is all about. What I can
surmise from the footnote, though, is this: a critical group, with a radical-
sounding document, is looking down its nose at some critical security
individuals while lauding others. And, in that context, it is hardly inconse-
quential that the group writes of ‘feminists’ and ‘postmodernists’ and not of
feminism or postmodernism as bodies of scholarship. People count –and yet
the promised dialogue between different scholars of critical security will be
restricted. And compromised as a result.
Christine Sylvester Anatomy of a Footnote 551
Escaping Morbidity
Let us bring out of entombment one ‘other participant’ and judge her relega-
tion to a footnote – and to the parenthesis within it, to boot – rather than her
inclusion in a dialogue. Let us consider Lene Hansen. Hansen is an Associate
Professor at the University of Copenhagen. Her work is explicitly in the field
of critical security studies (e.g. Hansen, 1997, 2000, 2001, 2006). That she
works in Copenhagen could make her part of the Copenhagen School; but,
given that the collective takes pains to avoid drawing too literal a line under
place-names, it might just be that she does critical security studies but not in
approved School ways. She has co-edited with Wæver (Hansen & Wæver,
2002), yet she is also critical of the Copenhagen School for its gender over-
sights. If she is part of C School, presumably c.a.s.e. would discuss her work
in relation to its approach (particularly on pp. 452–457). But c.a.s.e. does not
do this. Perhaps the collective puts her with the ‘other participants’ because
she is a ‘feminist’ and participants in the C School are not feminists. Maybe
she is a ‘hard-core postmodernist’. What if one is both of these obviously
unfortunate things? Is it the chainsaw for double ‘other participants’?
Look at her major piece about a mermaid with a security problem (Hansen,
2000). Without doubt, it is an important critique of the way gender and
feminist writings have been handled, or not handled, in the work of the
Copenhagen School. Hansen is concerned with ‘important security problem-
atics excluded’ from its gaze (Hansen, 2000: 286). She points out that there
was a ‘striking absence of gender’ in security discussions at the Copenhagen
School (Hansen, 2000: 286) and works to correct that absence in her mermaid
piece and in portions of her recent book, Security as Practice: Discourse
Analysis and the Bosnian War (Hansen, 2006: chapters 8 and 9). The main C
School text in the late 1990s accorded gender analysis one brief mention in
the main narrative, concerning trends in the USA, and one in – wait – a foot-
note on how feminists politicize the private (Buzan, Waever & de Wilde,
1998: 46, 130).
Hansen pinpoints two blank spots, as she puts it, in the C School’s speech-
act framework that have acted as gender censors: security as silence and sub-
suming security. She says that ‘security as silence occurs when insecurity
cannot be voiced, when raising something as a security problem is impossi-
ble or might even aggravate the threat being faced’ (Hansen, 2000: 287).
Seven years later, we ponder that thought as we consider the difficulties of
speaking from a parenthesis in a footnote. That grammatical structure saves
participants in the real discussion from having to hear too many ‘other par-
ticipants’. It also oversecures those in the box – or should we say it securitizes
them? In ‘The Little Mermaid’s Silent Security Dilemma and the Absence of
Gender in the Copenhagen School’, Hansen (2000: 294) points out that secu-
552 Security Dialogue vol. 38, no. 4, December 2007
rity as silence comes about when ‘the potential subject of security has no, or
limited, possibility of speaking its security problem’. Her case in point is the
situation faced by many Pakistani women who are raped. Their security
strategies are ‘silence, denial, or if the incident has become known, flight’
(Hansen, 2000: 295). They can find it nearly impossible to engage in speech
acts about the rape, because to do so puts them in harm’s way of zina, the law
against sexual intercourse outside bona fide marriage.
Silencing ‘other participants’ in the context of critical security studies in
Europe is certainly not of the same magnitude, but it does fit the general
argument Hansen is making about the absence of gender in the Copenhagen
School. The problem of silence concerns all those subjects endangered by
any attempt to speak, and the referent-object problem concerns all forms of
identity that are not ‘self-contained’. If those subjected to a securitizing move,
such as being designated ‘other participants’, attempt to speak up, they find
themselves walled off from the communication options necessary to appeal
their relegation. Their written words are blocked, as in not cited. Yet ‘the
Copenhagen School defines security according to what is successfully put
into language’ (Hansen, 2000: 300). All of this is like the dilemma faced by a
mermaid in Copenhagen harbor, whose silent hope of liberation and love
‘prevents her from ever fully materialising as an embodied subject’ (Hansen,
2000: 285). She is the mermaid from the famous fairy tale, who exchanges
her voice for legs to meet the prince, and then sacrifices her ability to return
to her family – and life – because the prince does not see her as a proper
subject. The moral of that tale starts in Copenhagen but travels far to the
‘other participants’ in the c.a.s.e. approach and to the world beyond
European critical security concerns.
Hansen describes subsuming security, the second blind spot, as the unap-
preciated complexity of gender. Being a woman or being a man is rarely
one’s only identity. It intermingles with identities that the Copenhagen
School finds salient to security, such as nationality and race. What this means
is that gender cannot be ’the kind of collective, self-contained referent object
required by the Copenhagen School’ (Hansen, 2000: 287). That is to say, it
cannot be existentially threatened in the same way that one’s national,
religious, or racial identity supposedly can be. Gender insecurities have
accordingly been relegated to an individual problem that is lower in the
greater hierarchy of security concerns, like a footnote to the main text. Again,
though, the ‘crime’ of being raped shows the shortcomings of subsuming
security. To many a feminist analyst, it is unstartling that ‘the targeting of
individual Pakistani women is deeply connected to their inscription within an
inferior gendered collectivity’ (Hansen, 2000: 291; emphasis in original). Such
is a basic tenet of feminist thinking: individual people called women are
treated in certain ways often because they are members of a subordinated
group, not because they may be ‘bad’ women or because they are members of
Christine Sylvester Anatomy of a Footnote 553
the ‘wrong’ national identity group; it is not unusual for the existential threat
to be delivered by people from one’s own group, not by outsiders alone. At
the same time, as Judith Butler (1990: 3) points out and Hansen (2000: 299)
cites, it is not enough to call women a large group, because ‘gender is not
always constituted coherently or consistently in different historical contexts,
and because gender intersects with racial, class, ethnic, sexual, and regional
modalities of discursively constituted identities’. Gender is a complex
security question.
At the end of a chain of logic and argumentation around these points,
Hansen (2000: 299–300) comes to her key contribution: ‘the focus on speech
produces problems in situations where the possibilities of speaking security
are constrained, and the conditions for becoming a referent object are such
that gender security is almost excluded from qualifying’. Following Butler,
she recommends including the body as a vehicle or performance of commu-
nication, and also examining the strategies used to keep certain security
problems from being seen at the collective level. These shifts would imply
that security is not necessarily a speech act between the state and its subjects,
but ‘a practice which constitutes subjects at both “ends” of the speech act (the
speaker and those spoken to)’ (Hansen, 2000: 303). We could thereby ‘arrive
at a theory that seeks to understand security as a practice which through dis-
cursive and bodily acts inscribe particular subjects as threats or as being
threatened’ (Hansen, 2000: 304). And, again, that theory of practice would
take us far beyond Copenhagen and its School, into far larger spaces of
silence, subjecthood unrealized, and bodies of security and insecurity.
By contrast, one senses that c.a.s.e. members are looking at themselves and
their mentors more than they are locating, engaging, or embracing anyone
else. And yet, security as practice rather than as concept is something the
c.a.s.e. piece advocates – security as the realm of politics and not something
allowed to be depoliticized: ‘We contest a vision of research as detached from
political contingency and action’ (c.a.s.e. collective, 2006: 445). Hansen
helped us to see political strategies that can turn security dilemmas into indi-
vidual and internalized – and unspeakable – non-problematics. We lament
her lost voice in an article that notes ‘persistent interrogations’ of critical
security studies coming only from ‘constructivist/reflexive approaches’
(c.a.s.e. collective, 2006: 445). And, more than that, once security becomes
practice and not concept, we have to wonder whether there is a practice afoot
in the footnote strategy that silences and subsumes security by mentioning
individuals, pigeonholing their identities, and not providing a guide to work
that might undermine the identity assignments. In the case of feminist schol-
ars, it can seem that trying to put gender into the picture is the very thing that
gets one entombed: it really is a man-i-fest(ival) out there. Individuals,
schools, ideas taken on relative to others that are silenced, ignored, deflected,
or deferred: that might be the unspoken security issue for the collective.
554 Security Dialogue vol. 38, no. 4, December 2007
Ressentiment/Amour
Having worked a player out of an entombing box, there are still some issues
– ticklish ones – remaining in the anatomy of a footnote. Here’s one: To what
extent do slights and relegations by critical security studies complicate the
goal of bringing security to the realm of sound politics? Just taking matters
of feminism as an example, is that relegation part of a larger tendency to
dismiss feminist scholarship as not critical, or not critical in the right ways, or
threatening to the critical traditions some are endeavoring to establish, or too
political in the wrong ways? Clearly, there is some disconnecting with femi-
nism going on – in the piece, in responses to it, and in all likelihood in larger
critical circles too. Yet, it would be difficult to dispute the fact that feminism
is a well-established field of critical thought and arena of critical practice. In
many ways, it is an exemplary realm that resists its own depoliticization.
More, feminist analysis comes in all the forms identifiable to any range of
critical thinkers doing security studies, from the Frankfurt School to the Paris
School, the Copenhagen School, the Aberystwyth School, post-structuralism,
biopolitics, and beyond. Feminist IR, in particular, has tackled issues of secu-
rity since the 1980s and is indisputably a ‘parallel emergence as a collective
phenomenon’ (c.a.s.e. collective, 2006: 450) with various schools of critical
security studies. Yet, I sense that appreciation for or interest in feminist con-
tributions to critical thinking is waning rather than waxing in critical Europe.
Certainly this is the case in the c.a.s.e. article. There are many openings in
that document to credit feminist scholarship with a history of critical security
contributions. One obvious place is on page 447, where dissident modes of
Christine Sylvester Anatomy of a Footnote 555
to IR. In the case of conferences put on by USC, and Wellesley, the express
purpose of the gatherings was to consider papers on gender and inter-
national relations. Everyone invited and present had written on some facet of
that topic, and everyone gave a paper to the assembled, not just the feminists.
This unprecedented moment within third-debate IR passed relatively
quickly. By the later 1990s we were beginning to draw lines in the sand again,
this time by proliferating new groups or sections that gradually turned into
camps. IR today exists as fragments, zones, and camp-ish camps, all taking
some exception to the many ‘other participants’ in IR. We rally around our
texts, our ‘specific individuals’, our debates, our workshops. Quite possibly,
we do not even know the important texts from a neighboring camp in the
field – or really care to engage them (Sylvester, 2007). We can be in love with
our favorite thinkers, displaying all the usual blindness to a beloved’s
personal and intellectual shortcomings. He becomes a font of genius: his
writings are poured over, endlessly discussed, endlessly revisited. He
becomes a sacred object to remember, quote, defend, and preserve. The criti-
cal European analysts of IR often seem in love with Foucault, some with
Schmitt and Agamben. For their part, Americans just love Waltz, Wendt, and
Morgenthau. Feminist IR does not find any of these guys quite as fabulous. Is
this the problem? We do not have the same saints’ bones in our reliquaries?
I don’t know. But there are consequences of leaving us and so many in the
world out and other. When critical people of all persuasions and locations
forget to recognize that critical comes in many forms, when they designate
some critical analysts as ‘other participants’, fall into the habit encouraged by
camp IR to focus narrowly and rally around a few thinkers, when they forget
that feminists are dissidents too and that women are in security peril the
world round, when they forget their grammars and citations and build little
tombs to hold some of their own body parts, they are in trouble in a troubled
world. And, more, when these faults repeat across venues, then criticals
become a bit like those they decry as hegemonists or non-critical thinkers.
And, lest a footnote be regarded as a mere piece of marginalia at the
margins of a field, it is crucial to recognize that critical scholarship is no longer
on the margins of IR. It, too, has its bona fide camps (e.g. critical terrorist
studies, a post-structuralism working group, feminist theory and gender
studies, international political sociology) and its own journals (e.g. Alter-
natives, International Feminist Journal of Politics, International Political Sociology,
Critical Studies on Terrorism). ‘It’ may not run IR, but then no camp in the field
is strong enough to do so today. If critical security studies could command
ideas in IR, I wager it would not look favorably on feminist thinkers and
thinking. More likely, ‘it’ would hug a postmodernist, Wæver’s blocking
moves notwithstanding. After all, he or she would be an intellectual descend-
ant of one of the continental lions, saints, and geniuses against whom even a
Judith Butler does not fully rate, let alone a mermaid with a security problem.
Christine Sylvester Anatomy of a Footnote 557
References
Butler, Judith, 1990. Gender Trouble: Feminism and the Subversion of Identity. London:
Routledge.
Butler, Judith, 2004. Precarious Life: The Powers of Mourning and Violence. London: Verso.
Buzan, Barry; Ole Wæver & Jaap de Wilde, 1998. Security: A New Framework for Analysis.
Boulder, CO: Lynne Rienner.
c.a.s.e. collective, 2006. ‘Critical Approaches to Security in Europe: A Networked
Manifesto’, Security Dialogue 37(4): 443–487.
Cohn, Carol, 1987. ‘Sex and Death in the Rational World of Defense Intellectuals’, Signs:
Journal of Women in Culture and Society 14(4): 687–718.
Elshtain, Jean Bethke, 1987. Women and War. New York: Basic.
Enloe, Cynthia, 1989. Bananas, Beaches, and Bases: Making Feminist Sense of International
Relations. London: Pandora.
Hansen, Lene, 1997. ‘A Case for Seduction? Evaluating the Poststructuralist Conceptuali-
zation of Security’, Cooperation and Conflict 32(4): 369–397.
Hansen, Lene, 2000. ‘The Little Mermaid’s Silent Security Dilemma and the Absence of
Gender in the Copenhagen School’, Millennium: Journal of International Studies 29(2):
285–306.
Hansen, Lene, 2001. ‘Gender, Nation, Rape: Bosnia and the Construction of Security’,
International Feminist Journal of Politics 3(1): 55–75.
Hansen, Lene, 2006. Security as Practice: Discourse Analysis and the Bosnian War. London:
Routledge.
Hansen, Lene & Ole Wæver, eds, 2002. European Integration and National Identity: The
Challenge of the Nordic States. London: Routledge.
Jabri, Vivienne, 1996. Discourses on Violence: Conflict Analysis Reconsidered. Manchester:
Manchester University Press.
558 Security Dialogue vol. 38, no. 4, December 2007
Sjoberg, Laura, 2006. Gender, Justice, and the Wars in Iraq: A Feminist Reformulation of Just
War Theory. New York: Lexington.
Stiehm, Judith, 1984. Women and Men’s Wars. Oxford: Pergamon.
Sylvester, Christine, 2007. ‘Whither the International at the End of IR’, Millennium: Journal
of International Studies 35(3): 551–573.
Tickner, Ann, 1992. Gender in International Relations: Feminist Perspectives on Achieving
Global Security. New York: Columbia University Press.
Wæver, Ole, 2004. ‘Aberystwyth, Paris, Copenhagen: New “Schools” in Security Theory
and Their Origins Between Core and Periphery’, paper presented at the 45th Annual
Convention of the International Studies Association, Montreal, 17–20 March.
Copyright of Security Dialogue is the property of Sage Publications, Ltd. and its content may not be copied or
emailed to multiple sites or posted to a listserv without the copyright holder's express written permission.
However, users may print, download, or email articles for individual use.