Abstract
The settling of the 32-year Aceh conflict not only transformed former members of the Free Aceh Movement (GAM) into administrators, constructing a new circle of elites, but also created opportunities and new spaces for economic and socio- political competition and contestation. Hence, this transformation sowed the seeds of an emerging conflict in Aceh. This study investigates the emerging conflict pat - terns along with their causes and the actors involved. Three patterns of conflict have emerged during the post-Helsinki Peace Agreement period: (i) a conflict among the former GAM elites, (ii) a conflict between the former GAM elites and the for - mer GAM rank-and-file combatants, and (iii) a conflict between the ethnic Acehnese majority and the diverse ethnic minority groups. While the first and second conflicts are primarily induced by individual self-interest, the third is specifically triggered by social and political discrimination as well as by under-development.
Highlights
The story of Aceh is that of a human tragedy which unfolded over successive phases
Three patterns of conflict have emerged during the post-Helsinki Peace Agreement period: (i) a conflict among the former GAM elites, (ii) a conflict between the former GAM elites and the former GAM rank-and-file combatants, and (iii) a conflict between the ethnic Acehnese majority and the diverse ethnic minority groups
This study addresses the following questions: What are the general patterns of conflict appearing in the post-Helsinki period? What is the root cause of each pattern of the conflict? And who are the actors involved in each conflict pattern?
Summary
How to cite: Ansori, M H 2012 From Insurgency to Bureaucracy: Free Aceh Movement, Aceh Party and the New Face of Conflict. STABILITY Ansori, M H 2012 From Insurgency to Bureaucracy: Free Aceh Movement, Aceh Party and the New Face of Conflict.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Stability: International Journal of Security and Development
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.