State of Conservation
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7B,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | WHC-92/CONF.002/5,WHC-92/CONF.002/7 Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1985 |
Document Source: | SC-85/CONF.008/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1984 |
Document Source: | SC-84/CONF.001/4,SC/84/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
Other Threats: | particularly worrying state of conservation |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Fire |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
Other Threats: | a) Fire; b) Lack of specific monitoring indicator; c) Lack of adequate firefighting arrangements in the historic urban zone; d) Lack of a programme of archaeological excavation |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Serious degradation of the city’s heritage (many houses and the ancient souq are in an alarming deterioration state) |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Serious degradation of the city’s heritage (many houses and the ancient souk are in an alarming deterioration state) ; Lack of conservation measures and supportive developments. |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A,WHC/17/41.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Serious deterioration of the city’s heritage |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Serious deterioration of the city's heritage |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Deterioration of the traditional urban fabric |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Deteriorated state of some of the monuments |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
Other Threats: | Fires |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add.2 |
Threats*: | Illegal activities |
Other Threats: | risk of collapse of historic building |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Risk of collapse of historic buildings; |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
Other Threats: | a) Risk of collapse of historic buildingsb) Construction of the replica of the Gorée Memorial |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Villages in the ecologicalcorridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Fire |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Insufficient infrastructure |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Elephant-human conflicts |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
Other Threats: | Elephant-human conflicts |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.201/11Rev,WHC-02/CONF.202/17,WHC-02/CONF.202/2 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Partial abandonment of the property |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
Other Threats: | a) Partial abandonment of the property; |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Near total abandonment of the property |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Near total abandonment of the property |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
Other Threats: | Near total abandonment of the site |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
Other Threats: | State of abandonment and degradation |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Continuing decline of the Baikal Seal population |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.201/11Rev,WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Continuing decline of the Baikal Seal population |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.207/INF.8,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
Other Threats: | Continuing decline of the Baikal Seal population |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Lack of systematic monitoring of the site |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Lack of systematic monitoring of the site |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Lack of systematic monitoring of the site |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
Other Threats: | a) Security limitations on staff and public access to parts of the Park; b) Fire |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B,WHC.03/27.COM/7B.Corr |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.001/3B Add.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Other Threats: | b) Forced evacuation of Park staff |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Forced evacuation of Park stafDestruction of Park infrastructure |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Forced evacuation of Park staff; and Destruction of Park infrastructur |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | a) Forced evacuation of Park staffb) Destruction of Park infrastructure |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Destruction to park infrastructure |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Damaged Park infrastructure |
Danger List: | Yes |
States Parties
Afghanistan Albania Algeria Argentina Australia Azerbaijan Bangladesh Belarus Brazil Bulgaria Cambodia Cameroon Central African Republic China Colombia Costa Rica Côte d'Ivoire Croatia Democratic Republic of the Congo Ecuador Egypt Ethiopia Ghana Guinea Honduras India Indonesia Iraq Jordan Kenya Lao People's Democratic Republic Lebanon Libya Lithuania Madagascar Mali Malta Mauritania Mexico Montenegro Morocco Nepal Niger Oman Peru Philippines Poland Russian Federation Senegal South Africa Sri Lanka Turkmenistan Uganda United Kingdom of Great Britain and Northern Ireland United Republic of Tanzania Viet Nam Yemen ZimbabweThreats
Illegal activities 591
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.