State of Conservation
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.001/3B,WHC-94/CONF.001/3B Add.1,WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures; |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
Other Threats: | Destruction of Park infrastructures |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/15 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Transhumance |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4,WHC-2001/CONF.205/INF.6 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | b) Inclination of the Minaret; |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Inclination of the Minaret |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Inclination of the Minaret |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Inclination of the Minaret |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Illegal activities |
Other Threats: | Need for consolidation and restoration of the monument |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | community-wildlife conflit |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict; |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1984 |
Document Source: | SC/84/CONF.004/9 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
Other Threats: | a) Decline in animals population; b) Reduction of control fires |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.207/INF.7,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1988 |
Document Source: | SC-88/CONF.001/4A |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A,WHC/17/41.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties
Afghanistan Albania Algeria Argentina Australia Azerbaijan Bangladesh Belarus Brazil Bulgaria Cambodia Cameroon Central African Republic China Colombia Costa Rica Côte d'Ivoire Croatia Democratic Republic of the Congo Ecuador Egypt Ethiopia Ghana Guinea Honduras India Indonesia Iraq Jordan Kenya Lao People's Democratic Republic Lebanon Libya Lithuania Madagascar Mali Malta Mauritania Mexico Montenegro Morocco Nepal Niger Oman Peru Philippines Poland Russian Federation Senegal South Africa Sri Lanka Turkmenistan Uganda United Kingdom of Great Britain and Northern Ireland United Republic of Tanzania Viet Nam Yemen ZimbabweThreats
Illegal activities 591
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.