State of Conservation
288
Reports
31
Properties concerned
18
States Parties with SOC reports
Date end:2013close
Region:
Africaclose
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.204/INF.12,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Severe famine facing Bandiagara and massive selling of cultural objects |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Other Threats: | diminishing protection |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Fire |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B,WHC.03/27.COM/7B.Corr |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.203/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev. |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.203/8Rev. |
Threats*: | Illegal activities |
Other Threats: | Salt-laden atmosphere |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7B,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | WHC-92/CONF.002/5,WHC-92/CONF.002/7 Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1985 |
Document Source: | SC-85/CONF.008/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1984 |
Document Source: | SC-84/CONF.001/4,SC/84/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add.2 |
Threats*: | Illegal activities |
Other Threats: | risk of collapse of historic building |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Risk of collapse of historic buildings; |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
Other Threats: | a) Risk of collapse of historic buildingsb) Construction of the replica of the Gorée Memorial |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Villages in the ecological corridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Villages in the ecologicalcorridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add.Corr |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.001/3B Add.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Transhumance |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4,WHC-2001/CONF.205/INF.6 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflit |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | community-wildlife conflit |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict; |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1984 |
Document Source: | SC/84/CONF.004/9 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
Other Threats: | a) Decline in animals population; b) Reduction of control fires |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.207/INF.7,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1988 |
Document Source: | SC-88/CONF.001/4A |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A,WHC/17/41.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
Other Threats: | a) Natural values and cultural landscape qualities are not yet reflected in the islands management structure and conservation priorities; b) Fire |
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.