State of Conservation
233
Reports
21
Properties concerned
14
States Parties with SOC reports
Property Category:Naturalclose
Date end:2011close
Region:
Africaclose
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Poverty |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.204/INF.12,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Other Threats: | Decline in wildlife populations |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Other Threats: | diminishing protection |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Fire |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B,WHC.03/27.COM/7B.Corr |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.203/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev. |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7B,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | WHC-92/CONF.002/5,WHC-92/CONF.002/7 Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1985 |
Document Source: | SC-85/CONF.008/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1984 |
Document Source: | SC-84/CONF.001/4,SC/84/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.001/3B Add.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Transhumance |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4,WHC-2001/CONF.205/INF.6 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | community-wildlife conflit |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Community-wildlife conflict; |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Uncontrolled forest land excisions, in the Mount Hombe and Ragat blocks |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1984 |
Document Source: | SC/84/CONF.004/9 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.207/INF.7,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1988 |
Document Source: | SC-88/CONF.001/4A |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A,WHC/17/41.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Degradation of buffer zone |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
Other Threats: | a) Anti-personnel mines infestation in the park; b) Degradation of lands around the park |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | a) Serious security issues (landmines); b) Fires |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Unsustainable resource use practices |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Other Threats: | Unsustainable resource use practices |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Other Threats: | Unsustainable resource use practices |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
Other Threats: | b) Reduction of elephant populations; |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 |
Threats*: | Illegal activities |
Other Threats: | Opening of a route to drive cattle |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/03,SC-87/CONF.005/3,SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.003/INF.4 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
Other Threats: | Threats to wildlife migration and populations |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10 |
Threats*: | Illegal activities |
Other Threats: | Threats to wildlife migration and populations |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.209/14 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC.94/CONF.003/16 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Declining populations of Walia ibex and Simien FoxSoil deterioration. |
Danger List: | Yes |
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.