animated goddess mdbs banner animated goddess

MoonDragon's Parenting Information
Protecting Our Children from Sexual Predators

catching sexual predators


If you think child predators are sexual perverts who lurk in bushes, hang around schoolyards, and scope out kids at the mall - you have a false sense of security. These days, they don't have to hide because the Internet lets them into your home at any time. Know the warning signs and how to help your child.

One in four children in chat rooms on the Internet will be solicited by a child predator. These pedophiles seek a target-rich environment for finding their prey, and the Internet has become their flocking ground. To insure that your children and household are safe from the threat of these predators, consider these tips from Detective James Brown, officer in charge of the LAPD's Sexually Exploited Child Unit.
    Never, ever leave your child alone in a room with a computer connected to the Internet.

    Any Internet-connected computer should be in the community part of the house. It should only be used when parents are home and monitoring their children's activity on the computer. Think about it like this; Would you ever let a stranger go up to your child's room and talk to them alone for four hours? Would you ever leave your child alone in a park and come back four hours later? It is a myth that a child on a computer at home is safe. At the least, they may be exposed to sexually explicit materials, and at the worst, they can be lured by an Internet pedophile.

    Parents should educate themselves on basic computer knowledge.

    Parents should be the ones to set up all Internet accounts and passwords. Make sure you know your child's account name and password. You should also be aware if any other e-mail accounts your child may have. Monitor your child and be aware of what he/she is doing, especially with websites such as a social website like where kids can put in their profiles to meet with other kids. Several sexual predators have been caught posing as kids on these types of websites and will often befriend and lure your child into giving them information about themselves and possibly setting up a face-to-face meeting.

    Locking certain computer sites does not work.

    Computer filters do not work for chat rooms, and there are no blocks for the chat rooms. There is software to monitor a child's activity, but not their chat activity.

    Be aware.

    Parents should be cautious if a child suddenly closes a browser window on the computer when the parent enters the room, or if the child does not want the parent to see what they are working on. If the parent questions what the child is looking at, they should go to the computer and click the back button on the tool bar or lean over and look closely at the computer screen. Parents should also be aware of pictures coming in over the computer.

    Never, ever give out personal information over the Internet.

    This is a good practice for both children and parents. It makes it easy for people to find out about you if you have provided them with any personal information. If you have to give some information, only give your state identification. Never give out your city, birthday, name, or school you attend.

    Children should never upload a picture of themselves to the Internet.

    They should also never e-mail a picture to this new person. Once the picture leaves your computer you have lost control of what can be done with the picture. A predator can do anything they want with it.

    Make sure you have open lines of communication with your children.

    Oftentimes kids are communicating with strangers because there is no communication in the house. Have open discussions with your children so they feel comfortable talking with you. They should know that if they receive material that bothers them or is inappropriate, they should bring it to their parent's attention so it can be reported to local law enforcement. They need to feel comfortable doing this.

    Many times children feel they did something wrong or something they were not supposed to do, so they think they will lose computer privileges because of this. It is important for them to know that they can bring it to their parents' attention without getting in trouble.

    Parents and children should visit to help start family discussions and conversations. This site is supported by the National Center for Missing and Exploited Children.

    If you suspect your child is in trouble, look for these signs:

  • A child that starts to act differently, withdrawn, getting bad grades or spending a lot of time on the Internet.

  • Many times children will think they have found their new "best friend," and they believe that this person will rescue them from their doldrums. If gifts start arriving at the home, this should also be a clue that something is not right. If your family starts receiving phone calls from people you do not recognize, this could mean there are serious problems. Either the child gave the predator your phone number, or the predator found it out. This can signify a threat to your child as well as the entire family, especially if the predator knows where you live.

  • If you suspect your child could be the victim of an Internet pedophile, call your local law enforcement agency. You can also visit, which will direct you to an agency in your area, or, which is a national center for missing and exploited children. For more information for you and your child to be safe on the Internet, visit Missing Kids - Massachusetts
DATELINE NBC: To Catch A Predator


When you visit web sites you can read newspapers, tour museums, check out libraries, visit distant lands, play games, look at pictures, shop, or do research to help you with your homework. There are millions o are boring, and some contain so-called "adult" images and other material that can be dangerous for teens. Others are demeaning, racist, sexist, and violent or contain false information. Some of these sites contain stuff that can make people feel badly or even hurt people. If you end up in any of these areas, immediately leave by clicking on the Home icon, going to another site, or shutting down your browser.

Some web sites ask for information about you. The site may ask for your name, your mailing address, your E-mail address, and other information before letting you in. It may ask you to provide information in exchange for sending you a gift or entering your name in a contest. Never enter any information about yourself without first checking with your parents or guardians.

When you enter information on a web site or any place on the Internet, you are giving up some of your privacy. Your name may wind up in some database, probably to be used to sell you something now or later. Or it may be used to try to harm or take advantage of you.

Just because a web site seems to be okay does not mean it necessarily is what it seems to be. Anyone - including creeps and criminals - can set up their own web site.

If you download anything from a web site, be extra careful. Some web sites ask your permission to download a program or "plug-in." In some cases these programs can be used to display annoying advertising on your computer. Even worse, they can invade your privacy by tracking what you are doing online. They can also plant viruses or increase your risk of a "hacker attack." Do not download anything unless you are certain it is from a trustworthy source.

Some teenagers have their own web sites or post information on web sites run by the school they go to or an organization they belong to. That is terrific, but if you do post something on the web, be sure to never include your home address, telephone number, school name, or photograph. If you do want people to be able to contact you online, just give a nondescript E-mail address, but make sure you have your parents' or guardians' permission first.


Chatrooms (and other social sites such as My Space, Facebook, Twitter and others) let you have a conversation with people around the block or around the world. It Is like being on a party line, only you type instead of talk. Everyone in the "chatroom" can see everything you type. Types of chatrooms tend to be different. Some chatrooms are just open conversations where everyone has an equal role. Some rooms are moderated where a "speaker" leads the chat and tries to keep everything in order. Some rooms have chaperons or monitors who try to make sure things do not get out of hand and can kick people out of the room if they do not behave. Even so, in some of these rooms what you type is seen right away by everyone. And the monitor cannot prevent you from going off to a private chat area with a person who may want to hurt you or type information that may put you in danger.

A chatroom is probably the most dangerous area on the Internet. You never know who is in one, so never type anything you would not say in public.

It is not uncommon for people to meet in chatrooms. You enter a room; start chatting with someone; and, before you know it, you are having a conversation. That relationship may turn out OK, but there are some not-so-happy stories. Chatrooms are sometimes used by people to take advantage of others. To put it bluntly, chatrooms - especially those used by teenagers - are sometimes also used by child molesters to find victims. Adults or even older teens seeking to exploit younger people do not necessarily tell the truth about who they are. Even teens your own age may try to hurt you. You have the right to remain in control of your own experiences. You do not have to accept inappropriate behavior from anyone.

You may meet people in a room who seem to have a lot in common with you. They may appear to be friendly and good listeners too. If the dialog remains strictly online, that may be okay. Just be careful not to give out any personal information.

You may want to get together with someone you meet in a chatroom, but remember - people are not always who they seem to be. Many individuals use this media as a way to express an alter ego or personna that in real life they really are not. In the shadowy confines of cyberspace you can pretend to be whomever or whatever you want to be, no matter how dark that personna may ab. Others use it as a means to hunt for, entrap and exploit their new victims, sometimes to the victim's fatal end at the hands of a murderer / serial killer.

Never give out personal information and never arrange a face-to-face meeting with someone you first "meet" in a chatroom unless your parents or guardians have said it's okay. Even then you need to follow the precautions in "Do Not Meet in Person."

Stay away from chatrooms that get into subjects associated with sex or cults or groups that do potentially dangerous things. It may seem interesting or fun, but some people may take you seriously or try to convince you to do something you don't want to do. Be particularly suspicious of anyone who tries to turn you against your parents, guardians, teachers, or friends.

On some services and web sites you can enter into a private chat area. Once there you can arrange to meet people. In some cases those rooms are truly private, but in other cases they may be listed in a directory of rooms. If so, there is nothing to stop others from entering those rooms. So be extra careful in these rooms, or avoid them altogether.

A smart way to avoid harassment in a chatroom is to choose a name that doesn't let people know if you're a girl or guy. Just make sure the name doesn't let anyone know anything about you or mean something that may encourage others to bother you.


Instant messaging (IM) and texting is an easy way to stay in touch without having to wait for an E-mail response. You type a message and click "send." That message instantly appears on another person's screen wherever he or she happens to be. You can exchange instant messages on computers and cell phones or between computers and cell phones or any other Internet-connected devices. As great as it is, IM can be dangerous. Like chatrooms, you need to be careful about whom you IM with and what you type. Never give out any personal information in an instant message unless you are 100 percent sure of who is receiving the IM and your parents or guardians have given you permission to do so. Some instant message services make it possible to exchange messages with several people at once - just like a chatroom. So make sure you know everyone on your IM list.

Some instant messaging software can be used to send your picture - in real time - along with your words. Be careful about your privacy and protecting it. Remember, do not send anyone your photograph online.

Some services encourage you to post a "profile" with information such as your age, sex, hobbies, and interests. These profiles can help you meet similar people, but they can also make you the subject of harassment, even if you do not post your name and address or other information. If you donot have a public profile, you will be safer and avoid a lot of hassles.

Be sure you know who is receiving the IMs and texts you send. Even if you do know the recipients, anything you type can be forwarded to other people. There is no way to "take back" something once you send it. Be careful about using video or digital cameras and sending images of yourself during an IM or texting session. Remember, you do not have to respond to any messages especially if they are rude, annoying, or make you feel uncomfortable. Avoid those wanting you to participate in "sex-ting" (sexual explicit texting) and asking for nude and/or sexually suggestive photos of yourself. These individuals are trying to exploit you and can result in abusive, bullying, harrassing behavior towards you. Many teens have actually been bullied into committing suicide by these type of individuals.


E-mail is just like regular mail. In this case you write to someone electronically, and the person can respond to your message electronically. People and companies use E-mail to send messages to thousands of people at a time, encouraging them to buy something or visit a web site. The process, known as "spamming," can be intrusive and annoying. Some use spamming to try to entice people to visit sexually explicit web sites.

Each E-mail message you send and receive contains a return address. Many people do not realize the return address can be fake or stolen and misused by the thief. So, just because you get a message from "" does not mean it is really from grandma. It may really be from

E-mail also contains a "header." Headers provide more information about who sent the message and where it came from. Understanding the header information can be difficult, but if you ever receive an E-mail message that does not make sense; is threatening; or contains things that make you feel scared, uncomfortable, or confused, you should report it to your Internet service provider and ask them to investigate where it came from. You can easily find that address on the service's main web page ( When in doubt report the message to (substitute the name of your service for "servicename.")

If you think any information you receive is illegal, you should report it to the CyberTipline® at or call 1-800-843-5678. Illegal material includes threats to your life or safety, threats to others, pornographic images of children, and evidence of other crimes. NCMEC will refer this report to the appropriate law-enforcement agency.

Be careful about replying to E-mails from people you do not know. Remember, the sender may not be who he or she seems to be. By replying you are verifying a valid E-mail address to the sender, and that information can be used to encourage a person who may send inappropriate messages or put you on even more E-mail lists. Never send a photograph of yourself or any personal information to someone you do not know.

E-mail can easily be copied and forwarded to others. So if you do send personal information to friends, be sure they will respect your privacy.


Peer-to-Peer (P2P) systems let you exchange files without a web site or other centralized system. The most famous of these services are used to share music files. There are plenty of other P2P systems. Some allow you to exchange other types of files including video, photographs, text documents, and software. Aside from the legal and ethical issues regarding the unauthorized sharing of copyrighted material, there are some serious safety issues regarding these services. Some of the downloaded files - including photographs and videos - may be upsetting or harmful. It's also a popular way for child molesters to exchange illegal images of children.

P2P file-sharing systems encourage users who download files to upload them as well. This may turn your PC into a server that shares your files, which can place you in legal trouble or possibly allow others to gain access to personal stuff on your computer. It is like giving someone you do not know the opportunity to know everything about you. It can also cause problems for other computers if you are on a business, home, or school network.

Another problem with file-sharing services is the software used to access them can sometimes come with unwelcome extra "features" such as "spy ware" programs that can invade your privacy and display annoying advertising.

If you use a file-sharing service, be careful about what "permissions" you give when you set it up. Avoid sharing your own files and say no to any offers to install extra software. Even then, there is no guarantee you will not experience problems as a result of having the software on your computer.


Newsgroups, sometimes called bulletin boards or forums, are places where you can read and post messages or download or upload files. Unlike chatrooms, newsgroups are not live or "real time." If you post a message it remains on the newsgroup for people to look at later. In newsgroups you can also post files including computer programs, illustrations, pictures, and stories.

There are newsgroups on almost every possible subject. Normally they are used as ways to get questions answered and share information about hobbies, musical groups, or any other subject of interest. Unfortunately, newsgroups, like other areas of the Internet, have risks.

The biggest risk is in revealing information about yourself. Whenever you post, in most cases, your words are available for anyone to see, even if you are responding to a particular individual's posting. Remember the basic rules, and never reveal identifying information about yourself.

And posting something usually makes your E-mail address available to the public. Thus, even if you don't say anything personal, your address will be available for people who may send you "junk" or inappropriate E-mails.

Some newsgroups contain sexually explicit illustrations, photographs, and stories. Some of this material may be illegal especially if it contains images of people who are younger than the age of 18 or certain other material that has been defined as "obscene." This can be upsetting and uncomfortable to view. It should be avoided.


Recent incidents involving Internet crimes against children have been prominent in the media. In some incidents, the crimes have involved suspects and victims who met each other on social networking or blogging sites such as MySpace, Friendster, Xanga, and Facebook. Blogs and social networking sites have recently exploded in popularity. The number of visitors to MySpace went from 4.9 million in 2005 to currently over 67 million. Like most new technological developments, this brings both positive and negative implications.

The majority of the activity on these sites is legal and can be positive. Young people who are curious connect with friends and seek like-minded individuals. However, many teens are not aware they are putting themselves in danger by giving out too much personal information and communicating with people they have only met online.
  • Janet Kornblum. "Teens hang out at MySpace." USA Today. January 8, 2006, Article
  • April 3, 2006,

The unprecedented amount of personal information available on blogs and social networking sites makes them a perfect place for people who would harm children to identify their victims and gain their trust. This trust can be used to lure teens into a false sense of security, making them vulnerable to "grooming" and enticement to meet in person, which could have very serious consequences.

Other dangers include exposure to inappropriate content, cyberbullying, or identity theft.

Teens are often not aware that their words - which may have been intended for a small audience - sometimes find their way to a larger one, especially if they are controversial. Some students who have posted threatening words against their school or classmates have attracted the attention of law enforcement, while those who have posted inappropriate comments about school personnel have also been disciplined. Some universities and employers are even reviewing online postings when considering potential candidates.

Never post your personal information, such as cell phone number, address, or the name of your school, or school team.

Be aware that information you give out in blogs could also put you at risk of victimization. People looking to harm you could use the information you post to gain your trust. They can also deceive you by pretending they know you.

Never give out your password to anyone other than your parent or guardian.

Only add people as friends to your site if you know them in real life.

Never meet in person with anyone you first "met" on a social networking site. Some people may not be who they say they are.

Think before posting your photos. Personal photos should not have revealing information, such as school names or locations. Look at the backgrounds of the pictures to make sure you are not giving out any identifying information without realizing it. The name of a mall, the license plate of your car, signs, or the name of your sports team on your jersey or clothing all contain information that can give your location away.

Never respond to harassing or rude comments posted on your profile. Delete any unwanted messages or friends who continuously leave inappropriate comments. Report these comments to the networking site if they violate that site's terms of service.

Check the privacy settings of the social networking sites that you use:
  • Set it so that people can only be added as your friend if you approve it.
  • Set it so that people can only view your profile if you have approved them as a friend.

Remember that posting information about your friends could put them at risk. Protect your friends by not posting any names, passwords, ages, phone numbers, school names, or locations. Refrain from making or posting plans and activities on your site.

Consider going through your blog and profile and removing information that could put you at risk. Remember, anyone has access to your blog and profile, not just people you know.


To report the sexual exploitation of children, go to It is monitored by the FBI and the Center For Missing and Exploited Children.

For more information on protecting your children on the Internet visit: Protecting Your Kids on the Internet
This link was recommended by Kate and her mom Darci Armstrong. (Link added July 17, 2014.) Thanks Kate for doing your research and I hope it helps to protect other kids too. I was once a girl scout over 50 years ago and later became a girl scout leader when my daughter was your age. She's all grown up now with a grown son of her own in the Air Force. Kate, keep up the good work sweetie. Be safe. Be Smart. - Leather Dupris, Webmistress)


As scary as it may be, parents need to talk to their kids about people who might want to hurt them. The best way to protect your children is to get them involved in their own protection. Here is some helpful advice:
    Parents need to be aware of possible predators.

    Typical signs are: someone who seems too good to be true, who offers extensive help to your family, who knows too much about your kids or kids in general, especially if they do not have children of their own.

    Talk to your kids about pedophiles as soon as they can understand what you mean.

    As early as 3 to 5 years old, when kids begin to interact with the world, they are subject to being victims.

    Do not be afraid that you are scaring your kids, but do not ask them to deal with adult issues either.

    Speak to them in age-appropriate language and give them instructions about what to do. They will feel empowered by knowing how to protect themselves. Be careful sharing your own experiences if you were a victim of sexual molestation, for example. Providing too many details and rehashing the tragedy can create a sexually charged environment and be harmful for your children in the long run.

    Kids need to know that they have the right to say no, yell, or ask for help.

    It may contradict what they know about respecting adults, but if they feel threatened, they have permission to make a scene, or to run away to a public place. And they need to know they would not get into trouble if they were wrong.

    Make sure your kids know what is acceptable behavior, and what is out-of-bounds.

    Make sure they understand that there are private areas of their bodies that no one else should touch. This includes family members, friends of the family, as well as strangers.

    Rehearse your child's response to danger.

    If he/she does not practice it, your child really will not really know what to do. Telling your child to yell for help is not enough. In the face of danger, a child could forget, so rehearse, role-play, and practice what your child should do. If you have a self-defense class available in your community, enroll you and your children in it. Self-defense training is good for the entire family. Not only does it offer helpful information and self-defense techniques on how to "get away" from a predator/attacker, but it also helps to give children (and adults) some self confidence. Practice techniques outside of class with your children so they become second-nature to them. Make it a family project.

    Remind your children that predators do not necessarily look scary or strange.

    A dangerous person could look like the person next door, or even be someone they know. Some of the worst offenders have been the best charmers in gaining trust of potential victims (such as Ted Bundy, for instance). Just because they may look harmless, does not mean they are harmless. Dangerous persons comes in all sizes, genders, ages, professions, and social levels.

    Keep communications open with your children.

    This is very important, especially if the predator is a family member or a family friend. Let them know it is "Okay to tell" and listen to them. Let them know that when someone says "you cannot tell anyone, this is a secret between us", that this is a danger sign and they should get away and tell someone they trust as soon as possible.


A series of recent high-profile child abduction cases has touched a nerve with parents across the nation. Too many parents think such tragedies only happen to "other people." That is simply not true. It can happen to a family member, a friend, a neighbor and to you. There are steps you can take to help protect your kids - without scaring them.

Talk to your kids early and often. Teach them to self-protect. Do not be afraid that you will make them paranoid (although a little paranoia is not always a bad thing either since the world can be a very scary, dangerous and predatory place to live these days for people of all ages). Children actually feel empowered when they feel understand that they have the power to protect themselves. Teach them to think "outside the box" and use their instincts and creativity to get out of potentially dangerous situations.

Do not ask children to deal with adult issues. Explain things in terms they can understand, such as good and bad. You do not have to share the gory details with them.

Tell your kids to avoid strangers. Responsible adults just do not ask kids for directions, offer them candy or treats, or for help in finding their puppy or another child (a common ruse used to lure kids away). If they are approached by someone offering something or asking them to help them with something, your child needs to know to say no and run away in the opposite direction and tell you, a police officer, a teacher or someone else they know and trust so this potential predator can be caught and questioned.

While it is important for children to respect adults and those in authority, give them permission to act impolite, rude, or scream and yell when they feel that something is not right. It is okay for them to make a scene or to yell for help, and let them know they will not get in trouble if they were mistaken.

Teach kids to yell with specificity: "This is not my Daddy!" or "Somebody help me!" or "Stranger Danger!" or "Call the police!" ... anything that will help get a public response to help the child.

Role play with your children to practice how they should respond. Make it educational (and fun) so they will remember what they are learning. Empower your kids while educating them.

Do not dress them in clothing that has their name on it. When they hear someone use their name, they often believe it is a signal for safety. Some of the worst offenders are people we know and know us as well (such as a family friend or relative).

Teach your kids a code word that only you and they know to indicate that there is possible danger. This can be very important if someone tries to pick them up by telling the child "Your mommy (or daddy) sent me to get you." It the person does not have the code word, the child needs to run in the opposite direction and tell someone they trust that this person is not who they say they are.

The number one defense for kids is to run away. They need to run to a public place with a lot of people.

Watch your kids! Keep a close eye on them. And do not assume that others to whom you entrust your child are as vigilant as you are. To make sure they are, test it out. Send a friend to pick up your child, for example, and see if the school allows it. Keep in mind the "code word" rule.

Let your child know he/she can talk to you about anything and everything, including body parts, harrassment, and bullying. Start communicating openly and honestly with your kids when they are very young and continue it into their pubescent years. If you do not establish this communicative trust early, trying to establish communications with a teenager later will prove to be very frustrating and non-productive as they tend to be very secretive about their lives, their problems, their relationships and their deeds.

Remember: Pedophiles are sick individuals - but they look just like everyone else. They embed themselves in everyday society. They are not extremists you can spot walking down the stre*/\et. Pay attention to people who spend an inordinate amount of time with kids, and do not have any of their own. You may be suspicious when you need not be, but it is better to have "false positives" than to not raise your eyebrows when you should.

Know with whom you and your children are interacting. This was my former landlord until September 2000 and I had no idea about his past history until researching this webpage.

William C. Arnold, Class 3 Sex Offender
SORB: William C. Arnold, Salem, Massachusetts

Sex: Male
Height: 6' 01''
Weight: 205
Hair Color: Black
Eye Color: Brown
Race: White
Age: 54
Aliases: William W. Arnold, William Corbett Arnold, Bill C. Arnold, Corbett William Arnold. Class 3 Sex Offender
Formerly of Salem, MA; Plympton, MA, Warwick, RI
Last Known Residence: 95 School Street, Manchester, MA (December 13, 2013)
  • Crime: Rape of a child with force, Conviction date: 1979-03-30
  • Crime: Rape of a child with force, Conviction date: 1978-10-20

  • Sex Offender Registry Board (SORB)
    Sex Offender Registry Board (SORB), Massachusetts Registered Sex Offenders In Salem, Massachusetts
    MassResources: Sex Offender Registry Information


    MoonDragon's Domestic Violence Information
    MoonDragon's Women's Health Information: Domestic Violence
    MoonDragon's D.V. Info: A Guide To Abuse Prevention, Protection, Assistance & Community
    MoonDragon's D.V. Info: Immigration Rights & Resources
    Prevent Abuse Now Register
    United States Department of Justice: National Sex Offender Public Registry
    Massachusetts Sex Offender Registry Board (SORB)
    Massachusetts Sex Offender Registry Board (SORB): Level 3 Offenders Search List
    Danvers Massachusetts Police: Level 3 Sex Offenders
    Easton Massachusetts Police: Level 3 Sex Offenders
    Pembroke Massachusetts Police: Level 3 Sex Offender Community Notification Sexual Offenders Lists & Maps Internet Dangers - Protecting Children in Cyberspace
    Blog Safety:
    Library Protection Package:
    Federal Bureau of Investigation: Investigative Programs - Crimes Against Children

    National Committee to Prevent Child Abuse
    Denver, CO 80212

    National Consumers League
    1701 K Street NW, Suite 1201
    Washington, DC 20006

    National Cyber Security Alliance
    1150 18th Street, NW
    Suite 1010
    Washington, DC 20036

    National Committee to Prevent Child Abuse
    Denver, CO 80212

    National Education Association
    1201 16th Street NW
    Washington, DC 20036

    National Law Center for Children and Families
    3819 Plaza Drive
    Fairfax, VA 22030

    National Parent Teacher Association
    330 North Wabash Avenue, Suite 2100
    Chicago, IL 60611
    800-307-4PTA (4782)

    National School Board Association
    1680 Duke Street
    Alexandria, VA 22314

    The National Urban League
    120 Wall Street
    New York, NY 10005

    Plugged In
    2115 University Avenue East
    Palo Alto, CA 94303

    U.S. Department of Education
    Office of Educational Research and Improvement
    400 Maryland Ave. SW
    Washington, DC 20202-0498
    800-USA-Learn (800-872-5327)
    Parents Guide to the Internet

    Law Enforcement
    U.S. Department of Justice
    950 Pennsylvania Avenue NW
    Washington, DC 20530

    Federal Bureau of Investigation
    935 Pennsylvania Avenue NW
    Washington, DC 20535-0001

    200 Quai Charles de Gaulle
    69006 Lyon, France

    International Association of Chiefs of Police
    515 N. Washington Street
    Alexandria, VA 22314-2357

    National Associations of Chiefs of Police
    3801 Biscayne Blvd.
    Miami, FL 33137

    National Associations of Police Organizations
    750 First Street NE, Suite 920
    Washington, DC 20002

    Sexual Abuse Free Environment (S.A.F.E.)

    United States Attorney General
    950 Pennsylvania Avenue NW
    Washington, DC 20530-0001

    United States Customs
    1300 Pennsylvania Avenue NW
    Washington, DC 20229

    Official PayPal Seal


    MoonDragon's Pregnancy Information Index
    MoonDragon's Parenting Information Index
    MoonDragon's Pediatric Information Index
    MoonDragon's Pregnancy Information Index & Survival Tips

    MoonDragon's Womens Health Index

    | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

    Health & Wellness Index


    Allspice Leaf Oil
    Angelica Oil
    Anise Oil
    Baobab Oil
    Basil Oil
    Bay Laurel Oil
    Bay Oil
    Benzoin Oil
    Bergamot Oil
    Black Pepper Oil
    Chamomile (German) Oil
    Cajuput Oil
    Calamus Oil
    Camphor (White) Oil
    Caraway Oil
    Cardamom Oil
    Carrot Seed Oil
    Catnip Oil
    Cedarwood Oil
    Chamomile Oil
    Cinnamon Oil
    Citronella Oil
    Clary-Sage Oil
    Clove Oil
    Coriander Oil
    Cypress Oil
    Dill Oil
    Eucalyptus Oil
    Fennel Oil
    Fir Needle Oil
    Frankincense Oil
    Geranium Oil
    German Chamomile Oil
    Ginger Oil
    Grapefruit Oil
    Helichrysum Oil
    Hyssop Oil
    Iris-Root Oil
    Jasmine Oil
    Juniper Oil
    Labdanum Oil
    Lavender Oil
    Lemon-Balm Oil
    Lemongrass Oil
    Lemon Oil
    Lime Oil
    Longleaf-Pine Oil
    Mandarin Oil
    Marjoram Oil
    Mimosa Oil
    Myrrh Oil
    Myrtle Oil
    Neroli Oil
    Niaouli Oil
    Nutmeg Oil
    Orange Oil
    Oregano Oil
    Palmarosa Oil
    Patchouli Oil
    Peppermint Oil
    Peru-Balsam Oil
    Petitgrain Oil
    Pine-Long Leaf Oil
    Pine-Needle Oil
    Pine-Swiss Oil
    Rosemary Oil
    Rose Oil
    Rosewood Oil
    Sage Oil
    Sandalwood Oil
    Savory Oil
    Spearmint Oil
    Spikenard Oil
    Swiss-Pine Oil
    Tangerine Oil
    Tea-Tree Oil
    Thyme Oil
    Vanilla Oil
    Verbena Oil
    Vetiver Oil
    Violet Oil
    White-Camphor Oil
    Yarrow Oil
    Ylang-Ylang Oil
    Healing Baths For Colds
    Herbal Cleansers
    Using Essential Oils


    Almond, Sweet Oil
    Apricot Kernel Oil
    Argan Oil
    Arnica Oil
    Avocado Oil
    Baobab Oil
    Black Cumin Oil
    Black Currant Oil
    Black Seed Oil
    Borage Seed Oil
    Calendula Oil
    Camelina Oil
    Castor Oil
    Coconut Oil
    Comfrey Oil
    Evening Primrose Oil
    Flaxseed Oil
    Grapeseed Oil
    Hazelnut Oil
    Hemp Seed Oil
    Jojoba Oil
    Kukui Nut Oil
    Macadamia Nut Oil
    Meadowfoam Seed Oil
    Mullein Oil
    Neem Oil
    Olive Oil
    Palm Oil
    Plantain Oil
    Plum Kernel Oil
    Poke Root Oil
    Pomegranate Seed Oil
    Pumpkin Seed Oil
    Rosehip Seed Oil
    Safflower Oil
    Sea Buckthorn Oil
    Sesame Seed Oil
    Shea Nut Oil
    Soybean Oil
    St. Johns Wort Oil
    Sunflower Oil
    Tamanu Oil
    Vitamin E Oil
    Wheat Germ Oil


  • MoonDragon's Nutrition Basics Index
  • MoonDragon's Nutrition Basics: Amino Acids Index
  • MoonDragon's Nutrition Basics: Antioxidants Index
  • MoonDragon's Nutrition Basics: Enzymes Information
  • MoonDragon's Nutrition Basics: Herbs Index
  • MoonDragon's Nutrition Basics: Homeopathics Index
  • MoonDragon's Nutrition Basics: Hydrosols Index
  • MoonDragon's Nutrition Basics: Minerals Index
  • MoonDragon's Nutrition Basics: Mineral Introduction
  • MoonDragon's Nutrition Basics: Dietary & Cosmetic Supplements Index
  • MoonDragon's Nutrition Basics: Dietary Supplements Introduction
  • MoonDragon's Nutrition Basics: Specialty Supplements
  • MoonDragon's Nutrition Basics: Vitamins Index
  • MoonDragon's Nutrition Basics: Vitamins Introduction


  • MoonDragon's Nutrition Basics: 4 Basic Nutrients
  • MoonDragon's Nutrition Basics: Avoid Foods That Contain Additives & Artificial Ingredients
  • MoonDragon's Nutrition Basics: Is Aspartame A Safe Sugar Substitute?
  • MoonDragon's Nutrition Basics: Guidelines For Selecting & Preparing Foods
  • MoonDragon's Nutrition Basics: Foods That Destroy
  • MoonDragon's Nutrition Basics: Foods That Heal
  • MoonDragon's Nutrition Basics: The Micronutrients: Vitamins & Minerals
  • MoonDragon's Nutrition Basics: Avoid Overcooking Your Foods
  • MoonDragon's Nutrition Basics: Phytochemicals
  • MoonDragon's Nutrition Basics: Increase Your Consumption of Raw Produce
  • MoonDragon's Nutrition Basics: Limit Your Use of Salt
  • MoonDragon's Nutrition Basics: Use Proper Cooking Utensils
  • MoonDragon's Nutrition Basics: Choosing The Best Water & Types of Water


  • MoonDragon's Nutrition Information Index
  • MoonDragon's Nutritional Therapy Index
  • MoonDragon's Nutritional Analysis Index
  • MoonDragon's Nutritional Diet Index
  • MoonDragon's Nutritional Recipe Index
  • MoonDragon's Nutrition Therapy: Preparing Produce for Juicing
  • MoonDragon's Nutrition Information: Food Additives Index
  • MoonDragon's Nutrition Information: Food Safety Links
  • MoonDragon's Aromatherapy Index
  • MoonDragon's Aromatherapy Articles
  • MoonDragon's Aromatherapy For Back Pain
  • MoonDragon's Aromatherapy For Labor & Birth
  • MoonDragon's Aromatherapy Blending Chart
  • MoonDragon's Aromatherapy Essential Oil Details
  • MoonDragon's Aromatherapy Links
  • MoonDragon's Aromatherapy For Miscarriage
  • MoonDragon's Aromatherapy For Post Partum
  • MoonDragon's Aromatherapy For Childbearing
  • MoonDragon's Aromatherapy For Problems in Pregnancy & Birthing
  • MoonDragon's Aromatherapy Chart of Essential Oils #1
  • MoonDragon's Aromatherapy Chart of Essential Oils #2
  • MoonDragon's Aromatherapy Tips
  • MoonDragon's Aromatherapy Uses
  • MoonDragon's Alternative Health Index
  • MoonDragon's Alternative Health Information Overview
  • MoonDragon's Alternative Health Therapy Index
  • MoonDragon's Alternative Health: Touch & Movement Therapies Index
  • MoonDragon's Alternative Health Therapy: Touch & Movement: Aromatherapy
  • MoonDragon's Alternative Therapy: Touch & Movement - Massage Therapy
  • MoonDragon's Alternative Health: Therapeutic Massage
  • MoonDragon's Holistic Health Links Page 1
  • MoonDragon's Holistic Health Links Page 2
  • MoonDragon's Health & Wellness: Nutrition Basics Index
  • MoonDragon's Health & Wellness: Therapy Index
  • MoonDragon's Health & Wellness: Massage Therapy
  • MoonDragon's Health & Wellness: Hydrotherapy
  • MoonDragon's Health & Wellness: Pain Control Therapy
  • MoonDragon's Health & Wellness: Relaxation Therapy
  • MoonDragon's Health & Wellness: Steam Inhalation Therapy
  • MoonDragon's Health & Wellness: Therapy - Herbal Oils Index


    Starwest Botanicals

    Educational materials and health products are available through
    Use the search box provided below to search for a particular item.

 Herbs, Foods, Supplements, Bath & Body

    Herbs Direct

    Chinese Herbs Direct

    Ayurvedic Herbs Direct

    Pet Herbs Direct

    ShareASale Merchant-Affiliate Program


    A website map to help you find what you are looking for on's Website. Available pages have been listed under appropriate directory headings.