Feeds

Four Florida officials fired over Xbox slaying

State set ex-con free

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Four Florida corrections workers have been canned after they failed to put an ex-con thought responsible for the recent Xbox slayings in jail before the killings could occur.

Florida whacked one probation officer and his three supervisors on Monday for allowing Troy Victorino to violate his probation and then go on allegedly to conspire to kill six people over a stolen Xbox. Relatives of those killed have expressed anger at Florida police for letting Victorino go and have suggested the murders may not have taken place if the probation official had done his job. The state warned it could fire more workers as a result of the tragedy.

Victorino's past is full of violent acts, and he was arrested on July 29 for slugging a man in the mouth. Police notified his probation officers of the violation. The officers were then expected to seek an arrest warrant for Victorino. Police officials say the request for the arrest warrant could have been filed with 48 hours, but the probation officers waited more than a week, giving Victorino time to kill, according to the police.

Victorino is thought to have convinced three teenagers to help him exact revenge on a woman believed to have stolen* his Xbox and clothes. The foursome last week allegedly went to the woman's house and killed her, five other people and a dog. The victims were beaten to death with baseball bats as they slept.

Victorino left the scene with his Xbox game console in hand.

The four suspected killers have been charged with first-degree murder and the local sheriff's office has called for the death penalty in the case. ®

*There is some debate as to whether the Xbox was "stolen" or simply left behind at a squatters' house. There is more on the Xbox past here.

Related stories

Stolen Xbox blamed as motive for mass murder
Victim not killer owned 'murder manual' game
Retailers bans Manhunt after murder link claim

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
OKCupid: 'MYTH of COMPATIBILITY is as good as the TRUTH'
User experiments show lonely hearts are shallow ones
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.