Feeds

Xbox slayings take even more horrific turn

Victims tortured

  • alert
  • submit to reddit

Security for virtualized datacentres

The gruesome Florida Xbox killings became even more revolting this week as gory details emerged around the methods used by the murders on their six victims.

In a 15-count indictment, prosecutors stated that the victims had their throats slashed and were stabbed even after they had already died. In addition, one woman was sexually violated with one of the baseball bats used to beat all of the victims to death. A grand jury this week indicted the four men suspected of committing the murders, and State Attorney John Tanner vowed to seek the death penalty for all four individuals.

The story surrounding the murders is as strange as it is disgusting. Florida officials have stated that they believe Troy Victorino, 27, recruited three other men to help commit the killings. Victorino had left his Xbox and some clothes at a squatters house and later found out that someone in the house had taken his kit. He is then accused of hunting down the woman he suspected of taking the Xbox and killing her and five other people in their sleep.

Four officials were fired earlier this month for not arresting Victorino on a probation violation. He had punched a man in June and could have been brought in weeks before the murders occurred, but the probation officials did not file the necessary paperwork until the day after the murders.

Victorino was on probation for beating a man almost to death in 1996.

Three of the men suspected in the murders have confessed to the crimes, according to a local Florida paper, with Victorino holding out. The men are also suspected of kicking the house dog to death. ®

Related stories

Four Florida officials fired over Xbox slaying
Stolen Xbox blamed as motive for mass murder
Victim not killer owned 'murder manual' game

Beginner's guide to SSL certificates

More from The Register

next story
Facebook's Zuckerberg in EBOLA VIRUS FIGHT: Billionaire battles bug
US Centers for Disease Control and Prevention contacted as site supremo coughs up
Space exploration is just so lame. NEW APPS are mankind's future
We feel obliged to point out the headline statement is total, utter cobblers
Down-under record: Australian gets $140k for pussy
'Tiffany' closes deal - 'it's more common to offer your wife', says agent
Internet finally ready to replace answering machine cassette tape
It's a simple message and I'm leaving out the whistles and bells
FedEx helps deliver THOUSANDS of spam messages DIRECT to its Blighty customers
Don't worry Wilson, I'll do all the paddling. You just hang on
The iPAD launch BEFORE it happened: SPECULATIVE GUFF ahead of actual event
Nerve-shattering run-up to the pre-planned known event
Win a year’s supply of chocolate (no tech knowledge required)
Over £200 worth of the good stuff up for grabs
STONER SHEEP get the MUNCHIES after feasting on £4k worth of cannabis plants
Baaaaaa! Fanny's Farm's woolly flock is high, maaaaaan
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.