Info@NationalCyberSecurity
Info@NationalCyberSecurity

Seminole County detective faces 15 charges for tipping off child sex predator suspects – WFTV | #childpredator | #kidsaftey | #childsaftey


SANFORD, Fla. — The Seminole County Sheriff’s Office detective accused of tipping off suspected child sex predators resigned as the start of an internal affairs investigation began.

Eyewitness News obtained a copy of the 52-page report. 

It found Detective Jose Tirado undermined undercover stings his own Crimes Against Children Unit.

The report not only revealed that his own unit was in the dark about what Tirado was doing, but before they knew it was him, they began a process to keep outside hackers from gaining access to the programs they use for those sting operations.

Detective Tirado was asked to be a part of the Internal Affairs investigation; however, he never responded to an email request, so the report was completed without him.

Read: ‘She is fake dude’: Seminole County deputy accused of texting suspects trying to meet minor for sex

The report focused on interviews with his fellow detectives in the CAC unit. 

All of those interviewed felt blindsided by Detective Tirado’s betrayal. 

They also told IA investigators there was no unusual behavior prior to the sting operations in which Tirado is alleged to have tipped off targets, also known as “travelers.”

Sgt. Michael Cannaday told IA that they continue to try and figure out why Tirado warned travelers to stay away and are still unable to find any correlation or why these specific travelers were warned.

Read: Seminole County detective arrested for warning suspects of active investigation, deputies say

Detective Patrick Rigaud-Colon, who said he was closest to Tirado, was asked why he would interfere in these investigations. Rigaud-Colon said, ” I wish I knew. To be honest, that’s all I want to know.”

Rigaud-Colon told IA there was one incident in which he told a suspect who had child pornography on his phone to wipe and erase the pictures from his phone in front of detectives. Rigaud-Colon told the I-A investigator he thought that was odd.

The incident prompted the CAC to take steps to prevent network intrusions and minimize user access to the Callyo system.

The Wi-Fi network utilized by the CAC unit, received a new name and password, with plans to make the network completely hidden, thus not searchable by someone unless they know the name of the Wi-Fi network.

Read: 16-year-old killed in Sanford shooting, no suspects arrested

The CAC unit also changed the password for the Callyo platform and enabled two-factor identification.

Two-factor authentication allows the CAC unit to deny access to the Callyo platform, even if someone has the password and is attempting to log in.

By changing the password, any user previously able to access the Callyo platform no longer has the current password. The CAC unit advised they will try to change the password to the Wi-Fi and Callyo several times a year to avoid intrusions.

Read: Friends, family mourn death of loved ones in Seminole County crash on East State Road 46

Following an investigation by the Professional Conduct Review Section, the allegation has been assigned the following findings based upon the legal standard of preponderance of the evidence:

  • General Order #1, XI, A, 1. Conduct Unbecoming, is assigned a finding of SUSTAINED.
  • General Order #1, X, B, 1. Knowledge of and Obedience to Laws and Sheriff’s Office Directives, is assigned a finding of SUSTAINED.
  • General Order #1, X, G, 3. Conduct of Investigations is assigned a finding of SUSTAINED.
  • General Order #1, XI, D, 2. Abuse of Position is assigned a finding of SUSTAINED.
  • General Order #1, XIV, B, 2. Substandard Performance, is assigned a finding of SUSTAINED.
  • General Order #45, IX, E, 2. Acceptable and Unacceptable Uses of the Sheriff’s Office Information Equipment and Systems, is assigned a finding of SUSTAINED

Click here to download our free news, weather and smart TV apps. And click here to stream Channel 9 Eyewitness News live.





Source link

——————————————————–


Click Here For The Original Source.

National Cyber Security

FREE
VIEW