That investigation method is for building reports.

They literally say exploit reports have to have video evidence.

1 Like