That investigation method is for building reports.
They literally say exploit reports have to have video evidence.