Identify your attacker, the A to J method