When designing technology and considering the possible implications of abuse, it’s critical to consider scenarios involving intimate partner violence (IPV). Too often, threat modeling stops short and primarily focuses on scenarios in which the abusive person may not be known to the victim. However, IPV is rampant and the perpetration of abuse plays out across technologies. Misuse and manipulation of devices, accounts, platforms, and services is extremely common as a tactic of abuse. Unlike many other threat scenarios, IPV presents situations where the abusive person may have access to devices and accounts, as well as intimate knowledge of the victim’s personal information and habits. Threat modeling for IPV should thoughtfully consider many use-case scenarios, both for misuse by the abuser and strategic and safe use by the victim. This workshop will walk through various scenarios to consider how design, implementation, and policy can be shaped to address IPV and empower victims.