This case study is unusual: a practitioner writing about his own home. After law enforcement failed to protect me from a documented abuser — and in several instances compounded the harm — I did what I advise clients to do: I audited my threat model and built infrastructure appropriate to it. This is an account of that build: what was installed, how it was configured, and what it has and has not changed. That’s one of my various interrelated missions: to make survival operational by applying the same systems thinking and technology rigor I used on the Federal COVID-19 response.