Rain Lag

The Analog Failure Forecast Deck: Designing Physical Risk Cards Before You Ship Dangerous Features

How to use a premortem-style, physical risk card deck to surface failures, social engineering threats, and deepfake risks before launch—and plug it into your engineering and simulation workflows for safer, higher‑ROI products.

The Analog Failure Forecast Deck: Designing Physical Risk Cards Before You Ship Dangerous Features

Shipping powerful features without deeply considering how they can fail—or be abused—is gambling with your product, your users, and sometimes public safety. Traditional risk reviews and threat models help, but they’re often abstract, rushed, and locked inside digital documents nobody revisits.

An Analog Failure Forecast Deck offers a different approach: a premortem-inspired, physical deck of risk cards that teams can literally hold, sort, argue over, and evolve as the product and threat landscape change.

This post walks through what the deck is, how to create and use it, and how to integrate it into modern model-based engineering and simulation workflows.


Why an Analog Deck in a Digital World?

Design and engineering discussions are already packed with dashboards, diagrams, and tickets. So why add pieces of cardboard?

Because physical artifacts change conversations:

  • They slow people down just enough to think more clearly.
  • They make abstract threats concrete and hard to ignore.
  • They flatten hierarchy: everyone at the table can pick up a card and challenge assumptions.
  • They survive tool changes and platform churn; a deck on the table is visible even when someone “forgets” to open the risk spreadsheet.

An Analog Failure Forecast Deck is not a replacement for formal risk analysis. It’s a front-end amplifier: a way to expose dangerous edge cases and misuse patterns before you commit to architectures or ship high-risk features.


Step 1: Run a Premortem, Not a Postmortem

Most teams wait for incidents to happen before doing a postmortem. By then, the harm is real and the options are costly.

A premortem flips the timeline:

“Imagine it’s 12 months after launch. This feature has gone badly wrong. What happened?”

Practical tips for a premortem session:

  1. Set the scenario
    Pick a specific feature or subsystem (e.g., “automated approval system,” “AI-powered assistant,” “voice-driven admin commands”).

  2. Individually brainstorm failures
    Have each person silently write down as many “bad endings” as they can think of: safety incidents, reputational damage, regulatory violations, user harm, financial loss, abuse by attackers, etc.

  3. Encourage wild cases
    Push beyond what feels comfortable. Include combinations of technical failure + human error + active adversaries.

  4. Share and cluster
    Group similar scenarios: fraud, privacy breaches, misinformation, physical safety risk, insider abuse, social engineering, supply chain issues, and so on.

These clustered scenarios form the raw material for your risk cards.


Step 2: Turn Scenarios Into Physical Risk Cards

Now concretize those imagined failures into a deck you can shuffle, deal, and work with.

Each risk card should be:

  • Specific: The more concrete the scenario, the better the design discussion.
  • Actionable: It should prompt “What would we do about this?”
  • Reusable: Generic enough to apply to multiple features over time.

A simple card template:

  • Title: Short, evocative label
  • Category: e.g., Fraud, Privacy, Safety, Social Engineering, Deepfake, Misuse, System Failure, Supply Chain, Regulatory, etc.
  • Scenario: 2–4 sentences describing what goes wrong and how
  • Impact: User, organization, public, environment, etc.
  • Signals: A few hints on how it might be detected (“unusual login patterns,” “burst of complaints,” “media reports,” “odd voice calls from executives”).

Example Cards

Card 1: Deepfake CEO Wire Transfer

  • Category: Social Engineering / Deepfake
  • Scenario: An attacker uses a convincing synthetic voice and video of the CEO to request urgent, confidential wire transfers via your product’s communication or approval tools. Staff follow instructions, bypassing normal controls.
  • Impact: Major financial loss, legal exposure, brand damage.

Card 2: Auto-Approval Cascade

  • Category: System Failure / Misconfiguration
  • Scenario: A misconfigured rule in an automated review system starts auto-approving high-risk actions (e.g., account upgrades, access grants) at scale. No one notices for weeks.
  • Impact: Security breaches, fraud, regulatory violations.

Printing the deck on actual cards (or at least sturdy paper) matters: the tactile element invites interaction and focus.


Step 3: Treat Social Engineering & Deepfakes as First-Class Risks

Many product teams still underweight human-targeted attacks, especially those involving realistic fakes: voice clones, video impersonations, spoofed chat accounts.

These are no longer edge cases. Your risk deck should treat them as first-class scenarios:

  • Voice-based impersonation: "CFO" calls through your system asking to reset MFA, approve a deal, or share credentials.
  • Video deepfakes: Fake board meeting clips shared through collaboration tools to pressure rushed sign-offs.
  • Synthetic documents & messages: AI-crafted emails/slides that look internally authentic and exploit your product workflows.

For each of these, create cards that explicitly reference how attackers might use your product as a channel or amplifier:

  • Does your product make it easy to bypass in-person verification?
  • Does it strip context or metadata that might reveal an impersonation?
  • Does it normalize “urgent, exception-based” workflows attackers can hijack?

By naming these threats on physical cards, you reduce the chance they’re dismissed as “too hypothetical” or “not our problem.”


Step 4: Use the Deck to Stress-Test Product Decisions

Once you have a deck, don’t just admire it—play with it in real design and review meetings.

A simple practice:

  1. Select a feature or design decision you’re reviewing.
  2. Draw 3–5 cards at random from the deck.
  3. For each card, ask:
    • How could this feature enable or amplify this risk?
    • What assumptions are we making that this card challenges?
    • What would need to be true for this scenario to become likely?
    • What safeguards or controls could break the chain of events?
  4. Capture mitigation ideas directly into your design docs, issue tracker, or safety case.

Over time, patterns emerge:

  • Recurring classes of failure that always cause uncomfortable silences.
  • Features or architectures that systematically increase or reduce certain risks.

The goal isn’t to eliminate all risk; it’s to make trade-offs explicit and ensure you’re not blindly walking into avoidable disasters.


Step 5: Continuously Evolve the Deck as a Living Artifact

Static risk lists age quickly. New technologies and threat patterns appear; regulations evolve; your attack surface grows.

Treat the risk deck as a living artifact:

  • After incidents (yours or others’): Create new cards that encode what went wrong and how.
  • After major launches: Add cards for newly discovered edge cases, user workarounds, and near-misses.
  • Quarterly reviews: Retire obsolete cards, merge duplicates, introduce new categories (e.g., “model manipulation,” “prompt injection,” “policy evasion”).

Keep a version history of the deck, especially if you’re in regulated or safety-critical domains. It can:

  • Demonstrate due diligence to auditors and regulators.
  • Anchor training for new team members.
  • Provide continuity even as staff and tools change.

Step 6: Integrate the Deck With Model-Based Systems Engineering & Simulation

The deck is analog, but it doesn’t live in isolation. It can plug into model-based systems engineering (MBSE) and simulation workflows to catch issues early in complex designs.

Here’s how:

  1. Map cards to system models
    For each risk card, identify the corresponding elements in your SysML, UML, or architecture diagrams: components, interfaces, data flows, human roles.

  2. Annotate requirements and constraints
    Turn card insights into explicit system requirements (e.g., “High-risk approvals must require out-of-band verification”) and safety constraints.

  3. Parameterize scenarios in simulations

    • Use cards to define what-if simulations: delayed alerts, incorrect sensor readings, malicious commands, overloaded queues, manipulated inputs.
    • For socio-technical risks (e.g., deepfake approvals), represent the human decision points and your system’s guardrails (or lack of them).
  4. Link to verification & validation

    • For each card, track which tests, simulations, or analyses show that the risk is mitigated, detected, or at least bounded.
    • Use this as part of your safety and security case.

In effect, the deck becomes an on-ramp from human intuition to formal modeling: teams imagine bad outcomes, encode them as cards, and then trace them into models, tests, and controls.


Step 7: Use Insights to Prioritize Mitigations and ROI

Not all cards are equally important. Once you’ve used the deck to expose risks, you need to decide what to address now versus later.

A lightweight prioritization flow:

  1. Rate each card’s scenario on:

    • Likelihood (given your user base, threat landscape, and architecture)
    • Impact (harm to people, organization, environment, compliance, reputation)
    • Detectability (how likely you are to catch it quickly)
  2. Cluster by mitigation pattern
    Some mitigations (e.g., strong audit logs, multi-factor approvals, anomaly detection, rate limits) defend against many cards at once. Those are often high-ROI investments.

  3. Feed priorities into your roadmap

    • Turn top risks into explicit backlog items.
    • Add gating criteria: a feature doesn’t ship until certain card scenarios are at least partially mitigated or consciously accepted.
  4. Track real-world outcomes
    When incidents do or don’t happen, revisit the deck:

    • Did the deck predict them?
    • If yes, why weren’t mitigations prioritized?
    • If no, what new cards should be created?

Handled well, the deck improves time-to-market quality by reducing rework, crisis patches, and reputational damage. Over time, this becomes a sustained ROI advantage: you waste less engineering effort on preventable disasters.


Conclusion: Make Failure Thinkable Before It’s Real

Powerful systems—especially those involving automation, AI, financial flows, or safety-critical decisions—will fail and be attacked. The question is whether you imagine those failures in time to do something about them.

An Analog Failure Forecast Deck turns vague anxiety into structured, reusable foresight:

  • Premortems to surface concrete, multi-factor failure scenarios.
  • Physical risk cards that keep threats visible in every important conversation.
  • Social engineering and deepfake risks treated as core design constraints, not edge trivia.
  • Integration with MBSE and simulation to connect human imagination with rigorous analysis.
  • A living artifact that guides mitigations, safeguards, and ultimately better ROI.

If your team is building something that could be dangerous in the wrong hands—or under the wrong conditions—don’t wait for the postmortem. Deal the deck first.

The Analog Failure Forecast Deck: Designing Physical Risk Cards Before You Ship Dangerous Features | Rain Lag