The Anomaly Protocol
Activation sequences for the Anomaly Protocol are severely controlled. Access to these protocols is denied to a select cohort of highly trained individuals within the organization. Any unauthorized attempts to initiate the Anomaly Protocol may lead to severe repercussions. Fundamental objectives of the Anomaly Protocol are tocontain anomalies,