The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to these protocols is limited to a select group of highly skilled individuals within the organization. Any unapproved interactions to initiate the Anomaly Protocol often trigger severe repercussions. Initial objectives of the Anomaly Protocol are toterminate anomalies,