The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to this protocols is restricted to a select group of highly trained individuals within the institute. Any unauthorized attempts to activate the Anomaly Protocol can result in severe consequences. Fundamental objectives of the Anomaly Protocol are toterminate anomalies,