THE ANOMALY PROTOCOL

The Anomaly Protocol

Activation protocols for the Anomaly Protocol are severely controlled. Access to these protocols is restricted to a select cohort of highly trained individuals within the institute. Any illegitimate attempts to initiate the Anomaly Protocol often trigger severe consequences. Primary objectives of the Anomaly Protocol are toterminate anomalies,

read more