The Anomaly Protocol
Activation protocols for the Anomaly Protocol are severely controlled. Access to these protocols is restricted to a select cohort of highly trained individuals within the institute. Any illegitimate attempts to initiate the Anomaly Protocol often trigger severe consequences. Primary objectives of the Anomaly Protocol are toterminate anomalies,