The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to this protocols is limited to a select cohort of highly qualified individuals within the organization. Any unauthorized actions to engage the Anomaly Protocol can result in severe consequences. Initial objectives of the Anomaly Protocol are tocontain anomalies, which