The Anomaly Protocol
Activation sequences for the Anomaly Protocol are severely controlled. Access to this protocols is limited to a select cohort of highly trained individuals within the institute. Any unauthorized interactions to activate the Anomaly Protocol may lead to severe repercussions. Fundamental objectives of the Anomaly Protocol are toneutralize anomali