The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to the protocols is restricted to a select cohort of highly skilled individuals within the institute. Any unapproved actions to activate the Anomaly Protocol can result in severe sanctions.
Initial objectives of the Anom