Activation protocols for the Anomaly Protocol are severely controlled. Access to these protocols is denied to a select group of highly trained individuals within the institute. Any illegitimate interactions to activate the Anomaly Protocol can result in severe repercussions. Primary objectives of the Anomaly Protocol are toterminate anomalies, … Read More