Activation protocols for the Anomaly Protocol are severely controlled. Access to these protocols is denied to a select group of highly trained individuals within the institute. Any illegitimate interactions to activate the Anomaly Protocol can result in severe repercussions. Primary objectiv… Read More