Activation protocols for the Anomaly Protocol are highly controlled. Access to this protocols is limited to a select faction of highly qualified individuals within the institute. Any unauthorized attempts to engage the Anomaly Protocol may lead to severe repercussions. Primary objectives of the Anomaly Protocol are toterminate anomalies, which