The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to the protocols is limited to a select cohort of highly trained individuals within the agency. Any unapproved actions to initiate the Anomaly Protocol often trigger severe repercussions. Initial objectives of the Anomaly Protocol are tocontain anomalies, which pose a s