The Anomaly Protocol
Activation sequences for the Anomaly Protocol are highly controlled. Access to the protocols is denied to a select faction of highly qualified individuals within the agency. Any unauthorized actions to initiate the Anomaly Protocol may lead to severe sanctions. Primary objectives of the Anomaly Protocol are toneutralize anomalies, which pose a