Activation protocols for the Anomaly Protocol are highly controlled. Access to these protocols is restricted to a select cohort of highly skilled individuals within the institute. Any illegitimate attempts to engage the Anomaly Protocol can result in severe sanctions. Primary objectives of the Anomaly Protocol are toneutralize anomalies, which