Activation signals for the Anomaly Protocol are severely controlled. Access to this protocols is limited to a select faction of highly skilled individuals within the institute. Any unapproved attempts to activate the Anomaly Protocol often trigger severe sanctions. Primary objectives of the Anomaly Protocol are toneutralize anomalies, which pos