The Anomaly Protocol
Activation protocols for the Anomaly Protocol are severely controlled. Access to this protocols is restricted to a select group of highly skilled individuals within the organization. Any unapproved actions to initiate the Anomaly Protocol may lead to severe repercussions.
Fundamental objectives