Activation sequences for the Anomaly Protocol are highly controlled. Access to this protocols is limited to a select group of highly skilled individuals within the organization. Any unauthorized interactions to engage the Anomaly Protocol may lead to severe consequences. Fundamental objectives of the Anomaly Protocol are tocontain anomalies, wh