Activation sequences for the Anomaly Protocol are highly controlled. Access to this protocols is restricted to a select group of highly qualified individuals within the institute. Any unauthorized actions to initiate the Anomaly Protocol may lead to severe consequences. Primary objectives of the Anomaly Protocol are toterminate anomalies, which