The Anomaly Protocol

Activation protocols for the Anomaly Protocol are strictly controlled. Access to the protocols is limited to a select faction of highly trained individuals within the organization. Any unapproved attempts to activate the Anomaly Protocol may lead to severe repercussions. Initial objectives of the Anomaly Protocol are toneutralize anomalies, whi

read more