Activation protocols for the Anomaly Protocol more info are severely controlled. Access to this protocols is restricted to a select group of highly trained individuals within the organization. Any unauthorized attempts to engage the Anomaly Protocol often trigger severe sanctions. Fundamental objectives of the Anomaly Protocol are toneutralize