Activation protocols for the Anomaly Protocol are strictly controlled. Access to these protocols is limited to a select cohort of highly trained individuals within the agency. Any unapproved attempts to activate the Anomaly Protocol often trigger severe consequences. Fundamental objectives of the Anomaly Protocol are toneutralize anomalies, whi