Activation protocols for the Anomaly Protocol are highly controlled. Access to these protocols is restricted to QQ1221 a select faction of highly skilled individuals within the agency. Any illegitimate interactions to activate the Anomaly Protocol can result in severe repercussions. Initial objectives of the Anomaly Protocol are toneutralize an