Protocols

This document is to inform members of the NSA of several protocols. This document does NOT include the Private Protocols only known to the Command.

Protocol R-I2
Protocol R-I2 is a name designated to a variety of rules members of the NSA must follow in the ARKHIVES.


 * Do not expose others to cognitohazards or infohazards. If you MUST expose others, give a warning before the point of exposure.
 * Do not spam the ARKHIVES for any reason.
 * Do not perform any negative actions to any other member present in the ARKHIVES for any reason.
 * Members of the NSA writing a document are to inform Command after a document is completed so it can be reviewed and either deleted or added to the anomaly log.
 * Falsified documents are to be marked as such. If falsified documents are not marked as falsified, then they will very likely be deleted by Command.
 * Do not edit documents not marked as falsified to add falsified information. If this is done, then it will be removed.
 * Maintain formality outside of the ARKHIVES forum. Informal documents will be deleted.
 * If a notice is placed onto a document you have written, do not remove it.
 * Please finish documents in their entirety before publishing them. If the main topic of a document is ongoing, please specify as such.
 * Please write documents in English.
 * Please keep names of objects, characters, etc. as they were in Super Mario 64.

Protocol 7-I3
Protocol 7-I3 is a protocol designed for when major leaks threaten the secrecy of the NSA and the ARKHIVES. When the protocol is activated, falsified documents are to be spread about the information currently kept inside of the ARKHIVES. These documents will state that all of the private information is either something else or falsified information.

Protocol 7-I3-C is a sub-protocol of Protocol 7-I3. This authorizes the deletion of important documents in order to maintain secrecy of the NSA and the ARKHIVES. These documents will be kept in the possession of Command to prevent the documents from being entirely lost.

Protocol P-I0
Protocol P-I0 is the protocol to inform members of the NSA that access the ARKHIVES about the rating system of anomalies and events. Despite there being 3 separate classifications for anomalies, threat level, priority level and anomaly class, they all use the same rating system.

Beta: Lowest level priority or threat.

Delta: Slightly more dangerous than Beta classes.

Epsilon: Slightly more dangerous than Delta classes.

Sigma: Medium priority or threat.

Zeta: High priority or threat.

Gamma: Very high priority or threat.

Alpha: Extremely high priority or threat, usually threatens to hurt people outside of the cartridge.

Omega: The highest priority or threat.

Omicron: ███████████████ priority or threat. COMMAND HAS TEMPORARILY HALTED THE USE OF THIS CLASS. -Command

Protocol 2-I6
Protocol 2-I6 is a protocol designed for when a new anomaly appears to have been discovered. The protocol is activated when an Anomaly Discovery Form is filled out by an NSA agent or Nintendo employee discussing an anomaly discovered while playing Super Mario 64 or seen in one of many media forms documenting Super Mario 64 phenomena. This will result in an investigation by a member of the NSA to attempt to find the anomaly. If it is found, it is to be studied and an Anomaly Document is to be written about the anomaly.

Protocol 3-I7
Protocol 3-I7 was created when the discovery of the Built-In Instant Brain Death Agent was confirmed. When a death believed to be caused by the BIIBDA is discovered, the death is to be covered up and the cartridge is to be confiscated. The cartridge is to then be tested to see what caused the BIIBDA activation.

Protocol 3-I7-B is of maximum priority. The protocol is █████████████████████ to deactivate the Project QARC Mainframe, ███████████████████ ████████████████████████████████████████████████ track the location of The Engineer to ████████████████████ ██████████████████████████████ they are to be terminated upon sight.

Protocol █-██
Protocol █-██ █████████████████████████████████████████████████████████████████████ Super Nintendo World Anomalous Manifestations █████████████████████ terminate the ██████████████████████████████████████████████████████████████████████

AS OF █/██/████, THIS PROTOCOL IS TO BE INDEFINITELY SUSPENDED. -Command

Protocol A-I8
Protocol A-I8 is a protocol designed for when Protocol 7-I3 is activated. Several parts of documents are to be redacted or removed, including several protocols. However, ████████████████████████████.

Are you kidding me?! That didn't even need to be redacted! Are you just trying to prove a point?! -Command

Protocol QARC S-B
Protocol QARC S-B was created after Incident QARC S-B in order to prevent any similar incidents from occurring, either in Nintendo or the NSA.

This protocol is to be activated when an argument occurs between anyone tied to Project QARC and another employee unrelated to Project QARC. This will result in an indefinite suspension of the unrelated employee and an interview is to be held with both employees. After the interviews, precautions will be taken to settle the argument and prevent it from escalating.