Continue the trailPreviousRange Safety As A Cover For Anomaly Retrieval TheoryNextRestricted Airspace As A Map Of Hidden Programs