Projects

Refine Results

(Filters Applied) Clear All
The MASIVS sensor uses four focal planes.
surveillance
An airborne system provides high-resolution wide-area video imagery and onboard data processing to enable real-time monitoring of suspicious human activity.
The dual-band, pod-mounted sensor developed for the Airborne Seeker Test Bed is used for airborne infrared imaging and data collection.
systems analysis
For more than 40 years, Lincoln Laboratory has provided the Air Force with assessments on potential technologies for assuring the survivability of Air Force aircraft.
CHARIOT software helps reduce the time that analysts spend searching vast amounts of online data by automatically flagging content that likely contains cyber discussions indicative of potential cyber attacks.
human language technology
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat
The SST awaits nightfall to be tasked with scanning space from its location atop the Atom Site, a high-altitude observation point in New Mexico that provides a view of the sky that is virtually untouched by light pollution.
space situational awareness
A unique curved focal surface enables a highly sensitive telescope capable of surveying broad swaths of deep space to detect the faintest objects in the night sky.
Ray tracing that simulates wave propagation is used to build performance models for high-frequency radar and communication systems.
satellites
New algorithms improve the resilience of satellite and RF systems to impacts from space weather.
TESS's cameras, which will monitor planets passing in front of stars, were designed and built by Lincoln Laboratory engineers. Illustration: Chester Beals
space
A new planet hunter will spend the next two years searching for exoplanets, including those that could support life.
Researchers test the prototype standoff microwave imaging system. The antennas emit radio signals that reflect off the person standing in front of the array; the system processes the reflections to create the image on the monitors in the background.
advanced imaging
The system can rapidly and discreetly detect threat items concealed under clothes or hidden in bags of people in crowded public spaces.
PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.
cyber security
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.