Skip to main content

B-2 Bomber

B-2 Bomber

K. LEE LERNER

The United States Air Force B-2 stealth technology lowobservable, strategic, long-range bomber is designed to penetrate air defense systems and destroy command, control, and air defense infrastructure during the opening days of a conflict when enemy forces and air defenses are fully operational.

A specially contoured radar absorbing skin and exhaust baffling system makes the flying wing configuration B-2 almost impossible to detect by radar and difficult to target with conventional thermal based system. The leading edges of the B-2 wings angle aft at approximately 33 degrees and trailing edge has a characteristic double "W" form. Although the B-2 does leave a weak RADAR return signature, the delay and low signal return confuse or obscure the B-2 track until it is too close to targetor has long passed the drop point.

The B-2 carries a crew of two and is equipped with a electronic flight instrumentation system (EFIS), that provides variable heads-up display of flight, engine, navigation, and weapons status.

Built by Northrop Grumman and costing more than $2 billion per bomber, the B-2 is the world's most expensive combat airplane.

The stealth technology requires special care, especially to preserve optimal "invisibility" to RADAR. To ensure this care, each B-2 is housed in a special climate-controlled hanger. The skin requires special treating occuring between missions to remove dirt and moisture. These special maintenance requirements meant that prior to Operation Iraqi Freedom the B-2 fleet operated exclusively out of Whiteman Air Force Base in Missouri. As a result, with mid-air refueling, B-2 crews flew 44-hour long round-trip bombing missions over Afghanistan in 2001. To increase the tempo of B-2 missions for Operation Iraqi Freedom, the air force transported (forward deployed) special climate-controlled shelters at bases in England and at the Diego Garcia base in the Indian Ocean.

As of April 2003, the U.S. Air force had 21 operational B-2s. It made its first secret operational flight in 1989. Stealth technology made its debut during the Persian Gulf War (19901991) and the B-2 saw action in Kosovo and Afghanistan (Operation Enduring Freedom).

The B-2 is designed to carry satellite-guided bombs, including earth penetrating "bunker busters" that can penetrate 20 or 30 feet of dirt or concrete before detonating. During Operation Iraqi Freedom a B-2 led strike opened the war with an attempt on an Iraqi leadership bunker in Baghdad that western intelligence sources thought might contain Iraqi leader Saddam Hussein. Nearly three weeks later another B-2 dropped four GBU-37 "bunker buster" bombs on a Baghdad target that U.S. intelligence sources source identified as a possible meeting location for Hussein and/or other enemy leaders. The missions were notable because the B-2s, already flying above Baghdad air defenses, were fully integrated with ground based intelligence operations that allowed no more than 35 minutes to elapse from the generation of on-site intelligence to weapons delivery on target.

To maintain its stealth configuration, the B-2 carries all its weapons internally in two separate weapons bays. The B-2 can carry up to 40,000 lbs (18,000 kg) of weapons load, including both conventional and nuclear precision-guided bombs and missiles. Operating at altitudes near 50,000 ft, B-2's can carry a number of conventional and nuclear weapons including, but not limited to, eight GBU-37s or 16 Joint Air to Surface Standoff Missiles (JASSM) and an undisclosed number of Joint Standoff Weapons (JSOW) and AGM-129 Advanced Cruise Missiles (with an estimated strike range of 1,500 miles).

FURTHER READING:

BOOKS:

Jones, Joseph. Stealth Technology. Blue Ridge Summit, PA: TAB Books, 1994.

ELECTRONIC:

Air Force Technology, B-2. <http://www.airforce-technology.com/projects/b2/> (April 8, 2003).

SEE ALSO

F-117A Stealth Fighter
Skunk Works
SR-71 Blackbird

Cite this article
Pick a style below, and copy the text for your bibliography.

  • MLA
  • Chicago
  • APA

"B-2 Bomber." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. 13 Oct. 2018 <http://www.encyclopedia.com>.

"B-2 Bomber." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. (October 13, 2018). http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/b-2-bomber

"B-2 Bomber." Encyclopedia of Espionage, Intelligence, and Security. . Retrieved October 13, 2018 from Encyclopedia.com: http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/b-2-bomber

Learn more about citation styles

Citation styles

Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).

Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.

Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:

Modern Language Association

http://www.mla.org/style

The Chicago Manual of Style

http://www.chicagomanualofstyle.org/tools_citationguide.html

American Psychological Association

http://apastyle.apa.org/

Notes:
  • Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
  • In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.