How the legendary B-2’s stealth actually works

Logan Nye
Updated onApr 4, 2023 6:04 AM PDT
4 minute read
Aviation photo

SUMMARY

The B-2 Spirit is one of the most clandestine and rare planes in the world. Only 21 were ever built, and they reportedly have a stealth profile similar to that of a large bird despite their 170-foot wingspan. And they’re invisible to many infrared …

The B-2 Spirit is one of the most clandestine and rare planes in the world. Only 21 were ever built, and they reportedly have a stealth profile similar to that of a large bird despite their 170-foot wingspan. And they're invisible to many infrared seekers, despite four large engines.

Here's how engineers made a massive plane with large engines nearly invisible to systems designed to detect threats exactly like the B-2.

Video thumbnail

The B-2's stealth profile is the result of extensive computer testing that wasn't possible before its design. While the F-117 and B-1 were stealth aircraft, they were designed by nerds with slide rules and minimal computer modeling because the technology and the computers necessary simply didn't exist.

But when it was time to design the B-2, the all-powerful nerds had super computers and leveraged them to create a model that had no flat surfaces with which to reflect radar directly back to the sensor. While a machine with no flat surfaces is harder to manufacture, the increase in stealth was deemed worthy of extra costs.

If the B-2 were flying directly towards the radar, most of the waves would actually be reflected 90 degrees away from the receiver, giving the radar operators next to nothing to work with.

Husband and wife B-2 Spirit pilots pose with one of the rare aircraft. The engine intakes are visible to the left and right of the cockpit. (Avery family courtesy photo)

But of course, the flying wing would lose most of its stealth if the engines were mounted outside of its high-tech form. So the engines were mounted inside with special openings for intake and exhaust that, again, would not reflect radar waves back to the dish.

That exhaust opens its own can of worms. After all, aircraft can be tracked by their infrared signatures, if only from relatively close ranges. So, the B-2 needed tech that would let it diffuse or mask its infrared emissions at ranges as short as possible.

It has a few (mostly classified) systems to help with this. The exact shape of the exhaust helps a lot, but it also cools its exhaust and mixes it with the outside air to create a final exhaust that is at nearly the same temperature as the air flowing into the intake.

U.S. Air Force Tech. Sgt. Germaine McCall, aircrew flight equipment NCO in charge, 509th Operations Support Squadron, carries a life support equipment to be cleaned and inspected upon the arrival of a B-2 Spirit at Joint Base Pearl Harbor-Hickam, Hawaii, August 28, 2018. (U.S. Air Force Staff Sgt. Danielle Quilla)

This greatly frustrates pursuing missiles and fighters, but obviously still leaves it vulnerable if someone spots the plane and talks fighters into the vicinity to hunt it.

Except the B-2 has another trick up its sleeve that makes even that less likely. It's actually extremely quiet, so much so that people at sporting events with B-2 flyovers have reported being able to speak to one another as the plane flies past.

Anyone who has worked with most other jets knows that you can typically hear them before you see them, often by a matter of hundreds of feet. It's the sound that lets you know to look for the plane, but the B-2's tiny acoustic signature means that most observers on the ground won't know there's anything in the sky to look for.

A U.S. Air Force B-2 Spirit flies past a crowd of spectators during the 2018 Royal International Air Tattoo at RAF Fairford, United Kingdom on July 14, 2018. (U.S. Air Force Tech. Sgt. Brian Kimball)
 

Combined, this makes the B-2 a plane with little radar observability, that's too quiet for most people on the ground to notice it flying nearby, and it gives off little heat, frustrating missiles and fighters sent to down it.

All of this still requires good pilots and planning. Determined defenders could use low-frequency radar waves and skilled fighters to hunt down a B-2 following a too-populated or well-defended route. But the last element of B-2 stealth comes from good intelligence, allowing pilots and planners to send the bombers in through relatively undefended routes or through routes the B-2 can defeat.

Because that's a big part of the B-2's mission. It's not supposed to act as the primary bomber in most circumstances. It's a first-wave attacker, clearing the air defenses on the ground and opening "alleys" for less stealthy aircraft. Ideally, they get a picture of the air defenses they will attack from reconnaissance aircraft like the RC-135 and are then able to dismantle them piece by piece.

An Air Force B-2 Spirit bomber, deployed from Whiteman Air Force Base, Mo., takes off March 27, 2016, in the U.S. Pacific Command area of operations. (U.S. Air Force Senior Airman Joel Pfiester)

But the B-2 can and has been sent against other targets, including bunkers in Iraq housing command and control elements during the invasion of that country. This is particularly useful when planners need to eliminate a target too early in the timeline to dismantle the air network first.

After all, if an enemy commander shows himself at a rally in the capital during an air campaign, you aren't going to wait for the B-2s to finish opening the air corridors, you're just going to send in B-2s to the final target (or you send B-1s if the B-2s can't get there in time). You can get the radars later.

And that's what's so great about the B-2. While the plane costs more dollars per hour of flight than many others and carries fewer bombs than planes like the B-52 and B-1, it can hit targets that few other platforms can, largely because of its amazing stealth.

NEWSLETTER SIGNUP

Sign up for We Are The Mighty's newsletter and receive the mighty updates!

By signing up you agree to our We Are The Mighty's Terms of Use and We Are The Mighty's Privacy Policy.

SHARE