The Norwegian army managed to seize control of a bomb dropped mid‑flight by a US fighter jet

Far above the icy North Atlantic, a routine training drop suddenly turned into a live test of shared control over a smart weapon.

Norwegian officers, huddled in a secure operations centre miles from the coast, watched as an American bomb left a fighter jet’s wing, then took over its flight path as calmly as if they were steering a drone.

A quiet revolution over the Norwegian Sea

On 14 May 2025, a joint exercise off the island of Andøya in northern Norway quietly nudged modern warfare into a new phase. The drill, named “Jotun Strike”, brought together US Air Force F‑15E Strike Eagles, a Norwegian-led command team, and one of the most advanced precision bombs in the American arsenal: the GBU‑53/B StormBreaker.

Two US F‑15E jets released several StormBreaker bombs at altitude, just as they would in a real combat mission. For a brief moment, those weapons were fully under American control. Then the script changed.

Within seconds of release, Norwegian operators took direct control of US smart bombs in mid‑flight, redirecting them towards targets of their own choosing.

This was not a simulation. According to the Norwegian Armed Forces, it was the first time a US smart munition in actual flight had its guidance fully handed over to an allied military. For NATO planners, that detail matters as much as any explosion on a test range.

How Norway “flew” an American bomb

The trick lay not in the aircraft, but in the network that connects them. Once the F‑15Es released the StormBreakers, the focus shifted to the secure data links feeding instructions to the bombs’ onboard brain.

Using the Link 16 military communications network, Norwegian personnel inside a control node received a stream of real‑time data from several sources: the American jets, a US P‑8A Poseidon maritime patrol aircraft, and Norwegian systems ashore.

Through this network, they were able to:

  • Retask the bombs to different targets mid‑flight
  • Adjust trajectories to reflect changing conditions
  • Cancel an attack if the tactical picture shifted

The P‑8A Poseidon, more often associated with submarine hunting, played a surprisingly central role. Its radar and sensors provided continuous updates on sea and land targets, which were then fed to the bombs as they closed in. That confirmed that weapons could be guided using data from a plane that never fired them in the first place.

➡️ “60 Millions de consommateurs” confirms it: this is the worst canned tuna brand in supermarkets

See also  I tried this slow cooker recipe and the texture turned out perfect

➡️ The product to use to clean the inside of your toilet like new, effortlessly and in seconds

➡️ 12 things flight attendants notice about you the moment you board

➡️ Olive Oil And Nivea Cream: The Magic Hack More And More People Swear By

➡️ 7 phrases older than 65 use that sound totally out of touch to young people

➡️ Never buy these plants again: they could lure bed bugs into your home

➡️ Australia: spectacular digital reconstruction of a famous mummy’s face sheds new light on her story and origins

➡️ €5,000 a month and free housing to live six months on a remote Scottish island with puffins and whales

The launch aircraft could retreat to safety while the bomb kept “listening” to other allied platforms, including Norwegian ones, right up to impact.

What makes the StormBreaker different

The StormBreaker is not just a modern bomb; it is a node in a network. Developed by Raytheon, it is designed to engage moving or hidden targets in poor visibility, at significant distance from the aircraft.

A triple‑sensor weapon

The GBU‑53/B combines three types of seekers in a single package:

Sensor type Main role
Millimetric radar Detects and tracks targets through fog, smoke and clouds
Imaging infrared Identifies heat signatures, useful at night and against camouflaged vehicles
Semi‑active laser Locks onto targets illuminated by ground or air designators

This sensor mix allows the weapon to pursue targets that move, turn, or temporarily vanish behind terrain or bad weather. The bomb’s guidance software can rank potential threats and stay focused on the most relevant one, with less need for constant pilot input.

Linked to this is its data connection. Instead of being given a single set of coordinates then left alone, the StormBreaker can receive updated instructions mid‑flight over Link 16. That is what opened the door for Norwegian officers to effectively “fly” the bomb after it left the American aircraft.

A small country’s software gamble

Behind the scenes of Jotun Strike sits a little‑known Norwegian project called NOBLE, attached to the country’s operational headquarters. Since 2019, this team has been working on ways to plug existing Norwegian platforms into allied munitions without buying new, tailor‑made hardware.

Their approach is mostly software‑driven: rather than redesign weapons, they write code that can understand and orchestrate data from different aircraft, ships and ground systems. The goal is simple but ambitious: make almost any “network‑ready” weapon usable by a coalition partner, under that partner’s own tactical control.

Jotun Strike showed that a nation with strong coding skills, but a modest fleet, can punch far above its weight in high‑end warfare.

For Norway, this means its F‑35s and other platforms can potentially guide and retask advanced weapons originally designed for US aircraft. It also means that during a crisis, Norwegian commanders might be able to coordinate strikes involving allied bombs and missiles without waiting for distant decision‑makers to approve every detail.

See also  “They age you instantly”: 5 frumpy hair trends to ditch for good after 50, according to a hairdresser

What this means for NATO and shared firepower

The political signal is as significant as the technical achievement. For the first time, a US bomb physically in the air became part of a tactical scenario designed and directed solely by an allied military. Trust had to run both ways: the US granted control, and Norway accepted the responsibility of steering an American weapon into its final approach.

Inside NATO, such capability hints at a future where national borders matter less than network permissions. In a fast‑moving crisis, an alliance member might launch a weapon, another might take control, and a third might provide targeting data, all within a few minutes.

That kind of shared firepower could, for example:

  • Allow frontline states to coordinate deep strikes using allied munitions stored on their soil
  • Let distant air forces contribute to deterrence without flying too close to hostile air defences
  • Spread the burden of decision‑making and targeting across several command centres

For smaller nations, the attraction is obvious. They do not need to own the entire arsenal as long as they can plug into it and steer it when needed. For larger powers like the US, this offers a way to leverage allies’ geography and situational awareness while keeping crews and high‑value platforms further from danger.

New risks and ethical questions

Shared control of weapons also introduces fresh concerns. If a bomb can switch from American to Norwegian hands in mid‑flight, who is legally and politically responsible once it detonates? How are rules of engagement harmonised when several nations are involved in the same strike?

The network itself also becomes a target. Adversaries will try to jam, spoof or hack the data links guiding these munitions. Securing Link 16 and future networks requires constant upgrades, hardened encryption and rigorous training to spot manipulation or corrupted data feeds.

The smarter and more connected a bomb becomes, the larger the attack surface for cyber and electronic warfare.

There is also a human factor. Operators could be tempted to rely too heavily on automation and sensor fusion, assuming the software has perfectly ranked threats and filtered out civilian objects. Military trainers now have to teach personnel how to challenge the system’s choices, not just follow them.

See also  How simplifying your day can improve emotional stability

Key terms and future scenarios

Several concepts sit at the heart of what happened during Jotun Strike and are likely to crop up more often in defence debates.

Network‑centric warfare

This describes a style of combat where the decisive advantage comes from how well sensors, shooters and commanders are connected. Instead of each aircraft or ship acting alone, they share a common picture and can hand tasks to one another in real time. Jotun Strike was a textbook example: US jets, a maritime patrol aircraft and Norwegian controllers worked as a single, distributed system.

Cross‑domain operations

Modern conflicts rarely stay in one dimension. A weapon launched from the air might rely on data from satellites, ground radar and naval vessels. In a future Arctic crisis, for instance, Norwegian coastal radars could spot a hostile ship, a US or British aircraft could launch a StormBreaker‑type weapon from far away, and another ally could retask that weapon mid‑flight as the vessel changes course.

Exercises like Jotun Strike also serve as testbeds for more complex scenarios. One likely next step is coordinating several smart munitions from different nations at once, with control passed between partners as threats shift. Another is rehearsing what happens when the network degrades: which country takes over, who can still issue a “stop” command, and how crews revert to more traditional tactics if the data stream fails.

For civilians trying to follow these shifts, the message is straightforward: warfare is becoming less about the size of a country’s arsenal and more about its ability to connect, compute and cooperate. Norway’s mid‑air takeover of an American bomb shows that, in this new landscape, lines of code can matter as much as lines of tanks.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top