They call themselves the Shadow Warriors. It isn't just a cool-sounding nickname for a patch or a challenge coin; it’s a literal description of how the 90th Cyberspace Operations Squadron (90 COS) functions within the broader machinery of the United States Air Force. If you’re looking for the flashy, Hollywood version of hacking where screens glow green and code flies by at light speed, you won’t find it here. The reality is much more quiet. And much more dangerous.
Based out of Joint Base San Antonio-Lackland, Texas, the 90 COS is a premier unit under the 67th Cyberspace Wing. They are the ones tasked with the development of "cyber effects." Basically, they build the tools that allow the military to project power in a space that doesn't have borders or physical terrain.
What the 90th Cyberspace Operations Squadron actually does
Most people assume every cyber unit in the military is just "defending the network." That’s a common mistake. While defense is huge, the 90th Cyberspace Operations Squadron focuses heavily on the capability development side. They are the architects. Think of it like this: if the Air Force were a traditional kinetic wing, the 90 COS wouldn't just be the pilots; they’d be the engineers designing the missiles and the stealth coating.
They produce the software and the exploits that the Cyber Strike Teams use when a mission goes live. Honestly, it’s a high-pressure environment because the "shelf life" of a cyber capability is incredibly short. A vulnerability that works today might be patched by a software update tomorrow. Because of that, the 90 COS has to operate with an agility that you don't usually see in the federal government. They use what’s called "Agile Development" cycles. It’s fast. It’s iterative.
The squadron is part of the 67th Cyberspace Operations Group. Their mission is essentially to provide the "full-spectrum" capabilities. You’ve got developers, analysts, and operators all sitting in the same SCIF (Sensitive Compartmented Information Facility), trying to solve puzzles that haven't even been identified as problems yet.
✨ Don't miss: The Dark Side of the Moon NASA Never Told You was a Myth
The Shift from Defensive to Offensive Mindsets
There’s a lot of chatter about "persistent engagement" in modern military doctrine. This is the idea that you can't just sit back and wait for an attack. You have to be present in the digital space constantly. The 90th Cyberspace Operations Squadron is at the heart of this shift. They aren't just reacting to pings on a firewall.
Historically, the military viewed cyber as a support function—something to keep the emails running or the satellites linked. That's dead now. Today, cyber is a lead domain. The 90 COS builds tools that can degrade or disrupt an adversary's ability to command their own forces. Imagine a scenario where an enemy's radar simply stops talking to their surface-to-air missiles. No explosions. No smoke. Just a line of code that says "No." That is the power the 90 COS brings to the table.
But it’s not all about "hacking the planet." A huge part of their work is Intelligence, Surveillance, and Reconnaissance (ISR). Before you can launch an effect, you have to understand the target network better than the people who built it. This requires a level of forensic detail that would make most IT professionals' heads spin. They look for the tiny cracks—the "zero-days"—that no one else has found.
Why San Antonio is the "Cyber City"
You might wonder why this is all happening in San Antonio. It’s not a coincidence. Joint Base San Antonio (JBSA) has become the epicenter of military cyber operations. Between the 16th Air Force (Air Forces Cyber) and the presence of the NSA’s Texas cryptologic center, the talent pool is massive.
The 90th Cyberspace Operations Squadron benefits from this ecosystem. They aren't working in a vacuum. They are constantly rubbing shoulders with the best minds in the private sector and other government agencies. This cross-pollination is what keeps their tools relevant. If they stayed inside a strictly "military" bubble, they’d be outpaced by Silicon Valley in six months. Instead, they’ve adopted a culture that feels more like a tech startup than a traditional military unit. You’ll see airmen in hoodies as often as you see them in OCPs (Operational Camouflage Pattern).
The Difficulty of Recruiting for the 90 COS
Let's be real: if you are a world-class coder, you can make half a million dollars a year working for a FAANG company. Why would you join the Air Force to sit in a windowless room in Texas?
The 90th Cyberspace Operations Squadron deals with this recruitment challenge every single day. Their pitch isn't the money. It’s the mission. In the private sector, you might be optimizing an ad algorithm to get people to click on a "Buy Now" button. At the 90 COS, you are working on problems of national security that literally no one else is allowed to touch.
- Legal Protections: Doing what they do in the private sector would land you in federal prison. Here, it’s your job.
- Unique Data Sets: They have access to information and networks that don't exist in the public web.
- Immediate Impact: You can write code in the morning and see it utilized in a global operation by the afternoon.
It takes a specific kind of person. They need people who are "half-monk, half-pirate." You need the discipline of a soldier but the creative, rule-breaking mindset of a hacker. Finding that balance is the hardest part of the squadron commander's job.
Misconceptions about Cyber Warfare
People often think cyber warfare is about "shutting down the power grid." While that’s a theoretical possibility, the 90 COS usually works on much more surgical goals. Total destruction is rarely the point. Subtlety is.
If you shut down a city's power, everyone knows they are under attack. If you subtly manipulate the data in a logistics database so that fuel trucks arrive at the wrong coordinates, you’ve achieved the same military goal without the massive escalatory "noise." The 90th Cyberspace Operations Squadron is the master of this kind of "gray zone" conflict.
✨ Don't miss: Why Download Video From Website Tools Are Glitchy and How to Actually Use Them
Another misconception is that it's all automated. It's not. There is a "man-in-the-loop" for almost everything. Every line of code, every exploit, and every deployment undergoes rigorous legal and ethical review. The Law of Armed Conflict (LOAC) applies to bytes just as much as it applies to bombs.
The Technology Stack (What we can actually talk about)
Obviously, the specific tools used by the 90th Cyberspace Operations Squadron are highly classified. We aren't going to find a GitHub repo for their latest exploits. However, we do know the general areas they focus on.
They are heavily involved in "DevSecOps." This is the practice of integrating security at every phase of the software development lifecycle. Instead of building a tool and then checking if it’s secure, the 90 COS builds security into the very foundation.
They also work extensively with:
- Vulnerability Research: Digging into firmware and operating systems to find weaknesses.
- Reverse Engineering: Taking apart adversary malware to see how it works and how to stop it.
- Data Analytics: Using AI and machine learning to sift through petabytes of network traffic to find the one "odd" packet that signals a breach.
Real-World Examples (Illustrative)
While we can't point to a specific "Operation X" and say the 90 COS did it, we can look at the types of operations they support. When the U.S. Cyber Command (USCYBERCOM) conducted "Defend Forward" operations during recent election cycles to prevent foreign interference, units like the 90th Cyberspace Operations Squadron were the ones providing the technical "ammo."
When a rogue nation-state uses ransomware to target American infrastructure, the 16th Air Force responds. The 90 COS provides the forensic tools to trace that attack back to its source and the counter-capabilities to ensure it doesn't happen again. They are the unseen hand in many of the headlines you read about "unidentified technical glitches" affecting adversarial regimes.
Actionable Insights for the Future
The world is only getting more connected. The Internet of Things (IoT), 5G, and the integration of AI into every device mean that the "attack surface" is growing exponentially. The 90th Cyberspace Operations Squadron is currently trying to figure out how to defend—and exploit—this new reality.
✨ Don't miss: Who Came Up With YouTube: The Real Story Behind the Three Guys Who Changed the Internet
If you are a tech professional or an aspiring airman, here is what you need to understand about the direction this is going:
- Understand the Hardware: Software-only hackers are becoming less valuable. The real "wins" are happening at the hardware and firmware level. Learn how chips think.
- Master the "Boring" Stuff: Everyone wants to do "Red Teaming" (offensive hacking). But the real breakthroughs often come from people who understand boring networking protocols or legacy database structures better than anyone else.
- Ethics Matter: In a world of autonomous cyber tools, the ethical framework you operate under is your most important safeguard. The military takes this incredibly seriously, and so should you.
- Stay Agile: The 90 COS succeeds because it isn't afraid to throw away a tool that worked yesterday if a better way exists today. Don't get married to your code.
The 90th Cyberspace Operations Squadron remains one of the most vital, yet least understood, components of modern American defense. They operate in the dark, not because they are doing anything wrong, but because in the world of cyber, the moment you are seen, you've already lost. They are the guardians of the invisible front. As long as our lives are lived through screens and signals, their mission will only become more central to our national survival.
To stay informed on these developments, watch for updates from the Air Force 16th Air Force (Air Forces Cyber) and the 67th Cyberspace Wing public affairs offices. They occasionally release declassified success stories and recruitment initiatives that give a rare peek behind the curtain of the Shadow Warriors.