Logo

Jooish News

LatestFollowingTrendingGroupsDiscover
Sign InSign Up
Vos Iz Neias

The Soldier Who Sold Out Israel: Inside the Raz Cohen Iron Dome Spy Case

Mar 20, 2026·10 min read

JERUSALEM (VINnews) – A 26-year-old Jerusalem reservist serving in Israel’s most critical air defense system passed GPS coordinates of Iron Dome batteries and the names of unit commanders to Iranian intelligence operatives — during an active war in which Iranian missiles were raining down on Israeli cities. How did it happen? And what does his case reveal about Iran’s most dangerous domestic weapon?

On the morning of March 20, 2026 — with Iranian missiles still streaking toward Israeli cities and Iron Dome batteries working overtime to intercept them — the Jerusalem District Court received a document that sent a chill through Israel’s security establishment. It was a formal indictment against Raz Cohen, a 26-year-old reservist from Jerusalem who had served inside the Iron Dome air defense network. The charge: passing precise, classified information about that same system to Iranian intelligence, in exchange for a modest sum of cryptocurrency, while his country was fighting for its life.

The case is one of the most brazen and symbolically devastating espionage arrests in Israel’s recent history — not because of the sophistication of the spy, but precisely because of the lack of it. Cohen was not a trained double agent, not ideologically motivated, and not recruited through any elaborate honey trap. He was, by all accounts, an ordinary young man who fell for what Israeli investigators are now calling Iran’s most successful domestic weapon: a simple Telegram message and an offer of easy money.

The Arrest and the Indictment

According to a joint statement from the Israel Police and the Shin Bet (Israel Security Agency), Cohen was arrested just one day after the outbreak of Operation Roaring Lion — Israel’s large-scale military campaign against Iran that began on February 28, 2026. His detention was extended multiple times as investigators from Lahav 433, the Shin Bet, and the Military Police’s Investigative Unit built their case.

The indictment, filed Friday at the Jerusalem District Court, charges Cohen with two serious security offenses: contact with a foreign agent and providing information to the enemy. Prosecutors have requested that he be held until the conclusion of proceedings — a signal that they view him as a continuing risk.

The specific intelligence Cohen allegedly passed was not merely operational boilerplate. According to the N12/Mako investigative report, he transferred precise GPS coordinates (in Israeli military parlance, נ“צ — nekudat tziyun) of IDF bases and the names of unit commanders within the Iron Dome system. In a war where Iranian ballistic missiles are being aimed at specific Israeli targets, this kind of positional data is potentially lethal.

Recruited by Telegram, Trapped by Blackmail

The recruitment method was disturbingly routine. Iranian intelligence operatives — operating under what Israeli security officials have dubbed ‘Operation Money’ (Mivtza Kesef) — trawled Telegram for potential recruits, offering small payments for what initially appeared to be harmless tasks. Cohen was contacted via the platform, and, according to Israeli media reports, agreed to carry out missions in exchange for payment.

For his classified disclosures, Cohen received approximately $1,500 in cryptocurrency — a sum that, measured against the potential damage, borders on the absurd. Channel 13 reported that for one specific transfer of an Iron Dome battery location, the payment was $1,000.

But the relationship did not remain transactional for long. When Cohen apparently tried to sever contact with his Iranian handlers, they turned the tables on him. According to Channel 13’s reporting, the Iranian operatives warned him: ‘We will turn you in to the Shin Bet.’ The threat was calculated and effective: the very institution tasked with catching spies became the weapon used to keep one in place. It is a dark irony that reveals the psychological sophistication behind what might otherwise seem like a crude operation.

In his interrogation, Cohen immediately confessed and expressed what investigators described as deep remorse. ‘I was stupid,’ he told his questioners — and then added a detail that security officials found particularly troubling: he said he had previously read news articles about Israelis who had been recruited to spy for Iran, had understood the danger, and yet still fell into the trap himself.

What Was Lost — and What Might Have Been

The precise damage assessment from Cohen’s espionage remains classified, but the contours are alarming. Iron Dome is not merely a weapons system — it is the technological foundation of Israeli civilian resilience. The system’s battery locations, operational protocols, and the identities of personnel managing it are among the most sensitive categories of military information in the Israeli arsenal. In the current war with Iran, in which the Islamic Republic has launched dozens of ballistic missiles at Israeli population centers, knowing where the batteries are positioned — and where the gaps in coverage might be — is information that could directly cost lives.

Security officials speaking to Israeli media have been blunt: “The damage caused to state security is very severe,” said one senior police official, adding that the information Cohen passed ‘could be used by Israel’s enemies for actions against it.’

A Portrait of the Accused — and What We Don’t Know

Beyond the bare facts in the indictment, remarkably little has been made public about Raz Cohen the person. Israeli law restricts what can be disclosed about criminal defendants before conviction, and the military nature of the case adds additional layers of censorship. He is described only as a 26-year-old resident of Jerusalem.

What we do know, from the pattern of similar cases, is that financial pressure is the dominant driver. Iranian intelligence has proven expert at identifying economically vulnerable young Israelis — men and women without criminal records, without ideological grievances, and without any obvious reason to betray their country — and offering them what initially seems like a victimless transaction. The tasks start small (photograph a street corner, send a document) and escalate gradually until the recruit is compromised beyond retreat.

Cohen’s case fits this profile almost perfectly — with one crucial aggravating factor: his military role gave him access to information that most Iranians recruited in Israel could never obtain. He was not just a civilian running errands for a foreign spy service. He was a soldier, inside a classified military system, with access to the precise data that Iran most urgently sought.

Not the First — And Almost Certainly Not the Last

The Cohen arrest is the latest, and perhaps most serious, in a cascade of Iranian espionage cases inside Israel that has accelerated dramatically since October 7, 2023. Israeli authorities have filed over 35 indictments related to Iranian recruitment since the start of the war, involving nearly 60 defendants. The range of recruits is startling in its diversity: a 13-year-old boy from Tel Aviv recruited via Telegram; a doctor approached by an Iranian agent during foreign travel; Russian-speaking immigrants from the Krayot suburbs of Haifa; residents of East Jerusalem; and now, a reservist from inside Iron Dome itself.

The most direct parallel to the Cohen case is the January 2025 indictment of Yuri Ilyaspov, 22, of Kiryat Yam, who also served in an Iron Dome battery unit and was charged with transmitting classified information to an Iranian operative — including a video that exposed sensitive details of the system’s operation. Ilyaspov received $3,500 for that footage. His friend Georgy Andreev, who had briefly participated before withdrawing, received $50. The disproportion between the price paid and the value of the intelligence is a recurring feature of these cases.

Senior Israeli security officials have acknowledged the scale of the problem with unusual candor. One investigator from Lahav 433 told Ynet that there are likely ‘dozens of spy networks, perhaps even hundreds, currently operating’ in Israel. The warning, striking as it is, reflects the reality that Iran has invested heavily in a recruitment infrastructure that requires almost no tradecraft — just an internet connection, a Telegram account, and the willingness to pay.

The Mechanics of ‘Operation Money’

Iranian intelligence’s domestic recruitment campaign inside Israel operates on a franchise model. Agents — often not Iranians themselves, but intermediaries communicating through layers of anonymity — post in Telegram channels frequented by Israelis seeking work, or send direct messages to profiles that suggest financial vulnerability. The initial tasks are deliberately innocuous: photograph a product at a supermarket, record a street corner, bury a SIM card at a specified location.

The payments are real, the requests seem harmless, and by the time the handler escalates to more serious demands — photograph a military installation, provide the location of a missile battery, share internal unit communications — the recruit is already compromised. Refusing at that point means confessing to prior cooperation; continuing means going deeper. It is a classic entrapment architecture, and it has proven devastatingly effective against targets who might never have imagined themselves as spies.

The use of cryptocurrency for payment adds another layer of difficulty for investigators. Cohen reportedly received his funds in digital currency, and authorities believe he may have managed to conceal traces of additional transfers beyond the $1,500 they confirmed. Cryptocurrency allows Iranian handlers to maintain financial distance while still compensating their assets quickly and in ways that are difficult to trace through conventional banking channels.

A Name Worth Distinguishing

A note for readers who may encounter the name in other contexts: there is a well-known Israeli footballer named Raz Cohen — a midfielder born in 1994 in Kfar Saba who has played for Hapoel Tel Aviv, Hapoel Afula, and Hapoel Ramat Gan, among other clubs. He has no connection whatsoever to this case. The name Cohen is among the most common in Israel, and the two individuals share only their name.

What Happens Now

Cohen faces a serious criminal prosecution in the Jerusalem District Court. The charges of contact with a foreign agent and providing information to the enemy carry substantial sentences under Israeli law — and the fact that the offenses were committed during active wartime is a significant aggravating factor. The prosecution’s request to hold him until the conclusion of proceedings suggests they expect a protracted legal process.

Israeli law does provide for the death penalty in cases of treason and espionage during wartime, though it has not been applied since the execution of Adolf Eichmann in 1962. In practice, Israeli courts have handed down long prison terms in comparable cases: former minister Gonen Segev, convicted of espionage for Iran in 2019, received eleven years.

The public reaction in Israel to Cohen’s arrest has been fierce and unambiguous. Social media flooded with calls for the harshest possible sentence, with many Israelis demanding citizenship revocation and lifetime imprisonment. The intensity of the response reflects not only outrage at the act itself, but the raw nerves of a society that has been under missile attack for weeks and now learns that the man tasked with defending them may have been helping aim the missiles.

A Lesson Written in Betrayal

The Raz Cohen case forces Israel to confront an uncomfortable truth: the greatest vulnerabilities in a modern military are not always technical or tactical. They are human. A sophisticated air defense network, built at enormous cost, staffed by trained professionals, and capable of intercepting ballistic missiles mid-flight, can be compromised by a single young man with a Telegram account and a financial grievance — or simply a moment of foolishness he could not later walk back.

Iran has understood this for years. Unable to defeat Iron Dome in the air, it has invested in defeating it on the ground — not through hacking or commando raids, but through the oldest intelligence tradecraft of all: finding someone on the inside, paying them a small amount of money, and waiting for the information to arrive.

 

View original on Vos Iz Neias
LatestFollowingTrendingDiscoverSign In