The Soldier Who Sold Out Israel: Inside the Raz Cohen Iron Dome Spy Case
By admin | March 20, 2026 | 5:28 amJERUSALEM (VINnews) – A 26-year-old Jerusalem reservist serving in Israel’s most critical air defense system passed GPS coordinates of Iron Dome batteries and the names of unit commanders to Iranian intelligence operatives — during an active war in which Iranian missiles were raining down on Israeli cities. How did it happen? And what does his case reveal about Iran’s most dangerous domestic weapon?
On the morning of March 20, 2026 — with Iranian missiles still streaking toward Israeli cities and Iron Dome batteries working overtime to intercept them — the Jerusalem District Court received a document that sent a chill through Israel’s security establishment. It was a formal indictment against Raz Cohen, a 26-year-old reservist from Jerusalem who had served inside the Iron Dome air defense network. The charge: passing precise, classified information about that same system to Iranian intelligence, in exchange for a modest sum of cryptocurrency, while his country was fighting for its life.
The case is one of the most brazen and symbolically devastating espionage arrests in Israel’s recent history — not because of the sophistication of the spy, but precisely because of the lack of it. Cohen was not a trained double agent, not ideologically motivated, and not recruited through any elaborate honey trap. He was, by all accounts, an ordinary young man who fell for what Israeli investigators are now calling Iran’s most successful domestic weapon: a simple Telegram message and an offer of easy money.
The Arrest and the IndictmentAccording to a joint statement from the Israel Police and the Shin Bet (Israel Security Agency), Cohen was arrested just one day after the outbreak of Operation Roaring Lion — Israel’s large-scale military campaign against Iran that began on February 28, 2026. His detention was extended multiple times as investigators from Lahav 433, the Shin Bet, and the Military Police’s Investigative Unit built their case.
The indictment, filed Friday at the Jerusalem District Court, charges Cohen with two serious security offenses: contact with a foreign agent and providing information to the enemy. Prosecutors have requested that he be held until the conclusion of proceedings — a signal that they view him as a continuing risk.
The specific intelligence Cohen allegedly passed was not merely operational boilerplate. According to the N12/Mako investigative report, he transferred
precise GPS coordinates (in Israeli military parlance, נ“צ — nekudat tziyun) of IDF bases and
the names of unit commanders within the Iron Dome system. In a war where Iranian ballistic missiles are being aimed at specific Israeli targets, this kind of positional data is potentially lethal.
Recruited by Telegram, Trapped by BlackmailThe recruitment method was disturbingly routine. Iranian intelligence operatives — operating under what Israeli security officials have dubbed ‘Operation Money’ (Mivtza Kesef) — trawled Telegram for potential recruits, offering small payments for what initially appeared to be harmless tasks. Cohen was contacted via the platform, and, according to Israeli media reports, agreed to carry out missions in exchange for payment.
For his classified disclosures, Cohen received approximately $1,500 in cryptocurrency — a sum that, measured against the potential damage, borders on the absurd. . . .
https://vinnews.com/2026/03/20/the-soldier-who-sold-out-israel-inside-the-raz-cohen-iron-dome-spy-case/