GasCope
Iron Dome Leaker Goes Full Degen: IDF Reservist Sells State Secrets for Crypto Pocket Change
Back to feed

Iron Dome Leaker Goes Full Degen: IDF Reservist Sells State Secrets for Crypto Pocket Change

Israeli prosecutors hit IDF reservist Raz Cohen with a formal indictment on March 20. He stands accused of trading classified Iron Dome intel to Iranian spooks for what amounts to a crypto bag of roughly $1,000—barely enough for a decent NFT mint these days.

The Shin Bet and the police's Lahav 433 unit, in a joint op charmingly named "Operation Roaring Lion," brought the charges before the Jerusalem District Court. It turns out even counterintelligence has a flair for dramatic branding.

Cohen, age 26, had previously served in the Iron Dome's command and control unit from 2019 to 2022. According to the reports, he slid into some DMs, kicking off contact with an alleged Iranian handler on Telegram back in December 2025. The ultimate "wrong chat" scenario.

Over approximately one month, he proceeded to airdrop 27 photos and videos to his new pen pal. The content was a masterclass in operational security failure, detailing firing processes, rates of fire, and arming procedures for the missile defense system. Not your average tech tutorial.

His generosity didn't stop there. He also handed over the GPS coordinates for Iron Dome batteries at Hatzerim and Palmachim bases, plus the locations of seven Israeli Air Force bases. Cohen even proudly volunteered his military role to the handler, a classic case of oversharing that would make any degen blush.

The leaked info dump also included personal details of Israeli security personnel. This featured a guard at the President's Residence and a relative who serves as an IAF pilot. Because why stop at state secrets when you can dox your own family for free?

The plot thickened when the handler later allegedly threatened to dox Cohen right back, promising to post a photo of his sister on a Telegram profile. Cohen's response? He blocked the contact and deleted Telegram in February 2026. The digital equivalent of "rage-quitting" after a bad trade.

Authorities finally caught up and arrested him on March 1, conveniently just one day after the war with Iran kicked off. Talk about poor timing.

Cohen now faces the music on charges of assisting the enemy during wartime and transmitting information to the enemy with intent to harm state security. Both carry a maximum penalty of life imprisonment under Israeli law—a significantly heavier bag than the one he was chasing.

This marks the first known espionage case involving an actual Iron Dome operator. Authorities dryly note that dozens of Israelis have faced similar Iran-linked charges over the past two years, suggesting this isn't exactly a one-off rug pull.

Recruitment attempts have predictably surged through social media and encrypted messaging apps during the ongoing conflict. The case is a stark, if absurd, lesson in how adversary intel services use tiny crypto payments on encrypted platforms to shop for classified defense info from personnel with active clearances. It's the ultimate low-ball offer.

Share:
Publishergascope.com
Published
UpdatedMar 24, 2026, 12:14 UTC

Disclaimer: This content is for information and entertainment purposes only. It does not constitute financial, investment, legal, or tax advice. Always do your own research and consult with qualified professionals before making any financial decisions.

See our Terms of Service, Privacy Policy, and Editorial Policy.