A former British soldier, Daniel Khalife, has been sentenced to 14 years and three months in prison after being convicted of spying and terrorism offences, following a detailed investigation by the Metropolitan Police’s Counter Terrorism Command.

Khalife, 23, was sentenced on 3 February 2025 at Woolwich Crown Court after being found guilty of sharing sensitive military information with Iranian agents.

His conviction, which included charges under the Official Secrets Act 1911 and the Terrorism Act 2000, highlights the serious threat posed by espionage and the UK’s firm response to safeguarding national security.

Khalife first came under suspicion in November 2021 when he anonymously contacted MI5 twice, claiming that he had established contact with Iranian agents and wished to become a “double agent.” His identity was later confirmed by investigators, who found that Khalife was serving in the Army at Staffordshire Barracks.

He was arrested in January 2022, and subsequent searches of his room uncovered sensitive documents detailing information about soldiers attached to highly classified units. Investigators also discovered that Khalife had been passing sensitive military information to Iranian agents for over two years.

In January 2023, Khalife was due to be charged with espionage-related offences, but he went missing after fleeing from his Army unit. Searches of his barracks room revealed a potential improvised explosive device and a note indicating he feared being charged. He was arrested on 26 January 2023 after being spotted at a leisure centre in Staffordshire.

While awaiting trial, Khalife staged a high-profile escape from HMP Wandsworth in September 2023, triggering a nationwide three-day manhunt involving hundreds of officers, police agencies, and public assistance. Khalife was eventually captured in Northolt.

Khalife was convicted of the following offences:

  • Passing information to Iran under the Official Secrets Act 1911, for which he was sentenced to six years in prison.
  • Eliciting or attempting to elicit information useful for terrorism, under the Terrorism Act 2000, resulting in a six-year sentence (five years custodial and one year on licence).
  • Prison escape for which he received an additional two years and three months’ imprisonment.

His combined sentence totals 14 years and three months. Khalife will also be subject to notification requirements under the Counter Terrorism Act 2008 for 15 years.

He was found not guilty of creating a bomb hoax at the Staffordshire Army barracks.

Commander Dominic Murphy, Head of the Met’s Counter Terrorism Command, highlighted the severity of the case, stating:

“The threat to the UK from states such as Iran is very serious, so for a soldier in the Army to be sharing sensitive military material and information with them is extremely reckless and dangerous.”

Murphy praised the collaborative effort of police, intelligence services, and the public in tracking down Khalife after his escape, adding:
“This outcome and sentence should serve as a warning to others that the illegal sharing of information will be treated extremely seriously by security services and police.”


At the UK Defence Journal, we aim to deliver accurate and timely news on defence matters. We rely on the support of readers like you to maintain our independence and high-quality journalism. Please consider making a one-off donation to help us continue our work. Click here to donate. Thank you for your support!

George Allison
George has a degree in Cyber Security from Glasgow Caledonian University and has a keen interest in naval and cyber security matters and has appeared on national radio and television to discuss current events. George is on Twitter at @geoallison

3 COMMENTS

  1. “Staffordshire Barracks”
    What Staffordshire Barracks?
    DMS Whittington? MoD Stafford? Beachley Barracks? I don’t recall a “Staffordshire Barracks” existing, so, as he was RCS,
    I assume he was at Beachley Barracks.
    Anyway, glad he is out of circulation, sounds like a bit of a fantasist.

LEAVE A REPLY

Please enter your comment!
Please enter your name here