"I Am Safe": How Two Amateur Radio Enthusiasts Secretly Passed Messages During the Falklands War

BFBS

To acknowledge and celebrate the end of the Falklands war on 14 June 1982, we are publishing this story about the unlikely friendship of two amateur radio enthusiasts 8,000 miles apart that allowed more than 50 soldiers the opportunity to get messages home to their loved ones.


Disclaimer:  This story was originally brought to light by bfbs Forces News on 7 December 2022. Certain linguistic changes have been made in the subsequent article from Cambridge Management Consulting, but all of the information comes from the original article, written by Hannah King Ros Moore, which you can read here, and an accompanying video on their YouTube page, which we encourage you to watch.


Between April and June 1982, Argentina and the United Kingdom engaged in a 10-week conflict which would come to be known as the Falklands War. Battling over the sovereignty of the Falkland Islands and its territorial dependency, South Georgia and the South Sandwich Islands, the conflict began with the invasion of the former by Argentina on 2 April, and ended with their ultimate surrender on 14 June – Falklands Liberation Day.


During this time, more than 100 villagers were being held captive in a hall by the Argentinians for almost seven weeks, before being free on 29 May by 2 PARA, following a battle to take Goose Green. Eighteen British soldiers were sadly lost during this fight, but back at home their families had heard nothing since the soldiers set sail.


That was until the unlikely friendship of two amateur radio enthusiasts 8,000 miles apart allowed more than 50 soldiers the opportunity to get messages home to their loved ones.


Bob McLeod, a ham radio operator, had already made history by making the announcement to the world that the Falkland Islands had been invaded. However, in doing so, he had also drawn the attention of the Argentinians, who were quick to confiscate his equipment.


Alan Bullock was the Forward Observation Officer of D Company, 2 PARA, and, while walking through the main street of Goose Green, spotted an antenna on a house belonging to Bob.


Alan knocked on Bob’s door, “Hello… is there any chance you are a radio amateur?”


“Yes… But the Argentinians took my transmitter and smashed it up.”


Bob’s wife then suggested that they use his 50W amplifier that was safely hidden under the stairs.

As Forward Observation Officer, Alan had his state-of-the-art at the time, military clansman radio, which, although only 20 watts for communicating over short distances, could be combined.


In order to get messages back to the UK, Bob made contact with John Wright, a radio amateur in Oxford with whom he had been chatting to over the airwaves for many years. Together, Bob and John devised a cryptic code for their conversation and each transmitted on different frequencies, in case anyone was listening. 


John would be given a soldier’s phone number and short messages to pass on to his family. 


John said of the plan: “Normally amateur radio enthusiasts talk about their radio equipment, experiments they’re doing.


“In this case, the communication was to pass family traffic which, under normal circumstances, isn’t allowed, but I threw caution to the wind and did what I could as quickly and clandestinely as possible.”


Word quickly got around the troops and soon it wasn’t just D Company’s families Bob and John were contacting. Before long, there was a queue outside Bob’s door, with each message always the same:


"I am safe."


About BFBS


BFBS is a pioneering military charity with a mission to entertain, inform, connect and champion the UK armed forces, their families and veterans.


Our armed forces do a tough yet invaluable job, often working in extreme conditions – so BFBS believes they deserve our unfailing support. Find out more at: https://about.bfbs.com/


The Positive Impact of Telecommunications


This story, and the combined initiative, intuition, and innovation between Allan Bullock, Bob McLeod and his wife, and John Wright, is testament to the transformative power of technology for forging connection and bringing optimism at times of difficulty, danger, and otherwise disconnect.


This story is particularly inspiring for Cambridge Management Consulting as an organisation currently working hard to enhance the telecommunications and technology infrastructure of the Falkland Islands. For more information about how we are achieving this, you can read about our consultancy work on the Islands here, and the opening of Falklands IT here.


Contact - AI Third Way article

Subscribe to our Newsletter

Blog Subscribe

SHARE CONTENT

Two blocks of data with bottleneck inbetween
by Paul Brooker 29 October 2025
Read our article on hidden complexity and find out how shadow IT, duplicate tools and siloed buying bloat costs. See how CIOs gain a single view of IT spend to cut waste, boost compliance and unlock 5–7% annual savings | READ FULL ARTICLE
Neon 'Open' sign in business window
by Tom Burton 9 October 2025
SMEs make up 99% of UK businesses, three fifths of employment, over 50% of all business revenue, are in everyone's supply chain, and are exposed to largely the same threats as large enterprises. How should they get started with cyber security? Small and Medium sized Enterprises (SME) are not immune to the threat of cyber attacks. At the very least, if your business has money then it will be attractive to criminals. And even if you don’t have anything of value, you may still get caught up in a ransomware campaign with all of your data and systems made inaccessible. Unfortunately many SMEs do not have an IT team let alone a cyber security team. It may not be obvious where to start, but inaction can have significant impact on your business by both increasing risk and reducing the confidence to address new opportunities. In this article we outline 5 key questions that can help SMEs to understand what they need to do. Even if you outsource your IT to a supplier these questions are still relevant. Some can’t be delegated, and others are topics for discussion so that you can ensure your service provider is doing the right things, as well as understanding where their responsibilities stop and yours start. Q1: What's Important & Worth Defending Not everything needs protecting equally. In your personal life you will have some possessions that are dear to you and others that you are more laissez-faire about. The same applies to your digital assets, and the start point for any security plan needs to be an audit of the things you own and their importance to your business. Those ‘things’, or assets, may be particular types of data or information. For instance, you may have sensitive intellectual property or trade secrets; you may hold information about your customers that is governed by privacy regulations; or your financial data may be of particular concern. Some of this information needs to be protected from theft, while it may be more important to prevent other types of data from being modified or deleted. It is helpful to build a list of these assets, and their characteristics like the table below:
Illustration of EV sensor fields
by Duncan Clubb 25 September 2025
Explore the rise of edge AI: smaller data centres, faster networks, and sustainable power solutions. See why the future of digital infrastructure is distributed and intelligent | READ FULL ARTICLE
A close-up of the Downing St sign
by Craig Cheney 19 September 2025
Craig Cheney | The conversation around artificial intelligence (AI) in Government has shifted in recent years. The publication of the UK Government’s AI Playbook represents more than just updated guidance — it signals a huge shift in the government's approach to AI.
Volcano lava lake
by Scott Armstrong 18 September 2025
Discover why short-term thinking on sustainability risks business growth. Explore how long-term climate strategy drives resilience, valuation, and trust | READ FULL ARTICLE
Close up of electricity pylon
by Duncan Clubb 17 September 2025
The UK’s AI ambitions face gridlock. Discover how power shortages, costly electricity, and rack density challenges threaten data centre growth – and what’s being done | READ FULL ARTICLE
Abstract neon hexagons
by Tom Burton 17 September 2025
Delaying cybersecurity puts startups at risk. Discover how early safeguards boost investor confidence, customer trust, and long-term business resilience | READ FULL ARTICLE
More posts