Thesis Friday #13: AUL – Detecting Airplane Mode Activation in iOS 26 Beta

This week I examined a forensic trace that is often underestimated in mobile analysis: the moment a user manually enables or disables Airplane Mode. With the release of iOS 26 Beta 1, the Apple Unified Log now provides clear and timestamped visibility into this specific action.

Why is this relevant? Because enabling Airplane Mode is not a passive system event. It is almost always the result of deliberate user interaction. Whether to avoid tracking, cut off communication, or trigger a controlled acquisition, this action can be forensically meaningful.

In iOS 26 Beta 1, Airplane Mode status is logged with precise system-level detail. Below are the two relevant artifacts captured in a test sequence.

Artifact: Airplane Mode Enabled

2025-07-04 14:16:40.247614+0200  localhost SpringBoard[35]: (CoreTelephony) [com.apple.CoreTelephony:Packet] Calling _CTServerConnectionGetCellularDataSettings(): isCapable = 0 isEnabled = 1 isAirplaneMode = 1

Timestamp: 2025-07-04 14:16:40.247614 (UTC+2)
Process: SpringBoard
Subsystem: CoreTelephony
EventMessage:
Calling _CTServerConnectionGetCellularDataSettings(): isCapable = 0 isEnabled = 1 isAirplaneMode = 1
→ This log entry confirms that Airplane Mode was turned ON. The key indicator is isAirplaneMode = 1, meaning cellular radios were disabled. However, as shown in the next section, Bluetooth remained active.

Artifact: Airplane Mode Disabled

2025-07-04 14:16:56.189761+0200  localhost wifid[54]: (CoreTelephony) [com.apple.CoreTelephony:Packet] Calling _CTServerConnectionGetCellularDataSettings(): isCapable = 0 isEnabled = 1 isAirplaneMode = 0

Timestamp: 2025-07-04 14:16:56.189761 (UTC+2)
Process: wifid
Subsystem: CoreTelephony
EventMessage:
Calling _CTServerConnectionGetCellularDataSettings(): isCapable = 0 isEnabled = 1 isAirplaneMode = 0
→ This confirms that Airplane Mode was turned OFF. Cellular services are now allowed, although the device still reports no current radio capability (isCapable = 0). (There was no SIM active)

Bluetooth Scanning During Airplane Mode

An unexpected observation during testing on an iPhone 12 running iOS 26 Beta 1: Bluetooth was not disabled when Airplane Mode was enabled. Instead, background Bluetooth Low Energy scans continued.

2025-07-04 14:16:40.251148+0200  localhost bluetoothd[99]: [com.apple.bluetooth:Server.LE.Scan] ScanParams: numScanAgents 5, combined params AD:1 RD:0 AS:0 PHYS:1 MSL:4 (30/300) PSV:0 Rg:0 Cri:0 pBT:0 pWiFi:0 pCfg:0 type:0
2025-07-04 

Timestamp: 2025-07-04 14:16:40.251148 (UTC+2)
Process: bluetoothd
Subsystem: Server.LE.Scan
EventMessage:
ScanParams: numScanAgents 5, combined params …

This confirms that multiple system services (e.g. sharingdlocationdCBDaemon) continued scanning in passive BLE mode. This behavior is new. In earlier iOS versions, Airplane Mode typically disabled Bluetooth unless the user manually re-enabled it.


To verify the log data, I manually checked the GUI on the test device (iPhone 12, iOS 26 beta 1). After enabling Airplane Mode via Control Center, I confirmed that Bluetooth remained active in the system settings. This matched the Unified Log output and confirmed that the interface no longer disables Bluetooth by default when Airplane Mode is toggled.

Forensic Relevance

The activation of Airplane Mode is an intentional action that can disrupt or delay communication, location services, and logging behavior. In investigative timelines, these artifacts can be used to:

  • Correlate with unlocks or app usage
  • Detect user intent to isolate the device
  • Anchor the start or end of a data gap
  • Identify hidden Bluetooth activity despite Airplane Mode being visually active

With iOS 26, these events are now more clearly and reliably recorded in the Unified Log — and that makes them a valuable signal in mobile forensic workflows.

Happy hunting!

Leave a Reply

Your email address will not be published. Required fields are marked *