What would be the hypothetical example of modern day burglary?

You break into a neighbor's house and steal their jewelry.

Does it have to be planned? For example a person goes in to the gas station every night to see who's working and stuff. And one night he decides to rob that gas station

Does this count as modern day burglary?

No. That's robbery, not burglary. Study this definition.

http://legal-dictionary.thefreedictionary.com/burglary

and this

http://www.quizlaw.com/criminal_law/what_is_the_difference_betwe.php

To provide a hypothetical example of modern-day burglary, let's consider a scenario involving digital theft. Please note that this example is purely fictional and intended for illustrative purposes.

Imagine there is a skilled hacker named Alex. Alex decides to carry out a burglary in the cyber world by targeting an e-commerce website called "TechMart." Here's how the hypothetical burglary could unfold:

1. Reconnaissance: Alex begins by gathering information about TechMart's website structure, vulnerabilities, and potential entry points. This could be achieved through techniques like scanning for open ports, analyzing the website's source code, or using social engineering tactics to exploit employees.

2. Exploiting Weaknesses: After identifying a vulnerability in TechMart's website, Alex exploits it to gain unauthorized access. This could involve exploiting a software flaw, utilizing weak passwords, or gaining access to an employee's credentials.

3. Network Access: Once inside TechMart's network, Alex aims to maintain persistence by disguising their activities and avoiding detection. They may escalate their privileges or search for valuable data such as customer information, sales records, or financial data.

4. Data Theft: Alex successfully obtains sensitive data from TechMart's database, including customers' personal information, credit card details, and purchase history. They could access this information by bypassing encryption, using keyloggers, or exfiltrating data through covert channels.

5. Covering Tracks: To evade detection, Alex takes precautions to erase any traces of their presence, such as deleting log files, modifying timestamps, or staging a decoy attack, making it harder for TechMart's security team to identify the breach.

6. Escaping: Once the theft is complete, Alex leaves the system without a trace, exploiting various techniques to remain anonymous, such as using IP anonymizers, TOR networks, or bouncing through multiple compromised systems around the world.

It's important to reiterate that this is a hypothetical example, and engaging in such activities is illegal and unethical.