Sample Thesis Paper
A breach in Homeland Security in the twenty first century is increasingly becoming a question of technological innovation. In this regard, it is not always necessarily scenarios that are volatile that cause the disruption of the fabric of society; but cases where the potential for damage in the event of an unwanted incident are also classifiable as a threat to homeland security (Bullock, Haddow, & Coppola, 2006). For instance, a hacking into the CIA website can come forth as a result of its mere presence on the internet. The CIA website poses a high degree of criticality and probability in terms of its breach and any hacking into the CIA database would be a major breach in Homeland Security.
It is for the same reason that the prevention of the breach of homeland security is carried out as a result of the combined action and sharing of information between different government agencies under the umbrella of the Department of Homeland Security.
It is evident from the above discussion that breaches in homeland security can take place from internal as well as external sources. In all such instances, the primary objective is to counter the incidence of the breach through limitation of the scope of the incident and prevention of its repetition. The preservation of Homeland security is a question of the preservation of the fabric and functionality of society and it therefore comes as no surprise that the United States seeks to engage in its preservation through highly collaborative means and measures.