On the modelling of the unstable breaching process