A vulnerability exists when:

A) Friendly forces detect a weakness in their operations.
B) Friendly forces detect a weakness in their operations and when the adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.
C) The adversary is capable of detecting critical information.
D) The adversary is able to collect friendly critical information.
E) The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.