USA has long accused China of aggressive espionage & reverse engineering . Officials and organizations have traced various attacks on corporates and government computer systems in US to computers in China. The attack in some some cases are so sophisticated that it will be impossible to perpetrate without the backing of Chinese government. SIKORSKY UH-60 In the 1980s, China purchased two dozen civilian version of the Black Hawk. They got some insights about design but were not able to do much since these did not contain secret components like the military version. This changed in 2011. Pakistan gave China access to the previously unknown U.S. "stealth" Sikorsky UH 60 helicopter that crashed during the commando raid which killed Osama bin Laden in May. This was done despite ,explicit requests from the CIA not to. It is believed that Chinese experts took detailed photographs of the design and more importantly collected the sample of the stealth coating which is used to hide the craft from radars. AM GENERAL HMMWV HUMVEE LIGHT TRUCK (U.S.) CHINESE DONGFENG EQ2050 BRAVE SOLDIER In the late 1980s, AM General, a major vehicle manufacturer based in Indiana, wanted to sell the High Mobility Multipurpose Wheeled Vehicle, also known as the Humvee, to the Chinese People’s Liberation Army (PLA). The PLA rejected the offer, and picked up one Humvee that was left by AM General in China. They also gathered the few civilian Humvees that Chinese oil companies had bought in the 1990s. Using reverse engineering, they built a prototype and named it Dongfeng EQ2050. C-17 GLOBEMASTER III Y-20 DOPPELGANGER Beginning in the winter of 2009, two Chinese hackers began sending malicious e-mails to Boeing employees disguised to look as if they came from familiar people. Even if one employee opened the mail and downloaded the attached file, it could give hackers a portal to secrets, corporate and US Department of Defense plans, engineering details, and potentially classified Pentagon files stored on Boeing networks. And that’s exactly what happened. On 26 Jan 2013 Chinese copy of C17 ,Y-20 Doppelganger, first flew. Currently, 8 is in service more production is planned in future. NORTHROP GRUMMAN X-47B UNMANNED COMBAT AIR VEHICLE (UCAV) CHINESE LIJIAN SHARP SWORD UCAV General Atomics MQ-1 Predator UAV (U.S.) CHENGDU WING LOONG “PTERODACTYL” UAV Beginning in 2011, a series of weaponized emails—PDF and Word attachments with malware inside—were sent to people who work to build american drones. A cybersecurity group found that the attachments, many of them with benign titles like "Boeing_Current_Market_Outlook_2011_to_2030.pdf" ," originated with a hacker group in Shanghai linked to China's military. Of the 261 attacks uncovered, 123 targeted U.S. drone companies, from large defense contractors to small firms. According to analyst , these were largely successful . The newest Chinese drones build with stolen data, closely resemble US aircraft visually and in performance, a remarkable turn-around time for China’s aviation industry. A LOCKHEED MARTIN F-35B Lightning II (U.S.) Shenyang J-31 which was unveiled in late 2014. The pentagon began the f-35 program in 2001 with an aim to develop a cost effective replacement for the u.s. military’s f-15 fighters, f-16 and f-18 bombers and reconnaissance aircraft, and a-10 close air support warplanes. Apart from United States,the primary customer and financial backer, the United Kingdom, Italy, the Netherlands, Canada, Turkey, Australia, Norway and Denmark are also part of the program.