. . "s and other materials misappropriated by an from computers belonging to plaintiffs, for which an investigator paid documents were selected by the intruder from a far larger of misappropriated documents according to the investigator's criteria so as to private emails involving potential business deals between plaintiffs as targets and other potential investigative targets supposedly engaged in con" . .