The document discusses techniques for detecting data leakage when sensitive data is distributed to third parties. It proposes distributing data intelligently using allocation strategies to improve the chances of identifying a guilty agent if data is leaked. Specifically, it evaluates distributing data with and without "fake objects" that resemble real data but do not correspond to real entities. The strategies are evaluated experimentally using simulated data leakage problems. The goal is to identify agents who leak data with strong evidence in order to hold them legally accountable.