The document discusses data leakage from organizations to external parties. It proposes using watermarking and fake data objects to detect the source of leaks. The system would include modules for data allocation, fake objects, data distribution, and identifying guilty agents. The goal is to distribute data intelligently to improve detection of agents responsible for leaks, while satisfying data requests. Challenges include some data not supporting watermarks and dynamic agent requests.