This document describes a system for detecting data leakage when sensitive data is distributed to third party agents. It proposes strategies for allocating data across agents to improve the ability to identify leaks. These strategies include injecting fake records to act as watermarks without modifying real data. The system models agent guilt and develops algorithms to optimize data distribution and detect leaks. It includes modules for data allocation, fake objects, leakage protection, and identifying guilty agents.