This document summarizes data allocation strategies for detecting data leakage when sensitive data is distributed through trusted agents. It proposes injecting "fake but genuine-looking" data along with real data to improve the ability to detect if leakage occurs and identify the agent responsible. Various allocation algorithms are presented, including random selection and maximizing the difference between agents' probabilities of guilt. Empirical results show the average detection metric is improved when fake data is used compared to no fake data. The strategies aim to detect leakage without modifying the original data, unlike traditional watermarking techniques.