Fingerprinting, IP address location, two-factor authentication, data encryption, intrusion detection, transaction-risk analysis, customer-risk detection and other technologies promise to solve fraud and abuse, money laundering and terrorism financing risk.