it me!

Graham Starr (me) is a freelance journalist and editor who makes things with math, art, and computers. I focus on interactive projects, digital features, and investigations (here is my PGP key and email). I’ve written about technology for Wired, The Atlantic, New York Magazine, and the Christian Science Monitor’s Passcode, and my projects have been featured in the Washington Post, Fortune, NPR, and HuffPost, among others. Breitbart once wrote an article about one of my projects and they put my name in scare-quotes for the entire thing. It was weird!

I’m currently on contract as the special projects editor at New York Magazine’s Select All. Before that, I was on staff at WIRED magazine as the research assistant to editor-in-chief Nicholas Thompson. And before that, I was a member of The Atlantic’s special projects team. There, I built, managed, and edited cool features (such as a retrospective on the Obama presidency, an oral history of the American workforce, and an interactive on how the world has changed during your lifetime (the last of which won a 2017 MPA Imagination Award!)).  

I occasionally work with NYU’s Interactive Telecommunications Program. Most recently, I was an “Instigator” at the program’s ITP Camp, where I helped lead workshops on media, art, and technology.

I’m interested in experimental storytelling and the intersection of comedy, tech, and journalism. In 2016, I participated in Comedy Hack Day, where my team, EquiTable, won the grand prize with a bill-splitting app that used Bureau of Labor Statistics data to account for historic wage inequity.

In college, I was the editor-in-chief of Tufts University’s humor magazine, The Zamboni. I revived and redesigned the then-25-year-old publication, launched its first website, and grew its staff from five to 60. The group’s official constitution is pretty wild.

More of my résumé can be seen by looking at my résumé.

If you’d like to hire me to do something cool for you, or just want to chat, please send me an email. I’d love to hear from you!

PGP Fingerprint: E1CB E7BF 0A23 D2BC C616 2A65 DB0D 92DF 71F4 416F
[PGP Public Key]