it wouldn’t bother removing itself. it would just modify the search software to insure it was never seen or reported (if those modifications aren’t already built in)
btw, they can do something similar to desktops.
nic cards have a nifty ability to allow a remote hacker to upload boot code then boot the box. done right, the uploaded code would dnload and install the necessary agent and log out, resetting the boot record (covering its tracks). the agent would then work with the existing system (previously compromised for the govt by microsoft and apple) and start recording / translating / uploading.
That’s one good thing about using bitlocker or truecrypt. Even with a bootloader in the NIC they won’t be able to get into the OS without getting past that password prompt.